11/12
11/12
Media and
Information
Literacy
Quarter 1 – Module 9:
Challenges in the Virtual
World
What I Need to Know
This module was designed and written with you in mind. It is here to help you
master the Challenges in The Virtual World. The scope of this module permits it to
be used in many different learning situations. The language used recognizes the
diverse vocabulary level of students. The lessons are arranged to follow the
standard sequence of the course. But the order in which you read them can be
changed to correspond with the textbook you are now using.
The module is divided into two learning outcomes, namely:
LO 1 - explain actions to promote ethical use of media and information
(MIL11/12LESI-IIIg22);
LO 2 - Create a campaign add to combat digital divide, addiction, and bullying.
(MIL12/LESI-IIIG-23)
After going through this module, you are expected to:
a) Describe the challenges/risks of Internet use and where they are
most likely to occur; and
b) Understand the interdependencies between users’ behaviour and the
likelihood of them being a victim or a perpetrator.
1
Definition of Terms
Computer Addiction
The excessive use of computers to the extent that it interferes with daily life. This
excessive use may for example interfere with work or sleep, result in problems with
social interaction, or affect mood, relationships, and thought processes.
Computer Program
Refers to a set of instructions executed by the computer to achieve intended results.
Computer System
Refers to any device or group of interconnected or related devices, one or more of
which, pursuant to a program, performs automated processing of data. It covers
any type of device with data processing capabilities including, but not limited to,
computers and mobile phones. The device consisting of hardware and software may
include input, output, and storage components the may stand alone or be
connected in a network or other similar devices. It also includes computer data
storage devices or media.
Critical Infrastructure
Refers to the computer systems, and/or networks, whether physical or virtual,
and/or the computer programs, computer data and/or traffic data so vital to this
country that the incapacity or destruction of or interference with such system and
assets would have a debilitating impact on security, national or economic security,
national public health and safety, or any combination of those matters.
Cyber
Refers to a computer or computer network, the electronic medium in which
communication takes place.
Cyber Bullying
Bullying that takes place online, or using electronic technology such as cell phones,
computers, and tablets over communication tools including social media sites, text
messages, chat, and websites.
Cybersecurity
Refers to the collection of tools, policies, risk management approaches, actions,
training, best practices, assurance and technologies that can be used to protect the
cyber environment and organization and user’s assets.
2
Database
Refers to a representation of information, knowledge, facts, concepts, or
instructions which are being prepared, processed or stored or have been prepared,
processed or stored in a formalized manner and which are intended for use in a
computer system.
Digital Divide
An economic inequality between groups in terms of access to, use of, or knowledge
of ICT. The divide within countries (such as the digital divide in the United States)
can refer to inequalities between individuals, households, businesses, and
geographic areas at different socioeconomic (and other demographic) levels.
Interception
Refers to listening to, recording, monitoring or surveillance of the content of
communications, including procuring of the content of data, either directly,
through access and use of a computer system or indirectly, through the use of
electronic eavesdropping or tapping devices, at the same time that the
communication is occurring.
Service Provider
Any public or private entity that provides to users of its service the ability to
communicate by means of a computer system; and any other entity that processes
or stores computer data on behalf of such communication service or users of such
service.
Subscriber’s Information
Refers to any information contained in the form of computer data or any other form
that is held by a service provider, relating to subscribers of its services other than
traffic or content data and by which identity can be established.
Traffic Data or Non-content Data
Refers to any computer data other than the content of the communication
including, but not limited to, the communication’s origin, destination, route, time,
date, size, duration, or type of underlying service.
Definition is taken from Fifteenth Congress Second Regular Session, 2012
3
Lesson
Challenges in The Virtual
9 World
Media and other information providers play a central role in information and
communication processes. Nowadays, media become the common outlet of self-
expression and creativity. Its huge influence spreads speedily across the globe. The
connection between technological advances and people’s connectivity created a
huge impact on the lives of today’s generation. This module covers all the above-
mentioned concepts.
What’s In
Intellectual Property is the product of one’s mind. There are five (5) types of
intellectual property namely: copyright, patent, trademark, industrial design and
geographical origin. All types of intellectual property are covered and protected by
law. Violation of the use of it is punishable by law.
Aside from the violation of Intellectual Property, numerous unethical actions arise
in media. These include cybercrimes such as cyberbullying, computer addiction,
identity theft, etc.
To learn more about the topic, let’s take a look at the activity.
Notes to the Teacher
You may provide news articles that reports how cybercrime
increased due to the internet.
4
What is It
CHALLENGES AND RISKS IN MEDIA
People nowadays find media as the fastest means of exchanging numerous
information, but lack to note the possible harmful effects of it. The International
Human Rights Law manages to provide security against possible harmful online
content.
The following are risks related to online contact: Money theft/phishing refers to
the process of harvesting bank details, in particular, personal identification
numbers (PINs) and transaction authentication numbers (TANs), with the intent to
ransack other people’s bank accounts. Commercial fraud: Commercial fraud
happens when sellers pretend to sell goods or services which, after payment, either
do not show the promised attributes or are not delivered at all. Grooming:
Grooming refers to pedophiles using the Internet as a means to contact children
and young people while concealing their adult identity. Bullying: Various types of
bullying seem always to be part of people’s lives. Even though publishing content
like defamatory pictures can be part of bullying, the phenomenon is chiefly related
to online contact. Multifunctional mobile phones are often used for taking pictures
with the intention of bullying and then uploading the pictures to the Internet or
sending them via multimedia messaging (MMS) to others. Another example is
sending messages/emails of insult, humiliating photos and fake profiles
deliberately shared across social media. Computer addiction: the excessive use of
computers to the extent that it interferes with daily life.
Another issue in media use is the so-called Digital divide- the economic inequality
between groups in terms of access to, use of, or knowledge of ICT. To address the
above-mentioned media-related issues, the Philippine Government approved the
Republic Act 10175 also known as the “Cybercrime Prevention Act of 2012” which
aims to address legal issues concerning online interactions and technology related
concerns in the country. RA 10175 of 2012, includes the following.
5
CHAPTER II. PUNISHABLE ACTS
Section 4. Cybercrime Offenses. — The following acts constitute the offense of
cybercrime punishable under this Act:
(a) Offenses against the confidentiality, integrity, and availability of computer
data and systems:
(1) Illegal Access – The access to the whole or any part of a computer system
without right.
(2) Illegal Interception – The interception made by technical means without right
of any non-public transmission of computer data to, from, or within a
computer system including electromagnetic emissions from a computer
system carrying such computer data.
(3) Data Interference — The intentional or reckless alteration, damaging, deletion
or deterioration of computer data, electronic document, or electronic data
message, without right, including the introduction or transmission of
viruses.
(4) System Interference — The intentional alteration or reckless hindering or
interference with the functioning of a computer or computer network by
inputting, transmitting, damaging, deleting, deteriorating, altering or
suppressing computer data or program, electronic document, or electronic
data message, without right or authority, including the introduction or
transmission of viruses.
(5) Misuse of Devices
(i) The use, production, sale, procurement, importation, distribution, or
otherwise making available, without right, of:
(6) Cyber-squatting – The acquisition of a domain name over the internet in bad
faith to profit, mislead, destroy reputation, and deprive others from
registering the same.
(b) Computer-related Offenses:
(1) Computer-related Forgery
(i) The input, alteration, or deletion of any computer data without right
resulting in inauthentic data with the intent that it be considered or acted
upon for legal purposes as if it were authentic, regardless whether or not the
data is directly readable and intelligible; or
(2) Computer-related Fraud — The unauthorized input, alteration, or deletion of
computer data or program or interference in the functioning of a computer
system, causing damage thereby with fraudulent intent: Provided, That if no
6
damage has yet been caused, the penalty imposable shall be one (1) degree
lower.
(3) Computer-related Identity Theft – The intentional acquisition, use, misuse,
transfer, possession, alteration or deletion of identifying information
belonging to another, whether natural or juridical, without
right: Provided, That if no damage has yet been caused, the penalty
imposable shall be one (1) degree lower.
(c) Content-related Offenses:
(1) Cybersex — The willful engagement, maintenance, control, or operation,
directly or indirectly, of any lascivious exhibition of sexual organs or sexual
activity, with the aid of a computer system, for favor or consideration.
(2) Child Pornography — The unlawful or prohibited acts defined and punishable
by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009,
committed through a computer system: Provided, That the penalty to be
imposed shall be (1) one degree higher than that provided for in Republic Act
No. 9775.
(3) Unsolicited Commercial Communications. — The transmission of commercial
electronic communication with the use of computer system which seek to
advertise, sell, or offer for sale products and services are prohibited unless:
(i) There is prior affirmative consent from the recipient; or
(ii) The primary intent of the communication is for service and/or
administrative announcements from the sender to its existing users,
subscribers or customers; or
(4) Libel — The unlawful or prohibited acts of libel as defined in Article 355 of the
Revised Penal Code, as amended, committed through a computer system or
any other similar means which may be devised in the future.
Furthermore, Section 8 of the law tackles about Penalties such as — Any person
found guilty of any of the punishable acts enumerated in Sections 4(a) and 4(b) of
this Act shall be punished with imprisonment of prision mayor or a fine of at least
Two hundred thousand pesos (PhP200,000.00) up to a maximum amount
commensurate to the damage incurred or both. Any person found guilty of the
punishable act under Section 4(a)(5) shall be punished with imprisonment of
prision mayor or a fine of not more than Five hundred thousand pesos
(PhP500,000.00) or both.
With the never-ending risks in media, protecting oneself is everyone’s responsibility.
7
safebook
Image source: https://safeinwarwickshire.com/2014/08/28/safebook-a-few-simple-tips-
when- using-socialmedia-how-to-avoid-cyberbullying-including-advice-to-
The image above suggests ways everyone should consider every time in contact with
the virtual world.
8
References
Commission on higher Education, 2016. Teaching Guide for Senior High
School MEDIA AND INFORMATION LITERACY CORE SUBJECT.
Media and Information Literacy Curriculum Guide by DepEd
http://unesco.mil-for-teachers.unaoc.org/modules/module-7/unit-2/
http://www.lawphil.net/statutes/repacts/ra2012/ra_10175_2012.html
9
10