Nothing Special   »   [go: up one dir, main page]

Lesson Plan For MIL

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

LESSON PLAN IN MEDIA AND INFORMATION LITERACY (MIL)

I. OBJECTIVES
At the end of the session, at least 90% of the learners shall be able to:
 Identify and explain the legal, ethical and societal issues. MIL11/12LESI-IIIg-20
 Demonstrate the relevance of current issues related to copyright and what are the actions
of government and private sectors through a Case Study. MIL11/12LESI-IIIg-21
 Internalize and apply the information acquired about legal, ethical and societal issues in
real life situation. MIL11/12LESI-IIIg-22

II. SUBJECT MATTER


a. Topic: Legal, Ethical, and Societal Issues in Media and Information Literacy
 Copyright, Plagiarism, Cyber Bullying & Computer addiction
Reference:
Clark, L. (2014, May 9). Four in ten teenage girls 'are addicted to internet': Youngsters
increasingly showing signs of compulsion with their tablets and smartphones. Retrieved
form http://www.dailymail.co.uk/news/article-2623903/Four-ten-teenage-girls-addicted-
internet-Youngstersincreasingly-showing-signs-compulsion-tablets-smart-phones.html
Mateo, J. (2015, December 3). UP grad in photo plagiarism gets redemption. Philippine
Star newspaper homepage philstar.com. Retrieved from
http://www.philstar.com/headlines/2015/12/03/1528420/grad-photo-plagiarism-gets-
redemption
Rudd, A. (2012, July 18). Diablo death: Teenager dies after playing video game for 40
hours without eating or sleeping. Retrieved from cyberpatrol.com. (2012-2015). Cyber
Sharks Map [digital image]. Retrieved from
http://jayminesarmiento.blogspot.com/2018/01/media-and-information-literacy-day-16.html
O’Brien, M. & Kellan, A. (2011, January 24). Virtual self can affect reality self. Retrieved
from http://phys.org/news/2011-01-virtual-affect-reality.html
Ramoral, C. (2013, September 22). UP student plagiarizes prize-winning photos.
Retrieved from http://www.rappler.com/move-ph/39566-up-student-admits-plagiarized-
photos
Spot.ph. (2013, October 2). Copycat Nation: 10 High-Profile Plagiarism Cases in the
Philippines. Retrieved from http://www.spot.ph/newsfeatures/54502/copycat-nation-10-
high-profile-plagiarismcases-in-the-philippines?page=1
Starr, L. (2015). Is Fair Use a License to Steal? Retrieved from
http://www.educationworld.com/a_curr/curr280b.shtml#sthash.qaat0Dud.dpuf
Vibar, I. (2012, August 23). Carabuena: From bully to cyberbullying victim. Retrieved from
http://news.abs-cbn.com/lifestyle/08/23/12/carabuena-bully-cyberbullying-victim
b. Materials: PowerPoint Presentation, sample articles in each case

III. PROCEDURE
1. Learning Activities
TEACHER’S ACTIVITY LEARNER’S ACTIVITY
 Teacher will play an AVP for prayer -Learners will stand and shall participate
 Teacher will greet the learners -Learners will respond on greetings
 Let the learners pick up pieces of paper -Learners pick up the pieces of paper
 Teacher will check the attendance -Learners will present their QR code
REVIEW:
As a sort of review, the teacher will ask few
questions
1. Who can recall the Media Languages?
PRESENTATION
ACTIVITY:
The teacher will show picture in the projector screen
(Cloud Image of Internet Dangers (Photograph)) -Learners will participate in giving
their insights
The teacher will ask the learners the following questions:
a. What issues do you see in the poster?
b. What possible dangers and issues of unguarded use of the internet are depicted in the picture?
c. Which of these issues have happened to you or to your friends? Why did they happen?

ANALYSIS:

The teacher will ask the learners about their -Two students will give a brief
observation of doing such activity discussion

ABSTRACTION:
-Learners will listen very carefully

• Copyright - a legal device that gives the creator of a literary, artistic, musical, or other creative work the
sole right to publish and sell that work. Copyright owners have the right to control the reproduction of their
work, including the right to receive payment for that reproduction. An author may grant or sell those rights
to others, including publishers or recording companies. Violation of a copyright is called infringement.
• Plagiarism - an act or instance of using or closely imitating the language and thoughts of another author
without authorization; the representation of that author's work as one's own, as by not crediting the original
author.
• Cyber Bullying - bullying that takes place online, or using electronic technology such as cell phones,
computers, and tablets over communication tools including social media sites, text messages, chat, and
websites. Examples of cyber bullying: text messages or emails composed to insult or demean; rumors or
false statements spread by email or posted on social networking sites; and humiliating photos, videos,
websites, or fake profiles deliberately shared across social media.
• Computer addiction - the excessive use of computers to the extent that it interferes with daily life . This
excessive use may for example interfere with work or sleep, result in problems with social interaction, or
affect mood, relationships, and thought processes.

APPLICATION:

CASE STUDY: Have the learners divide into groups of into 6-7.
Suggested issues of using unguarded internet (Copyright,
Plagiarism, Cyber Bullying & Computer addiction)
- Each group chooses a case under your
supervision. The task is to answer
questions from a given topic/case, and
then present them to the class. Each
group should elect the following: leader,
secretary, and presenters. Time limit for
discussion is 15 minutes while
presentation is 2-3 minutes. The
answers may be presented either
through Cartolina/Manila paper or
presentation software

IV- EVALUATION:
Presentations
1. Present the rubrics to the learners.
2. Provide critical and constructive feedback after presentations.
3. Emphasize that technology has its pros and cons.
V- ASSIGNMENT:
In a ½ half sheet of yellow paper, you need to answer the following questions: To be submitted tomorrow,
September 25, 2019.
1. What is netiquette?
2. Search an example/s of Online Netiquette?

Prepared by:

EDSON BUSILAC BESINGA, LPT

You might also like