Cyberethics- Contd.(4)

Good Morning Students!


I hope your are taking good care of your health.

In my last blog, I gave you the following questions to be done as homework:


Q11. Describe a few things one can do to protect his/her business and customers from the following:
* Non-delivered goods
* Counterfeit products
* Non-existent companies

Q12. What issues can occur in case of theft of Credit Card details or identity details?
Q13. Enlist the measures to stop/avoid Stealing of Information and Fraudulent payments.
Q14. How can one ensure that she/he is using a safe site URL?
Q15. Define the following terms:
* Secure Data Transmission
* Data Encryption
* Firewall

Q16. Write a few points about SSL.
Q17. What do you understand about FTP?

Before we move ahead, kindly mark you attendance in the Comments Section of this blog with your Name, Class and Section.


=====================================================


Let's get started...


Learning Outcomes:
By the end of this blog, you will be able to: 

  • Define the following terms: 
    • Intellectual Property Rights
    • Copyright Laws
    • Plagiarism
  • State the reason behind the vulnerability of the originality of any creation.
  • Enumerate the types of solution available to protect Intellectual Property
  • Enlist the reasons to protect Intellectual Property Rights
  • Enumerate the common types of Plagiarism.




=====================================================


At the beginning of the lesson, lets see this video:



If it is not playing, then click on this link:

 https://www.youtube.com/watch?v=zALUg5GTUMg



I hope you enjoyed the video.

Now, please tell me one thing...

Do you think what Sarah did in the video, is correct?



I hope no one will say NO.  

Because what Sarah did, is almost equivalent to theft. Stealing doesn't only include picking up of some tangible item without permission, but it also includes copying of someone's creation.

In that way what Sarah did, is a crime.

Ok... No problem.... Law is there to punish such people. But please think about creative people like Jess and Paul in our story today. These type of people need protection. Otherwise creativity will never blossom.


So let's study today's topics. We may get to know something interesting....

=====================================================

Intellectual Property Rights:

Until you sell anything made by you, who remains the owner of that creation? 

Obviously... You only. 

So, if you are the owner (until you sell it), you can decide the following with regard to that creation: 


  • How much information is to be exchanged, shared or distributed.
  • Price for exchanging , sharing or distributing. 
  • About the use of creation. 
But actually, your creation's originality is always very vulnerable. Although it involves a lot of time, effort, idea and creativity, but it is very easy to duplicate it and share it with others. 

Now take a minute and read the first REMEMBER section and the first paragraph of the topic 6.3.1 on Page No: 169 of your old book. If someone is sitting with the new book, then open Page No: 189. 
Once you have read the given portion, please come back to the blog. 


Did you find some solution to the vulnerability of the creation of your mind?

Yes the solutions are:
  • Copyright
  • Patents
  • Trademark

The Copyright Laws protect Intellectual property in its various forms and do not allow data to be  used freely. 

To use the data or information, the correct method is that one should take the permission/consent of the owner. The violation of this rule is a Cyber Crime.


Now, read the 5 points given under the heading - 'Why is it important to protect intellectual property righs', on Page No.: 169. 


I hope you must have found the following points. 
  1. It sets business a part from competitions - That means it gives a distinction to your business in market. 

  2. It offers customers something new and different - That means your product appears to be differentiated from other products in market. 

  3. It forms an essential part of branding and marketing - Because of intellectual property rights, one can easily do the publicity of her/his brand in the market. 

  4. It encourages new ideas and creation  of new software or software applications - When you know that now your creation is no longer vulnerable, you get encouraged for creating more. 

  5. It also helps promote investment in the national economy - When you think that the law of your country would not be able to safeguard your interest in context to your Intellectual Rights, you get discouraged. But if the law of your country gives a feeling to you that your Rights and Interest are protected then you get encouraged to invest in new ventures. 

=====================================================

Plagiarism:

You must have noticed this word in the video.

Sarah, who copied the contents of Jess and Paul, has actually committed Plagiarism.

So, What is Plagiarism?

Please read REMEMBER section on the bottom-right hand side of the page no.: 169 (old book) or 189 (new book).

Did you notice that Plagiarism is also a crime, as Sarah did in the video today?

Yes, it is.... Because it involves the following activities:
  1. Stealing of another author's language, thoughts, ideas or expressions and representing them own work.
  2. Stealing someone else's intellectual work and showing it as your own work without citing the source of information. 
Following are some common Types of Plagiarisms:
  • Direct Plagiarism
  • Self-Plagiarism
  • Mosaic Plagiarism
  • Accidental Plagiarism  


Don't worry boys...   We'll discuss about these in our next blog. 







=====================================================

Let's summarise:



  • With Intellectual Property Right a person can decide about how much information is to be exchanged, shared or distributed, price for exchanging , sharing or distributing, and about the use of creation. 
  • Copyright Laws protect Intellectual property in its various forms and do not allow data to be  used freely.
  • Plagiarism involves stealing someone else's intellectual work and showing it as your own work without citing the source of information. 
  • Original creation is very easy to duplicate and share with others. 
  • Copyright, Patents and Trademark are some solutions to protect Intellectual Property.
  • For promotion of business, lead in market and improve investment Intellectual Property Rights should be protected. 
  • Direct, Self, Mosaic and Accidental are four types of Plagiarism. 


That's all for today...


Thank you students!

God Bless You

Computer Science Department
(Middle School)

Comments

  1. Good morning ma'am
    Ashwanth is present
    10-C

    ReplyDelete
  2. Good morning ma’am
    Nishchay is present

    ReplyDelete
  3. Sanidhya and Gautam to write full name while giving attendance. I have not given attendance to both for the prrevious 2 classes

    ReplyDelete
  4. Adam saviour Kerketta from 10-C
    Is present ma'am

    ReplyDelete
  5. Good morning ma'am Arjun is present

    ReplyDelete
  6. Good morning ma'am
    Farhan is present

    ReplyDelete
  7. Good morning ma'am.
    Gautam Gupta 10-C

    ReplyDelete
  8. Good morning ma'am
    saurojyoti is present
    10-C

    ReplyDelete
  9. Good morning mam
    Neev kumar present

    ReplyDelete
  10. This comment has been removed by the author.

    ReplyDelete
  11. Good morning ma'am
    Jaigopal Longani present

    ReplyDelete
  12. Archbill Xalxo
    Present Ma'am 10-C

    ReplyDelete
  13. Good morning ma'am
    Alen Thomas is present

    ReplyDelete

Post a Comment

Popular posts from this blog

Python-IF(Prac)

Python-IF command

Python- IF(2)