Cyberethics- Contd.(4)
Good Morning Students!
I hope your are taking good care of your health.
In my last blog, I gave you the following questions to be done as homework:
Q11. Describe a few things one can do to protect his/her business and customers from the following:
* Non-delivered goods
* Counterfeit products
* Non-existent companies
Q12. What issues can occur in case of theft of Credit Card details or identity details?
Q13. Enlist the measures to stop/avoid Stealing of Information and Fraudulent payments.
Q14. How can one ensure that she/he is using a safe site URL?
Q15. Define the following terms:
* Secure Data Transmission
* Data Encryption
* Firewall
Q16. Write a few points about SSL.
Q17. What do you understand about FTP?
Before we move ahead, kindly mark you attendance in the Comments Section of this blog with your Name, Class and Section.
=====================================================
Let's get started...
Learning Outcomes:
By the end of this blog, you will be able to:
By the end of this blog, you will be able to:
- Define the following terms:
- Intellectual Property Rights
- Copyright Laws
- Plagiarism
- State the reason behind the vulnerability of the originality of any creation.
- Enumerate the types of solution available to protect Intellectual Property
- Enlist the reasons to protect Intellectual Property Rights
- Enumerate the common types of Plagiarism.
=====================================================
At the beginning of the lesson, lets see this video:
I hope you enjoyed the video.
Now, please tell me one thing...
Do you think what Sarah did in the video, is correct?
Because what Sarah did, is almost equivalent to theft. Stealing doesn't only include picking up of some tangible item without permission, but it also includes copying of someone's creation.
In that way what Sarah did, is a crime.
Ok... No problem.... Law is there to punish such people. But please think about creative people like Jess and Paul in our story today. These type of people need protection. Otherwise creativity will never blossom.
So let's study today's topics. We may get to know something interesting....
=====================================================
Intellectual Property Rights:
Until you sell anything made by you, who remains the owner of that creation?
Obviously... You only.
So, if you are the owner (until you sell it), you can decide the following with regard to that creation:
- How much information is to be exchanged, shared or distributed.
- Price for exchanging , sharing or distributing.
- About the use of creation.
But actually, your creation's originality is always very vulnerable. Although it involves a lot of time, effort, idea and creativity, but it is very easy to duplicate it and share it with others.
Now take a minute and read the first REMEMBER section and the first paragraph of the topic 6.3.1 on Page No: 169 of your old book. If someone is sitting with the new book, then open Page No: 189.
Once you have read the given portion, please come back to the blog.
Did you find some solution to the vulnerability of the creation of your mind?
Yes the solutions are:
Now, read the 5 points given under the heading - 'Why is it important to protect intellectual property righs', on Page No.: 169.
I hope you must have found the following points.
Plagiarism:
You must have noticed this word in the video.
Sarah, who copied the contents of Jess and Paul, has actually committed Plagiarism.
So, What is Plagiarism?
Please read REMEMBER section on the bottom-right hand side of the page no.: 169 (old book) or 189 (new book).
Did you notice that Plagiarism is also a crime, as Sarah did in the video today?
Yes, it is.... Because it involves the following activities:
Don't worry boys... We'll discuss about these in our next blog.
That's all for today...
Thank you students!
God Bless You
Computer Science Department
(Middle School)
Yes the solutions are:
- Copyright
- Patents
- Trademark
The Copyright Laws protect Intellectual property in its various forms and do not allow data to be used freely.
To use the data or information, the correct method is that one should take the permission/consent of the owner. The violation of this rule is a Cyber Crime.
|
Now, read the 5 points given under the heading - 'Why is it important to protect intellectual property righs', on Page No.: 169.
I hope you must have found the following points.
- It sets business a part from competitions - That means it gives a distinction to your business in market.
- It offers customers something new and different - That means your product appears to be differentiated from other products in market.
- It forms an essential part of branding and marketing - Because of intellectual property rights, one can easily do the publicity of her/his brand in the market.
- It encourages new ideas and creation of new software or software applications - When you know that now your creation is no longer vulnerable, you get encouraged for creating more.
- It also helps promote investment in the national economy - When you think that the law of your country would not be able to safeguard your interest in context to your Intellectual Rights, you get discouraged. But if the law of your country gives a feeling to you that your Rights and Interest are protected then you get encouraged to invest in new ventures.
=====================================================
Plagiarism:
You must have noticed this word in the video.
Sarah, who copied the contents of Jess and Paul, has actually committed Plagiarism.
So, What is Plagiarism?
Please read REMEMBER section on the bottom-right hand side of the page no.: 169 (old book) or 189 (new book).
Did you notice that Plagiarism is also a crime, as Sarah did in the video today?
Yes, it is.... Because it involves the following activities:
- Stealing of another author's language, thoughts, ideas or expressions and representing them own work.
- Stealing someone else's intellectual work and showing it as your own work without citing the source of information.
Following are some common Types of Plagiarisms:
- Direct Plagiarism
- Self-Plagiarism
- Mosaic Plagiarism
- Accidental Plagiarism
Don't worry boys... We'll discuss about these in our next blog.
=====================================================
Let's summarise:
- With Intellectual Property Right a person can decide about how much information is to be exchanged, shared or distributed, price for exchanging , sharing or distributing, and about the use of creation.
- Copyright Laws protect Intellectual property in its various forms and do not allow data to be used freely.
- Plagiarism involves stealing someone else's intellectual work and showing it as your own work without citing the source of information.
- Original creation is very easy to duplicate and share with others.
- Copyright, Patents and Trademark are some solutions to protect Intellectual Property.
- For promotion of business, lead in market and improve investment Intellectual Property Rights should be protected.
- Direct, Self, Mosaic and Accidental are four types of Plagiarism.
That's all for today...
Thank you students!
God Bless You
Computer Science Department
(Middle School)


Good morning ma'am
ReplyDeleteAshwanth is present
10-C
Krish kumar present ma'am
ReplyDeletePresent ma'am
ReplyDeleteX-C
Good morning ma’am
ReplyDeleteNishchay is present
Present ma'am
ReplyDeleteXC
Sanidhya and Gautam to write full name while giving attendance. I have not given attendance to both for the prrevious 2 classes
ReplyDeletePresent ma'am 10C
ReplyDeleteAdam saviour Kerketta from 10-C
ReplyDeleteIs present ma'am
Sanatan Ashish Hembrom is present
ReplyDeleteGood morning ma'am Arjun is present
ReplyDeleteMatthew Jayakumar X-C
ReplyDeleteGood morning ma'am
ReplyDeleteFarhan is present
Good morning ma'am.
ReplyDeleteGautam Gupta 10-C
THANKS FOR WRITING FULL NAME
DeletePresent ma'am
ReplyDeleteDinesh Goyal
Present Ma'am
ReplyDeleteGomes George X C
Present ma'am
ReplyDeletePragyan Chauhan XC
Good morning ma'am
ReplyDeletesaurojyoti is present
10-C
Good morning mam
ReplyDeleteNeev kumar present
This comment has been removed by the author.
ReplyDeleteGood morning ma'am
ReplyDeleteJaigopal Longani present
Archbill Xalxo
ReplyDeletePresent Ma'am 10-C
Present maam 10 c Ronit kant
ReplyDeleteDev shaurya present
ReplyDeleteGood morning ma'am
ReplyDeleteAlen Thomas is present
Good morning ma'am
ReplyDeleteVaibbhav mathur