SlideShare une entreprise Scribd logo
1  sur  31
Télécharger pour lire hors ligne
Society, Law and Ethics
Few Important terms
• Online fraud- fraud committed using the internet. e.g. identity theft, fraudulent
payment etc
• Scam-any fraudulent business practice that extracts money from an unsuspecting
,ignorant person
• Digital / Computer forensics- it refers to methods used for interpretation of
computer media for digital evidence.
• Secure data transmission- it means applying enough technical safeguards so that
data travels safely to its target, without being compromised or eavesdropped.
• Eavesdropping- is the act of secretly or stealthily listening to the private
conversation or communications of others without their consent in order to gather
information.
Ethical Issues
• Ethical issues occur when a given decision, scenario or activity creates a
conflict with a society's moral principles.
Some common ethical issues are:
• Intellectual property rights.
• Plagiarism
• Digital property rights (DPR)
Intellectual Property Rights(IPR)
• These are the rights of the owner of information to decide how much
information is to be exchanged , shared or distributed.
• It gives the owner a right to decide the price for exchanging
/sharing/distributing .
• Examples of IP - Property which are an invention relating to a product
or any process, a new design, a literary or artistic work and a
trademark (a word, a symbol and / or a logo, etc.),
•Copyright © (to protect literary and artistic work )
•Patent (to protect technologies)
•Trade Mark™ (to protect words, signs, logos etc)
•Design (to protect outer ornamental configuration)
•GeographicalIndications (GI) (to protect region specific product)
KINDS OF IPR are:
Why should an IP be protected?
IP is an assets and can be exploited by the
owner for commercial gains any manner
IP owner may intend to stop others from manufacturing and selling
products and services which are dully protected by him
IP owner can sell and/or license the IP for commercial gains
IP can be used to establish the goodwill and brand value in
the market.
IP can be mention in resumes of it’s creator and thus show competence of
it’s creator
IPR certificate establishes legal and valid ownership about an
intellectual property
Copyright ©
• It is a legal term to describe the rights of the creator of an original creative work
such as literary work, artistic work, a design , song, movie or software etc.
• Original work of ownership such as books, articles, songs, photographs, sculptures ,
choreography, sound recordings, motion pictures and other works.
• A work must be original, creative and fixed in a tangible medium
• Terms of protection- author’s life +60 more years in India
Patents
• It refers to a collection of exclusive rights given to the inventor for their
invention.
• Inventions such as processes, machines, manufactures, composition of
matter as well as improvements to these.
• An invention must be new and useful.
• Terms of protection- 20 years
Trademark ™
• These are some registered words, slogans, logos, shapes,colours and sound etc used
to distinguish the goods or services of one trader from another.
• Any word,phrase,symbol, design that distinguishes the source of the goods of one
party from those of others.
• A mark must be distinctive – means must be capable of identifying the source of a
particular good
• Terms of protection- For as long as the mark is used in commerce
Violation of IPR
• Violation of IPR is called IPR infringement.
THREE FORMS OF IPR INFRINGEMENT ARE:
(i) Plagiarism
(ii) Copyright infringement
(iii) Trademark Infringement
Plagiarism
• “the act of presenting the words, ideas, images, sounds, or the creative
expression of others as it is your creation or your own.”
OR
• Plagiarism is stealing someone else’s intellectual work and
representing it as your own work without citing the source of
information.
So Plagiarism is -
• Plagiarism is stealing of intellectual property
• Plagiarism is cheating
• Plagiarism is an Academic offence
• Plagiarism is Academic theft!
Examples of plagiarism :
• Giving incorrect source of information-wrongful citation.
• Modifying / lifting someone’s production such as music-composition etc
without attributing it to the creator of the work.
• Using some other author’s work without giving credit to the author.
• Failure in giving credit or acknowledging the contribution of others in a
collaborative effort.
Copyright infringement
Copyright infringement refers to using copyrighted work without the
consent or permission of the copyright holder.
Examples of Copyright infringement :
• Selling pirated books
• Selling copied/duplicated art work
• Selling pirated software
• Online piracy and many other such acts
• Performing a play in public without obtaining permission from the
playright
Trademark infringement
It is the unauthorized usage of a mark that is identical or deceptively
similar to a registered trademark
All types of IPR infringements are crimes and the owner can initiate a legal
action against the people/companies who do it.
Digital Property Rights(Digital Assests)
It refers to any information about you or created by you that exists in
digital form or on an electronic storage device
Examples of Digital property include : Any online personal accounts such as
• Email and communication accounts
• Social media accounts
• Shopping accounts
• Photo and video sharing accounts
• Video gaming accounts
• Online storage accounts , website, blogs etc
Threats to Digital properties :
• Digital software penetration tools
• Stealing and plagiarizing codes of your digital properties
Digital Property Rights Protection
•Restrict /prevent users from editing / saving/sharing /forwarding our content.
•Restriction from printing. E.g. some document or artwork may only be printed up to a limited
number of times.
•Restriction of screenshots capture
•Set an expiry date on your document or media, after which the user will no longer be able to
access it or opening of any document for fixed limited times.
•Lock through ip address, means media accessible in India can’t be accessed in
any other country.
•Watermark artworks and documents in order to establish ownership and identity.
BENEFITS OF DIGITAL RIGHTS MANAGEMENT
•It educates users about copyright and intellectual property.
•It helps make way for better licensing agreements and
technologies.
•It helps authors retain ownership of their works.
•It helps protect income streams.
•It help secure files and keep them private.
Free Software and Open Source Software
• Free software- those software which are freely accessible and can be freely
used, changed, copied and distributed and available free of cost.
• Open source software(OSS)-source code is available for modification and
distribution without any limitation. OSS may come with free of cose ot with
a payment of nominal charges that its developers may charge.
• Freeware-these software are available free of cost and allows copying and
further distribution.No modification allowed. No source code available.
Example: Microsoft internet explorer.
Example of Open source software
• As Operating system – linux,Ubuntu
• As dbms – mysql,mongodb
• As Programming language – java,php,python
• As internet browser/webserver –chromium, firefox/ apache http
server, apache tomcat
Softwares
• Proprietary software- those software which are neither open nor freely available.
Source code is not available. For distribution and modification special permission
required from the supplier or vendor. E.g. tally, MS windows
• Shareware-neither source code is available not available for modification and
distribution . Objective of this is to make the software available to try for as many
users as possible.e.g. winzip
• Copylefted software-these are free software but with limited distribution terms.
Copyleft is a subset of open source. with copyleft, the modified product must be
distributed with the same copyleft license attached to the original software.
• Both open source and copyleft allow for source code to be modified and
distributed.
Licenses
• CC Licenses( Creative Commons Licenses)-These give permission to copy, modify,distribute
the original works by attributing the creator of the work (download,upload,photocopy and
scan the work)
Disadvantage
• We cannot revoke a Creative Commons License once given. Only subsequent uses
will not be permitted.
• if someone profits from our work (provided we have not given a Non-
commercial license/ attribute license), we can’t ask for compensation or a
license fee
• The Copyright of derivative works can be ambiguous. If someone uses your
work to develop a new work and their ‘updated’ work is substantially different, there
is an argument that the initial Creative Commons License no longer applies.
So think first before attaching a Creative Commons License to work.
Licenses
• GNU General Public License (GPL)-this is most commonly used licenses for open
source projects.
It allows users to legally copy,distribute and modify software to developers
who work on open source projects. Eg. Wordpress
Disadvantage:
• If GPL licensed product is used in any commercial product then the entire
product has to be released as open source. Most of the companies set a ban
to use GPL product.
• Lots of people aren't aware of the stringent terms of GPL.
• Its extremely viral. If your project contains a component that contains
a component then whole project is subject to the GPL too.
Licenses
• Apache License- This gives number of rights related to copyrights and patents.
Main Features of The Apache License
• copy, modify and distribute the covered software in source and/or
binary forms exercise patent rights that would normally only
extend to the licensor provided that:
• all copies, modified or unmodified, are accompanied by a copy of the license
• all modifications are clearly marked as being the work of the modifier
• All notices of copyright, trademarkandpatent rights are reproduced
accurately in distributed copies
Public Domain Software VS Proprietary Software
Public Domain Software-
• These are free and can be used without restrictions.
• This is outside the scope of copyright and licensing.
Proprietary Software-
• these are neither free nor available for public.
• User has to buy the license in order to use it
E-waste management
Electronic Waste or E-waste or E-scrap or Waste Electrical and Electronic Equipment-
these are discarded computers, office electronic equipment,entertainment device
electronics, mobile phones,tv sets,refrigerators etc.
Characteristics of E-waste-
• Fastest growing segment of waste
• Most valuable due to its basic composition
• Very hazardous if not handled carefully
E-waste management
Electronic Waste or E-waste Disposal Process –
• Dismantling
• Segregation of ferrous metal, non-ferrous metal and plastic
• Refurbishment and resue
• Recycling /recovery of valuable materials
• Treatment/disposal of dangerous material and waste
E-waste management
Benefits of E-waste Recycling–
• Allows for recovery of valuable precious metals.
• Protects public health and water quality
• Creates jobs
• Toxic waste
• Saves landfill space
Gender Issues while Teaching /using Computers
Gender specific issues must be addressed to enforce gender equality in
computer science education.
Some issues are:
1. Under representation-
(i) preconceived notions
(ii) lack of interest
(iii) lack of motivation
(iv) lack of role models
(v) lack of encouragement in class
2. Not Girl-Friendly Work Culture
Solutions of Gender Issues:
1.There should be more initiatives and programmes that encourage girl to take up
computer science subject-
2. The film and TV censor board should ensure fair representation of female role
models in TV,cinema etc so that more girls get encouraged to take up ‘ computer
science’.
3. In the practical rooms, girls should be encouraged more to work on computers
on their own and also to find solutions of their routine problems.
Disability Issues While Teaching And Using Computers:
1.Unavailability of teaching Materials/Aids ( braille keyboards,
monitors, printers, screen readers )
2. Lack of special needs teachers- specialized editors, blinux,voice
assistant softwares ( cortana, Microsoft narrator, onboard etc)
3. Lack of supporting curriculum

Contenu connexe

Tendances

Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
 
Copyright (presentation)
Copyright (presentation)Copyright (presentation)
Copyright (presentation)
Gagan Varshney
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
Shwet Kamal
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 

Tendances (20)

Intellectual Property, Copyright, and Ethics
Intellectual Property, Copyright, and EthicsIntellectual Property, Copyright, and Ethics
Intellectual Property, Copyright, and Ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Spyware
SpywareSpyware
Spyware
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
Ethics and safety measures in computing.pptx
Ethics and safety measures in computing.pptxEthics and safety measures in computing.pptx
Ethics and safety measures in computing.pptx
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Copyright (presentation)
Copyright (presentation)Copyright (presentation)
Copyright (presentation)
 
Copyright ppt 1
Copyright ppt 1Copyright ppt 1
Copyright ppt 1
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Digital law powerpoint
Digital law powerpointDigital law powerpoint
Digital law powerpoint
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
Determination of trade secret status
Determination of trade secret statusDetermination of trade secret status
Determination of trade secret status
 

Similaire à Society_law_and_ethics.pdf

Data management ii 12 nov 2013
Data management  ii 12 nov 2013Data management  ii 12 nov 2013
Data management ii 12 nov 2013
ILRI-Jmaru
 
Intellectual property revisited
Intellectual property revisitedIntellectual property revisited
Intellectual property revisited
Serendipity Seraph
 
Intellectual property revisited
Intellectual property revisitedIntellectual property revisited
Intellectual property revisited
Serendipity Seraph
 
Intellectual Property 101 for Entrepreneurs
Intellectual Property 101 for EntrepreneursIntellectual Property 101 for Entrepreneurs
Intellectual Property 101 for Entrepreneurs
WhitmeyerTuffin
 

Similaire à Society_law_and_ethics.pdf (20)

Intellectual property
Intellectual propertyIntellectual property
Intellectual property
 
Introduction to Intellectual Property
Introduction to Intellectual PropertyIntroduction to Intellectual Property
Introduction to Intellectual Property
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.ppt
 
Copyright and Technology
Copyright and TechnologyCopyright and Technology
Copyright and Technology
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Intellectual Property Rights
Intellectual Property Rights Intellectual Property Rights
Intellectual Property Rights
 
Data management ii 12 nov 2013
Data management  ii 12 nov 2013Data management  ii 12 nov 2013
Data management ii 12 nov 2013
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
Own-It IP Presentation by Peter Mason, Briffa.
Own-It IP Presentation by Peter Mason, Briffa.Own-It IP Presentation by Peter Mason, Briffa.
Own-It IP Presentation by Peter Mason, Briffa.
 
Full Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdfFull Guide to Copyright Infringements.pdf
Full Guide to Copyright Infringements.pdf
 
Copyright and Open Licences
 Copyright and Open Licences Copyright and Open Licences
Copyright and Open Licences
 
2014 oct8 cemca-hyd-session-4-copyright and open licences
2014 oct8 cemca-hyd-session-4-copyright and open licences2014 oct8 cemca-hyd-session-4-copyright and open licences
2014 oct8 cemca-hyd-session-4-copyright and open licences
 
Copyright and Open Licences
 Copyright and Open Licences Copyright and Open Licences
Copyright and Open Licences
 
Intellectual property and existing businesses
Intellectual property and existing businessesIntellectual property and existing businesses
Intellectual property and existing businesses
 
Intellectual property revisited
Intellectual property revisitedIntellectual property revisited
Intellectual property revisited
 
Intellectual property revisited
Intellectual property revisitedIntellectual property revisited
Intellectual property revisited
 
IP Compliance.ppt
IP Compliance.pptIP Compliance.ppt
IP Compliance.ppt
 
intellectual property rights
 intellectual property rights intellectual property rights
intellectual property rights
 
Got a great idea? Now what?
Got a great idea? Now what?Got a great idea? Now what?
Got a great idea? Now what?
 
Intellectual Property 101 for Entrepreneurs
Intellectual Property 101 for EntrepreneursIntellectual Property 101 for Entrepreneurs
Intellectual Property 101 for Entrepreneurs
 

Dernier

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Dernier (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

Society_law_and_ethics.pdf

  • 2. Few Important terms • Online fraud- fraud committed using the internet. e.g. identity theft, fraudulent payment etc • Scam-any fraudulent business practice that extracts money from an unsuspecting ,ignorant person • Digital / Computer forensics- it refers to methods used for interpretation of computer media for digital evidence. • Secure data transmission- it means applying enough technical safeguards so that data travels safely to its target, without being compromised or eavesdropped. • Eavesdropping- is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information.
  • 3. Ethical Issues • Ethical issues occur when a given decision, scenario or activity creates a conflict with a society's moral principles. Some common ethical issues are: • Intellectual property rights. • Plagiarism • Digital property rights (DPR)
  • 4. Intellectual Property Rights(IPR) • These are the rights of the owner of information to decide how much information is to be exchanged , shared or distributed. • It gives the owner a right to decide the price for exchanging /sharing/distributing . • Examples of IP - Property which are an invention relating to a product or any process, a new design, a literary or artistic work and a trademark (a word, a symbol and / or a logo, etc.),
  • 5. •Copyright © (to protect literary and artistic work ) •Patent (to protect technologies) •Trade Mark™ (to protect words, signs, logos etc) •Design (to protect outer ornamental configuration) •GeographicalIndications (GI) (to protect region specific product) KINDS OF IPR are:
  • 6. Why should an IP be protected? IP is an assets and can be exploited by the owner for commercial gains any manner IP owner may intend to stop others from manufacturing and selling products and services which are dully protected by him IP owner can sell and/or license the IP for commercial gains IP can be used to establish the goodwill and brand value in the market. IP can be mention in resumes of it’s creator and thus show competence of it’s creator IPR certificate establishes legal and valid ownership about an intellectual property
  • 7. Copyright © • It is a legal term to describe the rights of the creator of an original creative work such as literary work, artistic work, a design , song, movie or software etc. • Original work of ownership such as books, articles, songs, photographs, sculptures , choreography, sound recordings, motion pictures and other works. • A work must be original, creative and fixed in a tangible medium • Terms of protection- author’s life +60 more years in India
  • 8. Patents • It refers to a collection of exclusive rights given to the inventor for their invention. • Inventions such as processes, machines, manufactures, composition of matter as well as improvements to these. • An invention must be new and useful. • Terms of protection- 20 years
  • 9. Trademark ™ • These are some registered words, slogans, logos, shapes,colours and sound etc used to distinguish the goods or services of one trader from another. • Any word,phrase,symbol, design that distinguishes the source of the goods of one party from those of others. • A mark must be distinctive – means must be capable of identifying the source of a particular good • Terms of protection- For as long as the mark is used in commerce
  • 10. Violation of IPR • Violation of IPR is called IPR infringement. THREE FORMS OF IPR INFRINGEMENT ARE: (i) Plagiarism (ii) Copyright infringement (iii) Trademark Infringement
  • 11. Plagiarism • “the act of presenting the words, ideas, images, sounds, or the creative expression of others as it is your creation or your own.” OR • Plagiarism is stealing someone else’s intellectual work and representing it as your own work without citing the source of information.
  • 12. So Plagiarism is - • Plagiarism is stealing of intellectual property • Plagiarism is cheating • Plagiarism is an Academic offence • Plagiarism is Academic theft! Examples of plagiarism : • Giving incorrect source of information-wrongful citation. • Modifying / lifting someone’s production such as music-composition etc without attributing it to the creator of the work. • Using some other author’s work without giving credit to the author. • Failure in giving credit or acknowledging the contribution of others in a collaborative effort.
  • 13. Copyright infringement Copyright infringement refers to using copyrighted work without the consent or permission of the copyright holder. Examples of Copyright infringement : • Selling pirated books • Selling copied/duplicated art work • Selling pirated software • Online piracy and many other such acts • Performing a play in public without obtaining permission from the playright
  • 14. Trademark infringement It is the unauthorized usage of a mark that is identical or deceptively similar to a registered trademark All types of IPR infringements are crimes and the owner can initiate a legal action against the people/companies who do it.
  • 15. Digital Property Rights(Digital Assests) It refers to any information about you or created by you that exists in digital form or on an electronic storage device Examples of Digital property include : Any online personal accounts such as • Email and communication accounts • Social media accounts • Shopping accounts • Photo and video sharing accounts • Video gaming accounts • Online storage accounts , website, blogs etc
  • 16. Threats to Digital properties : • Digital software penetration tools • Stealing and plagiarizing codes of your digital properties Digital Property Rights Protection •Restrict /prevent users from editing / saving/sharing /forwarding our content. •Restriction from printing. E.g. some document or artwork may only be printed up to a limited number of times. •Restriction of screenshots capture •Set an expiry date on your document or media, after which the user will no longer be able to access it or opening of any document for fixed limited times. •Lock through ip address, means media accessible in India can’t be accessed in any other country. •Watermark artworks and documents in order to establish ownership and identity.
  • 17. BENEFITS OF DIGITAL RIGHTS MANAGEMENT •It educates users about copyright and intellectual property. •It helps make way for better licensing agreements and technologies. •It helps authors retain ownership of their works. •It helps protect income streams. •It help secure files and keep them private.
  • 18. Free Software and Open Source Software • Free software- those software which are freely accessible and can be freely used, changed, copied and distributed and available free of cost. • Open source software(OSS)-source code is available for modification and distribution without any limitation. OSS may come with free of cose ot with a payment of nominal charges that its developers may charge. • Freeware-these software are available free of cost and allows copying and further distribution.No modification allowed. No source code available. Example: Microsoft internet explorer.
  • 19. Example of Open source software • As Operating system – linux,Ubuntu • As dbms – mysql,mongodb • As Programming language – java,php,python • As internet browser/webserver –chromium, firefox/ apache http server, apache tomcat
  • 20. Softwares • Proprietary software- those software which are neither open nor freely available. Source code is not available. For distribution and modification special permission required from the supplier or vendor. E.g. tally, MS windows • Shareware-neither source code is available not available for modification and distribution . Objective of this is to make the software available to try for as many users as possible.e.g. winzip • Copylefted software-these are free software but with limited distribution terms. Copyleft is a subset of open source. with copyleft, the modified product must be distributed with the same copyleft license attached to the original software. • Both open source and copyleft allow for source code to be modified and distributed.
  • 21. Licenses • CC Licenses( Creative Commons Licenses)-These give permission to copy, modify,distribute the original works by attributing the creator of the work (download,upload,photocopy and scan the work) Disadvantage • We cannot revoke a Creative Commons License once given. Only subsequent uses will not be permitted. • if someone profits from our work (provided we have not given a Non- commercial license/ attribute license), we can’t ask for compensation or a license fee • The Copyright of derivative works can be ambiguous. If someone uses your work to develop a new work and their ‘updated’ work is substantially different, there is an argument that the initial Creative Commons License no longer applies. So think first before attaching a Creative Commons License to work.
  • 22. Licenses • GNU General Public License (GPL)-this is most commonly used licenses for open source projects. It allows users to legally copy,distribute and modify software to developers who work on open source projects. Eg. Wordpress Disadvantage: • If GPL licensed product is used in any commercial product then the entire product has to be released as open source. Most of the companies set a ban to use GPL product. • Lots of people aren't aware of the stringent terms of GPL. • Its extremely viral. If your project contains a component that contains a component then whole project is subject to the GPL too.
  • 23. Licenses • Apache License- This gives number of rights related to copyrights and patents. Main Features of The Apache License • copy, modify and distribute the covered software in source and/or binary forms exercise patent rights that would normally only extend to the licensor provided that: • all copies, modified or unmodified, are accompanied by a copy of the license • all modifications are clearly marked as being the work of the modifier • All notices of copyright, trademarkandpatent rights are reproduced accurately in distributed copies
  • 24. Public Domain Software VS Proprietary Software Public Domain Software- • These are free and can be used without restrictions. • This is outside the scope of copyright and licensing. Proprietary Software- • these are neither free nor available for public. • User has to buy the license in order to use it
  • 25. E-waste management Electronic Waste or E-waste or E-scrap or Waste Electrical and Electronic Equipment- these are discarded computers, office electronic equipment,entertainment device electronics, mobile phones,tv sets,refrigerators etc. Characteristics of E-waste- • Fastest growing segment of waste • Most valuable due to its basic composition • Very hazardous if not handled carefully
  • 26. E-waste management Electronic Waste or E-waste Disposal Process – • Dismantling • Segregation of ferrous metal, non-ferrous metal and plastic • Refurbishment and resue • Recycling /recovery of valuable materials • Treatment/disposal of dangerous material and waste
  • 27. E-waste management Benefits of E-waste Recycling– • Allows for recovery of valuable precious metals. • Protects public health and water quality • Creates jobs • Toxic waste • Saves landfill space
  • 28. Gender Issues while Teaching /using Computers Gender specific issues must be addressed to enforce gender equality in computer science education.
  • 29. Some issues are: 1. Under representation- (i) preconceived notions (ii) lack of interest (iii) lack of motivation (iv) lack of role models (v) lack of encouragement in class 2. Not Girl-Friendly Work Culture
  • 30. Solutions of Gender Issues: 1.There should be more initiatives and programmes that encourage girl to take up computer science subject- 2. The film and TV censor board should ensure fair representation of female role models in TV,cinema etc so that more girls get encouraged to take up ‘ computer science’. 3. In the practical rooms, girls should be encouraged more to work on computers on their own and also to find solutions of their routine problems.
  • 31. Disability Issues While Teaching And Using Computers: 1.Unavailability of teaching Materials/Aids ( braille keyboards, monitors, printers, screen readers ) 2. Lack of special needs teachers- specialized editors, blinux,voice assistant softwares ( cortana, Microsoft narrator, onboard etc) 3. Lack of supporting curriculum