Lecture
This weeks lecture was about protecting yourself and your PC on the World-wide Web. We learnt what the problems with the Internet are these are as follows:
Intellectual Property, Copyright, Plagiarism, Security, Privacy, Freedom of Speech
we then learnt how to protect ourselves from the dangers of the Internet.
Tutorial
This weeks tutorial was all about copyright and security we had to do several tasks that were about these topics.
The first task we had to do was go to the website http://www.copyright.org.au/ then choose five information sheets that were relevant to the undergraduate course we are studying. The five i chose to study are
- Access to copyright material in Australia & the US
In this information sheet it discusses the relationship between aus and us allowing access to copyright material the information i gained from this sheet was that australian and us do not have to grant access to their copyright material, but perpision can be granted in certain situations, and that both countries have sanctions in place to prevent the circumvention of technological protection
measures. There is also no general exemption for private copying in either Australia or the US. Australia and the US have provisions that allow certain uses of copyright material for libarys and eductional institutions without permission.
- Assigning & licensing rights
In this information sheet it gives a brief overview of the ways in which copyright may be transferred from person to person and the ways in which a copyright owner may give permission to another person to use his or her work. The information i gained from this information sheet is that copyright owners can chose to assign or license their rights in copyright material. Also that Assignments and exclusive licences of copyright must be in writing and signed by the copyright owner beforethey are legally effective.
- Databases, compilations, tables & forms
In this information sheet it discuss the legal implications for wanting to use items such as tables of information; indexes and forms; collections of information such as directories; anthologies of short stories, essays or poetry; and databases. This information sheet covers the topics of how copyright does not protect facts or information but does however, protect “compilations” of information such as catalogues, databases, dictionaries,directories and tables.
- Film & copyright
In this information sheet it gives a brief overview of films and materials in films in relation to copyright laws. the information i have learnt from this information sheet is that Films contain a number of separate copyrights, including copyright in the screenplay or narration and in the
visual images and material incorporated into the soundtrack, such as music and recordings. you also have to have legal advice on contracts that deal with distribution and licensing of films before starting a movie for copyright to be valid.
- Internet: copying & downloading material
This information sheet is useful for people who want to copy or download material from the internet also legal comments on copyright issues for email's. This information sheet tell us that many internet sites allow you to download material from there website but that does not mean you can use this downloded information for any use you also do not want to assume assume that everything on the internet or in an email has the permission of the copyright owner.
The second task we were asked to complete was to access the APRA website with the url of (http://www.apra.com.au/music-users/online_mobile/online_mobile.asp) and then explain what i need to know about music and the web.
what every one should know about music and the web is that Copyright is the way a artist makes money from there work. so there are laws that give the artist the right to impose when and where there music can be used also how much money thay can demand for the right to use ther music.
A song may have more than one copyright. The lyrics will be protected as a literary work and the music as a musical work. A recording of the song will also be separately protected as a sound recording. Copyright protection is automatic, both in Australia and overseas so if you become an artist you do not have to apply for your work to be copyright protected so as soon as you write down your lyrics or music (chord progression), or tape it onto a CD or tape, it will be protected by copyright. Copyright owners also have the right to:
reproduce the work, publish the work, perform the work in public place, communicate the work to the public, make an adaptation of the work, rent a recording of the music.
copyright in music and lyrics last until the the artist is dead and then you have to wait 70 years.
When thecopyright in a work expires, it can be used for public use and anyone can use it without having to obtain permission or pay a fee.
Material on the Internet is not copyright free it is protected in just the same way as other materials. A song stored, for example, in an mp3 on a web site is protected in the same way as a recording on a CD. If you want to copy that CD, play it in public or communicate it to the public (by broadcast or via the Internet for example), you need permission from the copyright. Also you will also need permission if you want to download the mp3 file onto your own computer, make a copy for a friend or put it on another site.
a list of things that will help me to protect my privacy and security
- never open unknown attachments
- avoid dodgy-looking websiteshave an online email account instead of Outlook Express
- install anti-virus software & update it regularly
- have a active firewall
- disable Windows Scripting Host & ActiveX
- Install Antivirus software and update it reguraly
- Be aware of Spyware
- never give out personal information about yourself over the internet or phone
- Do not reply to SPAM mail
- Use Peer 2 Peer (P2P) software with caution
- Always scan documents (with Antivirus software) BEFORE you open them for the first time.
- Set your computer, Internet browser, e-mail accounts etc, to the highest possible security level
- Install a pop-up blocker to stop programs from unknown sources
- don't click unknown links and don't install file sharing software such as lime wire, that allows other computers to access your files.
- Do not show any personal ID
- Use encryption to avoid privacy threats
- Using a different password for every thing.
readings
Reading 1 Summary: ‘EFF's Top 12 Ways to Protect Your Online Privacy’
This article takes a very detailed look at the ways that people can protect their online privacy. Interestingly enough all of the tips that are listed are very easy and simple things that almost anyone can do. they consist of
- Do not reveal personal information inadvertently
- Turn on cookie notices in your Web browser, and/or use cookie management software.
- Keep a "clean" e-mail address.
- Don't reveal personal details to strangers or just-met "friends".
- Realize you may be monitored at work, avoid sending highly personal e-mail to mailing
- Beware sites that offer some sort of reward or prize in exchange for your contact
- Do not reply to spammers, for any reason.
- Be conscious of Web security
- Be conscious of home computer security.
- Examine privacy policies and seals.
- Remember that YOU decide what information about yourself to reveal, when, why.
- Use encryption.
Reading 2 Summary: ‘Ethics in Computing - Social Justice Issues: Electronic Monitoring’
This particular website covers several news articles and stories in relation to online social and ethical issues. It has done this by splitting the matter into four separate sections and taking news stories from several different reputable sources and linking them through their website. I found this to be a very good source of ethics related links, but it was quite poorly organised and had some broken links and images.
Reading 3 Summary: ‘Brown & Michaels - Overview of Intellectual Property’
This website demonstrated the basic kinds of intellectual property protection of copyright, trademarks and patents it was use full in helping me understand 'Intellectual Property'.
0 comments:
Post a Comment