Upload
brianne-french
View
218
Download
0
Embed Size (px)
Citation preview
The Ethical Use of Electronic Media.
Guilford County SciVisV103.03
Computer Ethics Resources such as images on
the Internet are copyrighted. Plagiarism (using somthing
that you did not create) is a serious offense covered in the Copyright Law of 1976. Plagiarism items can include literary, dramatic, and musical works.
Copying of software without purchasing is illegal and is a punishable offense.
Copyright LAWS and Terms Copyright is a form of
protection provided by the laws of the United States (title 17, U.S. Code) to the authors of “original works of including literary, dramatic, musical, artistic, and certain other intellectual work.
Copyright LAWS and Terms This protection is available to both published
and unpublished works. Section 106 of the 1976 Copyright Act generally gives the owner of copyright the exclusive right to do and to authorize others to do the following: To reproduce the work in copies or
phonorecords. To prepare derivative works based upon the
work. To distribute copies or phonorecords of the
work to the public by sale or other transfer of ownership, or by rental, lease, or lending.
Copyright LAWS and Terms To perform the work publicly, in the case of
literary, musical, dramatic, and choreographic works, pantomimes, and motion pictures, and other audiovisual works.
To display the copyrighted work publicly, in the case of literary, musical, dramatic, and choreographic works, pantomimes, and pictorial, graphic, or sculptural works, including the individual images of a motion picture or other audiovisual work.
In the casee of sound recerds to perform the work publicly by means of a digital audio transmission.
Plagiarism Plagiarism includes a
range of actions from failure to properly cite works to wholesale cheating. A student who plagiarizes may do so unintentionally or with purposeful deliberation. Listed below are some common forms of plagiarism.
Plagiarism (continued) Buying a paper from a research service and
turning it in as yours. Turning in another students work without that
student’s knowledge and claiming it as yours. Turning in a paper a peer has written for you. Copying a paper from a source text like a book or
the Internet without proper acknowledgment Copying materials from a source text, supplying
proper documentation, but leaving out quotation marks.
Paraphrasing materials from a source text without giving appropriate documentation.
Plagiarism (continued) infringement- copyright
infringement can occur when someone, without owner’s permission, copies copyrighted work
Copying does not need to be word-for-word copying, but changing of a few selected words The owner is allowed to obtain damages to compensate for the copying.
Plagiarism (continued) Self-Plagiarism-is the submission of
the same work for academic credit more than once without permission. For instance, submitting the same paper to two different courses. The practice might be acceptable if permission is sought ahead of time.
Example of acase at Rice University:http://honor.rice.edu/abstracts.cfm?
doc_id=10531
Trademarks trademarks are familiar names and
symbols that have become associated with quality, reliability, and/or fame. That’s why people and companies spend millions of dollars protecting these images.
A way of protecting is through a registered trademark. Registration of a trademark is a legal title to a symbol or idea in the same way as a deed is title to a piece of property.
Trademarks
List some famous trademarks:
Fair Use Limit Fair use- the acceptable boundaries to which a
person may use copyrighted material without obtaining the owner’s permission. Music - 10% or 30 seconds of a song whichever
is less. Video- 10% or 3 minutes of a video whichever
is less. Be aware of the condition “which ever is less.” In
order to use 30 seconds of a song, your song must be 5 minutes in length and most popular songs are only 3 to 3 ½ minutes.
Give credit for clips and videos in the bibliography of your project.
Acceptable Use of School Computers
The person named in the account should be the only one to access that account.
Tampering is not permitted on school computers.
The use of school computers is only for academic work and cannot be used to play non-academic games or for any fraudulent activity.
Personal email and instant messenger are unacceptable.
The End