CS 3043 Social Implications Of Computing 12/2/2015© 2009 Keith A. Pray 1 Class 8 Intellectual Property Keith A. Pray Instructor socialimps.keithpray.net.

Slides:



Advertisements
Similar presentations
Freedom of Speech (Part 3)
Advertisements

Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Technology in Education Issues we need to know. Social, Ethical, and Legal. By: Kara Bushey ECED 201.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
Anonymity and SPAM The Good, the Bad and the Ugly!
Computers and Law - Srishti Mehra – Team 2. What is Computer Law? Cross over of a number of legal areas affecting: Design and use of computers and software.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Property in Cyberspace 1.What is “Intellectual Property”?Intellectual Property Intellectual Property Is: Intangible creative work—not necessarily the physical.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
CENSORSHIP Jack Homer Frederick Abreu James Carroll Minsoo Kim.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
INTERNET and CODE OF CONDUCT
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Intellectual Property
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
CS 3043 Social Implications Of Computing © 2010 Keith A. Pray Class 3 Professional Ethics Keith A. Pray Instructor socialimps.keithpray.net.
Computer Ethics.
Intellectual Property Rights and the Web: Common Myths Presentation by Jean Mistele.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
CS 3043 Social Implications Of Computing 9/21/2015© 2008 Keith A. Pray 1 Class 9 Freedom Of Speech Keith A. Pray Instructor socialimps.keithpray.net.
Ch3 Freedom of Speech The US Constitution.
Copyright and Intellectual Property Issues in the Digital Environment Amy Ginther Project NEThics (sm) Office of Information Technology University of Maryland.
A Gift of Fire, 2edChapter 6: Intellectual Property1 Intellectual Property.
Class Discussion Notes MKT April 10, 2001.
Chapter 17 E-Commerce and Digital Law
… concern the legal ownership and use of intellectual property, such as software, music, movies, data, and information. Links: Video: Too Much Copyright.
Computer Ethics A Necessity for the new era. Why is Computer Ethics Important? The creation and existence of new questions that older laws cannot answer.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
CS 3043 Social Implications Of Computing 10/19/2015© 2004 Keith A. Pray 1 Class 9 Intellectual Property Keith A. Pray Instructor socialimps.keithpray.net.
CS 3043 Social Implications Of Computing 10/19/2015© 2008 Keith A. Pray 1 Class 7 Intellectual Property Keith A. Pray Instructor socialimps.keithpray.net.
CS 3043 Social Implications Of Computing 10/20/2015© 2009 Keith A. Pray 1 Class 7 Freedom Of Speech Keith A. Pray Instructor socialimps.keithpray.net.
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray Class 3 Professional Ethics Keith A. Pray Instructor socialimps.keithpray.net.
CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 8 Intellectual Property Continued Keith A. Pray Instructor socialimps.keithpray.net.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 17 Software as Intellectual Property.
Chapter 9: The Internet and World Wide Web Two contrasting views: Media Critic Marshall McCLuhan: the Internet would help create a “global village” of.
CS 3043 Social Implications Of Computing 10/28/2015© 2004 Keith A. Pray 1 Class 11 Freedom Of Speech Keith A. Pray Instructor socialimps.keithpray.net.
Internet and Intellectual Property  University of Palestine  Eng. Wisam Zaqoot  Feb 2010 ITSS 4201 Internet Insurance and Information Hiding.
The Freedom of Information Act (FOIA) is a law that gives you the right to access information from the federal government. It is often described as the.
1 Freedom of Speech In Cyberspace Changing Communications Paradigms Changing Communications Paradigms Offensive Speech and Censorship in Cyberspace AnonymitySpam.
CptS 401 Adam Carter. Quiz Question 7 Obscene speech is protected by the First Amendment. A. True B. False 2.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Freedom of Speech Computers in the World.
Intellectual property (cont.) 1. Software as intellectual property 2  The law concerning software is not clear and is steal being formulated  In USA.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Copyright and Intellectual Property Right 1. 2 Use and Protection of Intellectual Property in Online Business Intellectual property (general term) includes:
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 30 Security, Knowledge and Freedom of Expression.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
10 Big Myths About Copyright Explained Article by: Brad Templeton Presentation: James Brown.
Intellectual Property and Computer Science By Daniel Bray COSC 480.
Web bugs are tiny graphic files embedded in messages and Web pages that are designed to monitor who is reading the message or Web page and.
A Gift of Fire, 2edChapter 5: Freedom of Speech in Cyberspace1 Anonymity Common Sense and the Internet Early publications by some of our Founding Fathers.
“Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of.
Freedom Independence Transition
A Gift of Fire Third edition Sara Baase
By: Justin, Juan, Jian, and Jazlin
Intellectual Property Rights
A Gift of Fire Third edition Sara Baase
Property in Cyberspace
A Gift of Fire Third edition Sara Baase
Presentation transcript:

CS 3043 Social Implications Of Computing 12/2/2015© 2009 Keith A. Pray 1 Class 8 Intellectual Property Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 2 12/2/2015 Overview 1. Quiz 2. Freedom Of Speech – Students Present 3. Intellectual Property – Students Present 4. Assignment

CS 3043 Social Implications Of Computing Quiz For each of the IP protections below answer a - f. 1. Trademark 2. Copyright 3. Patent 4. Trade Secret a-e (1/4 point) f (1/4 bonus point) a) What kind of IP does it protect? b) What qualifications does the IP have to meet to be protected? c) How long does the protection last? d) Who grants and/or enforces the protection? e) Who owns the IP this protects? f) Give a specific example of IP currently protected? © 2009 Keith A. Pray 3 12/2/2015

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 4 12/2/2015 Overview 1. Quiz 2. Freedom Of Speech – Students Present 3. Intellectual Property – Students Present 4. Assignment

CS 3043 Social Implications Of Computing SPAM Overview The five W’s Freedom of Speech Solutions Will it every go away? © 2009 Keith A. Pray 5 12/2/2015 Ian Williams

CS 3043 Social Implications Of Computing Who? What? When? Where? Why? How? We all know what it is… or do we? Many organizations spam, even our President! Spam happens continuously to virtually everyone Used for commercial and political advertising, solicitation for funds, pornography, scams and phishing attempts Botnets are used to spread spam © 2009 Keith A. Pray 6 12/2/2015 Ian Williams

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 7 12/2/2015 Ian Williams

CS 3043 Social Implications Of Computing Freedom of Speech and Spam Isn’t Spam just Freedom of Speech? Actually… The right to send s is matched by the right to choose what one receives If sending mass s causes costly network traffic, then it shouldn’t be allowed Though the courts are usually very strong in supporting the First Amendment, they have ruled against spammers in the past © 2009 Keith A. Pray 8 12/2/2015 Ian Williams

CS 3043 Social Implications Of Computing Solutions Traditional content filtering Contact checking Recurrent Pattern Detection Anti-Spam Legislature © 2009 Keith A. Pray 9 12/2/2015 Ian Williams

CS 3043 Social Implications Of Computing Contact Checking © 2009 Keith A. Pray 10 12/2/2015 Ian Williams

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 11 12/2/2015 Ian Williams

CS 3043 Social Implications Of Computing Anti-spam Legislature CAN-SPAM Act of 2003  Bans false or misleading headers  Prohibits deceptive subject lines  Must give recipiants an opt-out method  Requires commercial s to be identified as an advertisement and include sender’s valid physical address Think about the spam you receive… © 2009 Keith A. Pray 12 12/2/2015 Ian Williams

CS 3043 Social Implications Of Computing Will it ever go away? In 2004 Bill Gates predicted that spam would be solved in 2 years Additional techniques seem to be constantly developed by spammers Can we really say that the new solutions are solutions? Perhaps spam is like other cyber crimes © 2009 Keith A. Pray 13 12/2/2015 Ian Williams

CS 3043 Social Implications Of Computing Summary True spam is not protected by the First Amendment New technological solutions to spam are constantly developed, but spammers are equally savvy Will it ever go away? Who knows… © 2009 Keith A. Pray 14 12/2/2015 Ian Williams

CS 3043 Social Implications Of Computing Internet Censorship Around the world Lucas Scotta Overview Why do governments censor the internet? What are some examples? Why is it bad? © 2009 Keith A. Pray 15 12/2/2015

CS 3043 Social Implications Of Computing Why censor the internet? Lucas Scotta © 2009 Keith A. Pray 16 12/2/2015 Threatens oppressive governments  Iranian election Offensive material Illegal or harmful information Western culture

CS 3043 Social Implications Of Computing How it works Lucas Scotta © 2009 Keith A. Pray 17 12/2/2015 Government-controlled internet backbone Firewalls Filters Monitoring

CS 3043 Social Implications Of Computing Censorship around the world Lucas Scotta © 2009 Keith A. Pray 18 12/2/2015

CS 3043 Social Implications Of Computing The Great Firewall of China Lucas Scotta Banned Google, Wikipedia, Technorati, New York Times Mirroring core routers monitor all international traffic Employ thousands of people to monitor online communication and censor the net Keep the internet “wholesome” © 2009 Keith A. Pray 19 12/2/2015

CS 3043 Social Implications Of Computing Ethical issues Lucas Scotta © 2009 Keith A. Pray 20 12/2/2015 Access to information Freedom of expression Censor opposition

CS 3043 Social Implications Of Computing Works Cited Accessed 9/20/09 © 2009 Keith A. Pray 21 12/2/ censorship.jpg censorship.jpg the-block-list.ars the-block-list.ars different.html#slide3 different.html#slide3

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 22 12/2/2015 Overview 1. Quiz 2. Freedom Of Speech – Students Present 3. Intellectual Property – Students Present 4. Assignment

CS 3043 Social Implications Of Computing What is the DMCA, anyway? Alex Kuang Stands for Digital Millennium Copyright Act Liked by:  RIAA, MPAA, Viacom  “Big Media” Disliked by:  EFF, Public Knowledge, other free speech groups  Cryptographers, researchers  Most of the internet © 2009 Keith A. Pray 23 12/2/2015

CS 3043 Social Implications Of Computing RIAA DMCA as Banhammer Alex Kuang RIAA = Recording Industry Association of America Notorious name in recent years for filesharing suits Uses DMCA as backing for a lot of its suits © 2009 Keith A. Pray 24 12/2/2015

CS 3043 Social Implications Of Computing Criticisms against RIAA Alex Kuang Abuse of DMCA + DRM “Assembly line” approach Settlement == extortion? Piracy? … $$$! Do they actually care? © 2009 Keith A. Pray 25 12/2/2015

CS 3043 Social Implications Of Computing RIAA’s rationale Alex Kuang “No industry can compete with free” Non-tolerance for “culture of illegality” The Artists’ interests are our priority They are also trying to be “innovative” © 2009 Keith A. Pray 26 12/2/2015

CS 3043 Social Implications Of Computing What’s happening now Alex Kuang Mar 2009: “Graduated response” program? Mar 2009: Still trotting out lawsuits against random people Sept 2009: Trying to push FCC to support ISP filtering services © 2009 Keith A. Pray 27 12/2/2015

CS 3043 Social Implications Of Computing References Alex Kuang veoh-big-win-online-video (9/22/09) veoh-big-win-online-video (9/22/09) (9/22/09) policy/news/2009/09/big-content-still-cant- compete-with-free.ars (9/22/09) policy/news/2009/09/big-content-still-cant- compete-with-free.ars © 2009 Keith A. Pray 28 12/2/2015

CS 3043 Social Implications Of Computing References Alex Kuang policy/news/2009/03/hypocrisy-or-necessity-riaa- continues-filing-lawsuits.ars (9/22/09) policy/news/2009/03/hypocrisy-or-necessity-riaa- continues-filing-lawsuits.ars policy/news/2009/09/isps-react-sort-of-support- network-neutralitywith-caveats.ars (9/22/09) policy/news/2009/09/isps-react-sort-of-support- network-neutralitywith-caveats.ars © 2009 Keith A. Pray 29 12/2/2015

CS 3043 Social Implications Of Computing References Alex Kuang policy/news/2009/03/att-joins-riaa-program-but- refuses-to-sanction-users.ars (9/22/09) policy/news/2009/03/att-joins-riaa-program-but- refuses-to-sanction-users.ars policy/news/2009/09/fcc-chairman-wants- network-neutrality-wired-and- wireless.ars?comments=1 (9/22/09) policy/news/2009/09/fcc-chairman-wants- network-neutrality-wired-and- wireless.ars?comments=1 © 2009 Keith A. Pray 30 12/2/2015

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 31 12/2/2015 Overview 1. Quiz 2. Freedom Of Speech – Students Present 3. Intellectual Property – Students Present 4. Assignment

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 32 12/2/2015 Assignment –Term Project Work Complete first pass of learning all you can  Should result in reference list and notes at minimum  Could include material about related technologies from the present and past (timelines are handy here) You should start thinking about all this material in the context of the subjects we’ve covered to date  Professional Ethics, Crime, Privacy, Freedom Of Speech, Intellectual Property, Work Ethics in general is simply a tool for logical thinking concerning what is the right thing to do in a situation.

CS 3043 Social Implications Of Computing 12/2/2015© 2009 Keith A. Pray 33 Class 8 The End Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 34 12/2/2015 Intellectual Property What is it?  How is it different from physical property? Why is it protected? How is it protected?

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 35 12/2/2015 Trademark Unique name, phrase, design, etc. Use? Scope? Term? What are some examples?

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 36 12/2/2015 Copyright Protects work in tangible form.  Expression, not ideas Holder  US Default? Exceptions?, Transferred? Regained?  Rights: Controls distribution, Controls derivative work, Public Performance, others?  US Term? How are they governed? Fair Use? Rationale?

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 37 12/2/2015 Patent Covers? Requirements? Terms? You cannot patent an idea.

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 38 12/2/2015 Trade Secret What are they? How are they enforced?

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 39 12/2/2015 How Does Intellectual Property Protection Apply To Computers? Hardware design Programs Algorithms Look And feel Music And Text Sharing

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 40 12/2/2015 Protecting Software Patented? Copyrighted? Trade Secret? License agreements? Open source and free software?