Download presentation
Presentation is loading. Please wait.
1
The Ethical Use of Electronic Media.
Guilford County SciVis V103.03
2
Warm-up Questions Answer the following warm-up questions:
1. Which software package is best suited for editing photographs? 2. What is the most popular productivity package available on the market today?
3
Instructions Fill in the blanks on the following slides:
4
Computer Ethics Resources such as _ on the Internet are copyrighted.
Plagiarism ________ is a serious offense covered in the Copyright Law of Plagiarism items can include literary, dramatic, and musical works. ___ is illegal and is a punishable offense.
5
Copyright LAWS and Terms
Copyright is a form of protection provided by the laws of the United States (title 17, U.S. Code) to the authors of ________ including literary, dramatic, musical, artistic, and certain other intellectual work.
6
Copyright LAWS and Terms
This protection is available to both published and unpublished works. Section 106 of the 1976 Copyright Act generally gives the owner of copyright the exclusive right to do and to authorize others to do the following: To reproduce the work _______ or phonorecords. To prepare __________ To distribute copies or phonorecords of the work to the public by sale or other transfer of ownership, or by rental, lease, or lending.
7
Copyright LAWS and Terms
To perform the work ______ in the case of literary, musical, dramatic, and choreographic works, pantomimes, and motion pictures, and other audiovisual works. ________ work publicly, in the case of literary, musical, dramatic, and choreographic works, pantomimes, and pictorial, graphic, or sculptural works, including the individual images of a motion picture or other audiovisual work. _________, to perform the work publicly by means of a digital audio transmission.
8
Plagiarism Plagiarism includes a range of actions from ________ A student who plagiarizes may do so unintentionally or with purposeful deliberation. Listed below are some common forms of plagiarism.
9
Plagiarism (continued)
_________ and turning it in as yours. Turning in another _____ without that student’s knowledge and claiming it as yours. Turning in a paper a peer has _____ for you. Copying a paper from a source text like a book or the Internet without proper ________ Copying materials from a source text, supplying proper documentation, but leaving out quotation marks. _______ materials from a source text without giving appropriate documentation.
10
Plagiarism (continued)
________- copyright infringement can occur when someone, without owner’s permission, ______ Copying does not need to be word-for-word copying, _________ The owner is allowed to obtain damages to compensate for the copying.
11
Plagiarism (continued)
_____________-is the submission of the same work for academic credit more than once without permission. For instance, submitting the same paper to two different courses. The practice might be acceptable if permission is sought ahead of time. Example of acase at Rice University:
12
Trademarks __________ are familiar names and symbols that have become associated with quality, reliability, and/or fame. That’s why people and companies spend millions of dollars protecting these images. A way of protecting is through a ___________ Registration of a trademark is a legal title to a symbol or idea in the same way as a deed is title to a piece of property.
13
Trademarks List some famous trademarks:
14
Fair Use Limit ________ - the acceptable boundaries to which a person may use copyrighted material without obtaining the owner’s permission. _______ - 10% or 30 seconds of a song whichever is less. _______ - 10% or 3 minutes of a video whichever is less. Be aware of the condition “_________ In order to use 30 seconds of a song, your song must be 5 minutes in length and most popular songs are only 3 to 3 ½ minutes. ________ for clips and videos in the bibliography of your project.
15
Acceptable Use of School Computers
The person named in the account should be the ______ to access that account. ________ is not permitted on school computers. The use of school computers is only for __________ and cannot be used to play non-academic games or for any fraudulent activity. Personal ________ and instant messenger are unacceptable.
16
Ticket Out the Door Answer the following Question:
What did I learn today?
17
The End
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.