0% found this document useful (0 votes)
77 views

Ethical Considerations in Using ICT Tools

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views

Ethical Considerations in Using ICT Tools

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Key Messages to Convey

Why Thoughtfulness Matters Before Posting About Others:


Emotional Impact: It might upset, embarrass, or hurt someone emotionally.
Consequences: It could lead to trouble for both you and the person involved, either
immediately or in the future.
Long-Term Effects: Online posts are permanent. They might harm relationships,
reputations, or future opportunities (e.g., college admissions, job prospects).
Friendships and Trust: Reckless posts could damage friendships and erode trust.
Strategies for Being More Thoughtful Before Posting:
Think About Visibility: Reflect on who might see the post (friends, family, teachers,
employers).
Practice Empathy: Ask yourself, “Would I be okay if someone posted this about me?”
Seek Consent: Always ask the person for permission before sharing content about them.
Community Awareness:
Consider whether the post might offend someone in your community, such as parents,
grandparents, or teachers.
Created by: Dr. Aamir Rashid (EED, UET Taxila) 120
Ethical Considerations
in using ICT Platforms
Intellectual Property, Copyright,
Proper Referencing, Content Accuracy
Intellectual Property
• IP refers to creations of the mind, such as inventions, literary and artistic works, designs,
and symbols, signs, images, names, and words.
• IP rights grant creators exclusive rights to their work, allowing them to control how their
work is used and to benefit from it financially.
Types of IP:
• Copyright: Protects original works of authorship, such as books, articles, music, and
software.
• Trademark: Protects symbols, logos, and brand names that distinguish goods and
services.
• Patent: Protects inventions and technological innovations.
• Trade Secret: Protects confidential business information, such as formulas,
customer lists, and business plans.
Fair Use Doctrine: Fair use is a legal doctrine that allows limited use of copyrighted
material without permission for purposes such as: Criticism, Commentary, Parody, News
reporting. For example: A film critic can use short clips from a movie in their review without
seeking explicit permission, as this falls under fair use for commentary.
Created by: Dr. Aamir Rashid (EED, UET Taxila) 122
Copyright in the Digital Landscape

What Can be Copyrighted: What Cannot be Copyrighted:

• Original written works • Facts and ideas


• Musical compositions • Common knowledge
• Artistic creations • Works in the public domain
• Software code • Short phrases or titles
• Photographs and digital • Government publications
images
• Videos and multimedia
content

Created by: Dr. Aamir Rashid (EED, UET Taxila) 123


Copyright
What it protects:
• Original works of authorship, such as literary works, music, art, and software.
Why it's needed:
• Copyright grants exclusive rights to creators, preventing unauthorized copying, distribution,
and adaptation of their work. This encourages creativity and innovation.
How it's obtained:
• Copyright protection generally exists automatically upon the creation of a work.
• However, registration with a copyright office e.g United States Copyright Office (USCO) can
offer additional legal benefits.
• For Works Created After January 1, 1978: Copyright lasts for the life of the author plus 70
years after the author's death.
Copyright Examples
Books and articles: The text and original illustrations in a book are protected by
copyright.
Music: A song's melody, lyrics, and arrangement are all subject to copyright.
Software: The code of a computer program is protected by copyright.
Created by: Dr. Aamir Rashid (EED, UET Taxila) 124
Public Domain
The public domain refers to a collection of creative works that are not protected by
intellectual property laws such as copyright, trademark, or patent. These works are free for
anyone to use, share, and build upon without seeking permission or paying royalties.
Examples include classic literature like Shakespeare's plays, Beethoven's symphonies,
and scientific principles like Newton's laws of motion.

Works enter the public domain primarily in two ways:


Expiration of Copyright:
Most countries grant copyright protection for a specific period, typically the life of the
author plus 70 years. Once this term expires, the work enters the public domain. For instance,
many of Jane Austen's novels are in the public domain.
Dedication by the Creator:
Authors can choose to release their works into the public domain, allowing others to
use them freely. This is often done to promote wider access and use

Created by: Dr. Aamir Rashid (EED, UET Taxila) 125


Licenses for Sharing Copyrighted Information
There are various licenses available for sharing copyrighted information, each granting different
permissions. Some common types include:
Open source licenses: Licenses that allow for the free use, modification, and distribution of
content. These licenses often require that any derivative works also be released under an open-source
license. E.g Linux operating system is licenced under GNU General Public License.
Commercial licenses: Licenses that allow for the use of copyrighted works for commercial
purposes, typically for a fee. These licenses may include restrictions on how the work can be used,
modified, or distributed. E.g Windows OS
Creative Commons licenses: A suite of standardized licenses that offer different levels of
flexibility for sharing and adapting copyrighted works. They allow creators to retain copyright while granting
others permission to use their work under specific conditions.
CC License Types:
• Attribution (must credit the original creator)
• Non-Commercial (can't use for money-making)
• No Derivative Works (can't modify the original)
• Share Alike (modifications must use same license)

Created by: Dr. Aamir Rashid (EED, UET Taxila) 126


Patents
What they protect:
Generally, patents can be categorized into three main types:
• Utility patents: These are the most common type of patent and protect new and useful processes,
machines, manufactures, or compositions of matter. This could include inventions like a new type of
engine, a novel manufacturing process, or a new pharmaceutical compound. (Duration 20 years)
• Design patents: These protect new, original, and ornamental designs for an article of manufacture. This
could include the shape of a bottle, the pattern on a piece of fabric, or the graphical user interface of
a software application. (Duration 15 years)
• Plant patents: These protect distinct and new varieties of asexually reproduced plants. This could
include a new type of rose bush or a genetically modified strain of corn. (Duration 20 years)
Why they're needed:
Patents incentivize innovation by granting inventors exclusive rights to their inventions for a limited period.
This allows them to profit from their creations and encourages further research and development.
How they're obtained:
Patents must be applied for and granted by a patent office e.g United States Patent and Trademark
Office (USPTO). The application process involves demonstrating the invention's novelty, usefulness, and
non-obviousness.
Created by: Dr. Aamir Rashid (EED, UET Taxila) 127
Trademarks
What they protect:
• Words, phrases or symbols that identify and distinguish goods or services of one party from those of
others.
Why they're needed:
• Trademarks protect consumers by helping them identify the source of goods and services. They also
protect businesses by preventing competitors from using similar marks that could cause confusion
in the marketplace.
How they're obtained:
• Trademark rights can arise from use of a mark in commerce. However, registration with a trademark office
(e.g USOTP) provides stronger legal protection.
• A federally registered trademark lasts for an initial period of 10 years from the date of registration.
• Trademarks can be renewed indefinitely in 10-year increments, provided that they are actively used in
commerce and the renewal requirements are met.
Trademark Examples
• Brand names: "Coca-Cola" is a registered trademark for a beverage.
• Logos: The Apple logo (an apple with a bite taken out of it) is a registered trademark.
• Slogans: "Just Do It" is a registered trademark of Nike.
Created by: Dr. Aamir Rashid (EED, UET Taxila) 128
Plagiarism and Academic Integrity
What is Plagiarism?
Plagiarism is the act of taking someone else's work or ideas and presenting them as your
own. It can take many forms, including copying, paraphrasing, or summarizing without proper
citation.
Why is Plagiarism Wrong?
Plagiarism is a serious academic offense that can have significant consequences, such as
failing grades, academic probation, or even expulsion. It undermines the value of original thought
and intellectual honesty.
How to Avoid Plagiarism:
Proper Citation: Cite all sources of information, whether they are direct quotes,
paraphrases, or summaries. Use a recognized citation style, such as APA, MLA, IEEE or
Chicago. Tools like Zotero and EndNote make it easy to organize and format references.
Original Thought: Develop your own ideas and arguments.
Paraphrasing and Summarizing: Restate information in your own words but be sure to cite
the original source.
Quoting Directly: Use quotation marks to indicate that you are directly quoting someone
else's words. Created by: Dr. Aamir Rashid (EED, UET Taxila) 129
Reference Styles

IEEE Citation Examples

Created by: Dr. Aamir Rashid (EED, UET Taxila) 130


Content Accuracy
Misinformation refers to false or inaccurate information shared without the intent to deceive. It often
occurs when individuals unknowingly share incorrect facts or rumors.
Disinformation, on the other hand, is deliberately false information created and spread with the intent to
mislead others. This can be done for various motives, including political gain, financial profit, or social
manipulation
How Fake News Spreads
Fake news, encompassing both misinformation and disinformation, spreads rapidly due to several factors:
• Social Media: Platforms like Twitter and Facebook allow for instant sharing of content, which can amplify
false information quickly. A study found that false information spreads faster than true information on social
media
• Emotional Appeal: Content that provokes strong emotional reactions (fear, anger, joy) is more likely to be
shared without verification
• Cognitive Biases: People tend to share information that confirms their preexisting beliefs or biases, often
without checking its accuracy
• Clickbait Culture: Headlines designed to attract clicks can mislead readers into sharing content without
reading the full article
Real-Life Example: During the COVID-19 pandemic, false information about cures and treatments
spread widely, causing panic and sometimes dangerous behaviors.
Created by: Dr. Aamir Rashid (EED, UET Taxila) 131
Content Accuracy
Here are some ways to protect yourself:

Check the Source:


• Look for information from reputable sources like established news organizations,
government agencies, or academic institutions.
Be Critical of Headlines:
• Sensationalized or emotionally charged headlines are often red flags for fake news.
Read Beyond the Headline:
• Get the full story before sharing. Fake news often twists facts or presents information out of
context.
Fact-Check:
• Use fact-checking websites like Snopes or PolitiFact to verify information.
Be Wary of Social Media:
• Information shared on social media should be treated with extra caution.

Created by: Dr. Aamir Rashid (EED, UET Taxila) 132

You might also like