Why Thoughtfulness Matters Before Posting About Others:
Emotional Impact: It might upset, embarrass, or hurt someone emotionally. Consequences: It could lead to trouble for both you and the person involved, either immediately or in the future. Long-Term Effects: Online posts are permanent. They might harm relationships, reputations, or future opportunities (e.g., college admissions, job prospects). Friendships and Trust: Reckless posts could damage friendships and erode trust. Strategies for Being More Thoughtful Before Posting: Think About Visibility: Reflect on who might see the post (friends, family, teachers, employers). Practice Empathy: Ask yourself, “Would I be okay if someone posted this about me?” Seek Consent: Always ask the person for permission before sharing content about them. Community Awareness: Consider whether the post might offend someone in your community, such as parents, grandparents, or teachers. Created by: Dr. Aamir Rashid (EED, UET Taxila) 120 Ethical Considerations in using ICT Platforms Intellectual Property, Copyright, Proper Referencing, Content Accuracy Intellectual Property • IP refers to creations of the mind, such as inventions, literary and artistic works, designs, and symbols, signs, images, names, and words. • IP rights grant creators exclusive rights to their work, allowing them to control how their work is used and to benefit from it financially. Types of IP: • Copyright: Protects original works of authorship, such as books, articles, music, and software. • Trademark: Protects symbols, logos, and brand names that distinguish goods and services. • Patent: Protects inventions and technological innovations. • Trade Secret: Protects confidential business information, such as formulas, customer lists, and business plans. Fair Use Doctrine: Fair use is a legal doctrine that allows limited use of copyrighted material without permission for purposes such as: Criticism, Commentary, Parody, News reporting. For example: A film critic can use short clips from a movie in their review without seeking explicit permission, as this falls under fair use for commentary. Created by: Dr. Aamir Rashid (EED, UET Taxila) 122 Copyright in the Digital Landscape
What Can be Copyrighted: What Cannot be Copyrighted:
• Original written works • Facts and ideas
• Musical compositions • Common knowledge • Artistic creations • Works in the public domain • Software code • Short phrases or titles • Photographs and digital • Government publications images • Videos and multimedia content
Created by: Dr. Aamir Rashid (EED, UET Taxila) 123
Copyright What it protects: • Original works of authorship, such as literary works, music, art, and software. Why it's needed: • Copyright grants exclusive rights to creators, preventing unauthorized copying, distribution, and adaptation of their work. This encourages creativity and innovation. How it's obtained: • Copyright protection generally exists automatically upon the creation of a work. • However, registration with a copyright office e.g United States Copyright Office (USCO) can offer additional legal benefits. • For Works Created After January 1, 1978: Copyright lasts for the life of the author plus 70 years after the author's death. Copyright Examples Books and articles: The text and original illustrations in a book are protected by copyright. Music: A song's melody, lyrics, and arrangement are all subject to copyright. Software: The code of a computer program is protected by copyright. Created by: Dr. Aamir Rashid (EED, UET Taxila) 124 Public Domain The public domain refers to a collection of creative works that are not protected by intellectual property laws such as copyright, trademark, or patent. These works are free for anyone to use, share, and build upon without seeking permission or paying royalties. Examples include classic literature like Shakespeare's plays, Beethoven's symphonies, and scientific principles like Newton's laws of motion.
Works enter the public domain primarily in two ways:
Expiration of Copyright: Most countries grant copyright protection for a specific period, typically the life of the author plus 70 years. Once this term expires, the work enters the public domain. For instance, many of Jane Austen's novels are in the public domain. Dedication by the Creator: Authors can choose to release their works into the public domain, allowing others to use them freely. This is often done to promote wider access and use
Created by: Dr. Aamir Rashid (EED, UET Taxila) 125
Licenses for Sharing Copyrighted Information There are various licenses available for sharing copyrighted information, each granting different permissions. Some common types include: Open source licenses: Licenses that allow for the free use, modification, and distribution of content. These licenses often require that any derivative works also be released under an open-source license. E.g Linux operating system is licenced under GNU General Public License. Commercial licenses: Licenses that allow for the use of copyrighted works for commercial purposes, typically for a fee. These licenses may include restrictions on how the work can be used, modified, or distributed. E.g Windows OS Creative Commons licenses: A suite of standardized licenses that offer different levels of flexibility for sharing and adapting copyrighted works. They allow creators to retain copyright while granting others permission to use their work under specific conditions. CC License Types: • Attribution (must credit the original creator) • Non-Commercial (can't use for money-making) • No Derivative Works (can't modify the original) • Share Alike (modifications must use same license)
Created by: Dr. Aamir Rashid (EED, UET Taxila) 126
Patents What they protect: Generally, patents can be categorized into three main types: • Utility patents: These are the most common type of patent and protect new and useful processes, machines, manufactures, or compositions of matter. This could include inventions like a new type of engine, a novel manufacturing process, or a new pharmaceutical compound. (Duration 20 years) • Design patents: These protect new, original, and ornamental designs for an article of manufacture. This could include the shape of a bottle, the pattern on a piece of fabric, or the graphical user interface of a software application. (Duration 15 years) • Plant patents: These protect distinct and new varieties of asexually reproduced plants. This could include a new type of rose bush or a genetically modified strain of corn. (Duration 20 years) Why they're needed: Patents incentivize innovation by granting inventors exclusive rights to their inventions for a limited period. This allows them to profit from their creations and encourages further research and development. How they're obtained: Patents must be applied for and granted by a patent office e.g United States Patent and Trademark Office (USPTO). The application process involves demonstrating the invention's novelty, usefulness, and non-obviousness. Created by: Dr. Aamir Rashid (EED, UET Taxila) 127 Trademarks What they protect: • Words, phrases or symbols that identify and distinguish goods or services of one party from those of others. Why they're needed: • Trademarks protect consumers by helping them identify the source of goods and services. They also protect businesses by preventing competitors from using similar marks that could cause confusion in the marketplace. How they're obtained: • Trademark rights can arise from use of a mark in commerce. However, registration with a trademark office (e.g USOTP) provides stronger legal protection. • A federally registered trademark lasts for an initial period of 10 years from the date of registration. • Trademarks can be renewed indefinitely in 10-year increments, provided that they are actively used in commerce and the renewal requirements are met. Trademark Examples • Brand names: "Coca-Cola" is a registered trademark for a beverage. • Logos: The Apple logo (an apple with a bite taken out of it) is a registered trademark. • Slogans: "Just Do It" is a registered trademark of Nike. Created by: Dr. Aamir Rashid (EED, UET Taxila) 128 Plagiarism and Academic Integrity What is Plagiarism? Plagiarism is the act of taking someone else's work or ideas and presenting them as your own. It can take many forms, including copying, paraphrasing, or summarizing without proper citation. Why is Plagiarism Wrong? Plagiarism is a serious academic offense that can have significant consequences, such as failing grades, academic probation, or even expulsion. It undermines the value of original thought and intellectual honesty. How to Avoid Plagiarism: Proper Citation: Cite all sources of information, whether they are direct quotes, paraphrases, or summaries. Use a recognized citation style, such as APA, MLA, IEEE or Chicago. Tools like Zotero and EndNote make it easy to organize and format references. Original Thought: Develop your own ideas and arguments. Paraphrasing and Summarizing: Restate information in your own words but be sure to cite the original source. Quoting Directly: Use quotation marks to indicate that you are directly quoting someone else's words. Created by: Dr. Aamir Rashid (EED, UET Taxila) 129 Reference Styles
IEEE Citation Examples
Created by: Dr. Aamir Rashid (EED, UET Taxila) 130
Content Accuracy Misinformation refers to false or inaccurate information shared without the intent to deceive. It often occurs when individuals unknowingly share incorrect facts or rumors. Disinformation, on the other hand, is deliberately false information created and spread with the intent to mislead others. This can be done for various motives, including political gain, financial profit, or social manipulation How Fake News Spreads Fake news, encompassing both misinformation and disinformation, spreads rapidly due to several factors: • Social Media: Platforms like Twitter and Facebook allow for instant sharing of content, which can amplify false information quickly. A study found that false information spreads faster than true information on social media • Emotional Appeal: Content that provokes strong emotional reactions (fear, anger, joy) is more likely to be shared without verification • Cognitive Biases: People tend to share information that confirms their preexisting beliefs or biases, often without checking its accuracy • Clickbait Culture: Headlines designed to attract clicks can mislead readers into sharing content without reading the full article Real-Life Example: During the COVID-19 pandemic, false information about cures and treatments spread widely, causing panic and sometimes dangerous behaviors. Created by: Dr. Aamir Rashid (EED, UET Taxila) 131 Content Accuracy Here are some ways to protect yourself:
Check the Source:
• Look for information from reputable sources like established news organizations, government agencies, or academic institutions. Be Critical of Headlines: • Sensationalized or emotionally charged headlines are often red flags for fake news. Read Beyond the Headline: • Get the full story before sharing. Fake news often twists facts or presents information out of context. Fact-Check: • Use fact-checking websites like Snopes or PolitiFact to verify information. Be Wary of Social Media: • Information shared on social media should be treated with extra caution.
Created by: Dr. Aamir Rashid (EED, UET Taxila) 132
Developing Essbase Applications Hybrid Techniques and Practices 2nd Edition Cameron Lackpour (Editor) - The ebook is ready for instant download and access
Developing Essbase Applications Hybrid Techniques and Practices 2nd Edition Cameron Lackpour (Editor) - The ebook is ready for instant download and access