Wednesday 23 January 2013

My Opinion ( IPR )

My Opinion ( IPR )

         In my opinion, everyone’s have their own freedom for everything but one thing to remember is that we need to know our limitations. Know what is right and what is wrong with our actions. Just do our responsibilities and consequences in our action.  
       The aim of protecting human rights is to respect and recognize the dignity of human beings. The freedom to live and the freedom of speech and opinion are among the basic rights practiced and respected by many nations for centuries.

Tuesday 22 January 2013

Software Piracy

Software Piracy

  • Software piracy refers to the unauthorized duplication and use of computer software.
  • Software piracy is the unauthorized copying or distribution of copyrighted software.

Kinds of Piracy

  • End User Piracy
Using multiple copies of a single software package on several different systems or distributing registered or licensed copies of software to others. Another common form of end user piracy is when a cracked version of the software is used. Hacking into the software and disabling the copy protection or illegally generating key codes that unlocks the trial version making the software a registered version creates a cracked version.
  • Reseller Piracy
Reseller piracy occurs when an unscrupulous reseller distributes multiple copies of a single software package to different customers; this includes preloading systems with software without providing original manuals and diskettes. Reseller piracy also occurs when resellers knowingly sell counterfeit versions of software to unsuspecting customers. Indications of reseller piracy are multiple users with the same serial number, lack of original documentation or an incomplete set, and non-matching documentation.
  • Trademark/Trade Name Infringement
Infringement occurs when an individual or dealer claims to be authorized either as a technician, support provider or reseller, or is improperly using a trademark or trade name.
  • BBS/Internet Piracy

BBS/ Internet Piracy occur when there is an electronic transfer of copyrighted software. If system operators and/or users upload or download copyrighted software and materials onto or from bulletin boards or the Internet for others to copy and use without the proper license. Often hackers will distribute or sell the hacked software or cracked keys. The developer does not receive any money for the software the hacker distributed. This is an infringement on the developer's copyright.








            http://www.tucows.com/article/531

Trademark

Trademark

  • It is a recognizable sign, design or expression which identifies products or services of a particular source from those of others.


  • A trademark is a device, word or combination of words, or symbol that indicates the source or ownership of a product or service.


  • Distinctive design, graphics, logo, symbols, words, or any combination thereof that uniquely identifies a firm and/or its goods or services, guarantees the item's genuineness, and gives it owner the legal rights to prevent the trademark's unauthorized use


  • Any name, symbol, figure, letter, word, or mark adopted and used by a manufacturer or merchant in order to designate his or her goods and to distinguish them from those manufactured or sold by others. A trademark is a proprietary term that is usually registered with the Patent and Trademark Office to assure its exclusive use by its owner.






Source: http://en.wikipedia.org/wiki/Trademark#cite_note-1
             http://legal-dictionary.thefreedictionary.com/Trademarks
             http://www.businessdictionary.com/definition/trademark.html
             http://dictionary.reference.com/browse/trademark

Patent

Patent

  • It is a form of intellectual property. It consists of a set of exclusive rights granted by a sovereign state to an inventor or their assignee for a limited period of time, in exchange for the public disclosure of the invention.


  • A form of protection that provides a person or legal entity with exclusive rights for making, using or selling a concept or invention and excludes others from doing the same for the duration of the patent.







Source: http://www.entrepreneur.com/encyclopedia/term/82342.html
             http://en.wikipedia.org/wiki/Patent

Copyright

Copyright

  • It is a legal concept, enacted by most governments, giving the creator of an original work exclusive right to it, usually for a limited time.
  • It is distinct from other forms of creator protection such as Patents, which give inventors exclusive rights over use of their inventions, and Trademarks, which are legally protected words or symbols or certain other distinguishing features that represent products or services.
  • It refers to laws that regulate the use of the work of a creator, such as an artist or author.




Source: http://en.wikipedia.org/wiki/Copyright
             http://legal-dictionary.thefreedictionary.com/copyright
             http://graphicdesign.about.com/od/legalglossary/g/copyright.html

Monday 21 January 2013

IPR


Intellectual Property Rights


  • A right that is had by a person or by a company to have exclusive rights to use its own plans, ideas, or other intangible assets without the worry of competition, at least for a specific period of time. These rights can include copyrights, patents, trademarks, and trade secrets. These rights may be enforced by a court via a lawsuit. The reasoning for intellectual property is to encourage innovation without the fear that a competitor will steal the idea and / or take the credit for it.

  • It refers to the general term for the assignment of property rights through patents, copyrights and trademarks. These property rights allow the holder to exercise a monopoly on the use of the item for a specified period.



Source: http://stats.oecd.org/glossary/detail.asp?ID=3236
              http://www.businessdictionary.com/definition/intellectual-property-rights.html


Wednesday 16 January 2013

Plagiarism



Plagiarism

Plagiarism is a form of cheating, but it's a little complicated so a kid might do it without understanding that it's wrong. Plagiarism is defined in dictionaries as the "wrongful appropriation," "close imitation," or "purloining and publication" of another author's "language, thoughts, ideas, or expressions," and the representation of them as one's own original work, but the notion remains problematic with nebulous boundaries.

Five Unethical Uses of Computers

  • Pornography

·         Distribution and use of pornography has been greatly facilitated with the use of the computer. Not only is the use of adult pornography widespread with the use of computers, but so is child pornography. Child pornography is one of the most, if not the most, unethical uses of the computer today.

  • Cyber-bullying

·         Bullying online is another form of unethical computer use. It is widespread and getting increasing coverage in the media as it becomes a larger problem. Sitting in front of a computer screen takes away the need to bully and harass someone in person and thus makes even worse actions and harassment possible. Additionally, the use of social networking on the computer as a tool for cyber-bullying is growing.

  • Plagiarism

·         Plagiarism is another unethical use of the computer. By going online, it is becoming increasingly easy to find material for plagiarism. The computer also facilitates writing articles through plagiarism by the use of writing programs and simply copying and pasting the words onto a document and taking credit for the work.

  • Cheating

·         Cheating in relationships is made easier through social networking online or the use of emails. Everything is password protected, making users able to be unfaithful in their relationships and even engage in cyber sex without anyone catching on.
Identity Theft
·         Theft of someone's identity is facilitated by the computer, making it yet another unethical use. If criminals are knowledgeable enough at computer hacking, then it is easy for them to gain access to the personal and financial information of other people and proceed in stealing their identity and ruining their lives.








Source: http://www.ehow.com/info_7806377_five-unethical-uses-computers.html