SlideShare uma empresa Scribd logo
1 de 37
CHAPTER TWELVE
PROFESSIONAL ISSUES
IN MULTIMEDIA
DEVELOPMENT
CHAPTER HIGHLIGHTS
• Definition and characteristics of a profession.
• Elements of a professional code of ethics.
• Copyright:
– Definition
– Rights
– Remedies.
– Challenges created by the digital revolution.
• Digital Rights Management
– Challenges and opportunities.
2
CHARACTERISTICS OF A
PROFESSION
• An occupation that requires specialized
training or education.
– Preparation often involves an accredited program
of study.
– Continuing education is important to remain
proficient in the field.
• Professional associations formulate codes of
ethics for their members.
– Professionals have obligations to individuals they
serve and society at large.
3
CHARACTERISTICS OF A
PROFESSION
• Professional associations have active role in
promoting and enforcing obligations of the
members.
• Professions are autonomous and self
regulating.
4
MULTIMEDIA DEVELOPMENT
• Shares defining properties of a profession.
– Requires specialized knowledge and continuing
education in latest techniques.
– Members of the team often belong to professional
organizations.
– Educational standards are developing in college
and university programs as the field matures.
– The work of a developer may have significant
social consequences.
5
PROFESSIONAL RESPONSIBILITY
• Code of ethics is a statement of obligations
and standards that define a practitioner's
professional responsibilities.
• No direct code of ethics for multimedia
developers yet, but the Software Engineering
Code of Ethics and Professional Practice
directly relates to the work of a multimedia
programmer and offers guidance to other
members of the team.
6
SOFTWARE ENGINEERING
CODE OF ETHICS
• Organized as eight principles with a set of specific
obligations.
– Specific obligations identify course of action to fulfill
the principle's major obligation.
• Principles suggest obligations in several different
areas:
– Society at large
– Laws that govern practice
– Clients and employers
– Colleagues and subordinates
– Profession itself.
7
GENERAL PRINCIPLES
ACM/IEEE CODE OF ETHICS
• The "Public" Principle:
"Software engineers shall act consistently with the public
interest."
• The "Client and Employer" Principle:
"Software engineers shall act in a manner that is in the best
interests of their client and employer, consistent with the
public interest."
• The "Product" Principle:
"Software engineers shall ensure that their products and
related modifications meet the highest professional
standards possible."
8
GENERAL PRINCIPLES
ACM/IEEE CODE OF ETHICS
• The "Judgment" Principle:
"Software engineers shall maintain integrity and
independence in their professional judgment."
• The "Management" Principle:
"Software engineering managers and leaders shall subscribe
to and promote an ethical approach to the management of
software development and maintenance."
• The "Profession" Principle:
"Software engineers shall advance the integrity and
reputation of the profession consistent with the public
interest."
9
GENERAL PRINCIPLES
ACM/IEEE CODE OF ETHICS
• The "Colleagues" Principle:
"Software engineers shall be fair to and supportive of their
colleagues."
• The "Self" Principle:
"Software engineers shall participate in lifelong learning
regarding the practice of their profession and shall
promote an ethical approach to the practice of the
profession."
10
Complete ACM/IEEE Code is in the appendix section.
THE COPYRIGHT TRADITION
11
– RIGHTS
– REMEDIES
– EXCEPTIONS
DEVELOPERS AND COPYRIGHT.
• Reasons multimedia developers need to
understand the copyright laws.
– They must guard against intentional or
unintentional violation of the rights of others.
– Developers must protect their own work.
– Developers must frame agreements with the
client to specify copyright ownership.
12
Larry Lessig on Laws that Choke Creativity. TED 2007 talk
COPYRIGHT PROTECTION
• Copyright is a form of legal protection given to
creators of "original works of authorship."
– Purpose of copyright protection is cultural
advancement.
• Copyright differs from patent protection.
– Copyright applies to original or creative
expression.
– Patent protects original inventions.
13
COPYRIGHT PROTECTION
• U.S. law protects any form of original
expression that is in fixed form.
– Work does not need to be registered.
– Notice of copyright protection is not necessary.
• "Works of original authorship" combined with
automatic coverage of works in fixed form
(including computer programs) means any content
created by another party is potentially
covered by copyright.
14
COPYRIGHT PROTECTIONS
• Owner of a copyright has five major rights:
– To reproduce the copyrighted work.
– To produce derivative works.
– To distribute copies to the public.
– To perform the work publicly.
– To display the work publicly.
• Owner retains these rights unless specifically
transferred to another party.
15
COPYRIGHT PROTECTIONS
• Protection is granted for set period of time.
– Works created after 1978 extend to life of creator
+ 70 yrs.
– Corporate rights extend 95 yrs. from date of
publication or 120 years from creation, whichever
comes first.
• Copyright registration is required if:
– Lawsuits are being filed for infringement.
– Statutory damages and attorneys' fees are
involved.
16
COPYRIGHT REGISTRATION
• Registration:
– Provides evidence of copyright claim.
– Establishes basis for legal enforcement.
– Recommended in multimedia development.
• Infringement can lead to:
– Injunctions to prohibit further production and
distribution.
– Compensation for monetary damages.
– Statutory damages and criminal sanctions.
17
Register copyright @ www.copyright.gov
COPYRIGHT EXCEPTIONS
• Public Domain
– Works for which copyright has expired.
– Works where it was never applied such as:
• Government documents
• Works not in fixed form.
• Fair Use
– A doctrine intended to advance important social
goals.
• Free and open press
• Education
• Research and scholarship.
18
Conditions of Fair Use described in section 107 of U.S. Copyright Act.
FAIR USE CRITERIA
• Four criteria used to determine fair use:
– Purpose and character of the use.
– Nature of the copyrighted work.
– Amount and significance of the portion used.
– Effect of the use on the value of the work.
• Fair use is likely to be found for uses that:
– Are non-profit.
– Are factual rather than creative.
– Use small amounts of the work.
– Have little or no effect on the value or potential market of
the work.
19
WORKS FOR HIRE
• Works that are produced under specific
direction of an employer and with the
employer's resources.
– Employer may own the copyright for works for
hire.
– Written agreements detailing copyright ownership
should be established by employer and employee.
20
COPYRIGHT AND DIGITAL MEDIA
• Copyright law was developed in age of analog
media.
– Media was more difficult to copy and distribute in
analog form.
• Digital versions of media pose challenges to
traditional protections.
– Easy to copy in full fidelity.
– Editing tools easily generate derivative works that
are difficult to detect.
– Public display rights are threatened by Web
technologies.
21
COPYRIGHT AND DIGITAL MEDIA
• Responses to preserving copyright and digital
media:
– Strengthen and improve enforcement of existing
legal protections.
– Develop new strategies within the digital media
itself to protect content.
• Digital Rights Management
–The application of digital technologies to the
management of intellectual property (IP).
22
DIGITAL RIGHTS MANAGEMENT
• Applied to many forms of intellectual property
(IP) including:
– Patents
– Corporate reports and communications
– Creative works traditionally covered by copyright
(analog "legacy media")
– Original digital media.
23
DIGITAL RIGHTS MANAGEMENT
• Contract law also protects creative works.
– Owners of creative works can sell a license to use
the product.
– End User License Agreements (EULAs) are popular
for software programs and in use with digital
books or "ebooks."
24
USES OF DRM
• DRM has often focused on rights of content owners.
• Commonly used to control copying and accessing
digital content.
– Adobe "eBooks"
– Content Scrambling System (CSS)
– Audio CDs (Sony BMG)
– Music sold on the Web.
• Digital Millennium Copyright Act (DMCA) reinforced
DRM copy/access protections.
– DMCA also generated controversy.
25
DIGITAL MILLENNIUM
COPYRIGHT ACT
• DMCA contains provisions that directly affect
the work of digital media professionals.
– Clarified permitted copying of digital media.
– Limited liability of ISPs for copyright infringements
by provider's users.
– Criminalized the circumvention of DRM controls.
– Outlawed the creation and distribution of any
technology, service, or device to circumvent the
controls.
26
DIGITAL MILLENNIUM
COPYRIGHT ACT
• The DMCA has generated controversy:
– Potential abuse of copyright claims
– Limitations on fair use
– Discouragement of research
– Stifling of creative expression.
27
Two Generations of DRM
• First Generation: a “prevent and protect”
strategy intended to limit access to, and use
of, digital media.
• Second Generation: a “respect and promote”
strategy to facilitate legal distribution and use
of digital media.
28
Second Generation DRM
• Elements include (Iannella 2001; Van Tassel 2006):
• Rights description, validation, and record keeping
• Media access
• Trading
• Implementing/monitoring rights usage
• Tracking.
29
DRM and Digital Watermarks
• Digital watermarks - alterations to a media file
that encode information about the file. For
instance:
– Copyright ownership
– Identity of creator
– Identity of purchasers of copyright.
• Used to enforce copyright but also may
support broader goals of “Second Generation”
DRM.
30
Benefits of Second Generation DRM
• New compensation models for creators of
media (Magnatune)
• New methods of distribution (Weed)
• Less expensive, more efficient access to
copyright permissions
• More flexible permission and licensing
options.
31
Promoting Second Generation DRM
• Creative Commons:
– Promotes sharing of creative works through web-
based licensing program.
• Six types of licenses
• Owners select terms of use they prefer.
– Goals:
• Share knowledge and creativity with the world
• Encourage creation of a common digital culture where
creative works are readily available for use by others.
32
Learn more @: http://creativecommons.org/
Promoting Second Generation DRM
• Open Source Initiative:
– A standards body to promote development,
distribution, and maintenance of open source
software.
– Three key features:
• Free redistribution of software.
• Access to the source code for modification.
• Ability to create derivative works ,i.e. develop other
software based on the original source code.
– Open Source applications are free to download and
use.
33
See www.opensource.org
The Age of Collaborative Creativity
• New thinking on creativity from users and
consumers.
– TED 2005 talk by Charles Leadbeater. The Era of
Open Innovation.
– TED 2005 talk by Howare Rheingold.
The New power of Collaboration.
• Steal this Film: movie on decentralization of
media production. Can be found on YouTube.
34
WRAP UP
• Professions and Professional responsibility.
• Codes of Ethics and multimedia developers.
• Protecting intellectual property with:
– Copyright law.
– Patents.
35
WRAP UP
• Exceptions to Copyright Protection
– Public Domain
– Fair Use
– Works for Hire.
• Challenges to copyright protection from digital
media.
– Digital Millennium Copyright Act (DMCA)
• Digital Rights Management
– Challenges
– Opportunities.
36
KEY TERM CHECK UP
37

Mais conteúdo relacionado

Semelhante a Chapter Tewlve

Protecting Your Intellectual Property and your Brand
Protecting Your Intellectual Property and your BrandProtecting Your Intellectual Property and your Brand
Protecting Your Intellectual Property and your BrandNow Dentons
 
Society_law_and_ethics.pdf
Society_law_and_ethics.pdfSociety_law_and_ethics.pdf
Society_law_and_ethics.pdfManyaThakur12
 
MetadataTheory: Policies & Copyrights for LOs (4th of 10)
MetadataTheory: Policies & Copyrights for LOs (4th of 10)MetadataTheory: Policies & Copyrights for LOs (4th of 10)
MetadataTheory: Policies & Copyrights for LOs (4th of 10)Nikos Palavitsinis, PhD
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.pptKISHOYIANKISH
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual propertySalim Hosen
 
Monetizing Game User Interface Innovations in Enterprise Applications
Monetizing Game User Interface Innovations in Enterprise ApplicationsMonetizing Game User Interface Innovations in Enterprise Applications
Monetizing Game User Interface Innovations in Enterprise ApplicationsFrank Coppersmith
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology Kathirvel Ayyaswamy
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computingUc Man
 
professional ethics in_computing
professional ethics in_computingprofessional ethics in_computing
professional ethics in_computingHamza Cheema
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)wtidwell
 
Professional societies
Professional societiesProfessional societies
Professional societiesSulman Ahmed
 
Copyright in digital era
Copyright in digital eraCopyright in digital era
Copyright in digital eraSunil Saini
 

Semelhante a Chapter Tewlve (20)

Ichec digital strategy ipr
Ichec digital strategy iprIchec digital strategy ipr
Ichec digital strategy ipr
 
Protecting Your Intellectual Property and your Brand
Protecting Your Intellectual Property and your BrandProtecting Your Intellectual Property and your Brand
Protecting Your Intellectual Property and your Brand
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Society_law_and_ethics.pdf
Society_law_and_ethics.pdfSociety_law_and_ethics.pdf
Society_law_and_ethics.pdf
 
MetadataTheory: Policies & Copyrights for LOs (4th of 10)
MetadataTheory: Policies & Copyrights for LOs (4th of 10)MetadataTheory: Policies & Copyrights for LOs (4th of 10)
MetadataTheory: Policies & Copyrights for LOs (4th of 10)
 
Lect 9 - Intellectual Property Rights.ppt
Lect 9  - Intellectual Property Rights.pptLect 9  - Intellectual Property Rights.ppt
Lect 9 - Intellectual Property Rights.ppt
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
Webinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source LicensingWebinar–What You Need To Know About Open Source Licensing
Webinar–What You Need To Know About Open Source Licensing
 
Monetizing Game User Interface Innovations in Enterprise Applications
Monetizing Game User Interface Innovations in Enterprise ApplicationsMonetizing Game User Interface Innovations in Enterprise Applications
Monetizing Game User Interface Innovations in Enterprise Applications
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology 20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
Copyright and Technology
Copyright and TechnologyCopyright and Technology
Copyright and Technology
 
Intellectual property & digital business
Intellectual property & digital businessIntellectual property & digital business
Intellectual property & digital business
 
Professional ethics in_computing
Professional ethics in_computingProfessional ethics in_computing
Professional ethics in_computing
 
professional ethics in_computing
professional ethics in_computingprofessional ethics in_computing
professional ethics in_computing
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)
 
Professional societies
Professional societiesProfessional societies
Professional societies
 
Copyright in digital era
Copyright in digital eraCopyright in digital era
Copyright in digital era
 
Uc14 chap16
Uc14 chap16Uc14 chap16
Uc14 chap16
 

Mais de Nada G.Youssef

Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Nada G.Youssef
 
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorChapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorNada G.Youssef
 
Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsChapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsNada G.Youssef
 
Chapter 12: Business Continuity Management
Chapter 12: Business Continuity ManagementChapter 12: Business Continuity Management
Chapter 12: Business Continuity ManagementNada G.Youssef
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementNada G.Youssef
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and MaintenanceNada G.Youssef
 
Chapter 9: Access Control Management
Chapter 9: Access Control ManagementChapter 9: Access Control Management
Chapter 9: Access Control ManagementNada G.Youssef
 
Chapter 8: Communications and Operations Security
Chapter 8: Communications and Operations SecurityChapter 8: Communications and Operations Security
Chapter 8: Communications and Operations SecurityNada G.Youssef
 
Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security Nada G.Youssef
 
Chapter 6: Human Resources Security
Chapter 6: Human Resources SecurityChapter 6: Human Resources Security
Chapter 6: Human Resources SecurityNada G.Youssef
 
Chapter 5: Asset Management
Chapter 5: Asset ManagementChapter 5: Asset Management
Chapter 5: Asset ManagementNada G.Youssef
 

Mais de Nada G.Youssef (20)

مجلة 1
مجلة 1مجلة 1
مجلة 1
 
Chapter Nine
Chapter NineChapter Nine
Chapter Nine
 
Chapter Eight
Chapter Eight Chapter Eight
Chapter Eight
 
Chapter Seven
Chapter SevenChapter Seven
Chapter Seven
 
Chapter Six
Chapter SixChapter Six
Chapter Six
 
Chapter Five
Chapter FiveChapter Five
Chapter Five
 
Chapter Three
Chapter ThreeChapter Three
Chapter Three
 
Chapter Two
Chapter TwoChapter Two
Chapter Two
 
Chapter one
Chapter oneChapter one
Chapter one
 
Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants
 
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorChapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare Sector
 
Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsChapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial Institutions
 
Chapter 12: Business Continuity Management
Chapter 12: Business Continuity ManagementChapter 12: Business Continuity Management
Chapter 12: Business Continuity Management
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and Maintenance
 
Chapter 9: Access Control Management
Chapter 9: Access Control ManagementChapter 9: Access Control Management
Chapter 9: Access Control Management
 
Chapter 8: Communications and Operations Security
Chapter 8: Communications and Operations SecurityChapter 8: Communications and Operations Security
Chapter 8: Communications and Operations Security
 
Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security
 
Chapter 6: Human Resources Security
Chapter 6: Human Resources SecurityChapter 6: Human Resources Security
Chapter 6: Human Resources Security
 
Chapter 5: Asset Management
Chapter 5: Asset ManagementChapter 5: Asset Management
Chapter 5: Asset Management
 

Último

Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 

Último (20)

Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 

Chapter Tewlve

  • 1. CHAPTER TWELVE PROFESSIONAL ISSUES IN MULTIMEDIA DEVELOPMENT
  • 2. CHAPTER HIGHLIGHTS • Definition and characteristics of a profession. • Elements of a professional code of ethics. • Copyright: – Definition – Rights – Remedies. – Challenges created by the digital revolution. • Digital Rights Management – Challenges and opportunities. 2
  • 3. CHARACTERISTICS OF A PROFESSION • An occupation that requires specialized training or education. – Preparation often involves an accredited program of study. – Continuing education is important to remain proficient in the field. • Professional associations formulate codes of ethics for their members. – Professionals have obligations to individuals they serve and society at large. 3
  • 4. CHARACTERISTICS OF A PROFESSION • Professional associations have active role in promoting and enforcing obligations of the members. • Professions are autonomous and self regulating. 4
  • 5. MULTIMEDIA DEVELOPMENT • Shares defining properties of a profession. – Requires specialized knowledge and continuing education in latest techniques. – Members of the team often belong to professional organizations. – Educational standards are developing in college and university programs as the field matures. – The work of a developer may have significant social consequences. 5
  • 6. PROFESSIONAL RESPONSIBILITY • Code of ethics is a statement of obligations and standards that define a practitioner's professional responsibilities. • No direct code of ethics for multimedia developers yet, but the Software Engineering Code of Ethics and Professional Practice directly relates to the work of a multimedia programmer and offers guidance to other members of the team. 6
  • 7. SOFTWARE ENGINEERING CODE OF ETHICS • Organized as eight principles with a set of specific obligations. – Specific obligations identify course of action to fulfill the principle's major obligation. • Principles suggest obligations in several different areas: – Society at large – Laws that govern practice – Clients and employers – Colleagues and subordinates – Profession itself. 7
  • 8. GENERAL PRINCIPLES ACM/IEEE CODE OF ETHICS • The "Public" Principle: "Software engineers shall act consistently with the public interest." • The "Client and Employer" Principle: "Software engineers shall act in a manner that is in the best interests of their client and employer, consistent with the public interest." • The "Product" Principle: "Software engineers shall ensure that their products and related modifications meet the highest professional standards possible." 8
  • 9. GENERAL PRINCIPLES ACM/IEEE CODE OF ETHICS • The "Judgment" Principle: "Software engineers shall maintain integrity and independence in their professional judgment." • The "Management" Principle: "Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintenance." • The "Profession" Principle: "Software engineers shall advance the integrity and reputation of the profession consistent with the public interest." 9
  • 10. GENERAL PRINCIPLES ACM/IEEE CODE OF ETHICS • The "Colleagues" Principle: "Software engineers shall be fair to and supportive of their colleagues." • The "Self" Principle: "Software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical approach to the practice of the profession." 10 Complete ACM/IEEE Code is in the appendix section.
  • 11. THE COPYRIGHT TRADITION 11 – RIGHTS – REMEDIES – EXCEPTIONS
  • 12. DEVELOPERS AND COPYRIGHT. • Reasons multimedia developers need to understand the copyright laws. – They must guard against intentional or unintentional violation of the rights of others. – Developers must protect their own work. – Developers must frame agreements with the client to specify copyright ownership. 12 Larry Lessig on Laws that Choke Creativity. TED 2007 talk
  • 13. COPYRIGHT PROTECTION • Copyright is a form of legal protection given to creators of "original works of authorship." – Purpose of copyright protection is cultural advancement. • Copyright differs from patent protection. – Copyright applies to original or creative expression. – Patent protects original inventions. 13
  • 14. COPYRIGHT PROTECTION • U.S. law protects any form of original expression that is in fixed form. – Work does not need to be registered. – Notice of copyright protection is not necessary. • "Works of original authorship" combined with automatic coverage of works in fixed form (including computer programs) means any content created by another party is potentially covered by copyright. 14
  • 15. COPYRIGHT PROTECTIONS • Owner of a copyright has five major rights: – To reproduce the copyrighted work. – To produce derivative works. – To distribute copies to the public. – To perform the work publicly. – To display the work publicly. • Owner retains these rights unless specifically transferred to another party. 15
  • 16. COPYRIGHT PROTECTIONS • Protection is granted for set period of time. – Works created after 1978 extend to life of creator + 70 yrs. – Corporate rights extend 95 yrs. from date of publication or 120 years from creation, whichever comes first. • Copyright registration is required if: – Lawsuits are being filed for infringement. – Statutory damages and attorneys' fees are involved. 16
  • 17. COPYRIGHT REGISTRATION • Registration: – Provides evidence of copyright claim. – Establishes basis for legal enforcement. – Recommended in multimedia development. • Infringement can lead to: – Injunctions to prohibit further production and distribution. – Compensation for monetary damages. – Statutory damages and criminal sanctions. 17 Register copyright @ www.copyright.gov
  • 18. COPYRIGHT EXCEPTIONS • Public Domain – Works for which copyright has expired. – Works where it was never applied such as: • Government documents • Works not in fixed form. • Fair Use – A doctrine intended to advance important social goals. • Free and open press • Education • Research and scholarship. 18 Conditions of Fair Use described in section 107 of U.S. Copyright Act.
  • 19. FAIR USE CRITERIA • Four criteria used to determine fair use: – Purpose and character of the use. – Nature of the copyrighted work. – Amount and significance of the portion used. – Effect of the use on the value of the work. • Fair use is likely to be found for uses that: – Are non-profit. – Are factual rather than creative. – Use small amounts of the work. – Have little or no effect on the value or potential market of the work. 19
  • 20. WORKS FOR HIRE • Works that are produced under specific direction of an employer and with the employer's resources. – Employer may own the copyright for works for hire. – Written agreements detailing copyright ownership should be established by employer and employee. 20
  • 21. COPYRIGHT AND DIGITAL MEDIA • Copyright law was developed in age of analog media. – Media was more difficult to copy and distribute in analog form. • Digital versions of media pose challenges to traditional protections. – Easy to copy in full fidelity. – Editing tools easily generate derivative works that are difficult to detect. – Public display rights are threatened by Web technologies. 21
  • 22. COPYRIGHT AND DIGITAL MEDIA • Responses to preserving copyright and digital media: – Strengthen and improve enforcement of existing legal protections. – Develop new strategies within the digital media itself to protect content. • Digital Rights Management –The application of digital technologies to the management of intellectual property (IP). 22
  • 23. DIGITAL RIGHTS MANAGEMENT • Applied to many forms of intellectual property (IP) including: – Patents – Corporate reports and communications – Creative works traditionally covered by copyright (analog "legacy media") – Original digital media. 23
  • 24. DIGITAL RIGHTS MANAGEMENT • Contract law also protects creative works. – Owners of creative works can sell a license to use the product. – End User License Agreements (EULAs) are popular for software programs and in use with digital books or "ebooks." 24
  • 25. USES OF DRM • DRM has often focused on rights of content owners. • Commonly used to control copying and accessing digital content. – Adobe "eBooks" – Content Scrambling System (CSS) – Audio CDs (Sony BMG) – Music sold on the Web. • Digital Millennium Copyright Act (DMCA) reinforced DRM copy/access protections. – DMCA also generated controversy. 25
  • 26. DIGITAL MILLENNIUM COPYRIGHT ACT • DMCA contains provisions that directly affect the work of digital media professionals. – Clarified permitted copying of digital media. – Limited liability of ISPs for copyright infringements by provider's users. – Criminalized the circumvention of DRM controls. – Outlawed the creation and distribution of any technology, service, or device to circumvent the controls. 26
  • 27. DIGITAL MILLENNIUM COPYRIGHT ACT • The DMCA has generated controversy: – Potential abuse of copyright claims – Limitations on fair use – Discouragement of research – Stifling of creative expression. 27
  • 28. Two Generations of DRM • First Generation: a “prevent and protect” strategy intended to limit access to, and use of, digital media. • Second Generation: a “respect and promote” strategy to facilitate legal distribution and use of digital media. 28
  • 29. Second Generation DRM • Elements include (Iannella 2001; Van Tassel 2006): • Rights description, validation, and record keeping • Media access • Trading • Implementing/monitoring rights usage • Tracking. 29
  • 30. DRM and Digital Watermarks • Digital watermarks - alterations to a media file that encode information about the file. For instance: – Copyright ownership – Identity of creator – Identity of purchasers of copyright. • Used to enforce copyright but also may support broader goals of “Second Generation” DRM. 30
  • 31. Benefits of Second Generation DRM • New compensation models for creators of media (Magnatune) • New methods of distribution (Weed) • Less expensive, more efficient access to copyright permissions • More flexible permission and licensing options. 31
  • 32. Promoting Second Generation DRM • Creative Commons: – Promotes sharing of creative works through web- based licensing program. • Six types of licenses • Owners select terms of use they prefer. – Goals: • Share knowledge and creativity with the world • Encourage creation of a common digital culture where creative works are readily available for use by others. 32 Learn more @: http://creativecommons.org/
  • 33. Promoting Second Generation DRM • Open Source Initiative: – A standards body to promote development, distribution, and maintenance of open source software. – Three key features: • Free redistribution of software. • Access to the source code for modification. • Ability to create derivative works ,i.e. develop other software based on the original source code. – Open Source applications are free to download and use. 33 See www.opensource.org
  • 34. The Age of Collaborative Creativity • New thinking on creativity from users and consumers. – TED 2005 talk by Charles Leadbeater. The Era of Open Innovation. – TED 2005 talk by Howare Rheingold. The New power of Collaboration. • Steal this Film: movie on decentralization of media production. Can be found on YouTube. 34
  • 35. WRAP UP • Professions and Professional responsibility. • Codes of Ethics and multimedia developers. • Protecting intellectual property with: – Copyright law. – Patents. 35
  • 36. WRAP UP • Exceptions to Copyright Protection – Public Domain – Fair Use – Works for Hire. • Challenges to copyright protection from digital media. – Digital Millennium Copyright Act (DMCA) • Digital Rights Management – Challenges – Opportunities. 36
  • 37. KEY TERM CHECK UP 37