topic 12 issues and trends in integrative media 1
TRANSCRIPT
1
TOPIC 12ISSUES AND TRENDS IN INTEGRATIVE MEDIA
2
OUTLINE12.1 COPYRIGHT ISSUES12.2 CONFIDENTIALITY ISSUES12.3 CENSORSHIP ISSUES12.4 SECURITY ISSUES12.5 TRENDS IN INTEGRATIVE MEDIA
INDUSTRY
3
12.1COPYRIGHT ISSUES
4
12.1 COPYRIGHT ISSUES Copyright issues is very sensitive towards;
Writing Music Film Etc.
In academic for instance, many information from internet, student do not come out with own original idea, but copy the idea from other people, especially from the internet Media from internet could create plagiarism
5
12.1 COPYRIGHT ISSUES (cont) In film and music industry;
Need copyrights and permission from producer Sell in market piracy product, low quality, no
warranty Using internet, through file sharing
Download songs and movies The issues, copyrights management
Exclusive copyright to the author and producer
Moral down to the film and music industry
6
12.1 COPYRIGHT ISSUES (cont) To protect the rights of the producers,
government introduced the copyrights protection acts In Malaysia, (Akta Hak Cipta 1987) It covered and protected;
Art work Music Film Sound recording Broadcast recording Etc.
7
12.1 COPYRIGHT ISSUES (cont) To be protected by this act, it must be original and
master piece The copyrights owner controls the reproduction,
communication process or the work quality which to be presented to the public Also distribution control even duration of the copyrights
Licensed Copyrights Tribunal was formed to solve the license issues and the act that should be taken by the copyright owner It becomes a crime to produce or sell pirated copy
(infringing copies) Kementerian Perdagangan Dalam Negeri dan Hal Ehwal
Pengguna Malaysia 2008
8
12.2CONFIDENTIALITY ISSUES
9
12.2 CONFIDENTIALITY ISSUES The more communication activity using
computers, the more issues on confidentiality In other word, privacy
We need to secure our privacy from hackers, they can; Steel our secret information Remove files Graffiti own the website Etc.
10
12.2 CONFIDENTIALITY ISSUES (cont) Dalley (2006) – privacy as the capability of
any person to secure or protect collection, consumption, and sell private information
Example of the wrong act from the confidentiality issue Money transfer to unknown person Fishing email Online purchasing debited to other person
Credit card purchasing by other person
11
12.2 CONFIDENTIALITY ISSUES (cont) Nowadays, with the multimedia
technology, fraud webpages that look like real webpages, also developed to cheat people They were build for phishing, or to steel
other people information especially credit card number and pin number
12
12.3CENCORSHIP ISSUES
13
12.3 CENSORSHIP ISSUES In the early stages, to attract the interest of more
investor to join Multimedia Super Corridor, Malaysia promised not to censor the internet information
The internet user have no limits for information gathering following the perception of the author and source provider from Malaysia
However, there were unexpected worries about the spread of porno sources and incitement which touch the sensitive issues as well as religious and races issues
14
12.3 CENSORSHIP ISSUES (cont) There are application to control minor age
usually 18 years and below; Cyber Patrol Cybersitter Cyber Snoop Internet Guard Control Net Nanny Norton Internet Security Etc.
It blocks by using keywords to the words which have porn, incitement, horror and violent
15
12.4SECURITY ISSUES
16
12.4 SECURITY ISSUES So, what are some of the security
threats in social media outlets? Lack of a business policy or lack of
enforcement of the policy. Friending someone you don't know. Not thinking twice about clicking on links. Letting hijackers into accounts. Third-party application dangers.
http://www.enterprisenetworkingplanet.com/netsecur/five-social-media-security-issues
17
12.4 SECURITY ISSUES Lack of a business policy or lack of enforcement of the policy.
As always, the first line of security should ensure that employees have limits on what can be accessed on company networks and that action is taken when the rules are broken.
Friending someone you don't know. A few weeks ago, I received a request from a stranger who wrote
that, because we had a similar interest, we should be friends. I hit the ignore button, which was a good thing. It was part of a phishing scheme. Others did hit the friend button and have had computer issues as a result.
Not thinking twice about clicking on links. One of the great things about a site like Twitter is the sharing of
information you might not see elsewhere. The downside is the tiny URLs that hide the true link to Web sites. If you aren't sure, ask.
18
12.4 SECURITY ISSUES Letting hijackers into accounts.
Hackers are finding holes in the software and are taking over individual accounts to spread malware from "trusted" sources and scam consumers into sending personal information.
Third-party application dangers. Hackers are able to retrieve passwords and other personal
information through Facebook games. Fake Facebook toolbars are taking users to a spoofed site that steals passwords.
19
12.4 SECURITY ISSUES
Challenges in creating a social media policy
http://indyamber.wordpress.com/2010/07/05/90/
20
12.5TRENDS IN INTEGRATIVE MEDIA INDUSTRY
21
12.5 TRENDS IN INTEGRATIVE MEDIA INDUSTRY
Lately the use of integrative media seem more practical than at the beginning of its introduction.
If some time before production such as splash screen first placed on each site to highlight the sophistication of the knowledge of the owner.
But now its use is decreasing. Why? Probably because more of us more concerned about
the speed reaches the desired information from view 'credibility' of the website owner through the sophistication of his designs.
We no longer focus on things that are cosmetic, but empty inside.
22
12.5 TRENDS IN INTEGRATIVE MEDIA INDUSTRY Society no longer search news focused on traditional media as
traditional media may have the same perception. Community want a more honest information and come from their
own experience of an event and not from the eyes of those who saw the incident and produce their own news from the perception.
Users start browsing for information. In the web pages of blog, the browser can interact directly with the
author news and information from authors of primary sources. Blog is to allow interactivity. Blog also combines all elements of the media. There are written materials in the form of text, there are video recordings
that also includes audio and sometimes animation. More so graphics.
23
12.5 TRENDS IN INTEGRATIVE MEDIA INDUSTRY When we focus on the biggest consumer
for Internet media which is the teenagers and young adults, we can not set aside the discussion on the Social Networking Sites This sites provide us with our own web page
and list of friends known face to face or virtually.
This web site multimedia elements integrated by enabling the sharing of video, audio and other things.
24
That’s all..Thank you..