Plagiarism. Dr. M.G. Sreekumar UNESCO Coordinator, Greenstone Support for South Asia Head, LRC & CDDL, IIM Kozhikode

Size: px
Start display at page:

Download "Plagiarism. Dr. M.G. Sreekumar UNESCO Coordinator, Greenstone Support for South Asia Head, LRC & CDDL, IIM Kozhikode"

Transcription

1 Digital Rights Management & Plagiarism Dr. M.G. Sreekumar UNESCO Coordinator, Greenstone Support for South Asia Head, LRC & CDDL, IIM Kozhikode

2 Agenda

3 Intranet / Internet K-Assets/Objects, Practices, CoP, Collaborative Space Gateway-out Data capture Organizational Enterprise Wide

4 Enterprise IT Environment Integration Shared Data Intranet Firewall Internet PCs Servers

5 Content Management Key issue (challenge & opportunity) today in most enterprises Why? Wide variety of web-enabled digital content Web enabling of businesses Digital publishing Most authoring tools support saving in web compatible formats Ease of web publishing and hosting Need for integrating internal and external content

6 What is Content Management? Technologies, standards, principles and practices related to: Content creation, capturing, publishing Organization and storage Search, retrieval and delivery Preservation Rights management Version control Administration Integration with external content Integration with other applications on Intranets via web servers and browsers

7 Content Management: Components Content Management: Components External Content Internal Content Legacy Content Select Download Link Host Create Capture Publish Extract Convert Host Quality Control Integrity Performance Monitor Usage Maintenance Preservation Security Content Repository Organisation Search/ Retrieval Access

8 Content: Types Structured, Unstructured Source documents with / without Metadata Metadata t with / without t Source document Free / fee based Internal / external

9 Content: Types Internal content examples: , Company News Plans, policies, project reports, best practices, annual reports, press releases, news letters, product catalogs, presentations, etc. Processes, Manuals, Factsheets Staff / expert profiles, phone directories Client, competitor info Software, Courseware, CBT SQL databases, library catalog, legacy databases

10 Content: Types External content examples: Licensed: Databases (bibliographic, full-text) e-journals e-books Software, etc. Free content (listserv, databases, e-journals, etc.) Web 2.0 / Social Network Locally hosted / remote access More and more external content is brought behind the firewall

11 External Content Why bring external content behind firewall? Robust & Reliable delivery compared to WWW (World Wide Wait) Storage Costs going Cheap Content aggregation, filtering, and profile- based delivery Integration with internal content

12 Content: Formats Text (HTML, ASCII) Binary objects (software) Graphics Images WYSIWYG documents PDF Multimedia presentations Digital audio, video More bandwidth more media rich content

13 Searchers

14 DRM A Collective name for technologies that prevent one from using a copyrighted work beyond the degree to which the copyright owner (or a publisher who may not actually hold a copyright) wishes ih to allow him/her to use it. -- Michael Godwin

15 DRM Any technology used to protect the interests of owners of content and services (such as copyright owners). Typically, authorised recipients or users must acquire a license in order to consume the protected material files, music, movies according to the rights or business rules set by the content owner -- Microsoft Security Glossary

16

17 ERM ERM stands for Enterprise Rights Management. It is also known as IRM, Information Rights Management. The commonly adopted name is Enterprise Digital Rights Management edrm.

18 ERM ERM is the persistent control of access to and usage of electronic information regardless of where it exists. Be it inside or outside your organization s firewall.

19

20

21 Protecting Unstructured Data

22 Data Protection Cycle

23 Objectives To meet all the complicated document security needs throughout the full document lifecycles and workflows. Easy to integrate with existing systems (Providing SDK for authentication, packaging, policy management). To support all sorts of documents/files/content being circulated in the everyday enterprise work environment. Provide Security, Reliability and Scalability on a 24X7X365 formula.

24

25

26 Issues with Strong DRM User Support Preservation and Archiving Fair Use Expensive No Interoperability What exactly is being sealed and delivered?

27 DRM Enabling New Business Models

28 New Business Models Right to use content more than once Right to share or re-distribute content Time-limited usage Usage limited Subscription model

29 Best Practices Secure Document Secure Node Secure Exchange Secure e Web Secure Print Secure File-Server

30

31

32

33

34 A Word About Open Access

35

36

37

38

39

40 Plagiarism The act of presenting the words, ideas, images, sounds, or the creative expression of others as my own.

41

42

43

44 Excuses

45 Possible Consequences

46

47 NO Need to Document if Facts that are widely known Information or Judgments considered as Common Knowledge Examples Mahatma Gandhi Father of the Nation Washington DC Capital of the USA

48

49

50

51 Three Strategies

52 Preventing Plagiarism

53 Simple Detection Techniques

54 Use a Search Engine

55 Screeners

56 Screeners

57 Screeners

58