Thursday, June 26, 2014

Technopreneurship

1. What are the factors that contributed to the success and failure of Steve Jobs as a technopreneur?

Steve Jobs for me has the factors that contributed to both his success and failure. Some of this is his a business mind thinking looking at the possibility of everything, creativity, his self motivation, determination, focus and  also his braveness to face risks that accompanies it, Thus having this qualities or factors, he did done a great job in innovating products at that time with much better ones which people started patronizing leading to his success. But failure hunt him in the most highest peak of his career he became too confident in himself and being prideful this is the time when he started to look down on his employees and insulting them. His lack of communication also add to the factors that result to his failure, because of this he didn’t got a chance to know what his comrades and employees think, and failed to understand that they are only human capable of making mistakes. In addition to this is his bad attitude he is easily angered and has a temper.  But overall Steve Jobs is still a picture of an ideal technopreneur.

2. How do you see yourself as a technopreneur?

Honestly in the present I don’t see myself as one but if given a chance I could be. Maybe not as good and great as Steve Jobs and Bill Gates, but an average one, now as an IT student I can picture myself to be venturing to business pertaining to Technology. It might be a bit difficult but I can see myself willing to take that risk. I can’t say that avoiding problems along the way is possible since having an ordeal is normal when running a business however I can picture myself with the determination to overcome it and taking it as a challenge accepted that could leave me with a lesson that I know will help me to improve and strengthen my resolve to carry on.

3. Would you take the same career path that Steve Jobs took?  Why or why not?


Yes in a way because, his career path lead to his contribution of today’s technology. So if given a chance I would like to take the same path as he did. Innovating and creating something helpful to people in the future. He is without a doubt worth to be followed. Though I would like to follow only his way of making his ideas to reality and making known and be successful, but not the way he think and his attitude towards the end which I can say is negative in every aspect, because I still want to be the same me as what  I am in the beginning and not be too much over shined by fame and pride in the long run. 

Saturday, March 8, 2014

Values and Ethics: Intellectual Property

Intellectual property is a legal concept which refers to creations of the mind for which exclusive rights are recognized.
“ refers to creations of the mind, such as inventions; literary and artistic works; designs; and symbols, names and images used in commerce.
IP is protected in law by, for example, patents, copyright and trademarks, which enable people to earn recognition or financial benefit from what they invent or create. By striking the right balance between the interests of innovators and the wider public interest, the IP system aims to foster an environment in which creativity and innovation can flourish.” http://www.wipo.int/about-ip/en/
Copyright law
Patent law
Trade secret law
 
Intellectual Property Rights(IPR) – the right of the person over his/her mind creations.

Copyrights : the right for authors of their published or unpublished  works. This includes composers , writers, etc.

Grants issued for solely for them:
         Distribute
         Display
         Perform
         Reproduce work
         Prepare derivative works based upon the work

But they could give exclusive rights to others.

Copyright infringement  is the use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works. This is issued to whoever copies works from other people.

Software copyright protection
 is used by proprietary software companies to prevent the unauthorized copying of their software. but there are software’s which are free to used by many.
          Digital Millennium Copyright Act (DMCA) –protect from the unauthorized distribution of the  tools and software .

World Intellectual Property Organization (WIPO) is an international organization dedicated to helping to ensure that the rights of creators and owners of intellectual property are protected worldwide and that inventors and authors are, thus, recognized and rewarded for their ingenuity. 
This organization advocates to raise interest many in intellectual property.
COPYRIGHT PROTECTION
According to our discussion, The protection of copyright as stated by the law  is that the term of protection of copyright for original and derivative works is the life of the author plus fifty (50) years after his death.
The Code specifies the terms of protection for the different types of works.
In calculating the term of protection, the term of protection subsequent to the death of the author shall run from the date of his death or of publication, but such terms shall always be deemed to begin on the first day of January of the year following the event which gave rise to them (i.e. death, publication, making).

Copyright ownership
In general the one who made the work hold the copyright of it.
       For commissioned works: the one who commissioned for the work    owns it but the copyright still remain to the owner unless there is an written agreement between the two
       For audiovisual works: the producer, the author of the scenario, the composer of the music, the film director, and the author of the work so adapted.
Patents
            Property right to inventors.
             is a set of exclusive rights granted by a sovereign state to an inventor or assignee for a limited period of time in exchange for detailed public disclosure of an invention.
The owner have the rights, if he wants to exclude the public from making, distributing, using or selling his invention, and like copyright legal actions would be given to the violator(s).
A patent according to our teaher has a term of protection of twenty (20) years providing an inventor significant commercial gain. In return, the patent owner must share the full description of the invention. This information is made available to the public in the form of the Intellectual Property Official Gazette and can be utilized as basis for future research and will in turn promote innovation and development. The Official Gazette is the public journal and main publication of the government of the Republic of the Philippines. http://www.gov.ph/

Patent infringement
Just like copyright infringement, this is also for the unauthorized use of the invention of others.
Software patent
Protects the features of the software the design, construction and how it works.

Trade secret
-business information, with economic value, should be kept confidential .
          Information is only considered a trade secret if the company takes steps to protect it
 Broadly speaking, any confidential business information which provides an enterprise a competitive edge may be considered a trade secret. Trade secrets encompass manufacturing or industrial secrets and commercial secrets.
 
Employees and Trade Secrets
The greatest threats to the trade secret are employees. It is best to enclose in the employee’s contract the confidentiality of the company’s information to ensure safety. 
          Noncompete agreements
         Protect intellectual property from being used by competitors when key employees leave
         Require employees not to work for competitors for a period of time
         Wide range of treatment on noncompete agreements among the various states


Key Intellectual Property Issues
          Issues that apply to intellectual property and information technology
         Plagiarism
         Reverse engineering
         Open source code
         Competitive intelligence
         Trademark infringement
         Cybersquatting
 

  
   Plagiarism
 is the "wrongful appropriation" and "purloining and publication" of another author's "language, thoughts, ideas, or expressions," and the representation of them as one's own original work.          

.







open source -Program source code made available for use or modification:
–As users or other developers see fit

"In production and development, open source as a development model promotes a) universal access via free license to a product's design or blueprint, and b) universal redistribution of that design or blueprint, including subsequent improvements to it by anyone."









Competitive intelligence is the action of defining, gathering, analyzing, and distributing intelligence about products, customers, competitors, and any aspect of the environment needed to support executives and managers making strategic decisions for an organization.







Trademarks ® or TM or SM 
•A symbol or design or logo used to identify a business or a product.
•Trademark can’t be registered until it’s used. 














"Cybersquatting -also known as domain squatting), according to the United States federal law known as the Anticybersquatting Consumer Protection Act, is registering, trafficking in, or using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else. The cybersquatter then offers to sell the domain to the person or company who owns a trademark contained within the name at an inflated price.:"

Thursday, February 20, 2014

Values And Ethics: Privacy and Freedom of Expression


Privacy - The right to be left alone—the most comprehensive of rights, and the right most valued by a free people.
 It is the ability of an individual or group to seclude or information about themselves and thereby expresses themselves selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share common themes.- http://en.wikipedia.org/wiki/Privacy

it is the right of a person so keep something important for themselves like Private matters and problems.
In the internet world the words ‘Privacy’ might be able to be kept secret  or not, that may be one of the reason why
Some people don’t associate themselves in internet.

Information Privacy
                Combination
of:
·         Communication privacy
·         Data privacy


This two part of information privacy is generally stating the overall outlook of ‘information privacy’, communications, for not be watched by anyone while communicating with others and data the restrictions set in accessing one’s personal data by other individuals and organization.





Privacy Laws, Applications, and Court Rulings
Following are the legislative acts passed over the past 40 years:
·         Financial Data

o    Fair Credit Reporting Act (1970)
that regulates the collection, dissemination, and use of consumer information, including consumer credit information.- http://en.wikipedia.org/wiki/Fair_Credit_Reporting_Act      
o    Fair and Accurate Credit Transactions Act (2003)
  as an amendment to the Fair Credit Reporting Act. The act allows consumers to request and obtain a free credit report once every twelve months from each of the three nationwide consumer credit reporting companies - http://en.wikipedia.org/wiki/Fair_and_Accurate_Credit_Transactions_Act
o    Right to Financial Privacy Act (1978)
  is a United States federal law that gives the customers of financial institutions the right to some level of privacy from government searches.- http://en.wikipedia.org/wiki/Right_to_Financial_Privacy_Act

·         all are such protecting the right to privacy of individuals



•          Children’s personal data
o    Children’s Online Privacy Protection Act (1998)
  applies to the online collection of personal information by persons or entities under U.S. jurisdiction from children under 13 years of age. It details what a website operator must include in a privacy policy, when and how to seek verifiable consent from a parent or guardian, and what responsibilities an operator has to protect children's privacy and safety online including restrictions on the marketing to those under 13 - http://en.wikipedia.org/wiki/Children's_Online_Privacy_Protection_Act

o    Family Education Rights and Privacy Act (1974)
  gives parents access to their child's education records, an opportunity to seek to have the records amended, and some control over the disclosure of information from the records. With several exceptions, schools must have a student's consent prior to the disclosure of education records after that student is 18 years old. The law applies only to educational agencies and institutions that receive funding under a program administered by the U.S. Department of Education. - http://en.wikipedia.org/wiki/Family_Educational_Rights_and_Privacy_Act

•          Electronic surveillance
o    Communications Act of 1934
 regulating interstate and foreign commerce in communication by wire and radio so as to make available, so far as possible, to all the people of the United States a rapid, efficient, nationwide, and worldwide wire and radio communication service with adequate facilities at reasonable charges, for the purpose of the national defense.- http://en.wikipedia.org/wiki/Communications_Act_of_1934


o    Title III of the Omnibus Crime Control and Safe Streets Act (Wiretap Act)
  protection against unreasonable search and seizure extends to the interception of communications and applies to all conversations where an individual has a reasonable expectation of privacy.- https://it.ojp.gov/default.aspx?page=1284

          Access to government records
o    Freedom of Information Act (1966 amended 1974)
  Grants citizens the right to access certain information and records of the federal government upon request



Key Privacy and Anonymity Issues

          Identity theft
          Electronic discovery
          Consumer profiling
          Treating customer data responsibly
          Workplace monitoring
          Advanced surveillance technology




Identity Theft
                   Impersonation of important data. Such as;
o    Name
o    Address
o    Date of birth
o    Social Security number
o    Passport number
o    Driver’s license number
o    Mother’s maiden name


 is a crime in which an imposter obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else..- http://searchsecurity.techtarget.com/definition/identity-theft



Electronic Discovery


          According to our teacher it is the collection, preparation, review, and production of           electronically stored information for use in criminal and civil actions






Consumer Profiling


                   Outline of significant demographic and psychographic details about the user of a particular product. The data include the user's age category, marital status, income level, education, occupation, sex, area of residence, and purchase behavior patterns. Knowledge of the consumer profile is very important in the determination of a creative advertising campaign. The advertising must appeal to both the user and the potential user of the product.- http://www.answers.com/topic/consumer-profile#ixzz2trhdJ8Pz




Workplace Monitoring

§                      process in which incoming and outgoing mail passes through E-mail filtering software to search for content which may violate the policies of the employer.- http://en.wikipedia.org/wiki/Employee_monitoring

§  Protect against employee abuses that reduce worker productivity or expose employer to harassment lawsuits






Advanced Surveillance Technology

§                Camera surveillance
o    the monitoring of the behavior, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting them.-http://en.wikipedia.org/wiki/Surveillance

o    a way to monitor activities in an establishment or at home, also used for security purposes

§                Global positioning system (GPS) chips
o     is a space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites.- http://en.wikipedia.org/wiki/Global_Positioning_System
o    An option to locate a person or a place.







Freedom of Expression is the political right to communicate one's opinions and ideas using one's body and property to anyone who is willing to receive them. The term freedom of expression is sometimes used in synonymous, but includes any act of seeking, receiving and imparting information or ideas, regardless of the medium used. 
It is the right of every individual to say, write and do as a way to speak out their mind. Democratically exclaim or declare whatever it is.

First Amendment Rights

         Perjury
         Fraud
         Defamation
         Obscene speech
         Incitement of panic
         Incitement to crime
         “Fighting words”
         Sedition


Obscene Speech
Speech that appeals to the prurient interest,  depicts sexual conduct in a patently offensive way, and lacks serious literary, artistic, political, or scientific value. Indecently speaking can also defines this.
Speech can be obscene if the person, finds it interesting to say implecits or sexual conduct in a way

Defamation

the action of damaging the good reputation of someone; slander or libel.
•          Slander
–        Oral defamatory statement
•          Libel
–        Written defamatory statement




Controlling Access to Information on the Internet

This includes the following law acts:

•          Communications Decency Act (CDA) – aims to protect especially children from all kinds of indecency such as pornography\
•          Child Online Protection Act (COPA) – this impose heavy penalties when minors are exposed to harmful materials in the web.
•          Internet filtering – an software that is installed with the web browser, that blocks certain sites which are indecent or inappropriate.

•          URL filtering
–        Blocks objectionable URLs or domain names

•            Keyword filtering
–        Blocks keywords or phrases

•          Dynamic content filtering – evaluate a website before it can be viewed
•          Uses
o   Object analysis
o   Image recognition


•  Top-rated Internet filters for home users
–        NetNanny Parental Controls
–        PureSight PC
–        CYBERsitter
–        SafeEyes
–        CyberPatrol

•          ICRA rating system
•          ISP blocking


Children’s Internet Protection Act (CIPA), this put measures in the school and libraries which are most likely students are in. putting internet or web filters for obscene picture, videos which are harmful to minors.








Anonymity on the Internet, is an expression that could hind a person’s identity, anonymously express opinions without fear, exercising freedom of speech, but could be the source of illegal or unethical if used in a wrong way.
Defamation and Hate Speech
–        Sending threatening private messages over the Internet to a person
–        Libel directed at a particular person





Corporate Blogging
                        Some company requires their employees to write blogs, which is a good way to know their employed people thinks about the company, a best way to put in words some suggestion and opinions. Though, this is also the start of unstop criticism that employees might do and that worst case scenario –revealing company secrets.




Pornography

                        One of the top problem of society these days. Pornography is an uprising dilemma of the government. With the internet accessed by many individuals sites after sites of indecent content are coming up luring people to view it.



•          CAN-SPAM Act - Specifies requirements that commercial retailers must follow when sending messages. Federal Trade Commission charged with enforcing the act, but has not done so effectively deterrent in fighting the dissemination of pornography