TOPIC 12ISSUES AND TRENDS IN
INTEGRATIVE MEDIA
1
OUTLINE
12.1 COPYRIGHT ISSUES
12.2 CONFIDENTIALITY ISSUES
12.3 CENSORSHIP ISSUES
12.4 SECURITY ISSUES
12.5 TRENDS IN INTEGRATIVE MEDIA
INDUSTRY
2
12.1COPYRIGHT ISSUES
3
12.1 COPYRIGHT ISSUES Copyright issues is very sensitive towards;
Writing
Music
Film
Etc.
In academic for instance, many information from internet, student do not come out with own original idea, but copy the idea from other people, especially from the internet
Media from internet could create plagiarism
4
12.1 COPYRIGHT ISSUES (cont)
In film and music industry;
Need copyrights and permission from producer
Sell in market piracy product, low quality, no
warranty
Using internet, through file sharing
Download songs and movies
The issues, copyrights management
Exclusive copyright to the author and producer
Moral down to the film and music industry
5
12.1 COPYRIGHT ISSUES (cont)
To protect the rights of the producers, government introduced the copyrights protection acts In Malaysia, (Akta Hak Cipta 1987)
It covered and protected; Art work
Music
Film
Sound recording
Broadcast recording
Etc.
6
12.1 COPYRIGHT ISSUES (cont) To be protected by this act, it must be original and
master piece
The copyrights owner controls the reproduction, communication process or the work quality which to be presented to the public Also distribution control even duration of the copyrights
Licensed Copyrights Tribunal was formed to solve the license issues and the act that should be taken by the copyright owner It becomes a crime to produce or sell pirated copy
(infringing copies) Kementerian Perdagangan Dalam Negeri dan Hal Ehwal
Pengguna Malaysia 2008
7
12.2CONFIDENTIALITY ISSUES
8
12.2 CONFIDENTIALITY ISSUES
The more communication activity using
computers, the more issues on confidentiality
In other word, privacy
We need to secure our privacy from hackers,
they can;
Steel our secret information
Remove files
Graffiti own the website
Etc.
9
12.2 CONFIDENTIALITY ISSUES
(cont)
Dalley (2006) – privacy as the capability of
any person to secure or protect collection,
consumption, and sell private information
Example of the wrong act from the
confidentiality issue
Money transfer to unknown person
Fishing email
Online purchasing debited to other person
Credit card purchasing by other person
10
12.2 CONFIDENTIALITY ISSUES
(cont)
Nowadays, with the multimedia
technology, fraud webpages that look
like real webpages, also developed to
cheat people
They were build for phishing, or to steel
other people information especially credit
card number and pin number
11
12.3CENCORSHIP ISSUES
12
12.3 CENSORSHIP ISSUES In the early stages, to attract the interest of
more investor to join Multimedia Super Corridor, Malaysia promised not to censor the internet information
The internet user have no limits for information gathering following the perception of the author and source provider from Malaysia
However, there were unexpected worries about the spread of porno sources and incitement which touch the sensitive issues as well as religious and races issues
13
12.3 CENSORSHIP ISSUES (cont)
There are application to control minor age usually 18 years and below;
Cyber Patrol
Cybersitter
Cyber Snoop
Internet Guard Control
Net Nanny
Norton Internet Security
Etc.
It blocks by using keywords to the words which have porn, incitement, horror and violent
14
12.4SECURITY ISSUES
15
12.4 SECURITY ISSUES
So, what are some of the security threats
in social media outlets?
Lack of a business policy or lack of
enforcement of the policy.
Friending someone you don't know.
Not thinking twice about clicking on links.
Letting hijackers into accounts.
Third-party application dangers.
16
http://www.enterprisenetworkingplanet.com/netsecur/five-social-media-security-issues
12.4 SECURITY ISSUES Lack of a business policy or lack of enforcement of the
policy. As always, the first line of security should ensure that employees
have limits on what can be accessed on company networks and that action is taken when the rules are broken.
Friending someone you don't know. A few weeks ago, I received a request from a stranger who
wrote that, because we had a similar interest, we should be friends. I hit the ignore button, which was a good thing. It was part of a phishing scheme. Others did hit the friend button and have had computer issues as a result.
Not thinking twice about clicking on links. One of the great things about a site like Twitter is the sharing of
information you might not see elsewhere. The downside is the tiny URLs that hide the true link to Web sites. If you aren't sure, ask.
17
12.4 SECURITY ISSUES Letting hijackers into accounts.
Hackers are finding holes in the software and are taking over individual accounts to spread malware from "trusted" sources and
scam consumers into sending personal information.
Third-party application dangers.
Hackers are able to retrieve passwords and other personal information through Facebook games. Fake Facebook toolbars are taking users to a spoofed site that steals passwords.
18
12.4 SECURITY ISSUES
19
Challenges in
creating a social
media policy
http://indyamber.
wordpress.com/2
010/07/05/90/
12.5TRENDS IN INTEGRATIVE
MEDIA INDUSTRY
20
12.5 TRENDS IN INTEGRATIVE
MEDIA INDUSTRY Lately the use of integrative media seem more
practical than at the beginning of its introduction.
If some time before production such as splash screen first placed on each site to highlight the sophistication of the knowledge of the owner.
But now its use is decreasing. Why?
Probably because more of us more concerned about the speed reaches the desired information from view 'credibility' of the website owner through the sophistication of his designs.
We no longer focus on things that are cosmetic, but empty inside.
21
12.5 TRENDS IN INTEGRATIVE
MEDIA INDUSTRY Society no longer search news focused on traditional media as
traditional media may have the same perception.
Community want a more honest information and come from their own
experience of an event and not from the eyes of those who saw the incident and produce their own news from the perception.
Users start browsing for information.
In the web pages of blog, the browser can interact directly with the author news and information from authors of primary sources.
Blog is to allow interactivity.
Blog also combines all elements of the media.
There are written materials in the form of text, there are video recordings that
also includes audio and sometimes animation.
More so graphics.
22
12.5 TRENDS IN INTEGRATIVE
MEDIA INDUSTRY
When we focus on the biggest consumer for
Internet media which is the teenagers and
young adults, we can not set aside the
discussion on the Social Networking Sites
This sites provide us with our own web page and
list of friends known face to face or virtually.
This web site multimedia elements integrated by enabling the sharing of video, audio and other
things.
23
That’s all..Thank you..
24