THE INTERNET IS FOREVER



Part IV: Piracy and HackingDescription: To explore the concepts of stealing and hacking as it relates to internet safety. Objectives and briefing students:Students will be able to explain what copyright laws are.Students will be able to explain the possible consequences of violating copyright laws.Students will be able to explain what is meant by hacking e-mail and Facebook.Suggested grade level: 5-6Materials Needed:Computer and screen to display provided PowerPoint presentation; paper; and markers, colored pencils, or crayons. Procedures:1.Conduct the Quick Assessment.2.PowerPoint presentation.3.Perform the Cooperative Learning Activities.4.Perform the Post-Presentation Assessment.Suggested Cooperative Learning Activity 1:Provide students with paper and drawing instruments, and allow them 5 minutes to draw a simple picture of anything. (A suggested subject of the picture such as the school, a dog, their home, etc. may help keep students on task.)Encourage students to look at other students’ pictures. Begin a discussion regarding whether it is okay for one student to copy exactly another student’s picture without his or her permission. Why is it not okay? Would it be okay for a company to copy the picture and use it in an advertisement or sell copies without the student’s permission?Inform the students that they each have a copyright on their own picture that they just drew. If they like, they can fill in a little ? on their artwork. The Federal Laws of the United States protect each individual’s expression of their original ideas. If someone were to copy one or their pictures, that student would have the right to stop or prevent the copying. Suggested Cooperative Learning Activity 2:Review the PowerPoint with the class. Explore with students the concept of stealing copyrighted expression and the consequences thereof. During the PowerPoint, stop to address some or all of the following points:Copyright is a way to project the expression of original ideas. Things that may be copyrighted include literature, music, drama, choreography, art, photographs, audio visual, architecture, etc. The owner of a copyright has the right to control how and when the work is copied. We encourage people to spend effort in developing these works of art by protecting them from copying. Show the students some visual examples of copyrighted works.Quickly run through the thirteen slides of FBI copyright warnings and ask the students if they have ever seen these warnings before. If they have not, let them know it is run at the beginning of DVDs to let people know they are not allowed to copy the DVD. Downloading movies, music or video games to the internet for others to upload is illegal unless you have permission from the person who owns the copyright. Likewise, uploading music and video games that others have down loaded is illegal unless you have permission. Discuss what uploading and downloading is. Kids may think of this as sharing but it is really illegal coping of the work of people who spend a lot of money making movies, music or video games. Explain that none of the kids should think they have permission just because they can find music or video games on the internet.Discuss with the children why it is wrong to copy an artist’s work. How is this different than copying off of a classmate’s paper? How is it the same? (If plagiarism has been previously introduced to the class, discuss how copyright is a variation on the same concept.)Discuss peer to peer filing sharing programs that kids may be using illegally. Example, Limewire, Kazaa, BitTorrent, and Pirate Bay. Discuss anti-pirating technology that prevents copying DVDs, CDs, games, etc. This is generally referred to as digital rights management “DRM” and encompasses a number of different technologies. For example, iTunes limits the number of devices you can access with your account. One way people avoid DRM technology is through the use of modchips. These are computer chips that are connected to gaming systems that interrupt the DRM technology. Some games have region coding, i.e., a particular copy or version of the game is designed for use in South Korea, and the region coding prevents it from being used in the United States. Modchips can avoid this region coding and allow illegal copies from Asia and other areas to operate on game systems in the US. Modchips can also allow illegal copying and additional “cheats” in the videogame. “Cracked apps” are applications for smart phones, tablets, and computers that have been illegally copied. These pirated applications can only be used on an iPhone that has been “jailbroken” or an Android phone. There is also pirated software (e.g., Photoshop, Windows Office, AutoCAD, etc.) available at numerous websites. It is extremely common that illegal applications and software also include malicious viruses that are designed to steal the user’s identity. Numerous identity thefts have occurred because of cracked applications or other pirated software. Please note that DRM technology can also prevent perfectly legal activities. People who have created ways to avoid DRM restrictions are not always doing something wrong. For example, it is not illegal to “jailbreak” an iPhone and download applications that are not available from Apple, but is illegal to copy copyrighted applications. There are a lot of pros and cons to DRM technology. A student interested in the topic will find a wealth of commentaries on the topic.Explain students can get caught downloading music, movies or video games illegally because each computer connected to the internet is the sited individual IP address. This IP address links the computer to an exact physical location. Your internet service provider may monitor your activity on the internet and report that information and also report your physical location. Your internet service provider may also cancel your family’s account and prevent them from having internet service if you illegally download copyrighted works. Explain that Microsoft, Sony and Nintendo have security technologies that prevent people from illegally copying their games. However, some people have invented mod chips to get around these security technologies. The use of mod chips is illegal. People caught selling them or installing them may be arrested and prosecuted.Discuss the examples of court cases involving copyright infringement. Pick one or two of the examples and ask the students if the punishment was just. To contrast the punishment, ask the students how they would feel if someone copied their work if they had spent months or even years creating a song or a piece of art. Discuss hacking emails and Facebook accounts. Review the cases in the slides and discuss if the punishment was just.Fair use of copyrighted materials is allowed by law. Whether a use is considered “fair” is evaluated according to four factors:The purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;The nature of the copyrighted work;The amount and substantiality of the portion used in relation to the copyrighted work as a whole; andThe effect of the use upon the potential market for or value of the copyrighted work.All four factors must be balanced. Meeting three of four factors does not automatically mean a use is fair. The law balances all of the factors to determine if a use is fair. The Purpose and Character of the UseNonprofit, educational purposes are favored over commercial uses. The copyright statute explicitly lists the following purposes as appropriate: criticism, comment, news reporting, teaching, scholarship, or research. ?The Nature of the Copyrighted WorkCopying work that is marketed for sale to educational institutions weighs against fair use in the educational context. Further, use of an unpublished work is less likely to be considered fair use. Also, a work of fiction or other more “creative” work is given more protection than a work of non-fiction.The Amount or Substantiality of the Portion Used??Using only a portion of a larger work is more likely to be fair use than using the entire work. For example, showing just a clip from a movie is more likely to be considered fair use than showing the entire movie. When the work is a piece of art and the whole image is used, the law has found that smaller and or lower resolutions copies of images are more likely fair use than the full resolution image. The Effect of the Use on the Potential Market for or Value of the WorkIf the copy is used only used for teaching, research or scholarship it is unlikely to affect the potential market for a piece of work. Occasional quotations or photocopies will likely have no adverse market effects, but copies of entire software applications and videos can cause a measurable dip in the potential markets for those copyrighted works.??Suggested Cooperative Learning Activity 3:Break the students up into small groups of 2-3 students. Ask each group to design and create a poster that will inform other kids in the school of the most important lesson they learned regarding piracy and/or internet hacking. Have students present their posters to the rest of the class. Hang the posters in the halls of the school.Review & Further Class Questions:Is downloading a music or song on the internet illegal? How is it similar to shop lifting a CD or sneaking into a movie without a ticket? How do our copyright laws promote the arts in our society?What are some ways to legally download, watch, or listen to songs and movies from the internet. (Examples include iTunes, Hulu, YouTube, , Amazon, Television Network Websites (NBC, ABC, CBS, AMC, public television, etc.), Netflix.) If you have access to the live internet, visit some of these sites. DEBRIEF: Discuss what in this presentation the kids already knew about. What they didn’t know about. Discuss with them something that shocked them and discuss with them what they would want to tell other kids after this presentation. ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download