Education Consumers

Verified

Added on  2023/01/12

|5
|1021
|68
AI Summary
This document discusses the impact of copyright infringement on education consumers and the importance of protecting intellectual property. It explores the role of IP addresses in communication, targeting elderly consumers, university campaigns, and the feasibility of implementing network protection mechanisms. The document also provides references for further reading.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: EDUCATION CONSUMERS
Education Consumers (Non legal)
Name of the students:
Name of the University:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1EDUCATION CONSUMERS
1. Education in schools
Internal Protocol (IP) is referred to as a numerical label assigned for separate devices
those are generally connected to computer networks. In order to process successful
communication between the users the IP s requited without the IP address the sender would not
be able to send the information and additionally will not be achieve the same while required
(Lewin-Lane et al. 2018). The two leading functionalities served by the IP addresses are
identification of network or hosts and addressing of proper location of the computing device.
Infringing copyright hurts the users which tell the user the way that needs to be followed
to discem between the illegal and legal activities. For instance, there are many ICT companies
which fail to adopt accurate protection mechanism (Mulligan 2017). It allows the users to access
all data from the server without permission. In order to protect all Intellectual Properties (IP)
anyone who gives authorization and the original creator of the products should be considered.
Company’s confidential data should not be hacked by external attackers, therefore legal
rules and policies for both businesses and organizations should maintain thoroughly. Marriot
International impacted more than Million on consumers in the years of 2014-2018. Similarly, in
the year of 2016, October the Adult friend finder network faced major challenge due to data
hacking and copyright issues. External hackers have collected more than 20 years of stored data
in terms of names, email, passwords etc from the company server without permission and
misused them.
Document Page
2EDUCATION CONSUMERS
2. Targeting the elderly as well
In order to conduct the campaign the consumers who are targeted are nominated
regardless of their age groups. It means that both adults and older people are eligible to attend the
campaign program. Bulk set of consumers who are not aware of this program are allowed to
attend the campaign program (Joyce et al. 2016). Some of the unwanted sites are required be
banned to restrict the child to do illegal activities. If any user who is below the age group of 18
visit such unwanted sites would be traced through the IP addresses. The numbers of Mobile
commerce/ M-Commerce and E-commerce users are growing every day and as a result internet
access has also become an easy job.
3. Uni campaigns
3.1 Conversations happen in uni
The universities and school authorities are required to follow open communication to
provide the users an independent platform where they would be able to share their ideas and
point of views about the legal and illegal activities n terms of copyright laws and regulations The
campaign will ensure that all the users are possessing enough of ideas about the copyright laws.
It means that open communication is the only way that needs to be followed by authorities while
conducting the campaign (Rub 2017). The attendants and participants of the campaign program
will discuss about the problems statements and the societal issues associated to this. In addition
to this, the usage regarding some of the app and websites are also elaborated in this
communication or campaign program. Apart from that, analogous situations and the associated
challenges with theses usage are also elaborated in this campaign program.
Document Page
3EDUCATION CONSUMERS
4. About the working adults
4.1 Feasibility
Implementation of proper network protection mechanism is much essential for both child
and elder students. The school authorities require using appropriate legal acts and regulations to
resolve the challenges. It will assist the students to realize the difference between ethical and
unethical activities. The users must not visit an unwanted site which implies that according to the
age group the activities of the user are required to be checked. Children should not be allowed to
visit nay of the unwanted websites (Ku 2017). The IP address will help to track the location of
the users and through internet connection the details content of the website visited will also be
traced easily.
The copyright law is about protecting the actual authorship works that are fixed in
tangible medium which include literary, musical, artistic and dramatic works. It is assumed that,
successful implementation of this process is completely feasible (Thornton 2018). Different
types of printed materials such as posters, calendars, leaflets etc are required to be used by the
users to spread awareness among the users and consumers.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4EDUCATION CONSUMERS
References
Joyce, C., Ochoa, T.T., Carroll, M.W., Leaffer, M.A. and Jaszi, P., 2016. Copyright law (p. 542).
Durham: Carolina Academic Press.
Ku, R.S.R., 2017. The creative destruction of copyright: Napster and the new economics of
digital technology. In Copyright Law (pp. 207-268). Routledge.
Lewin-Lane, S., Dethloff, N., Grob, J., Townes, A. and Lierman, A., 2018. The search for a
service model of copyright best practices in academic libraries. Journal of Copyright in
Education and Librarianship, 2(2), pp.1-24.
Mulligan, C., 2017. Copyright without Copying. Cornell JL & Public Policy, 27, p.469.
Rub, G.A., 2017. Copyright Survives: Rethinking the Copyright-Contract Conflict. Virginia Law
Review, pp.1141-1245.
Schwabach, A., 2016. Fan fiction and copyright: outsider works and intellectual property
protection. Routledge.
Thornton, J., 2018. Copyright Meets Fandom: Understanding the Cultural Influence of
‘Manga’and ‘Anime’through Fan Translations and Copyright Laws.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]