Information Technology Exam: Digital Identity, Ethics, and Copyright

Verified

Added on  2023/03/17

|10
|1914
|68
Homework Assignment
AI Summary
This IT assignment addresses various aspects of information technology, including digital identity, digital footprint, internet privacy, and the Digital Millennium Copyright Act (DMCA). It explores the creation and protection of digital identities, types of digital footprints, and internet privacy laws in the United States. The assignment also covers Open Educational Resources (OER) and their application in education, along with the risks associated with debit card usage. Additionally, it defines and differentiates between Augmented Reality (AR), Virtual Reality (VR), and Mixed Reality (MR), and explores the use of LinkedIn for professional networking. The second part of the assignment delves into copyright, intellectual property, and the ethical use of software and intellectual property, emphasizing the importance of respecting creators' rights and the ethical implications of using software and intellectual property without proper authorization.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: IT Question Answers.
IT Question Answers
Name of the Student:
Name of the university:
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1Information Technology
Part I
Digital Identity:
a) Digital identity stands to represent an online cyberspace which is claimed by an
individual device or any organization. A digital identity is created by the action and
activities by the organization, device or an individual online, which links the actions with
a specific address which has been randomly generated or to the IP address (Beck 2015).
Followed by the above aspects there are several steps which needs to be completed
in order to create a digital identity. Those steps are mentioned below:
Capture-
This is the first step towards creating a digital identity. In this step the information
of the subscriber’s is being captured for further process.
Verify-
In this step the gathered information are verified in order check the validity of the
user data. The verification includes the document verification as well as the
biometric verification. Followed by the completion of this step it proceed further.
Generates Digital Identity-
In this process the information of an individual, device or organization is linked
with a randomly generated ID. This step provides specific identity to each of the
device, individual or organization.
b) Digital Footprint:
Digital footprint stands to represent a string which has been created by a user while
using the social media as well as internet, which includes the email services and websites as
well as other online platforms. Studies has mentioned that there are basically two types of
Digital FootPrint present which includes the Active FootPrints and Passive FootPrints. Active
Document Page
2Information Technology
FootPrint stands for those which has been provided in online intentionally and the Passive
FootPrint stands for those data which has been leaved in online unintentionally. The personal
IP address which can track the location of the user is one of the significant example of
Passive Digital FootPrint.
Internet privacy:
a) Internet privacy stands to represent the protection methods by which the personal data
as well as the sensitive data are protected which is present online. Those data includes
the private conversations, social media activities as well as the location of an
individual or any organization.
b) In order to protect the user data present in the internet United States has introduced
several Privacy which are listed below:
Electronic Communication Privacy- In this law the government of US has intended to
protect the communication via the digital platform which include the emails as well as
social media conversation.
System Fraud- In this act the government of US has intended to protect the computer
devices in order to protect the customer data.
Cyber Intelligence and Protection Act- the fundamental purpose of this act to restrict
the cyber cyber-crime in order to protect the user information.
DMCA:
DMCA stands for Digital Millennium Copyrights Act. The fundamental objective of
this act is to alert the organizations, service providers, internet search engines as well as the
individuals about the incorporation of the copyrights act into their service structure.
Document Page
3Information Technology
DMCA protects the creative acts which has been created by any individual,
organization or service provider (Carpou 2015).
OER:
In is stands for Open Educational Resources which provides free access to the
resources which are relevant for the educational purpose. In order to provide better
experience to the user OER offers free accessibility to the educational resources which can be
utilized without any restrictions (Butcher 2015).
One of the most utilized and useful OER in the educational field is i) CourseEra, ii)
Open2Study.
There are several benefits present behind the utilization of Debit cards however
studies has mentioned that there are various risk present related to the utilization of debit
card online. Those risk includes the threat to the data loss due to the attacks of cyber hackers.
Thus, in order to get protection from those data it is essential to be aware of the
websites and application before opting for online purchase.
EDI
EDI stands for Electronic Data Interchange. DI process stands to represent the
exchange the data by posting request to the targeted resources and get the responses by
receiving the required information from the respective resources.
First define what the following initials stand for:
AI –
AI stands for Artificial Intelligence.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4Information Technology
AR
AR stands for Augmented Reality.
VR
VR stands for Virtual Reality.
MR
MR stands for Mixed Reality.
Then give a brief explanation of the difference between AR, VR and MR?
AR-
This process in initiated by the imposing the human point of view with the content
which has been generated by a computer.
VR-
This process stands to represent the trick which has been operated on the stimulation
of the presence of user as well as the user sense.
MR-
This process stands to represent the interaction between the human and machines.
LinkedIn:
The mentioned application is utilized in the business platforms in order to post jobs as
well as to hire new employs based on their required criteria.
There are several advantage present in the utilization of LinkedIn as this application
offers to create a professional profile by which it will provide you the knowledge about the
new posted job. Along with the above benefits the organizations also gets benefits by posting
their job requirements.
Document Page
5Information Technology
In order to create a professional profile it needs to provide the valid id’s related which
will be verified then it will allow the user to utilize the LinkedIn services according to their
preferences.
Electronic etiquette:
This protocol provides a basic guidelines to an organization or individuals in order to
utilize the electronic devices for the betterment of the organization or individuals.
Email etiquette offers the organization to follow the basic guidelines to use the email
for any organizational purpose.
Employee Monitoring Software:
The employee monitoring is a typical type of software which is used by the
organization administrations for monitoring and supervising all the employees of the
organization. Within business this is actually deployed over whole business network for
centralised log view using a central PC.
One example of this employee monitoring software is the Teramind. The main
important facilities that are provided by the Teramind are the instant message monitoring,
website monitoring, email monitoring, file transfer monitoring and application monitoring.
Part II:
Copyright:
The Copyright is actually a legal right that is present in most of the countries which
helps the creators to protect their original work from any type of unauthorised usage and
piracy. In a broader way Copyright actually provides original content creator an exclusive
rights so that they can determine whether the created content by them can be used by
Document Page
6Information Technology
someone else or not and if it this content can be used by someone else then under what
conditions this content can be used by other peoples.
Intellectual Property:
The intellectual property is considered as a specific type of property category which
mainly consists intangible creations regarding the human intellect. The intellectual property
provides two types of rights one is copyright and the other one is the industrial property
rights. Within this industrial property rights some important aspects are the models, industrial
designs, patents, trademarks and designations of origin. The intellectual properties actually
consists law which inspires the creators to create a large range of intellectual goods. This is
achieved as the law of intellectual property provides businesses and people property rights to
the intellectual goods and information they create but for a certain period of time.
Copyrights for Protecting Intellectual Property:
The laws of intellectual property is used for protecting creators and the original
content of them from any type of piracy where copyright is also utilised for protecting this
original content of the users. Thus copyright is considered as a form of intellectual property.
Here the intellectual properties are protected through copyright as the copyright prevents
other peoples to copy the work, stops distribution copies of it without proper permission or
fees and lending of copies of the original work. The copyright also prevents the peoples to
put the original work on the internet and prevents adaptation of the original content.
Ethical use of Software and Intellectual Property:
Many of the users tries to use the intellectual properties and software without paying
for it. From personal perspective this is quite unethical to use these intellectual properties and
software without paying for it. An intellectual property consist hard work of the peoples who
developed this property and this is also same for the software where the developers works
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7Information Technology
hard for creating the software. Thus they must be paid off for their hard work and the users
who are using these software or the intellectual property must pay for it. This will also
motivate the creators to create further contents.
Document Page
8Information Technology
Reference:
Beck, E.N., 2015. The invisible digital identity: Assemblages in digital networks. Computers
and Composition, 35, pp.125-140.
Butcher, N., 2015. A basic guide to open educational resources (OER). Commonwealth of
Learning (COL);.
Carpou, Z., 2015. Robots, Pirates, and the Rise of the Automated Takedown Regime: Using
the DMCA to Fight Piracy and Protect End-Users. Colum. JL & Arts, 39, p.551.
Bibliography:
Giorcelli, M. and Moser, P., 2016. Copyrights and creativity: Evidence from italian
operas. Available at SSRN 2505776.
Horner, S.N., 2013. DMCA: Professional Sports Leagues' Answer to Protecting Their
Broadcasting Rights Against Illegal Streaming. Marq. Sports L. Rev., 24, p.435.
Jahan, M., Liu, Z. and Loh, K.P., 2013. A Graphene oxide and coppercentered metal organic
framework composite as a trifunctional catalyst for HER, OER, and ORR. Advanced
Functional Materials, 23(43), pp.5363-5372.
Mellmer, J.A., Young, R.T., Perkins, A.D., Robertson, J.M., Sabin, J.N., Mcdonald, M.C.,
Phillips, D., Sheridan, R.M., Nazeer, N.A., Higley, D.B. and Carter, S.R., 2014. Managing
digital identity information. U.S. Patent 8,631,038.
Rao, N., Venkat, T., Shayideep, S. and Jahagirdar, J., 2016. Internet of Things: Security
Challenges and Issues. International Journal of Computer Science Engineering &
Technology, 6(12).
Document Page
9Information Technology
Spoo, R., 2016. Without Copyrights: Piracy, Publishing, and the Public Domain. Oxford
University Press.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]