SlideShare ist ein Scribd-Unternehmen logo
1 von 24
TOPIC 12
    ISSUES AND TRENDS IN
    INTEGRATIVE MEDIA



1
2




OUTLINE
12.1   COPYRIGHT ISSUES
12.2   CONFIDENTIALITY ISSUES
12.3   CENSORSHIP ISSUES
12.4   SECURITY ISSUES
12.5   TRENDS IN INTEGRATIVE MEDIA
       INDUSTRY
12.1
    COPYRIGHT ISSUES




3
4




12.1 COPYRIGHT ISSUES
   Copyright issues is very sensitive towards;
       Writing
       Music
       Film
       Etc.
   In academic for instance, many information
    from internet, student do not come out with
    own original idea, but copy the idea from
    other people, especially from the internet
       Media from internet could create plagiarism
5




12.1 COPYRIGHT ISSUES (cont)
   In film and music industry;
       Need copyrights and permission from producer
       Sell in market piracy product, low quality, no
        warranty
   Using internet, through file sharing
       Download songs and movies
   The issues, copyrights management
       Exclusive copyright to the author and producer
       Moral down to the film and music industry
6




12.1 COPYRIGHT ISSUES (cont)
   To protect the rights of the
    producers, government introduced the
    copyrights protection acts
       In Malaysia, (Akta Hak Cipta 1987)
       It covered and protected;
         Art work
         Music
         Film
         Sound recording
         Broadcast recording
         Etc.
7




12.1 COPYRIGHT ISSUES (cont)
   To be protected by this act, it must be original and
    master piece
   The copyrights owner controls the reproduction,
    communication process or the work quality which to
    be presented to the public
       Also distribution control even duration of the copyrights
   Licensed Copyrights Tribunal was formed to solve the
    license issues and the act that should be taken by
    the copyright owner
       It becomes a crime to produce or sell pirated copy
        (infringing copies)
           Kementerian Perdagangan Dalam Negeri dan Hal Ehwal
            Pengguna Malaysia 2008
12.2
    CONFIDENTIALITY ISSUES




8
9




12.2 CONFIDENTIALITY ISSUES
   The more communication activity using
    computers, the more issues on confidentiality
       In other word, privacy
   We need to secure our privacy from hackers,
    they can;
       Steel our secret information
       Remove files
       Graffiti own the website
       Etc.
10




12.2 CONFIDENTIALITY ISSUES
(cont)
   Dalley (2006) – privacy as the capability of
    any person to secure or protect collection,
    consumption, and sell private information
   Example of the wrong act from the
    confidentiality issue
       Money transfer to unknown person
       Fishing email
       Online purchasing debited to other person
           Credit card purchasing by other person
11




12.2 CONFIDENTIALITY ISSUES
(cont)
 Nowadays,   with the multimedia
 technology, fraud webpages that look
 like real webpages, also developed to
 cheat people
    They were build for phishing, or to steel
     other people information especially credit
     card number and pin number
12.3
 CENCORSHIP ISSUES




12
13




12.3 CENSORSHIP ISSUES
   In the early stages, to attract the interest of
    more investor to join Multimedia Super
    Corridor, Malaysia promised not to censor the
    internet information
   The internet user have no limits for information
    gathering following the perception of the
    author and source provider from Malaysia
   However, there were unexpected worries
    about the spread of porno sources and
    incitement which touch the sensitive issues as
    well as religious and races issues
14




12.3 CENSORSHIP ISSUES (cont)
   There are application to control minor age usually
    18 years and below;
       Cyber Patrol
       Cybersitter
       Cyber Snoop
       Internet Guard Control
       Net Nanny
       Norton Internet Security
       Etc.
   It blocks by using keywords to the words which
    have porn, incitement, horror and violent
12.4
 SECURITY ISSUES




15
16




     12.4 SECURITY ISSUES
       So,  what are some of the security threats
         in social media outlets?
            Lack of a business policy or lack of
             enforcement of the policy.
            Friending someone you don't know.
            Not thinking twice about clicking on links.
            Letting hijackers into accounts.
            Third-party application dangers.

http://www.enterprisenetworkingplanet.com/netsecur/five-social-media-security-issues
17




12.4 SECURITY ISSUES
   Lack of a business policy or lack of enforcement of the
    policy.
       As always, the first line of security should ensure that employees
        have limits on what can be accessed on company networks
        and that action is taken when the rules are broken.
   Friending someone you don't know.
       A few weeks ago, I received a request from a stranger who
        wrote that, because we had a similar interest, we should be
        friends. I hit the ignore button, which was a good thing. It was
        part of a phishing scheme. Others did hit the friend button and
        have had computer issues as a result.
   Not thinking twice about clicking on links.
       One of the great things about a site like Twitter is the sharing of
        information you might not see elsewhere. The downside is the
        tiny URLs that hide the true link to Web sites. If you aren't
        sure, ask.
18




12.4 SECURITY ISSUES
   Letting hijackers into accounts.
       Hackers are finding holes in the software and are taking over
        individual accounts to spread malware from "trusted" sources and
        scam consumers into sending personal information.
   Third-party application dangers.
       Hackers are able to retrieve passwords and other personal
        information through Facebook games. Fake Facebook toolbars are
        taking users to a spoofed site that steals passwords.
19




  12.4 SECURITY ISSUES
Challenges in
creating a social
media policy

http://indyamber.
wordpress.com/2
010/07/05/90/
12.5
 TRENDS IN INTEGRATIVE
 MEDIA INDUSTRY



20
21




12.5 TRENDS IN INTEGRATIVE
     MEDIA INDUSTRY
   Lately the use of integrative media seem more
    practical than at the beginning of its introduction.
   If some time before production such as splash
    screen first placed on each site to highlight the
    sophistication of the knowledge of the owner.
   But now its use is decreasing. Why?
   Probably because more of us more concerned
    about the speed reaches the desired information
    from view 'credibility' of the website owner through
    the sophistication of his designs.
   We no longer focus on things that are
    cosmetic, but empty inside.
22




12.5 TRENDS IN INTEGRATIVE
MEDIA INDUSTRY
   Society no longer search news focused on traditional media as
    traditional media may have the same perception.
   Community want a more honest information and come from their own
    experience of an event and not from the eyes of those who saw the
    incident and produce their own news from the perception.
   Users start browsing for information.
   In the web pages of blog, the browser can interact directly with the
    author news and information from authors of primary sources.
       Blog is to allow interactivity.
       Blog also combines all elements of the media.
       There are written materials in the form of text, there are video recordings that
        also includes audio and sometimes animation.
       More so graphics.
23




12.5 TRENDS IN INTEGRATIVE
MEDIA INDUSTRY
   When we focus on the biggest consumer for
    Internet media which is the teenagers and
    young adults, we can not set aside the
    discussion on the Social Networking Sites
       This sites provide us with our own web page and
        list of friends known face to face or virtually.
       This web site multimedia elements integrated by
        enabling the sharing of video, audio and other
        things.
That’s all..
 Thank you.. 




24

Weitere ähnliche Inhalte

Was ist angesagt?

Web 3.0: The Upcoming Revolution
Web 3.0: The Upcoming RevolutionWeb 3.0: The Upcoming Revolution
Web 3.0: The Upcoming Revolution
Nitin Godawat
 
Social io t-sito s-iot
Social io t-sito s-iotSocial io t-sito s-iot
Social io t-sito s-iot
Luigi Atzori
 
Client brief report for digital video
Client brief report for digital videoClient brief report for digital video
Client brief report for digital video
BenT1990
 

Was ist angesagt? (20)

L3 cs110 jcu-sindoni rev10092011
L3 cs110 jcu-sindoni rev10092011L3 cs110 jcu-sindoni rev10092011
L3 cs110 jcu-sindoni rev10092011
 
Blackberry playbook – new challenges
Blackberry playbook – new challengesBlackberry playbook – new challenges
Blackberry playbook – new challenges
 
Service Design Days 2017 - Keynote Jon Rogers (University of Dundee)
Service Design Days 2017 - Keynote Jon Rogers (University of Dundee)Service Design Days 2017 - Keynote Jon Rogers (University of Dundee)
Service Design Days 2017 - Keynote Jon Rogers (University of Dundee)
 
Digital citizenship presentation
Digital citizenship presentationDigital citizenship presentation
Digital citizenship presentation
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Web 3.0: The Upcoming Revolution
Web 3.0: The Upcoming RevolutionWeb 3.0: The Upcoming Revolution
Web 3.0: The Upcoming Revolution
 
The future internet web 3.0
The future internet  web 3.0The future internet  web 3.0
The future internet web 3.0
 
computer and security
computer and security computer and security
computer and security
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Social io t-sito s-iot
Social io t-sito s-iotSocial io t-sito s-iot
Social io t-sito s-iot
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs annual report 2017
Qrator Labs annual report 2017
 
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by DesignSay Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
Say Good-Bye to Zero-Sum: Say Hello to Privacy and Marketing, by Design
 
Malware & Data Breaches: Combatting the Biggest Threat
Malware & Data Breaches:  Combatting the Biggest ThreatMalware & Data Breaches:  Combatting the Biggest Threat
Malware & Data Breaches: Combatting the Biggest Threat
 
World Wide Platform
World Wide PlatformWorld Wide Platform
World Wide Platform
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
Client brief report for digital video
Client brief report for digital videoClient brief report for digital video
Client brief report for digital video
 

Andere mochten auch

Andere mochten auch (19)

Scct2013 topic6-integrative mediaprojectdevelopment
Scct2013 topic6-integrative mediaprojectdevelopmentScct2013 topic6-integrative mediaprojectdevelopment
Scct2013 topic6-integrative mediaprojectdevelopment
 
HARDWARE COMPONENTS FOR INTEGRATIVE MEDIA SYSTEMS
HARDWARE COMPONENTS FOR INTEGRATIVE MEDIA SYSTEMSHARDWARE COMPONENTS FOR INTEGRATIVE MEDIA SYSTEMS
HARDWARE COMPONENTS FOR INTEGRATIVE MEDIA SYSTEMS
 
qualitative analysis
qualitative analysisqualitative analysis
qualitative analysis
 
Scct2013 topic 7_ii
Scct2013 topic 7_iiScct2013 topic 7_ii
Scct2013 topic 7_ii
 
Scct2013 topic 4_audio
Scct2013 topic 4_audioScct2013 topic 4_audio
Scct2013 topic 4_audio
 
Penyiastan kewartawanan politik di 3 buah negara
Penyiastan kewartawanan politik di 3 buah negaraPenyiastan kewartawanan politik di 3 buah negara
Penyiastan kewartawanan politik di 3 buah negara
 
INTRODUCTION TO INTEGRATIVE MEDIA
INTRODUCTION TO INTEGRATIVE MEDIAINTRODUCTION TO INTEGRATIVE MEDIA
INTRODUCTION TO INTEGRATIVE MEDIA
 
Scct2013 topic 4_animation
Scct2013 topic 4_animationScct2013 topic 4_animation
Scct2013 topic 4_animation
 
benefit eating spicy food
benefit eating spicy foodbenefit eating spicy food
benefit eating spicy food
 
Scct2013 topic4 video
Scct2013 topic4 videoScct2013 topic4 video
Scct2013 topic4 video
 
Tips for organizing trainings
Tips for organizing trainingsTips for organizing trainings
Tips for organizing trainings
 
Topic 3
Topic 3Topic 3
Topic 3
 
internet and the world wide web
internet and the world wide webinternet and the world wide web
internet and the world wide web
 
Scct2013 topic5-introto applicationdevelopment
Scct2013 topic5-introto applicationdevelopmentScct2013 topic5-introto applicationdevelopment
Scct2013 topic5-introto applicationdevelopment
 
writing literature review
writing literature reviewwriting literature review
writing literature review
 
Scct2013 topic 3_graphics
Scct2013 topic 3_graphicsScct2013 topic 3_graphics
Scct2013 topic 3_graphics
 
Model Ekonomi Baru
Model Ekonomi BaruModel Ekonomi Baru
Model Ekonomi Baru
 
Penulisan perhubungan awam
Penulisan perhubungan awamPenulisan perhubungan awam
Penulisan perhubungan awam
 
Writing proposal
Writing proposalWriting proposal
Writing proposal
 

Ähnlich wie issue and trend in integrative media

Ernst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital worldErnst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital world
forumdavignon
 

Ähnlich wie issue and trend in integrative media (19)

Ipr in cyberspace
Ipr in  cyberspaceIpr in  cyberspace
Ipr in cyberspace
 
Social Media Policy
Social Media PolicySocial Media Policy
Social Media Policy
 
Ernst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital worldErnst & Young : Intellectual property in a digital world
Ernst & Young : Intellectual property in a digital world
 
Ch12
Ch12Ch12
Ch12
 
Information Technology and IT act
Information Technology and IT actInformation Technology and IT act
Information Technology and IT act
 
ID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptxID-20305090 Fahim Montasir.pptx
ID-20305090 Fahim Montasir.pptx
 
IPR & CYBER SECURITY.pptx
IPR & CYBER SECURITY.pptxIPR & CYBER SECURITY.pptx
IPR & CYBER SECURITY.pptx
 
Lecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security BreachLecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security Breach
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
 
2012: This year I learned
2012: This year I learned2012: This year I learned
2012: This year I learned
 
2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx2ndnov_txicybersec& SAFETY.pptx
2ndnov_txicybersec& SAFETY.pptx
 
Trend keamanan komputer 2012
Trend keamanan komputer 2012Trend keamanan komputer 2012
Trend keamanan komputer 2012
 
Digital Piracy
Digital PiracyDigital Piracy
Digital Piracy
 
Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
 
Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012Security And Privacy Cagliari 2012
Security And Privacy Cagliari 2012
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 

Kürzlich hochgeladen

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Kürzlich hochgeladen (20)

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 

issue and trend in integrative media

  • 1. TOPIC 12 ISSUES AND TRENDS IN INTEGRATIVE MEDIA 1
  • 2. 2 OUTLINE 12.1 COPYRIGHT ISSUES 12.2 CONFIDENTIALITY ISSUES 12.3 CENSORSHIP ISSUES 12.4 SECURITY ISSUES 12.5 TRENDS IN INTEGRATIVE MEDIA INDUSTRY
  • 3. 12.1 COPYRIGHT ISSUES 3
  • 4. 4 12.1 COPYRIGHT ISSUES  Copyright issues is very sensitive towards;  Writing  Music  Film  Etc.  In academic for instance, many information from internet, student do not come out with own original idea, but copy the idea from other people, especially from the internet  Media from internet could create plagiarism
  • 5. 5 12.1 COPYRIGHT ISSUES (cont)  In film and music industry;  Need copyrights and permission from producer  Sell in market piracy product, low quality, no warranty  Using internet, through file sharing  Download songs and movies  The issues, copyrights management  Exclusive copyright to the author and producer  Moral down to the film and music industry
  • 6. 6 12.1 COPYRIGHT ISSUES (cont)  To protect the rights of the producers, government introduced the copyrights protection acts  In Malaysia, (Akta Hak Cipta 1987)  It covered and protected;  Art work  Music  Film  Sound recording  Broadcast recording  Etc.
  • 7. 7 12.1 COPYRIGHT ISSUES (cont)  To be protected by this act, it must be original and master piece  The copyrights owner controls the reproduction, communication process or the work quality which to be presented to the public  Also distribution control even duration of the copyrights  Licensed Copyrights Tribunal was formed to solve the license issues and the act that should be taken by the copyright owner  It becomes a crime to produce or sell pirated copy (infringing copies)  Kementerian Perdagangan Dalam Negeri dan Hal Ehwal Pengguna Malaysia 2008
  • 8. 12.2 CONFIDENTIALITY ISSUES 8
  • 9. 9 12.2 CONFIDENTIALITY ISSUES  The more communication activity using computers, the more issues on confidentiality  In other word, privacy  We need to secure our privacy from hackers, they can;  Steel our secret information  Remove files  Graffiti own the website  Etc.
  • 10. 10 12.2 CONFIDENTIALITY ISSUES (cont)  Dalley (2006) – privacy as the capability of any person to secure or protect collection, consumption, and sell private information  Example of the wrong act from the confidentiality issue  Money transfer to unknown person  Fishing email  Online purchasing debited to other person  Credit card purchasing by other person
  • 11. 11 12.2 CONFIDENTIALITY ISSUES (cont)  Nowadays, with the multimedia technology, fraud webpages that look like real webpages, also developed to cheat people  They were build for phishing, or to steel other people information especially credit card number and pin number
  • 13. 13 12.3 CENSORSHIP ISSUES  In the early stages, to attract the interest of more investor to join Multimedia Super Corridor, Malaysia promised not to censor the internet information  The internet user have no limits for information gathering following the perception of the author and source provider from Malaysia  However, there were unexpected worries about the spread of porno sources and incitement which touch the sensitive issues as well as religious and races issues
  • 14. 14 12.3 CENSORSHIP ISSUES (cont)  There are application to control minor age usually 18 years and below;  Cyber Patrol  Cybersitter  Cyber Snoop  Internet Guard Control  Net Nanny  Norton Internet Security  Etc.  It blocks by using keywords to the words which have porn, incitement, horror and violent
  • 16. 16 12.4 SECURITY ISSUES  So, what are some of the security threats in social media outlets?  Lack of a business policy or lack of enforcement of the policy.  Friending someone you don't know.  Not thinking twice about clicking on links.  Letting hijackers into accounts.  Third-party application dangers. http://www.enterprisenetworkingplanet.com/netsecur/five-social-media-security-issues
  • 17. 17 12.4 SECURITY ISSUES  Lack of a business policy or lack of enforcement of the policy.  As always, the first line of security should ensure that employees have limits on what can be accessed on company networks and that action is taken when the rules are broken.  Friending someone you don't know.  A few weeks ago, I received a request from a stranger who wrote that, because we had a similar interest, we should be friends. I hit the ignore button, which was a good thing. It was part of a phishing scheme. Others did hit the friend button and have had computer issues as a result.  Not thinking twice about clicking on links.  One of the great things about a site like Twitter is the sharing of information you might not see elsewhere. The downside is the tiny URLs that hide the true link to Web sites. If you aren't sure, ask.
  • 18. 18 12.4 SECURITY ISSUES  Letting hijackers into accounts.  Hackers are finding holes in the software and are taking over individual accounts to spread malware from "trusted" sources and scam consumers into sending personal information.  Third-party application dangers.  Hackers are able to retrieve passwords and other personal information through Facebook games. Fake Facebook toolbars are taking users to a spoofed site that steals passwords.
  • 19. 19 12.4 SECURITY ISSUES Challenges in creating a social media policy http://indyamber. wordpress.com/2 010/07/05/90/
  • 20. 12.5 TRENDS IN INTEGRATIVE MEDIA INDUSTRY 20
  • 21. 21 12.5 TRENDS IN INTEGRATIVE MEDIA INDUSTRY  Lately the use of integrative media seem more practical than at the beginning of its introduction.  If some time before production such as splash screen first placed on each site to highlight the sophistication of the knowledge of the owner.  But now its use is decreasing. Why?  Probably because more of us more concerned about the speed reaches the desired information from view 'credibility' of the website owner through the sophistication of his designs.  We no longer focus on things that are cosmetic, but empty inside.
  • 22. 22 12.5 TRENDS IN INTEGRATIVE MEDIA INDUSTRY  Society no longer search news focused on traditional media as traditional media may have the same perception.  Community want a more honest information and come from their own experience of an event and not from the eyes of those who saw the incident and produce their own news from the perception.  Users start browsing for information.  In the web pages of blog, the browser can interact directly with the author news and information from authors of primary sources.  Blog is to allow interactivity.  Blog also combines all elements of the media.  There are written materials in the form of text, there are video recordings that also includes audio and sometimes animation.  More so graphics.
  • 23. 23 12.5 TRENDS IN INTEGRATIVE MEDIA INDUSTRY  When we focus on the biggest consumer for Internet media which is the teenagers and young adults, we can not set aside the discussion on the Social Networking Sites  This sites provide us with our own web page and list of friends known face to face or virtually.  This web site multimedia elements integrated by enabling the sharing of video, audio and other things.
  • 24. That’s all.. Thank you..  24