{"id":277,"date":"2017-05-16T19:53:53","date_gmt":"2017-05-16T19:53:53","guid":{"rendered":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/chapter\/14-4-ethical-considerations-of-the-online-world\/"},"modified":"2017-05-16T19:53:53","modified_gmt":"2017-05-16T19:53:53","slug":"14-4-ethical-considerations-of-the-online-world","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/chapter\/14-4-ethical-considerations-of-the-online-world\/","title":{"raw":"14.4 Ethical Considerations of the Online World","rendered":"14.4 Ethical Considerations of the Online World"},"content":{"raw":"<div class=\"bcc-box bcc-highlight\" id=\"fwk-luleapollo-ch14_s03_n01\">\n        <h3 class=\"title\">Learning Objectives<\/h3>\n        <ol class=\"orderedlist\" id=\"fwk-luleapollo-ch14_s03_o01\"><li>Explain concerns related to surveillance and personal privacy rights introduced by the Internet.<\/li>\n            <li>Differentiate between copyright infringement and fair use.<\/li>\n            <li>Identify plagiarism and copyright concerns introduced by the Internet.<\/li>\n        <\/ol><\/div>\n    <p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_p01\">Online media has developed rapidly, with technology advancing at a rate that often surpasses the ability of legislation and policy to keep up with it. As a result, issues like individuals\u2019 rights to privacy, copyright protections, and fair use restrictions have become the subject of numerous court cases and public debates as lawmakers, judges, and civil liberties organizations struggle to define the limits of technology and the access it provides to previously restricted information. In the following section you will look at some of the most prominent issues in today\u2019s online media environment. You should reflect on the ethical issues in mass media raised in the two preceding sections and how they are manifested in the areas of personal privacy, copyright law, and plagiarism.<\/p>\n    <div class=\"section\" id=\"fwk-luleapollo-ch14_s03_s01\" xml:lang=\"en\">\n        <h2 class=\"title editable block\">Privacy and Surveillance<\/h2>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s01_p01\">Concerns about online privacy issues in recent years have led some people to wonder whether the collection of personal information on websites has begun to infringe on individuals\u2019 constitutional rights. While the U.S. Constitution does not explicitly guarantee a general right to privacy, the Bill of Rights establishes privacy of beliefs, privacy of the home, and privacy of person and possessions from unreasonable searches. Additionally, in a number of court cases, the \u201cright to liberty\u201d clause has also been read as a guarantee of personal privacy (Linder, 2010). What do these constitutional rights mean when it comes to storing a person\u2019s credit card data online, or tracking his or her Internet searches, or using cookies to collect information about his or her purchasing habits? Because online media is developing so rapidly, many of these issues have not been settled by federal legislation and remain the source of numerous courtroom battles. Consider the 2010 case in which the online services company Yahoo! entered into a legal struggle with government officials who wanted to search the e-mail account of a Yahoo! user for incriminating evidence. While Yahoo! claimed the government would need a search warrant to access a user\u2019s e-mail, the government investigators claimed the Fourth Amendment does not apply in the case of an e-mail account (Electronic Frontier Foundation, 2010).<\/p>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s01_p02\">In defense of information collection and surveillance, many websites argue that, by using their services, individuals are agreeing to make their personal information available. However, many people don\u2019t realize the extent of surveillance capabilities or know how to protect certain personal information while using online tools. The more people rely on the Internet for shopping, communication, social networking, and media consumption, the more their personal data is stored online. Every time a person subscribes to a magazine, joins an organization, donates money to charity, gives to a political cause, or searches the pages of a government agency, that information is stored in a computer (Privacy Rights Clearinghouse, 2010). For example, <span class=\"margin_term\"><a class=\"glossterm\">cookies<\/a><\/span>, text files that web page servers embed in users\u2019 hard drives, help search engines like Google and Yahoo! track their customers\u2019 search histories, buying habits, and browsing patterns. Cookies stored by Google last for 30 years (Godoy, 2006). These search engine cookies are used to customize users\u2019 searches and to deliver customized third-party ads based on a particular user\u2019s demographics and behavior. However, privacy advocates claim this practice fosters predatory advertising (Spring, 2010). Additionally, considering that search engines receive multiple requests per day for specific information on their users (requests that are often tied to criminal investigations and lawsuits), there is a growing concern that unfair or even erroneous profiling may result.<sup>1<\/sup> Much of this information is stored without users\u2019 knowledge or informed consent\u2014although agreements for most software inform users when their data is being collected, few people have the patience or time to read and understand the dense legalistic language of these agreements. And even when users invest the time and effort to understand the agreements, they are left with the difficult choice of either agreeing to have their data recorded or going without useful software.<\/p>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s01_p03\">Internet users concerned about their privacy may also be unaware of another growing trend: the combination of online data with offline information to build profiles of web surfers. Data providers like BlueKai, Datalogic, and Nielsen are now able to pool offline data and demographics to create \u201cdigital dossiers\u201d (detailed digital records of a particular subject or market) for online advertisers who want to reach a target market.<sup>2<\/sup> This combination of online and offline information provides a nearly complete picture of someone\u2019s life. If advertisers are looking for a 56-year-old retired female educator who is divorced, owns a home and a dog, suffers from arthritis, and plays tennis at the local fitness club, they can now find her. While advertisers have been careful to point out that people are identified by demographic subgroup but never by name, many organizations that advocate for privacy, such as the Electronic Frontier Foundation, believe that protections and greater transparency should be enforced (Spring, 2010).<\/p>\n        <div style=\"text-align: center; font-size: .8em;\" id=\"fwk-luleapollo-ch14_s03_s01_f01\">\n            <p class=\"title\"><span class=\"title-prefix\">Figure 14.7<\/span> <\/p>\n            <a href=\"\/mediaandculture\/wp-content\/uploads\/sites\/9\/2015\/04\/cf5c4d1811558e9cfc34c562f266449a.jpg\"> <img src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/1918\/2017\/05\/16195347\/cf5c4d1811558e9cfc34c562f266449a.jpg\" alt=\"image\" style=\"max-width: 497px;\"\/><\/a><p class=\"para\">Online ads like these target users based on pools of very specific information.<\/p>\n        <\/div>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s01_p04\">Users also supply a wide range of information about themselves through online social networks that are connected with their names, contact information, and photographs. Creditors now look at individuals\u2019 social networks to determine whether they would be good credit customers, and banks may access social network information to make loan decisions (Mies, 2010). If users aren\u2019t careful about their privacy settings on MySpace, Twitter, or Facebook, photographs and other private information may be easily accessible to anyone performing a Google search. Of even greater concern is the growing trend to publicize information that was previously private as the networking sites evolve and change their interfaces.<\/p>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s01_p05\">Surveillance can range from the monitoring of online activity by employers and other institutions that want to make sure users are following guidelines, to high-level government investigations of terrorist activity. The USA PATRIOT Act, passed just 6 weeks after the September 11, 2001, terrorist attacks, expanded the federal government\u2019s rights to access citizens\u2019 personal information. Under the Patriot Act, authorities have access to personal records held by Internet service providers and other third parties, and government officials can tap in to an individual\u2019s e-mail communications and web searches if he or she is suspected of terrorist activity or of having connections to terrorist activity (American Civil Liberties Union, 2003; Olsen, 2001). One concern among civil liberties organizations is that the Patriot Act might become a back door for the government to conduct undisclosed surveillance that doesn\u2019t necessarily involve the threat of terrorism. For instance, under the Patriot Act the government can wiretap Internet communications even if the primary purpose is a criminal investigation, as long as intelligence gathering is a significant purpose of the investigation (Harvard Law School).<\/p>\n    <\/div>\n    <div class=\"section\" id=\"fwk-luleapollo-ch14_s03_s02\" xml:lang=\"en\">\n        <h2 class=\"title editable block\">Fair Use and Plagiarism<\/h2>\n        <p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_p01\">Now that a large amount of research can easily be conducted online, and content can be copied and pasted from one platform to another with no more than the click of a button, concerns about plagiarism and copyright infringement are more relevant than ever. The concepts of copyright infringement and plagiarism can easily be confused with each other. The following provides an overview of copyright, its issues and limitations, and its distinction from plagiarism.<\/p>\n        <div class=\"section\" id=\"fwk-luleapollo-ch14_s03_s02_s01\" xml:lang=\"en\">\n            <h2 class=\"title editable block\">Copyright Infringement<\/h2>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s01_p01\"><span class=\"margin_term\"><a class=\"glossterm\">Copyright<\/a><\/span> is a form of protection provided by U.S. law, under which the creator of an original artistic or intellectual work is automatically granted certain rights, including the right to distribute, copy, and modify the work (U.S. Copyright Office). If someone rents a movie from Netflix, for example, and watches it with his friends, he hasn\u2019t violated any copyright laws because Netflix has paid for a license to loan the movie to its customers. However, if the same person rents a movie and burns himself a copy to watch later, he has violated copyright law because he has not paid for nor obtained the film creators\u2019 permission to copy the movie. Copyright law applies to most books, songs, movies, art, essays, and other pieces of creative work. However, after a certain length of time (70 to 120 years depending on the publication circumstances), creative and intellectual works enter the public domain; that is, they are free to be used and copied without permission.<\/p>\n            <div class=\"bcc-box bcc-highlight\"> \n                <h4 class=\"title\">Google Books: Turning Copyright Law on Its Head?<\/h4>\n                <p class=\"para\" id=\"fwk-luleapollo-ch14_s03_s02_s01_p02\">In 2002, Google began scanning millions of books in academic libraries to make them available online in digital format. Of the more than 12 million books Google has digitized since then\u2014and made searchable through Google Book Search\u20142 million are in the public domain. Those 2 million books are available in \u201cfull view\u201d and free for users to download, while books still under copyright are available as limited previews, where users can access about 20 percent of the texts. According to Google, the project will pave the way for greater democratization of knowledge, making texts available to readers who formerly wouldn\u2019t have had access to them. However, many authors, publishers, and legal authorities claim the project represents a massive copyright violation. In 2005, the Authors Guild and the Association of American Publishers filed class-action lawsuits against Google (Newitz, 2010).<\/p>\n                <p class=\"para\" id=\"fwk-luleapollo-ch14_s03_s02_s01_p03\">William Cavanaugh, a lawyer with the U.S. Department of Justice, claims that the Google Books Settlement, an agreement partially reached in 2008, \u201cturns copyright law on its head.\u201d According to the settlement agreement, in exchange for $125 million, part of which would go to authors and publishers, Google was released from liability for copying the books and was granted the right to charge money for individual and institutional subscriptions to its Google Books service (which gives subscribers full access to the copied books\u2014even those under copyright). Authors have the choice to opt out of the agreement, asking to have their books removed from Google\u2019s servers. However, more than 30,000 publishers have already made deals with Google, which override the authors\u2019 rights to opt out (Oder, 2010).<\/p>\n            <\/div>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s01_p04\">Some works are in the public domain because the creator has chosen to make them available to anyone without requiring permission. However, most works are in the public domain because their copyright has expired; in the United States, anything published before 1923 is automatically in the public domain. Additionally, there have been changes to U.S. copyright law over the years that caused some works to enter the public domain earlier. Before 1964, for instance, any published work had to have its copyright renewed during the 28th year after its publication. If no renewal was filed, the copyright was lost. <a class=\"xref\" href=\"#fwk-luleapollo-ch14_s03_s02_s01_f01\">Figure 14.8<\/a> shows significant changes to U.S. copyright law since 1790 (Press, 2007).<\/p>\n            <div style=\"text-align: center; font-size: .8em;&#x201D; id=\">\n                <p class=\"title\"><span class=\"title-prefix\">Figure 14.8<\/span> <\/p>\n                <a href=\"\/mediaandculture\/wp-content\/uploads\/sites\/9\/2015\/04\/47f24cad997eb5fa2ada15a41eebdf49.jpg\"> <img src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/1918\/2017\/05\/16195350\/47f24cad997eb5fa2ada15a41eebdf49.jpg\" alt=\"image\" style=\"max-width: 497px;\"\/><\/a><p class=\"para\">Changes to U.S. Copyright Law<\/p>\n            <\/div>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s01_p05\">While it is illegal to violate the rights granted by copyright law, the copyright holder\u2019s rights are not unlimited. One of the significant limitations is the policy of \u201cfair use,\u201d under which the public is entitled to freely use copyrighted information for purposes such as criticism, commentary, news reporting, teaching, scholarship, research, or parody (U.S. Copyright Office, 2009). If a critic were writing a book review for a magazine, for instance, according to fair use, she would be allowed to summarize and quote from the book she wanted to review, whether or not the author of the book agreed to this use. According to the U.S. government, there are four issues to consider when determining fair use:\n<\/p>\n<ol class=\"orderedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s01_o01\"><li>The purpose and character of the use, including whether such use is of commercial nature or is for nonprofit educational purposes<\/li>\n                    <li>The nature of the copyrighted work<\/li>\n                    <li>The amount and substantiality of the portion used in relation to the copyrighted work as a whole<\/li>\n                    <li>The effect of the use on the potential market for, or value of, the copyrighted work (U.S. Copyright Office, 2009)\n<\/li>\n<\/ol><p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s01_p06\">The distinction between what is considered fair and what constitutes copyright infringement is not always clearly defined. For one thing, there are no guidelines that specify a number of words, lines, or notes that can be taken without permission. <a class=\"xref\" href=\"#fwk-luleapollo-ch14_s03_s02_s01_t01\">Table 14.1 \"Cases Involving Fair Use\"<\/a> provides some examples of distinctions between fair use and copyright infringement.<\/p>\n            <div class=\"table block\" id=\"fwk-luleapollo-ch14_s03_s02_s01_t01\">\n                <p class=\"title\"><span class=\"title-prefix\">Table 14.1<\/span> Cases Involving Fair Use<\/p>\n                <table cellpadding=\"0\" style=\"border-spacing: 0px;\"><thead><tr><th align=\"center\">\n                                        <p class=\"para\">Fair Use<\/p>\n                                    <\/th>\n                            <th align=\"center\">\n                                        <p class=\"para\">Not Fair Use<\/p>\n                                    <\/th>\n                        <\/tr><\/thead><tbody><tr><td align=\"left\">\n                                        <p class=\"para\"><strong class=\"emphasis bold\"><em class=\"emphasis\">Wright v. Warner Books Inc.<\/em> (1991):<\/strong> In a biography of Richard Wright the biographer quoted from six of Wright\u2019s unpublished letters and 10 unpublished journal entries.<\/p>\n                                        <p class=\"para\">CONSIDERATIONS: The copied letters amounted to less than 1 percent of Wright\u2019s total letter material. Additionally, the biographer\u2019s purpose in copying the documents was informational.<\/p>\n                                    <\/td>\n                            <td align=\"left\">\n                                        <p class=\"para\"><strong class=\"emphasis bold\"><em class=\"emphasis\">Castle Rock Entertainment Inc. v. Carol Publication Group<\/em> (1998):<\/strong> Carol Publication published a book of trivia questions about the TV series <em class=\"emphasis\">Seinfeld<\/em>. The book included direct quotes from the show and based its questions on characters and events in the series.<\/p>\n                                        <p class=\"para\">CONSIDERATIONS: The book infringed on the ability of Castle Rock (the copyright holder) to make its own trivia books.<\/p>\n                                    <\/td>\n                        <\/tr><tr><td align=\"left\">\n                                        <p class=\"para\"><strong class=\"emphasis bold\"><em class=\"emphasis\">Perfect 10 Inc. v. <a class=\"link\" href=\"http:\/\/Amazon.com\">Amazon.com<\/a> Inc.<\/em> (2007):<\/strong> A Google search engine displayed thumbnail-sized photos of nude models from a subscription-only website.<\/p>\n                                        <p class=\"para\">CONSIDERATIONS: The search engine\u2019s use of the photos transformed them into \u201cpointers,\u201d directing users to the photos\u2019 original source. The transformative use was more important than any factors that would allow Google to make money from displaying the images.<\/p>\n                                    <\/td>\n                            <td align=\"left\">\n                                        <p class=\"para\"><strong class=\"emphasis bold\"><em class=\"emphasis\">Los Angeles News Service v. KCAL-TV Channel 9<\/em> (1997):<\/strong> A TV news station used a 30-second segment of a four-minute video that depicted the beating of a Los Angeles man. The video was copyrighted by the Los Angeles News Service.<\/p>\n                                        <p class=\"para\">CONSIDERATIONS: The segment used by the news station was a significant portion of the total video. Additionally, the use was for commercial reasons and infringed on the Los Angeles News Service\u2019s ability to market the video.<\/p>\n                                    <\/td>\n                        <\/tr><\/tbody><tfoot><tr><th align=\"left\">\n                                        <p class=\"para\">Source: Stanford University Libraries. \u201cCopyright &amp; Fair Use.\u201d <a class=\"link\" href=\"http:\/\/fairuse.stanford.edu\/Copyright_and_Fair_Use_Overview\/chapter9\/9-c.html\">http:\/\/fairuse.stanford.edu\/Copyright_and_Fair_Use_Overview\/chapter9\/9-c.html<\/a><\/p>\n                                    <\/th>\n                            <th>\n                        <\/th><\/tr><\/tfoot><\/table><\/div>\n        <\/div>\n        <div class=\"section\" id=\"fwk-luleapollo-ch14_s03_s02_s02\" xml:lang=\"en\">\n            <h2 class=\"title editable block\">Plagiarism<\/h2>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p01\">Sometimes plagiarism becomes confused with copyright violation. However, the two words are not synonymous; while there can be some overlap between them, not every instance of plagiarism involves copyright violation, and not every instance of copyright violation is an act of plagiarism. For one thing, while copyright violation can involve a wide range of acts, <span class=\"margin_term\"><a class=\"glossterm\">plagiarism<\/a><\/span> is defined more narrowly as using someone else\u2019s information, writing, or speech without properly documenting or citing the source. In other words, plagiarism involves representing another person\u2019s work as one\u2019s own.<\/p>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p02\">As the U.S. Copyright Office points out, it is possible to cite a copyrighted source of information without obtaining permission to reproduce that information.<sup>3<\/sup> In such a case, the user has violated copyright law even though she has not plagiarized the material. Similarly, a student writing a paper could copy sections of a document that is in the public domain without properly citing his sources, in which case he would not have broken any copyright laws. However, representing the information as his own work would be an instance of plagiarism.<\/p>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p03\">Plagiarism, a perennially serious problem at academic institutions, has recently become even more prevalent. The ease of copying and pasting online content into a word-processing document can make it highly tempting for students to plagiarize material for research projects and critical papers. Additionally, a number of online \u201cpaper mills\u201d contain archives where students can download papers for free or, in some cases, purchase them (Denhart, 1999). In 2003, <em class=\"emphasis\">The New York Times<\/em> surveyed students at 23 college campuses and reported that 38 percent of students admitted to having committed copy-and-paste plagiarism within the previous year (De Leon, 2007).<\/p>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p04\">To combat the rise in plagiarism, many schools and universities now subscribe to services that allow instructors to check students\u2019 work for plagiarized material. Plagiarism.org, for instance, offers an analytics tool that compares student writing against a database that includes work from online paper mills, academic databases, documents available through major search engines, and other student papers submitted to Plagiarism.org.<sup>4<\/sup> According to many researchers, part of the issue may be that students don\u2019t understand what constitutes plagiarism. Some students, for instance, claim they think information available online is in the public domain (Auer &amp; Krupar, 2001). The following list offers suggestions for ways to avoid plagiarism in your own work.<\/p>\n            <ul class=\"itemizedlist editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s02_l01\"><li>Don\u2019t procrastinate.<\/li>\n                <li>Avoid taking shortcuts.<\/li>\n                <li>Take thorough notes and keep accurate records.<\/li>\n                <li>Rephrase ideas in your own words.<\/li>\n                <li>Provide citations or attributions for all sources.<\/li>\n                <li>Ask your instructor when in doubt (Longman Publishers).\n<\/li>\n            <\/ul><p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p05\">While plagiarism is an issue of concern in academia, it occurs in print media as well. Writers, whether through carelessness or laziness, may lift content from existing materials without properly citing or reinterpreting them. In an academic setting, plagiarism may lead to consequences as severe as failure or even expulsion from an institution. However, outside of academia the consequences may be even more damaging. Writers have lost publishing contracts, permanently damaged their reputations, and even ruined their careers over instances of plagiarism. For example, the late George Harrison, of the Beatles, was successfully sued by Ronald Mack for copyright infringement of his song \u201cHe\u2019s So Fine.\u201d<sup>5<\/sup> It was determined by the court that Harrison unconsciously plagiarized the musical essence of Mack\u2019s song for his composition \u201cMy Sweet Lord.\u201d<\/p>\n            <p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p06\">You should now have an understanding of the key issues in media ethics, particularly as they relate to privacy rights, plagiarism, and copyright laws. Please ensure you understand the key concepts listed below.<\/p>\n            <div class=\"bcc-box bcc-success\" id=\"fwk-luleapollo-ch14_s03_s02_s02_n01\">\n                <h3 class=\"title\">Key Takeaways<\/h3>\n                <ul class=\"itemizedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_l02\"><li>\n                        <p class=\"para\">Concerns about the public\u2019s right to privacy have increased in recent years, as more personal information has become available online.<\/p>\n                        <ul class=\"itemizedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_l03\"><li>Every time someone makes a purchase, performs a web search, accesses a web page, downloads files, sends an e-mail, or engages in social networking, that information is stored in a computer and may be accessed by third parties under certain conditions.<\/li>\n                            <li>The USA PATRIOT Act, passed after the September 11, 2001, attacks, has broadened the federal government\u2019s rights to access individuals\u2019 personal records.<\/li>\n                            <li>Civil liberties organizations are concerned about clauses of the Patriot Act, such as the one that stipulates that the government can wiretap Internet communications as long as intelligence gathering is a significant purpose of the investigation.<\/li>\n                        <\/ul><\/li>\n                    <li>\n                        <p class=\"para\">Rules that distinguish copyright violation from fair use are not always entirely clear and have been the subject of debate now that a greater amount of copyrighted work is easily accessible via the Internet.<\/p>\n                        <ul class=\"itemizedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_l04\"><li>Works enter the public domain once their copyright has expired, at which point they can be altered, copied, and distributed freely.<\/li>\n                            <li>Because of numerous changes in U.S. copyright laws, some works have entered the public domain earlier than others.<\/li>\n                            <li>According to the U.S. government, when distinguishing between fair use and copyright infringement, there are four things to consider: whether or not the use is for profit, the nature of the copyrighted work, the percentage of the copyrighted material being used, and the effect of that use on the value of the copyrighted work.<\/li>\n                        <\/ul><\/li>\n                    <li>Plagiarism is also a growing concern because of the ease of copying and pasting texts from online sources into computer documents. It is important to keep in mind that plagiarism and copyright infringement are different issues: Plagiarism involves not giving credit to a work\u2019s creator, whereas copyright deals with the legality of using a created work.<\/li>\n                <\/ul><\/div>\n            <div class=\"bcc-box bcc-info\" id=\"fwk-luleapollo-ch14_s03_s02_s02_n02\">\n                <h3 class=\"title\">Exercises<\/h3>\n                <p class=\"para\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p07\">You will now examine several cases in detail to further explore your understanding of the concepts and key ideas covered in this chapter. Respond to the questions asked, and provide evidence or examples to defend and support your answer. Each response should be one or two paragraphs.<\/p>\n                <p class=\"para\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p08\">Case 1. Research the USA PATRIOT Act. You can read what the American Civil Liberties Union (ACLU) has to say about the act here: <a class=\"link\" href=\"http:\/\/www.aclu.org\/pdfs\/safefree\/patriot_report_20090310.pdf\">http:\/\/www.aclu.org\/pdfs\/safefree\/patriot_report_20090310.pdf<\/a>. You can read what the federal government has to say about the act here: <a class=\"link\" href=\"http:\/\/www.justice.gov\/archive\/ll\/highlights.htm\">http:\/\/www.justice.gov\/archive\/ll\/highlights.htm<\/a><\/p>\n                <ul class=\"itemizedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_l05\"><li>What are its major stipulations?<\/li>\n                    <li>What are some major concerns of civil liberties advocates?<\/li>\n                    <li>Do you agree with the ACLU that \u201cthe Patriot Act eroded our most basic right\u2014the freedom from unwarranted government intrusion into our private lives?\u201d Or do you agree with the acronym the federal government created to explain the act: Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism? Explain your reasons.<\/li>\n                <\/ul><p class=\"para\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p09\">Case 2. Consider the following case:<\/p>\n                <p class=\"para\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p10\">After the publication of author J. K. Rowling\u2019s popular <em class=\"emphasis\">Harry Potter<\/em> novels, one fan created an elaborate website for Harry Potter enthusiasts. The website includes an encyclopedia of information about the books; indexed lists of people, places, and things; fan art; discussion forums; essays; timelines; and other features. Much of the content of the website\u2019s encyclopedia entries comes directly from the books. Use of the website is free and unrestricted, and while the site includes some ads, the income they generate only goes to offset the site\u2019s operating costs.<\/p>\n                <ul class=\"itemizedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_l06\"><li>Decide whether you believe the website represents an instance of fair use or whether the action was a copyright violation. Defend your response.<\/li>\n                <\/ul><\/div>\n            <div class=\"bcc-box bcc-info\" id=\"fwk-luleapollo-ch14_s03_s02_s02_n03\">\n                <h3 class=\"title\">End-of-Chapter Assessment<\/h3>\n                <p class=\"simpara\">Review Questions<\/p>\n                <ol class=\"orderedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_o01\"><li>\n                        <p class=\"para\">Section 1<\/p>\n                        <ol class=\"orderedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_o02\"><li>Why was the NAACP unhappy with the schedule of programs for the 1999 season of major television network entertainment?<\/li>\n                            <li>List at least four common characteristics of the way women are often presented in TV and movie entertainment.<\/li>\n                            <li>Why is it considered problematic that so few women and ethnic minorities are represented \u201cbehind the scenes\u201d in the creation of mass-media products?<\/li>\n                            <li>Explain how mass media as a socialization agent relates to public attitudes toward sexual behavior.<\/li>\n                        <\/ol><\/li>\n                    <li>\n                        <p class=\"para\">Section 2<\/p>\n                        <ol class=\"orderedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_o03\"><li>How does online news content put added pressure on news organizations?<\/li>\n                            <li>Explain the media\u2019s watchdog role.<\/li>\n                            <li>When is it considered acceptable for journalists to expose details about an individual\u2019s private life?<\/li>\n                            <li>How does political bias influence the way news gets presented?<\/li>\n                        <\/ol><\/li>\n                    <li>\n                        <p class=\"para\">Section 3<\/p>\n                        <ol class=\"orderedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_o04\"><li>Identify cookies. Why are cookies a concern for privacy advocates?<\/li>\n                            <li>What are some reasons a created work might be in the public domain?<\/li>\n                            <li>List the four considerations the federal government lists for determining whether an action is fair use or copyright violation.<\/li>\n                            <li>Give an example of an act that could be considered plagiarism but not copyright violation.<\/li>\n                        <\/ol><\/li>\n                <\/ol><\/div>\n            <div class=\"bcc-box bcc-info\" id=\"fwk-luleapollo-ch14_s03_s02_s02_n05\">\n                <h3 class=\"title\">Critical Thinking Questions<\/h3>\n                <p class=\"para\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p12\">Answer the following critical thinking questions. Your responses should be one to two pages for each prompt.<\/p>\n                <ol class=\"orderedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_o06\"><li>Watch segments of the evening news on three of the major television networks. Based on the information presented here about representations of women and racial minorities, what do you observe? Do your observations corroborate claims of stereotyping and underrepresentation? Do you notice important differences among the three networks where these issues are concerned?<\/li>\n                    <li>Create a mock advertisement that breaks with common racial stereotypes, gender myths, or media representations of sexuality.<\/li>\n                    <li>A number of prominent journalists and news experts have argued that the newspaper industry must find a new model for generating revenue if it hopes to survive. Create a short proposal in which you outline a plan for newspaper agencies to earn money from sources other than subscriptions and print advertising.<\/li>\n                    <li>Develop an argument in which you defend the use of information gathering and profiling for the placement of Internet ads and the creation of customized web pages.<\/li>\n                    <li>What might be some implications of the Google Books settlement? Why do you think William Cavanaugh claimed that it \u201cturns copyright law on its head\u201d?<\/li>\n                <\/ol><\/div>\n            <div class=\"bcc-box bcc-info\" id=\"fwk-luleapollo-ch14_s03_s02_s02_n04\">\n                <h3 class=\"title\">Career Connection: Political Blogger<\/h3>\n                <p class=\"para\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p11\">Research what it takes to be a professional political blogger for a news site like <a class=\"link\" href=\"http:\/\/CNN.com\">CNN.com<\/a> or <em class=\"emphasis\">The Huffington Post<\/em>. Then answer the following short-answer questions. Each response should be one to two paragraphs.<\/p>\n                <ol class=\"orderedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_o05\"><li>How much and what kind of research would you need to perform on a daily basis?<\/li>\n                    <li>Where would you go for your information?<\/li>\n                    <li>What are some elements that make for a successful blog?<\/li>\n                    <li>What are some particular ethical concerns surrounding this form of journalism?<\/li>\n                <\/ol><\/div>\n        <\/div>\n<\/div>\n\n<sup>1<\/sup>Godoy, \u201cGoogle Records Subpoena.\u201d\n\n<sup>2<\/sup>Spring, \u201cGood-Bye to Privacy?\u201d\n\n<sup>3<\/sup>U.S. Copyright Office, \u201cFair Use.\u201d\n\n<sup>4<\/sup>Denhart, \u201cThe Web\u2019s Plagiarism Police.\u201d\n\n<sup>5<\/sup>Bright Tunes Music v. Harrisongs Music, 420 F. Supp. 177 (S.D.N.Y. 1976).\n\n<h2>References<\/h2>\n\nAmerican Civil Liberties Union, \u201cSurveillance Under the USA PATRIOT Act,\u201d April 3, 2003, <a class=\"link\" href=\"http:\/\/www.aclu.org\/national-security\/surveillance-under-usa-patriot-act\">http:\/\/www.aclu.org\/national-security\/surveillance-under-usa-patriot-act<\/a>.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nAuer, Nicole J. and Ellen M. Krupar, \u201cMouse Click Plagiarism: The Role of Technology in Plagiarism and the Librarian\u2019s Role in Combating It,\u201d <em class=\"emphasis\">Library Trends<\/em>, Winter 2001, <a class=\"link\" href=\"http:\/\/findarticles.com\/p\/articles\/mi_m1387\/is_3_49\/ai_75278304\/\">http:\/\/findarticles.com\/p\/articles\/mi_m1387\/is_3_49\/ai_75278304\/<\/a>.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nDe Leon, Michelle. \u201cInternet Plagiarism on the Rise in Colleges,\u201d <em class=\"emphasis\">Lehigh University Brown and White<\/em>, November 12, 2007, <a class=\"link\" href=\"http:\/\/media.www.thebrownandwhite.com\/media\/storage\/paper1233\/news\/2007\/11\/12\/News\/Internet.Plagiarism.On.The.Rise.In.Colleges-3094622.shtml\">http:\/\/media.www.thebrownandwhite.com\/media\/storage\/paper1233\/news\/2007\/11\/12\/News\/Internet.Plagiarism.On.The.Rise.In.Colleges-3094622.shtml<\/a>.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nDenhart, Andy. \u201cThe Web\u2019s Plagiarism Police,\u201d <em class=\"emphasis\">Salon<\/em>, June 14, 1999, <a class=\"link\" href=\"http:\/\/www.salon.com\/technology\/feature\/1999\/06\/14\/plagiarism\">http:\/\/www.salon.com\/technology\/feature\/1999\/06\/14\/plagiarism<\/a>.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nElectronic Frontier Foundation, \u201cEFF Backs Yahoo! to Protect User from Warrantless Email Search,\u201d news release, April 14, 2010, <a class=\"link\" href=\"http:\/\/www.eff.org\/press\/archives\/2010\/04\/13\">http:\/\/www.eff.org\/press\/archives\/2010\/04\/13<\/a>.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nGodoy, Maria. \u201cGoogle Records Subpoena Raises Privacy Fears,\u201d <em class=\"emphasis\">NPR<\/em>, January 20, 2006, <a class=\"link\" href=\"http:\/\/www.npr.org\/templates\/story\/story.php?storyId=5165854\">http:\/\/www.npr.org\/templates\/story\/story.php?storyId=5165854<\/a>.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nHarvard Law School, Berkman Center for Internet and Society, \u201cThe USA Patriot Act, Foreign Intelligence Surveillance, and Cyberspace Privacy,\u201d Harvard Law School, <a class=\"link\" href=\"http:\/\/cyber.law.harvard.edu\/privacy\/module5.html\">http:\/\/cyber.law.harvard.edu\/privacy\/module5.html<\/a>.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nLinder, Doug. \u201cThe Right of Privacy,\u201d Exploring Constitutional Law, 2010, <a class=\"link\" href=\"http:\/\/www.law.umkc.edu\/faculty\/projects\/ftrials\/conlaw\/rightofprivacy.html\">http:\/\/www.law.umkc.edu\/faculty\/projects\/ftrials\/conlaw\/rightofprivacy.html<\/a>.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nLongman Publishers, \u201cAvoiding Plagiarism,\u201d Pearson Education, <a class=\"link\" href=\"http:\/\/wps.pearsoncustom.com\/pcp_longman_ap_2\/32\/8420\/2155775.cw\/content\/index.html\">http:\/\/wps.pearsoncustom.com\/pcp_longman_ap_2\/32\/8420\/2155775.cw\/content\/index.html<\/a>.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nMies, Ginny. \u201cSkeptical Shopper: Can Your Online Life Ruin Your Credit?\u201d <em class=\"emphasis\">PC World<\/em>, March 23, 2010,. <a class=\"link\" href=\"http:\/\/www.pcworld.com\/article\/192207\/skeptical_shopper_can_your_online_life_ruin_your_credit.html\">http:\/\/www.pcworld.com\/article\/192207\/skeptical_shopper_can_your_online_life_ruin_your_credit.html<\/a>.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nNewitz, Annalee. \u201c5 Ways the Google Books Settlement Will Change the Future of Reading,\u201d <em class=\"emphasis\">io9<\/em> (blog).April 2, 2010, <a class=\"link\" href=\"http:\/\/io9.com\/5501426\/5-ways-the-google-book-settlement-will-change-the-future-of-reading\">http:\/\/io9.com\/5501426\/5-ways-the-google-book-settlement-will-change-the-future-of-reading<\/a>.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nOder, Norman. \u201cGoogle Settlement Fairness Hearing, Part Two: DOJ Expresses Opposition; Parties Mount Vigorous Defense,\u201d <em class=\"emphasis\">Library Journal<\/em>, February 18, 2010, <a class=\"link\" href=\"http:\/\/www.libraryjournal.com\/article\/CA6719808.html\">http:\/\/www.libraryjournal.com\/article\/CA6719808.html<\/a>.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nOlsen, Stephanie. \u201cPatriot Act Draws Privacy Concerns,\u201d <em class=\"emphasis\">CNET<\/em>, October 26, 2001, <a class=\"link\" href=\"http:\/\/news.cnet.com\/2100-1023-275026.html\">http:\/\/news.cnet.com\/2100-1023-275026.html<\/a>.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nPress, Nolo. \u201cChapter 8: The Public Domain,\u201d Stanford University Libraries and Academic Information Resources, 2007, <a class=\"link\" href=\"http:\/\/fairuse.stanford.edu\/Copyright_and_Fair_Use_Overview\/chapter8\/index.html\">http:\/\/fairuse.stanford.edu\/Copyright_and_Fair_Use_Overview\/chapter8\/index.html<\/a>.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nPrivacy Rights Clearinghouse, \u201cPrivacy Today: A Review of Current Issues,\u201d March 2010, <a class=\"link\" href=\"http:\/\/www.privacyrights.org\/ar\/Privacy-IssuesList.htm#publicrecords\">http:\/\/www.privacyrights.org\/ar\/Privacy-IssuesList.htm#publicrecords<\/a>.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nSpring, Tom. \u201cGood-Bye to Privacy?\u201d <em class=\"emphasis\">PC World<\/em>, May 23, 2010, <a class=\"link\" href=\"http:\/\/www.pcworld.com\/article\/196787\/goodbye_to_privacy.html\">http:\/\/www.pcworld.com\/article\/196787\/goodbye_to_privacy.html<\/a>.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nU.S. Copyright Office, \u201cCopyright Basics,\u201d <a class=\"link\" href=\"http:\/\/www.copyright.gov\/\">http:\/\/www.copyright.gov\/<\/a>.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\nU.S. Copyright Office, \u201cFair Use,\u201d May 2009, <a class=\"link\" href=\"http:\/\/www.copyright.gov\/fls\/fl102.html\">http:\/\/www.copyright.gov\/fls\/fl102.html<\/a>.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t","rendered":"<div class=\"bcc-box bcc-highlight\" id=\"fwk-luleapollo-ch14_s03_n01\">\n<h3 class=\"title\">Learning Objectives<\/h3>\n<ol class=\"orderedlist\" id=\"fwk-luleapollo-ch14_s03_o01\">\n<li>Explain concerns related to surveillance and personal privacy rights introduced by the Internet.<\/li>\n<li>Differentiate between copyright infringement and fair use.<\/li>\n<li>Identify plagiarism and copyright concerns introduced by the Internet.<\/li>\n<\/ol>\n<\/div>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_p01\">Online media has developed rapidly, with technology advancing at a rate that often surpasses the ability of legislation and policy to keep up with it. As a result, issues like individuals\u2019 rights to privacy, copyright protections, and fair use restrictions have become the subject of numerous court cases and public debates as lawmakers, judges, and civil liberties organizations struggle to define the limits of technology and the access it provides to previously restricted information. In the following section you will look at some of the most prominent issues in today\u2019s online media environment. You should reflect on the ethical issues in mass media raised in the two preceding sections and how they are manifested in the areas of personal privacy, copyright law, and plagiarism.<\/p>\n<div class=\"section\" id=\"fwk-luleapollo-ch14_s03_s01\" xml:lang=\"en\">\n<h2 class=\"title editable block\">Privacy and Surveillance<\/h2>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s01_p01\">Concerns about online privacy issues in recent years have led some people to wonder whether the collection of personal information on websites has begun to infringe on individuals\u2019 constitutional rights. While the U.S. Constitution does not explicitly guarantee a general right to privacy, the Bill of Rights establishes privacy of beliefs, privacy of the home, and privacy of person and possessions from unreasonable searches. Additionally, in a number of court cases, the \u201cright to liberty\u201d clause has also been read as a guarantee of personal privacy (Linder, 2010). What do these constitutional rights mean when it comes to storing a person\u2019s credit card data online, or tracking his or her Internet searches, or using cookies to collect information about his or her purchasing habits? Because online media is developing so rapidly, many of these issues have not been settled by federal legislation and remain the source of numerous courtroom battles. Consider the 2010 case in which the online services company Yahoo! entered into a legal struggle with government officials who wanted to search the e-mail account of a Yahoo! user for incriminating evidence. While Yahoo! claimed the government would need a search warrant to access a user\u2019s e-mail, the government investigators claimed the Fourth Amendment does not apply in the case of an e-mail account (Electronic Frontier Foundation, 2010).<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s01_p02\">In defense of information collection and surveillance, many websites argue that, by using their services, individuals are agreeing to make their personal information available. However, many people don\u2019t realize the extent of surveillance capabilities or know how to protect certain personal information while using online tools. The more people rely on the Internet for shopping, communication, social networking, and media consumption, the more their personal data is stored online. Every time a person subscribes to a magazine, joins an organization, donates money to charity, gives to a political cause, or searches the pages of a government agency, that information is stored in a computer (Privacy Rights Clearinghouse, 2010). For example, <span class=\"margin_term\"><a class=\"glossterm\">cookies<\/a><\/span>, text files that web page servers embed in users\u2019 hard drives, help search engines like Google and Yahoo! track their customers\u2019 search histories, buying habits, and browsing patterns. Cookies stored by Google last for 30 years (Godoy, 2006). These search engine cookies are used to customize users\u2019 searches and to deliver customized third-party ads based on a particular user\u2019s demographics and behavior. However, privacy advocates claim this practice fosters predatory advertising (Spring, 2010). Additionally, considering that search engines receive multiple requests per day for specific information on their users (requests that are often tied to criminal investigations and lawsuits), there is a growing concern that unfair or even erroneous profiling may result.<sup>1<\/sup> Much of this information is stored without users\u2019 knowledge or informed consent\u2014although agreements for most software inform users when their data is being collected, few people have the patience or time to read and understand the dense legalistic language of these agreements. And even when users invest the time and effort to understand the agreements, they are left with the difficult choice of either agreeing to have their data recorded or going without useful software.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s01_p03\">Internet users concerned about their privacy may also be unaware of another growing trend: the combination of online data with offline information to build profiles of web surfers. Data providers like BlueKai, Datalogic, and Nielsen are now able to pool offline data and demographics to create \u201cdigital dossiers\u201d (detailed digital records of a particular subject or market) for online advertisers who want to reach a target market.<sup>2<\/sup> This combination of online and offline information provides a nearly complete picture of someone\u2019s life. If advertisers are looking for a 56-year-old retired female educator who is divorced, owns a home and a dog, suffers from arthritis, and plays tennis at the local fitness club, they can now find her. While advertisers have been careful to point out that people are identified by demographic subgroup but never by name, many organizations that advocate for privacy, such as the Electronic Frontier Foundation, believe that protections and greater transparency should be enforced (Spring, 2010).<\/p>\n<div style=\"text-align: center; font-size: .8em;\" id=\"fwk-luleapollo-ch14_s03_s01_f01\">\n<p class=\"title\"><span class=\"title-prefix\">Figure 14.7<\/span> <\/p>\n<p>            <a href=\"\/mediaandculture\/wp-content\/uploads\/sites\/9\/2015\/04\/cf5c4d1811558e9cfc34c562f266449a.jpg\"> <img decoding=\"async\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/1918\/2017\/05\/16195347\/cf5c4d1811558e9cfc34c562f266449a.jpg\" alt=\"image\" style=\"max-width: 497px;\" \/><\/a><\/p>\n<p class=\"para\">Online ads like these target users based on pools of very specific information.<\/p>\n<\/p><\/div>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s01_p04\">Users also supply a wide range of information about themselves through online social networks that are connected with their names, contact information, and photographs. Creditors now look at individuals\u2019 social networks to determine whether they would be good credit customers, and banks may access social network information to make loan decisions (Mies, 2010). If users aren\u2019t careful about their privacy settings on MySpace, Twitter, or Facebook, photographs and other private information may be easily accessible to anyone performing a Google search. Of even greater concern is the growing trend to publicize information that was previously private as the networking sites evolve and change their interfaces.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s01_p05\">Surveillance can range from the monitoring of online activity by employers and other institutions that want to make sure users are following guidelines, to high-level government investigations of terrorist activity. The USA PATRIOT Act, passed just 6 weeks after the September 11, 2001, terrorist attacks, expanded the federal government\u2019s rights to access citizens\u2019 personal information. Under the Patriot Act, authorities have access to personal records held by Internet service providers and other third parties, and government officials can tap in to an individual\u2019s e-mail communications and web searches if he or she is suspected of terrorist activity or of having connections to terrorist activity (American Civil Liberties Union, 2003; Olsen, 2001). One concern among civil liberties organizations is that the Patriot Act might become a back door for the government to conduct undisclosed surveillance that doesn\u2019t necessarily involve the threat of terrorism. For instance, under the Patriot Act the government can wiretap Internet communications even if the primary purpose is a criminal investigation, as long as intelligence gathering is a significant purpose of the investigation (Harvard Law School).<\/p>\n<\/p><\/div>\n<div class=\"section\" id=\"fwk-luleapollo-ch14_s03_s02\" xml:lang=\"en\">\n<h2 class=\"title editable block\">Fair Use and Plagiarism<\/h2>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_p01\">Now that a large amount of research can easily be conducted online, and content can be copied and pasted from one platform to another with no more than the click of a button, concerns about plagiarism and copyright infringement are more relevant than ever. The concepts of copyright infringement and plagiarism can easily be confused with each other. The following provides an overview of copyright, its issues and limitations, and its distinction from plagiarism.<\/p>\n<div class=\"section\" id=\"fwk-luleapollo-ch14_s03_s02_s01\" xml:lang=\"en\">\n<h2 class=\"title editable block\">Copyright Infringement<\/h2>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s01_p01\"><span class=\"margin_term\"><a class=\"glossterm\">Copyright<\/a><\/span> is a form of protection provided by U.S. law, under which the creator of an original artistic or intellectual work is automatically granted certain rights, including the right to distribute, copy, and modify the work (U.S. Copyright Office). If someone rents a movie from Netflix, for example, and watches it with his friends, he hasn\u2019t violated any copyright laws because Netflix has paid for a license to loan the movie to its customers. However, if the same person rents a movie and burns himself a copy to watch later, he has violated copyright law because he has not paid for nor obtained the film creators\u2019 permission to copy the movie. Copyright law applies to most books, songs, movies, art, essays, and other pieces of creative work. However, after a certain length of time (70 to 120 years depending on the publication circumstances), creative and intellectual works enter the public domain; that is, they are free to be used and copied without permission.<\/p>\n<div class=\"bcc-box bcc-highlight\">\n<h4 class=\"title\">Google Books: Turning Copyright Law on Its Head?<\/h4>\n<p class=\"para\" id=\"fwk-luleapollo-ch14_s03_s02_s01_p02\">In 2002, Google began scanning millions of books in academic libraries to make them available online in digital format. Of the more than 12 million books Google has digitized since then\u2014and made searchable through Google Book Search\u20142 million are in the public domain. Those 2 million books are available in \u201cfull view\u201d and free for users to download, while books still under copyright are available as limited previews, where users can access about 20 percent of the texts. According to Google, the project will pave the way for greater democratization of knowledge, making texts available to readers who formerly wouldn\u2019t have had access to them. However, many authors, publishers, and legal authorities claim the project represents a massive copyright violation. In 2005, the Authors Guild and the Association of American Publishers filed class-action lawsuits against Google (Newitz, 2010).<\/p>\n<p class=\"para\" id=\"fwk-luleapollo-ch14_s03_s02_s01_p03\">William Cavanaugh, a lawyer with the U.S. Department of Justice, claims that the Google Books Settlement, an agreement partially reached in 2008, \u201cturns copyright law on its head.\u201d According to the settlement agreement, in exchange for $125 million, part of which would go to authors and publishers, Google was released from liability for copying the books and was granted the right to charge money for individual and institutional subscriptions to its Google Books service (which gives subscribers full access to the copied books\u2014even those under copyright). Authors have the choice to opt out of the agreement, asking to have their books removed from Google\u2019s servers. However, more than 30,000 publishers have already made deals with Google, which override the authors\u2019 rights to opt out (Oder, 2010).<\/p>\n<\/p><\/div>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s01_p04\">Some works are in the public domain because the creator has chosen to make them available to anyone without requiring permission. However, most works are in the public domain because their copyright has expired; in the United States, anything published before 1923 is automatically in the public domain. Additionally, there have been changes to U.S. copyright law over the years that caused some works to enter the public domain earlier. Before 1964, for instance, any published work had to have its copyright renewed during the 28th year after its publication. If no renewal was filed, the copyright was lost. <a class=\"xref\" href=\"#fwk-luleapollo-ch14_s03_s02_s01_f01\">Figure 14.8<\/a> shows significant changes to U.S. copyright law since 1790 (Press, 2007).<\/p>\n<div style=\"text-align: center; font-size: .8em;&#x201d; id=\">\n<p class=\"title\"><span class=\"title-prefix\">Figure 14.8<\/span> <\/p>\n<p>                <a href=\"\/mediaandculture\/wp-content\/uploads\/sites\/9\/2015\/04\/47f24cad997eb5fa2ada15a41eebdf49.jpg\"> <img decoding=\"async\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/1918\/2017\/05\/16195350\/47f24cad997eb5fa2ada15a41eebdf49.jpg\" alt=\"image\" style=\"max-width: 497px;\" \/><\/a><\/p>\n<p class=\"para\">Changes to U.S. Copyright Law<\/p>\n<\/p><\/div>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s01_p05\">While it is illegal to violate the rights granted by copyright law, the copyright holder\u2019s rights are not unlimited. One of the significant limitations is the policy of \u201cfair use,\u201d under which the public is entitled to freely use copyrighted information for purposes such as criticism, commentary, news reporting, teaching, scholarship, research, or parody (U.S. Copyright Office, 2009). If a critic were writing a book review for a magazine, for instance, according to fair use, she would be allowed to summarize and quote from the book she wanted to review, whether or not the author of the book agreed to this use. According to the U.S. government, there are four issues to consider when determining fair use:\n<\/p>\n<ol class=\"orderedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s01_o01\">\n<li>The purpose and character of the use, including whether such use is of commercial nature or is for nonprofit educational purposes<\/li>\n<li>The nature of the copyrighted work<\/li>\n<li>The amount and substantiality of the portion used in relation to the copyrighted work as a whole<\/li>\n<li>The effect of the use on the potential market for, or value of, the copyrighted work (U.S. Copyright Office, 2009)\n<\/li>\n<\/ol>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s01_p06\">The distinction between what is considered fair and what constitutes copyright infringement is not always clearly defined. For one thing, there are no guidelines that specify a number of words, lines, or notes that can be taken without permission. <a class=\"xref\" href=\"#fwk-luleapollo-ch14_s03_s02_s01_t01\">Table 14.1 &#8220;Cases Involving Fair Use&#8221;<\/a> provides some examples of distinctions between fair use and copyright infringement.<\/p>\n<div class=\"table block\" id=\"fwk-luleapollo-ch14_s03_s02_s01_t01\">\n<p class=\"title\"><span class=\"title-prefix\">Table 14.1<\/span> Cases Involving Fair Use<\/p>\n<table cellpadding=\"0\" style=\"border-spacing: 0px;\">\n<thead>\n<tr>\n<th align=\"center\">\n<p class=\"para\">Fair Use<\/p>\n<\/th>\n<th align=\"center\">\n<p class=\"para\">Not Fair Use<\/p>\n<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"left\">\n<p class=\"para\"><strong class=\"emphasis bold\"><em class=\"emphasis\">Wright v. Warner Books Inc.<\/em> (1991):<\/strong> In a biography of Richard Wright the biographer quoted from six of Wright\u2019s unpublished letters and 10 unpublished journal entries.<\/p>\n<p class=\"para\">CONSIDERATIONS: The copied letters amounted to less than 1 percent of Wright\u2019s total letter material. Additionally, the biographer\u2019s purpose in copying the documents was informational.<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\"><strong class=\"emphasis bold\"><em class=\"emphasis\">Castle Rock Entertainment Inc. v. Carol Publication Group<\/em> (1998):<\/strong> Carol Publication published a book of trivia questions about the TV series <em class=\"emphasis\">Seinfeld<\/em>. The book included direct quotes from the show and based its questions on characters and events in the series.<\/p>\n<p class=\"para\">CONSIDERATIONS: The book infringed on the ability of Castle Rock (the copyright holder) to make its own trivia books.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td align=\"left\">\n<p class=\"para\"><strong class=\"emphasis bold\"><em class=\"emphasis\">Perfect 10 Inc. v. <a class=\"link\" href=\"http:\/\/Amazon.com\">Amazon.com<\/a> Inc.<\/em> (2007):<\/strong> A Google search engine displayed thumbnail-sized photos of nude models from a subscription-only website.<\/p>\n<p class=\"para\">CONSIDERATIONS: The search engine\u2019s use of the photos transformed them into \u201cpointers,\u201d directing users to the photos\u2019 original source. The transformative use was more important than any factors that would allow Google to make money from displaying the images.<\/p>\n<\/td>\n<td align=\"left\">\n<p class=\"para\"><strong class=\"emphasis bold\"><em class=\"emphasis\">Los Angeles News Service v. KCAL-TV Channel 9<\/em> (1997):<\/strong> A TV news station used a 30-second segment of a four-minute video that depicted the beating of a Los Angeles man. The video was copyrighted by the Los Angeles News Service.<\/p>\n<p class=\"para\">CONSIDERATIONS: The segment used by the news station was a significant portion of the total video. Additionally, the use was for commercial reasons and infringed on the Los Angeles News Service\u2019s ability to market the video.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<tfoot>\n<tr>\n<th align=\"left\">\n<p class=\"para\">Source: Stanford University Libraries. \u201cCopyright &amp; Fair Use.\u201d <a class=\"link\" href=\"http:\/\/fairuse.stanford.edu\/Copyright_and_Fair_Use_Overview\/chapter9\/9-c.html\">http:\/\/fairuse.stanford.edu\/Copyright_and_Fair_Use_Overview\/chapter9\/9-c.html<\/a><\/p>\n<\/th>\n<th>\n                        <\/th>\n<\/tr>\n<\/tfoot>\n<\/table>\n<\/div><\/div>\n<div class=\"section\" id=\"fwk-luleapollo-ch14_s03_s02_s02\" xml:lang=\"en\">\n<h2 class=\"title editable block\">Plagiarism<\/h2>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p01\">Sometimes plagiarism becomes confused with copyright violation. However, the two words are not synonymous; while there can be some overlap between them, not every instance of plagiarism involves copyright violation, and not every instance of copyright violation is an act of plagiarism. For one thing, while copyright violation can involve a wide range of acts, <span class=\"margin_term\"><a class=\"glossterm\">plagiarism<\/a><\/span> is defined more narrowly as using someone else\u2019s information, writing, or speech without properly documenting or citing the source. In other words, plagiarism involves representing another person\u2019s work as one\u2019s own.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p02\">As the U.S. Copyright Office points out, it is possible to cite a copyrighted source of information without obtaining permission to reproduce that information.<sup>3<\/sup> In such a case, the user has violated copyright law even though she has not plagiarized the material. Similarly, a student writing a paper could copy sections of a document that is in the public domain without properly citing his sources, in which case he would not have broken any copyright laws. However, representing the information as his own work would be an instance of plagiarism.<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p03\">Plagiarism, a perennially serious problem at academic institutions, has recently become even more prevalent. The ease of copying and pasting online content into a word-processing document can make it highly tempting for students to plagiarize material for research projects and critical papers. Additionally, a number of online \u201cpaper mills\u201d contain archives where students can download papers for free or, in some cases, purchase them (Denhart, 1999). In 2003, <em class=\"emphasis\">The New York Times<\/em> surveyed students at 23 college campuses and reported that 38 percent of students admitted to having committed copy-and-paste plagiarism within the previous year (De Leon, 2007).<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p04\">To combat the rise in plagiarism, many schools and universities now subscribe to services that allow instructors to check students\u2019 work for plagiarized material. Plagiarism.org, for instance, offers an analytics tool that compares student writing against a database that includes work from online paper mills, academic databases, documents available through major search engines, and other student papers submitted to Plagiarism.org.<sup>4<\/sup> According to many researchers, part of the issue may be that students don\u2019t understand what constitutes plagiarism. Some students, for instance, claim they think information available online is in the public domain (Auer &amp; Krupar, 2001). The following list offers suggestions for ways to avoid plagiarism in your own work.<\/p>\n<ul class=\"itemizedlist editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s02_l01\">\n<li>Don\u2019t procrastinate.<\/li>\n<li>Avoid taking shortcuts.<\/li>\n<li>Take thorough notes and keep accurate records.<\/li>\n<li>Rephrase ideas in your own words.<\/li>\n<li>Provide citations or attributions for all sources.<\/li>\n<li>Ask your instructor when in doubt (Longman Publishers).\n<\/li>\n<\/ul>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p05\">While plagiarism is an issue of concern in academia, it occurs in print media as well. Writers, whether through carelessness or laziness, may lift content from existing materials without properly citing or reinterpreting them. In an academic setting, plagiarism may lead to consequences as severe as failure or even expulsion from an institution. However, outside of academia the consequences may be even more damaging. Writers have lost publishing contracts, permanently damaged their reputations, and even ruined their careers over instances of plagiarism. For example, the late George Harrison, of the Beatles, was successfully sued by Ronald Mack for copyright infringement of his song \u201cHe\u2019s So Fine.\u201d<sup>5<\/sup> It was determined by the court that Harrison unconsciously plagiarized the musical essence of Mack\u2019s song for his composition \u201cMy Sweet Lord.\u201d<\/p>\n<p class=\"para editable block\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p06\">You should now have an understanding of the key issues in media ethics, particularly as they relate to privacy rights, plagiarism, and copyright laws. Please ensure you understand the key concepts listed below.<\/p>\n<div class=\"bcc-box bcc-success\" id=\"fwk-luleapollo-ch14_s03_s02_s02_n01\">\n<h3 class=\"title\">Key Takeaways<\/h3>\n<ul class=\"itemizedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_l02\">\n<li>\n<p class=\"para\">Concerns about the public\u2019s right to privacy have increased in recent years, as more personal information has become available online.<\/p>\n<ul class=\"itemizedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_l03\">\n<li>Every time someone makes a purchase, performs a web search, accesses a web page, downloads files, sends an e-mail, or engages in social networking, that information is stored in a computer and may be accessed by third parties under certain conditions.<\/li>\n<li>The USA PATRIOT Act, passed after the September 11, 2001, attacks, has broadened the federal government\u2019s rights to access individuals\u2019 personal records.<\/li>\n<li>Civil liberties organizations are concerned about clauses of the Patriot Act, such as the one that stipulates that the government can wiretap Internet communications as long as intelligence gathering is a significant purpose of the investigation.<\/li>\n<\/ul>\n<\/li>\n<li>\n<p class=\"para\">Rules that distinguish copyright violation from fair use are not always entirely clear and have been the subject of debate now that a greater amount of copyrighted work is easily accessible via the Internet.<\/p>\n<ul class=\"itemizedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_l04\">\n<li>Works enter the public domain once their copyright has expired, at which point they can be altered, copied, and distributed freely.<\/li>\n<li>Because of numerous changes in U.S. copyright laws, some works have entered the public domain earlier than others.<\/li>\n<li>According to the U.S. government, when distinguishing between fair use and copyright infringement, there are four things to consider: whether or not the use is for profit, the nature of the copyrighted work, the percentage of the copyrighted material being used, and the effect of that use on the value of the copyrighted work.<\/li>\n<\/ul>\n<\/li>\n<li>Plagiarism is also a growing concern because of the ease of copying and pasting texts from online sources into computer documents. It is important to keep in mind that plagiarism and copyright infringement are different issues: Plagiarism involves not giving credit to a work\u2019s creator, whereas copyright deals with the legality of using a created work.<\/li>\n<\/ul>\n<\/div>\n<div class=\"bcc-box bcc-info\" id=\"fwk-luleapollo-ch14_s03_s02_s02_n02\">\n<h3 class=\"title\">Exercises<\/h3>\n<p class=\"para\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p07\">You will now examine several cases in detail to further explore your understanding of the concepts and key ideas covered in this chapter. Respond to the questions asked, and provide evidence or examples to defend and support your answer. Each response should be one or two paragraphs.<\/p>\n<p class=\"para\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p08\">Case 1. Research the USA PATRIOT Act. You can read what the American Civil Liberties Union (ACLU) has to say about the act here: <a class=\"link\" href=\"http:\/\/www.aclu.org\/pdfs\/safefree\/patriot_report_20090310.pdf\">http:\/\/www.aclu.org\/pdfs\/safefree\/patriot_report_20090310.pdf<\/a>. You can read what the federal government has to say about the act here: <a class=\"link\" href=\"http:\/\/www.justice.gov\/archive\/ll\/highlights.htm\">http:\/\/www.justice.gov\/archive\/ll\/highlights.htm<\/a><\/p>\n<ul class=\"itemizedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_l05\">\n<li>What are its major stipulations?<\/li>\n<li>What are some major concerns of civil liberties advocates?<\/li>\n<li>Do you agree with the ACLU that \u201cthe Patriot Act eroded our most basic right\u2014the freedom from unwarranted government intrusion into our private lives?\u201d Or do you agree with the acronym the federal government created to explain the act: Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism? Explain your reasons.<\/li>\n<\/ul>\n<p class=\"para\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p09\">Case 2. Consider the following case:<\/p>\n<p class=\"para\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p10\">After the publication of author J. K. Rowling\u2019s popular <em class=\"emphasis\">Harry Potter<\/em> novels, one fan created an elaborate website for Harry Potter enthusiasts. The website includes an encyclopedia of information about the books; indexed lists of people, places, and things; fan art; discussion forums; essays; timelines; and other features. Much of the content of the website\u2019s encyclopedia entries comes directly from the books. Use of the website is free and unrestricted, and while the site includes some ads, the income they generate only goes to offset the site\u2019s operating costs.<\/p>\n<ul class=\"itemizedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_l06\">\n<li>Decide whether you believe the website represents an instance of fair use or whether the action was a copyright violation. Defend your response.<\/li>\n<\/ul>\n<\/div>\n<div class=\"bcc-box bcc-info\" id=\"fwk-luleapollo-ch14_s03_s02_s02_n03\">\n<h3 class=\"title\">End-of-Chapter Assessment<\/h3>\n<p class=\"simpara\">Review Questions<\/p>\n<ol class=\"orderedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_o01\">\n<li>\n<p class=\"para\">Section 1<\/p>\n<ol class=\"orderedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_o02\">\n<li>Why was the NAACP unhappy with the schedule of programs for the 1999 season of major television network entertainment?<\/li>\n<li>List at least four common characteristics of the way women are often presented in TV and movie entertainment.<\/li>\n<li>Why is it considered problematic that so few women and ethnic minorities are represented \u201cbehind the scenes\u201d in the creation of mass-media products?<\/li>\n<li>Explain how mass media as a socialization agent relates to public attitudes toward sexual behavior.<\/li>\n<\/ol>\n<\/li>\n<li>\n<p class=\"para\">Section 2<\/p>\n<ol class=\"orderedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_o03\">\n<li>How does online news content put added pressure on news organizations?<\/li>\n<li>Explain the media\u2019s watchdog role.<\/li>\n<li>When is it considered acceptable for journalists to expose details about an individual\u2019s private life?<\/li>\n<li>How does political bias influence the way news gets presented?<\/li>\n<\/ol>\n<\/li>\n<li>\n<p class=\"para\">Section 3<\/p>\n<ol class=\"orderedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_o04\">\n<li>Identify cookies. Why are cookies a concern for privacy advocates?<\/li>\n<li>What are some reasons a created work might be in the public domain?<\/li>\n<li>List the four considerations the federal government lists for determining whether an action is fair use or copyright violation.<\/li>\n<li>Give an example of an act that could be considered plagiarism but not copyright violation.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/div>\n<div class=\"bcc-box bcc-info\" id=\"fwk-luleapollo-ch14_s03_s02_s02_n05\">\n<h3 class=\"title\">Critical Thinking Questions<\/h3>\n<p class=\"para\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p12\">Answer the following critical thinking questions. Your responses should be one to two pages for each prompt.<\/p>\n<ol class=\"orderedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_o06\">\n<li>Watch segments of the evening news on three of the major television networks. Based on the information presented here about representations of women and racial minorities, what do you observe? Do your observations corroborate claims of stereotyping and underrepresentation? Do you notice important differences among the three networks where these issues are concerned?<\/li>\n<li>Create a mock advertisement that breaks with common racial stereotypes, gender myths, or media representations of sexuality.<\/li>\n<li>A number of prominent journalists and news experts have argued that the newspaper industry must find a new model for generating revenue if it hopes to survive. Create a short proposal in which you outline a plan for newspaper agencies to earn money from sources other than subscriptions and print advertising.<\/li>\n<li>Develop an argument in which you defend the use of information gathering and profiling for the placement of Internet ads and the creation of customized web pages.<\/li>\n<li>What might be some implications of the Google Books settlement? Why do you think William Cavanaugh claimed that it \u201cturns copyright law on its head\u201d?<\/li>\n<\/ol>\n<\/div>\n<div class=\"bcc-box bcc-info\" id=\"fwk-luleapollo-ch14_s03_s02_s02_n04\">\n<h3 class=\"title\">Career Connection: Political Blogger<\/h3>\n<p class=\"para\" id=\"fwk-luleapollo-ch14_s03_s02_s02_p11\">Research what it takes to be a professional political blogger for a news site like <a class=\"link\" href=\"http:\/\/CNN.com\">CNN.com<\/a> or <em class=\"emphasis\">The Huffington Post<\/em>. Then answer the following short-answer questions. Each response should be one to two paragraphs.<\/p>\n<ol class=\"orderedlist\" id=\"fwk-luleapollo-ch14_s03_s02_s02_o05\">\n<li>How much and what kind of research would you need to perform on a daily basis?<\/li>\n<li>Where would you go for your information?<\/li>\n<li>What are some elements that make for a successful blog?<\/li>\n<li>What are some particular ethical concerns surrounding this form of journalism?<\/li>\n<\/ol>\n<\/div><\/div>\n<\/div>\n<p><sup>1<\/sup>Godoy, \u201cGoogle Records Subpoena.\u201d<\/p>\n<p><sup>2<\/sup>Spring, \u201cGood-Bye to Privacy?\u201d<\/p>\n<p><sup>3<\/sup>U.S. Copyright Office, \u201cFair Use.\u201d<\/p>\n<p><sup>4<\/sup>Denhart, \u201cThe Web\u2019s Plagiarism Police.\u201d<\/p>\n<p><sup>5<\/sup>Bright Tunes Music v. Harrisongs Music, 420 F. Supp. 177 (S.D.N.Y. 1976).<\/p>\n<h2>References<\/h2>\n<p>American Civil Liberties Union, \u201cSurveillance Under the USA PATRIOT Act,\u201d April 3, 2003, <a class=\"link\" href=\"http:\/\/www.aclu.org\/national-security\/surveillance-under-usa-patriot-act\">http:\/\/www.aclu.org\/national-security\/surveillance-under-usa-patriot-act<\/a>.<\/p>\n<p>Auer, Nicole J. and Ellen M. Krupar, \u201cMouse Click Plagiarism: The Role of Technology in Plagiarism and the Librarian\u2019s Role in Combating It,\u201d <em class=\"emphasis\">Library Trends<\/em>, Winter 2001, <a class=\"link\" href=\"http:\/\/findarticles.com\/p\/articles\/mi_m1387\/is_3_49\/ai_75278304\/\">http:\/\/findarticles.com\/p\/articles\/mi_m1387\/is_3_49\/ai_75278304\/<\/a>.<\/p>\n<p>De Leon, Michelle. \u201cInternet Plagiarism on the Rise in Colleges,\u201d <em class=\"emphasis\">Lehigh University Brown and White<\/em>, November 12, 2007, <a class=\"link\" href=\"http:\/\/media.www.thebrownandwhite.com\/media\/storage\/paper1233\/news\/2007\/11\/12\/News\/Internet.Plagiarism.On.The.Rise.In.Colleges-3094622.shtml\">http:\/\/media.www.thebrownandwhite.com\/media\/storage\/paper1233\/news\/2007\/11\/12\/News\/Internet.Plagiarism.On.The.Rise.In.Colleges-3094622.shtml<\/a>.<\/p>\n<p>Denhart, Andy. \u201cThe Web\u2019s Plagiarism Police,\u201d <em class=\"emphasis\">Salon<\/em>, June 14, 1999, <a class=\"link\" href=\"http:\/\/www.salon.com\/technology\/feature\/1999\/06\/14\/plagiarism\">http:\/\/www.salon.com\/technology\/feature\/1999\/06\/14\/plagiarism<\/a>.<\/p>\n<p>Electronic Frontier Foundation, \u201cEFF Backs Yahoo! to Protect User from Warrantless Email Search,\u201d news release, April 14, 2010, <a class=\"link\" href=\"http:\/\/www.eff.org\/press\/archives\/2010\/04\/13\">http:\/\/www.eff.org\/press\/archives\/2010\/04\/13<\/a>.<\/p>\n<p>Godoy, Maria. \u201cGoogle Records Subpoena Raises Privacy Fears,\u201d <em class=\"emphasis\">NPR<\/em>, January 20, 2006, <a class=\"link\" href=\"http:\/\/www.npr.org\/templates\/story\/story.php?storyId=5165854\">http:\/\/www.npr.org\/templates\/story\/story.php?storyId=5165854<\/a>.<\/p>\n<p>Harvard Law School, Berkman Center for Internet and Society, \u201cThe USA Patriot Act, Foreign Intelligence Surveillance, and Cyberspace Privacy,\u201d Harvard Law School, <a class=\"link\" href=\"http:\/\/cyber.law.harvard.edu\/privacy\/module5.html\">http:\/\/cyber.law.harvard.edu\/privacy\/module5.html<\/a>.<\/p>\n<p>Linder, Doug. \u201cThe Right of Privacy,\u201d Exploring Constitutional Law, 2010, <a class=\"link\" href=\"http:\/\/www.law.umkc.edu\/faculty\/projects\/ftrials\/conlaw\/rightofprivacy.html\">http:\/\/www.law.umkc.edu\/faculty\/projects\/ftrials\/conlaw\/rightofprivacy.html<\/a>.<\/p>\n<p>Longman Publishers, \u201cAvoiding Plagiarism,\u201d Pearson Education, <a class=\"link\" href=\"http:\/\/wps.pearsoncustom.com\/pcp_longman_ap_2\/32\/8420\/2155775.cw\/content\/index.html\">http:\/\/wps.pearsoncustom.com\/pcp_longman_ap_2\/32\/8420\/2155775.cw\/content\/index.html<\/a>.<\/p>\n<p>Mies, Ginny. \u201cSkeptical Shopper: Can Your Online Life Ruin Your Credit?\u201d <em class=\"emphasis\">PC World<\/em>, March 23, 2010,. <a class=\"link\" href=\"http:\/\/www.pcworld.com\/article\/192207\/skeptical_shopper_can_your_online_life_ruin_your_credit.html\">http:\/\/www.pcworld.com\/article\/192207\/skeptical_shopper_can_your_online_life_ruin_your_credit.html<\/a>.<\/p>\n<p>Newitz, Annalee. \u201c5 Ways the Google Books Settlement Will Change the Future of Reading,\u201d <em class=\"emphasis\">io9<\/em> (blog).April 2, 2010, <a class=\"link\" href=\"http:\/\/io9.com\/5501426\/5-ways-the-google-book-settlement-will-change-the-future-of-reading\">http:\/\/io9.com\/5501426\/5-ways-the-google-book-settlement-will-change-the-future-of-reading<\/a>.<\/p>\n<p>Oder, Norman. \u201cGoogle Settlement Fairness Hearing, Part Two: DOJ Expresses Opposition; Parties Mount Vigorous Defense,\u201d <em class=\"emphasis\">Library Journal<\/em>, February 18, 2010, <a class=\"link\" href=\"http:\/\/www.libraryjournal.com\/article\/CA6719808.html\">http:\/\/www.libraryjournal.com\/article\/CA6719808.html<\/a>.<\/p>\n<p>Olsen, Stephanie. \u201cPatriot Act Draws Privacy Concerns,\u201d <em class=\"emphasis\">CNET<\/em>, October 26, 2001, <a class=\"link\" href=\"http:\/\/news.cnet.com\/2100-1023-275026.html\">http:\/\/news.cnet.com\/2100-1023-275026.html<\/a>.<\/p>\n<p>Press, Nolo. \u201cChapter 8: The Public Domain,\u201d Stanford University Libraries and Academic Information Resources, 2007, <a class=\"link\" href=\"http:\/\/fairuse.stanford.edu\/Copyright_and_Fair_Use_Overview\/chapter8\/index.html\">http:\/\/fairuse.stanford.edu\/Copyright_and_Fair_Use_Overview\/chapter8\/index.html<\/a>.<\/p>\n<p>Privacy Rights Clearinghouse, \u201cPrivacy Today: A Review of Current Issues,\u201d March 2010, <a class=\"link\" href=\"http:\/\/www.privacyrights.org\/ar\/Privacy-IssuesList.htm#publicrecords\">http:\/\/www.privacyrights.org\/ar\/Privacy-IssuesList.htm#publicrecords<\/a>.<\/p>\n<p>Spring, Tom. \u201cGood-Bye to Privacy?\u201d <em class=\"emphasis\">PC World<\/em>, May 23, 2010, <a class=\"link\" href=\"http:\/\/www.pcworld.com\/article\/196787\/goodbye_to_privacy.html\">http:\/\/www.pcworld.com\/article\/196787\/goodbye_to_privacy.html<\/a>.<\/p>\n<p>U.S. Copyright Office, \u201cCopyright Basics,\u201d <a class=\"link\" href=\"http:\/\/www.copyright.gov\/\">http:\/\/www.copyright.gov\/<\/a>.<\/p>\n<p>U.S. Copyright Office, \u201cFair Use,\u201d May 2009, <a class=\"link\" href=\"http:\/\/www.copyright.gov\/fls\/fl102.html\">http:\/\/www.copyright.gov\/fls\/fl102.html<\/a>.<\/p>\n","protected":false},"author":20,"menu_order":4,"template":"","meta":{"_candela_citation":"","CANDELA_OUTCOMES_GUID":"","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-277","chapter","type-chapter","status-publish","hentry"],"part":264,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/pressbooks\/v2\/chapters\/277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/wp\/v2\/users\/20"}],"version-history":[{"count":0,"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/pressbooks\/v2\/chapters\/277\/revisions"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/pressbooks\/v2\/parts\/264"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/pressbooks\/v2\/chapters\/277\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/wp\/v2\/media?parent=277"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/pressbooks\/v2\/chapter-type?post=277"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/wp\/v2\/contributor?post=277"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/suny-hccc-massmedia\/wp-json\/wp\/v2\/license?post=277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}