SCM 501 Coursework

Protecting Intellectual Property

At first let us know about what is IP:  Intellectual property rights are based on people’s rights to create their own intellectual activities and the marks and credits in their business management activities.

The network-based Internet has a fast transmission speed, a rich information content and a wide range of propagation. The development of network technology has broken the original communication pattern, and it has brought people a new material and spiritual life enjoyment. It is also one of the most important and fastest ways for people to acquire knowledge and information.

The information on the Internet is mostly well-known and open, and it is difficult to be controlled by the right holder. The significance of intellectual property lies in protecting the rights of intellectual property holders in the dissemination of their work. However, the characteristic of knowledge transmission on the network is “no borders”.

It’s a tough job to protect your intellectual property online, but you can set a ban on reprinting before posting an article, or use a photo format for text publishing. Also if you want to share your own article to others, you also can put the copyleft on your blogs. Copyleft works are copyrighted; however, they incorporate legal distribution provisions that guarantee anyone’s freedom to use, modify and redistribute the work and its derivatives, provided that these terms of publication cannot be changed.

The essence of the concept of intellectual property is a modest balance of public and private interests, and the degree of protection is not as high as possible. Copyleft prefers to share their work, including the right to reuse, modify, and distribute the work, rather than retaining all rights.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.

 

SCM 501 Coursework

Managing your online identity

Network security is holistic rather than fragmented; it is dynamic rather than static; it is open rather than closed; it is relative rather than absolute; it is common rather than isolated.

Internet information security has gradually attracted people’s attention, and countries are attaching great importance to the field of network trusted identity authentication.

As long as your usernames are the same, you can find all of your information by searching for keywords in the search bar.

I think to establish your own online identity, you must first make clear what you want to express. Many websites that can make their own web pages provide content layout for the user’s personal homepage or personal BLOG, so that you can freely arrange your homepage after selecting the template.

But to do user experience is to invest, such as technology investment. You have to develop your own personalized features, plagiarism is not acceptable. The content that users are interested in when using the website has a distinctly different tendency: any design of the website cannot meet the needs of all interest orientations at the same time. At this time, the user needs are generated, and the user’s habits of tracking the survey are required to subdivide the personalized functions.

The difference between providing personalized web pages and non-personalized web pages suggests that this is a detail, and it should be implied that it should be implied. Don’t over-confidently reason about user preferences, and pay attention to protecting the privacy of personal information in the process of personalization.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.

SCM 501 Coursework

Community

What is a community?

In my mind, the community is a large organization that allows many like-minded people to discuss what they are interested in.
Why do we create them?

I want to find someone who has the same opinion or has the same problem.
What are some examples of our local communities?

sportclub, nightclub, neighbourhood, volunteer groups.
What characterises a community? (e.g. good things, bad things…)

good thing: You can ask for help and get happiness in the community.

bad thing: Excessive indulging in community activities can be devastating or over-exciting.
What communities do you belong to?

New Zealand Chinese Association Nelson Branch
Why did you join?

Because I want to find some Chinese in New Zealand, it makes me feel warm.

How long have you been part of it?

2 Years

How active are you?

I just looking, never talk with them.
What online (not Second Life) communities do you belong to?

New Zealand Chinese Association Nelson Branch
Why did you join?

The reason is same I want to find some chinese who lived in New Zealand.
How long have you been part of it?

Never.

How active are you?

Never.
What differences are there between physical and online communities?

It doesn’t make any difference to me because I rarely participate in their activities, whether it’s reality or online.

 

SCM 501 Coursework

Online Safety and Privacy

Behind emerging devices is digital technology. This is a computer, but not as everyone knows. Unlike traditional computing platforms, such as the common computing platforms used by personal computers, and Internet devices running on new proprietary firmware. While the Internet brings benefits, it also brings greater risks, because the more connected devices, the more hackers and cybercriminals have more entry points to commit crimes.

In addition, to ensure that your online security must also pay attention to the protection of passwords, scammers can use various means to scam. For example, phishing sites and spam.

In response to these scammers, we can create a separate webmail account that is not associated with other accounts. This protects your primary email account (including your bank or other sensitive personal information) from spam and other phishing attacks. Otherwise, if an account is compromised, all of your associated accounts will be at risk.

Publishing your own posts on a public platform is actually very risky. For example, your identity will be stolen by others and they will use your identity information to conduct online scams. To avoid the theft of identity information, you must learn to protect your account security.

The network operator will automatically transfer the data which you upload to the third party, so even if you delete your own information, it will still have a backup. This requires us to be cautious when uploading private information. Information about personal bank accounts and mobile phone numbers should not be published on public platforms.

Be vigilant before posting content, check the user information and applications that allow viewing of the content. When searching for problems on the Internet, don’t click on unsure security URLs. You can use strong passwords and use different passwords to keep your different accounts secure.

The privacy level you choose for yourself can increase the level of security privacy in your favorite browser settings.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.

SCM 501 Coursework

Personal Brand Introduction

I’m Zoey, a Chinese student studying at New Zealand. This blog traces my experience in makeup and the setbacks I have encountered. This blog is about makeup and how to choose the best products, I’ll share lots of products that I have used to give you a detailed assessment. Occasionally I will share some of my skin care tips to help you find the right product.

 

The original intention of writing this blog is very simple. I hope that through my sharing, everyone can find the right product with no longer suffer. But as my focus on beauty is getting deeper, I find that many products share the same commonality. Many people have a wrong understanding when they are choosing cosmetics, that is price can decide everything. But this is not the case. Many high-priced products do not have a good quality. On the contrary, many low-priced products are surprisingly easy to use.

 

I loved makeup since I was a Junior student, I always secretly use my mother’s cosmetics to make myself look good. This love for makeup has continued into my college life, and during college I started watching a variety of makeup videos on the video site to learn makeup techniques. What’s interesting is that all the makeup videos I’ve seen that teach me how to make a perfect look. I can combine all the content that my videos teach me. This is my most unique market skill.

 

I am a recognized girl who good at makeup in my circle of friends. My friends often want me to share the makeup information of the day, such as the color of the eyeshadow and the color of the lipstick.

 

My microblogging attention is not too low, some fans are willing to see me to share beauty, and I can also share my web page on my Instagram and Facebook and let my friends click to subscribe. The group I am targeting is all the girls or boys who need makeup skills. I will do my best to help them choose the right product and tell them the correct makeup steps.

 

My online brand will only be promoted on Instagram, Facebook and Weibo in the early days. When my brand matures, I will choose to create a special email address to receive and send messages. Offline brand promotion I may print my business card with the link of my website and any of my contact information, which will help the brand promotion.

 

I think that it takes a lot of effort to maintain a brand’s activity, such as continuous learning, constant purchase of new products for evaluation, and contact with famous cosmetics companies for cooperation. This is all that I need to work hard to perfect.

 

 

Thank you for reading all the way to the end.

Look forward to hearing from you.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.