my favourite movie

  • Notting Hill
  • X-Men
  • Mummy Return
  • Mummy
  • Jurassic Park III
  • ชินจัง

วันจันทร์ที่ 24 พฤศจิกายน พ.ศ. 2551

What is fair use?©RIGHT LAW IN THAILAND

COPYRIGHT LAW IN THAILAND


Brief History of Thai Copyright Laws
Prior to the existence of a modern copyright law in Thailand, there was an announcement of the Vajiranana Library (the National Library at present) in 1894 prohibiting any person from publishing any part of, or any article published in Vajirayarnvises Books without prior permission of “Kamma-sampathikasapa.” (Surat Numnnont 1962, 17) The announcement protected the rights regarding articles published in Vajirayarnvises Book. In 1901, during the reign of King Chulalongkorn (King Rama V, 1868-1910) the Copyright Act B.E. 2445 (A.D. 1902) was promulgated. During the reign of King Vajiravudh (King Rama VI, 1910-1925) the Copyright Act B.E. 2457 (A.D. 1914) was enacted to amend the previous law. However, both Acts protected only the copyright of literary works.
In the reign of King Prajadhipok (King Rama VII, 1925-1934) the Act for the Protection of Literary and Artistic Works B.E. 2474 (A.D. 1931), which repealed the former two Acts, was promulgated on 16 June 1931. This Act was the first modern copyright law, because it contained the universal principles of copyright law, especially the protection of artistic, scientific and foreign works. After having been enforced for more than forty years, the Act for the Protection of Literary and Artistic Works B.E. 2474 became out of date. The penalty for copyright infringement was very minor. The Copyright Act B.E. 2521 (A.D. 1978), which became effective on 19 December 1978 provided protection for audio-visual works, sound records and video broadcasting works.
Fifteen years later, the Copyright Act growth up to date to new forms of literary and artistic works, such as computer programs, sound and visual recordings performances and the leasing of audio-visual work. In that case, the government therefore proposed a new copyright bill to the parliament which was passed as “the Copyright Act B.E. 2537” (A.D. 1994). This Act came into force on 21 March 1995.

Nature of Copyright
Section 4 of the Copyright Act B.E. 2537 defines the word “copyright” as “the exclusive right to do any act under this Act in relation to the work made by the author.”
The purposes of the Copyright Act are to protect the rights of a person to his/her works which uses his/her skill, effort and labor to create a work, and which may be useful for all mankind. (Phillips and Firth 1990, 115) Whenever any person makes or creates a work under the conditions of the copyright law, he/she will be exclusively entitled to do anything to or with regards to the work, for example, its reproduction, adaptation, dissemination to the public and the granting license to other persons to use the said rights, because the copyright provides a very useful and effective way of exploiting a work economically. (Bainbridge 1992, 33) The copyright law protects the work, which any author makes or creates, in the form in which it is expressed but does not protect the underlying ideas and information in the work. On this account, if any idea is not created to be a work in physical appearance, no copyright protection shall be extended to such idea. (Dworkin and Taylor 1990, 4)
Copyright gives exclusive right to the author who makes or creates a work, and acquires the right under the copyright law. However, the copyright is a property right in which the owner may assign his right wholly or in part and may assign it for a limited period of time or for the entire term of the protection of the copyright. An assignment of copyright, except by means of succession shall be made in writing signed by the assignor and the assignee, and if there is no specified period of time in any assignment, it shall be deemed that the assignment is limited for a ten-year period (Section 17).
Though the copyright is able to be assigned under the law, the author of a copyright work still has the moral rights to be identified as the author of the work (the paternity right) able to prohibit an assignee of copyright or any other person from distorting, abridging, adapting or doing any acts in relation to the work to such extent as to cause injury to the reputation or prestige of the author (the integrity right). If the author dies, his heirs have the right in litigation to enforce such rights throughout the term of the copyright protection unless otherwise agreed upon in writing (Section 18).

Copyrightable Works
The prerequisite of a copyright work is that it be the product of human endeavor, be that endeavor ever so slight, and not simply somethingwhich occurs in nature. (Phillips and Firth 1990, 115) The works, which are able to be protected under the copyright Act B.E. 2537, must be creative works, irrespective of the mode or the form in which the work is expressed. By virtue of Section 6 of the Copyright Act B.E. 2537, the copyrightable works are stipulated as one of the following works:
1. Literary works means every production in the literary domain, such as books, pamphlets, writings, printings, lectures, sermons, addresses and speeches, including computer programs.
Furthermore, this Act also defines computer programs as a set of instructions or anything used with a computer for making the computer work or to obtain any result, irrespective of computer program language.
2. Dramatic works mean works relating to choreography, dancing, action or performance in dramatic composition, and includes pantomime.
3. Artistic works mean any works of painting and drawing, work of sculpture, works of lithography, works of architecture, photographic works, works on illustrations, maps, structures, sketches, or three-dimensional works in relation to geography, topography or science, works of the applied arts, and includes the photographs and plans of such works.
4. Musical works mean any musical composition for playing or singing, whether with rhythm and lyrics or only rhythm, and include a musical notes or musical diagrams, the tunes in having been arranged and transcripted.
5. Audiovisual works mean works composed of a sequence of images recorded in any form of material, which are capable of being replayed by necessary apparatus for using such material, and include a sound track of that work, if any.
6. Cinematographic works mean audiovisual works composed of any sequence of visual images, which is capable of being continuously shown as moving pictures, or is capable of being recorded in another material so as to be continuously shown as moving pictures, and includes the sound track of that moving picture, if any.
7. Sound recordings mean works composed of a sequence of music, sound of a performance or any other sound recorded in any form of material, which is capable of being replayed by necessary apparatus for using such material, but not including the sound track of a cinematographic work or another audio-visual work.
8. Sound and video broadcasting works mean works communicated to the public by means of radio broadcasting, sound and video broadcasting on television or by other similar means.
9. Other works in the literary, scientific or artistic domain. When an author creates works in accordance with the conditions of the Copyright Act B.E. 2537, his works will be protected under this Act. However, Section 7 of the Copyright Act B.E. 2537 states that the following works do not come under the Copyright Acts:

News of the day and facts having the character of being information only.
Constitutions and legislations.
Regulations, by-laws, notifications, orders, explanations and correspondence of the Ministries, sub-Ministries, Departments or any other state or local unit.
Judgment, orders, decisions and reports of the government.
Translations and collection of those in (1) to (4) made by the Ministries, sub-Ministries, Departments, or any other state or local units.
The underlying reasons for these exceptions are that such works are general works stipulated for public interest.

Acquisition of Copyright
The acquisition of copyright for protection under the Copyright Act B.E. 2537 can be classified into four categories as follows:

1. The author shall be entitled to the copyright in the work he has created under any of the following conditions (Section 8)
1.1 In the case where the work has not been published yet, the author must be a Thai national or must have stayed in the Kingdom, or a national of or resident in a country which is a member of the convention on copyright protection of which Thailand is also a member throughout the time or most of the time of a work’s creation.
1.2 In the case where the work has been published, the first publication must have been in the Kingdom or in a country which is a member of the convention on copyright protection of which Thailand is also a member, or in the case where the first publication is made outside the Kingdom or in another country which is not a member of the convention on copyright protection of which Thailand is a member, if the work has been published in the Kingdom or in a country which is a member of the convention on copyright protection of which Thailand is also a member within thirty days as from the date of the first publication, or the author must be qualified according to that prescribed in (1.1) at the time of the first publication.
However, in the case where the author must be a Thai national, if he is a juristic person, such juristic person must be incorporated under the law of Thailand.
By virtue of Section 4 of the Copyright Act B.E. 2537, the meaning of the publication is a disposition of the duplicated copies of a work, regardless of its form or character, with the consent of the author, by making duplicated copies available to a reasonable number of the public having due regards to the nature of the work, but does not include a performance or display of dramatic, musical or cinematographic works, lecturing or delivering a speech on literary work, sound and video broadcasting about any work, exhibition of artistic work and construction of architectural work.
In the case where the author has created a work in the capacity of an officer or employee, he shall be entitled to the copyright in that work, but his employer is entitled to the right to disseminate that work to the public in accordance with the purpose of the employment, unless it has been agreed otherwise in writing (Section 9 of the Copyright Act B.E. 2537). Additionally, the employer shall be entitled to the copyright in the work the author was specifically commissioned to make, unless the author and the employer have agreed otherwise (Section 10)
2. In case of a work being by its nature an adaptation of the work copyrighted under this Act with the consent of the copyright owner, the person making such adaptation shall be entitled to the copyright under this Act, without prejudice to the right of the copyright owner in the work of the original author which was adapted (Section 11)
3. In case of a work being by its nature a compilation or composition of the works copyrighted under this Act with the consent of the copyright owner, or being a compilation or composition of data or anything else which can be read or transferred by a machine or other equipment, if the person, who compiles or composes, has done so by selecting or rearranging in its nature which is not an imitation of another person’s work, the person making such compilation and composition shall be entitled to the copyright to such work under this Act, without prejudice to the right of copyright owner in the work and data or anything else of the original author which was compiled or composed (Section 12)
4. The Ministries, sub-Ministries, Departments or any other state or local agency shall be entitled to the copyright in the works created under their employment or direction or control, unless it has been agreed otherwise in writing (Section 14)

Protection of Copyright
The copyright owner shall have the exclusive rights regarding the following acts (Section 15)
1. Reproduction or adaptation. By virtue of the meaning under Section 4 of the Copyright Act B.E. 2537, “reproduction” is any mode of copying, emulation, duplication, block-making, sound recording, video recording or sound and video recording, from the original, a duplicate or a publication in its material part, whether wholly or in part. In relation to computer program, reproduction is any mode of copying or duplication of the computer program from any recording medium in its material part, and not being in the nature of making a new work, whether wholly or in part. And “adaptation” is a reproduction by conversion, improvement, amendment or copying of the original in its material part, and not being in the nature of making a new work, whether wholly or in part.
2. Dissemination to the public. Under Section 4 of the Copyright Act B.E. 2537, dissemination to the public means making the work available to the public by means of performing, lecturing, praying, playing, converting into different formats such as sound and image, reconstructing, disposing or by any other means.
3. Letting the originals or the duplicates of computer program works, audio-visual works, cinematographic works and sound recording works.
4. Granting benefits accruing from the copyright to other persons.
5. Granting license to other persons to use the right under (1) (2) or (3), with or without imposing any condition, but such condition shall not be stipulated in the nature that being the restriction or unfair competition. However, in the case where a copyright owner by virtue of this Copyright Act, grants license to a person to use any said right, this license shall be regarded as a non-exclusive license, and the copyright owner can grant the same license to anyone else, unless the license imposes the prohibition (Section 16).

Term of Copyright Protection
Generally, the copyright in a work shall subsist for the life of the author and shall continue to subsist until the end of the period of fifty years from the death of the author. Nevertheless, in the case of a work of joint authorship, the copyright in such work shall subsist for the life of the joint authors and shall continue to subsist until the end of the period of fifty years from the death of the last surviving joint author. Additionally, if the author or every joint author was dead before the publication of the work, the copyright shall subsist for a period of fifty years from the date of its first publication(Section 19).
In case of the author being a juristic person, or using a pseudonymous or anonymous name and being unknown in terms of identity, the copyright in such work shall subsist for a period of fifty years from the date of its creation, but if the work is published during the said period, the copyright shall subsist for a period of fifty years from the date of its first publication (Paragraph 4 of Section 19 and Section 20).
The copyright in the photographic, audio-visual, cinematographic, sound recording or sound and video broadcasting work, or the copyright in the work created in accordance with the employment or direction or control of the Ministries, sub-Ministries, Departments or any other state or local agency shall subsist for a period of fifty years from the date of its creation. But if the work is published during the said period, the copyright shall subsist for a period of fifty years from the date of its first publication (Section 21 and Section 23).
However, the copyright in the work of applied art shall only subsist for a period of twenty-five years from the date of its creation, but if the work is published during the said period, the copyright shall subsist for a period of twenty-five years from the date of its first publication (Section 22).
The publication of any copyrighted work after the termination of the term of copyright protection shall not give rise to the copyright in that work anew, for instance the publication of a musical work after fifty years from the death of the composer does not give rise a new to the copyright in that work (Section 26).

Infringement of Copyright
As mentioned above, the Copyright Act provides the exclusive rights to the copyright owner, so infringement of copyright means the act which any person commits to the copyrighted work without permission of the copyright owner. The infringement of copyright is divided into two kinds as follows:
1. Direct Infringement. Any of the following acts in relation to every type of copyrighted works, except for a sound and video broadcasting, shall constitute an infringement of copyright: (1) reproduction or adaptation; (2) dissemination to the public. (Section 27, Section 28 and Section 30)
However, in relation to an audiovisual work, cinematographic work, sound recording work or computer program, the infringement of copyright also includes the letting of an original or duplicate of such works (Section 28 and Section 30).
Moreover, any one of the following acts in relation to a copyrighted sound and video broadcasting work shall constitute an infringement of copyright: (1) a production of audio-visual work, cinematographic work, sound recording or sound and video broadcasting work, whether wholly or in part; (2) a rebroadcasting of sound and visual images, whether wholly or in part; (3) an arrangement of the sound and video broadcasting work to be heard and/or seen by the public, by asking for a fee or other commercial benefits in return. (Section 29)
2. Indirect Infringement. Any person, who knows should have reason to know that a work was made by an infringement of the copyright of another person, does any of the following acts in relation to such work for profits, shall be deemed to commit an indirect infringement of copyright:

selling, possessing to sell, offering to sell, letting for hire, offering to hire, selling by hire-purchase or offering to sell by hire-purchase;
dissemination to the public;
distributing in such manner as to be prejudicial to the copyright owner;
importing or making an order for importation into the Kingdom. (Section 31)
Exceptions from Infringement of Copyright
Section 30 of the Copyright Act B.E. 2537 provides the exceptions from infringement of copyright, that is an act done in relation to the copyrighted work of another person by virtue of this Act shall not constitute an infringement of copyright, if done as follows:

research or study of the work, which is not done for making profit;
use for one’s own benefit and/or use for the benefits of his family member, or close relatives;
criticisms, comments or reviews of the work accompanied by an acknowledgement of the copyright ownership in such work;
report of current events through the mass media, accompanied by an acknowledgement of the copyright ownership in such work;
reproduction, adaptation, exhibition or making available for judicial or administrative proceedings under the law, or for a report of the said proceedings;
reproduction, adaptation, exhibition or making available by a teacher for teaching, which is not done for making profit;
reproduction or adaptation of a part of such work, or abridging or making a summary by a teacher or educational institution for distributing or selling to students in the class or in an educational institution, provided that is not done for making profit;
utilization of the work as a part of the examination questions and answers.
Regarding the exception of the infringement of copyright of computer programs, Section 35 of the Copyright Act B.E. 2537 stipulated that an act done in relation to a copyrighted computer program shall not be deemed an infringement of copyright, if there is no intention for making profit, in the following cases:

research or study of that computer program;
use for the benefit of the owner of the copy of the computer program;
criticisms, comments or reviews of the work accompanied by an acknowledgement of the copyright ownership in such computer program;
report of current events through the mass media, accompanied by an acknowledgement of the copyright ownership in such computer program;
duplicating computer program in an appropriate number by the person who legitimately purchased or obtained the computer program from another person for the purpose of maintenance or loss replacement.
reproduction, adaptation, exhibition or making available for judicial or administrative proceedings under the law, or for a report of the said proceedings;
utilization of the computer program as a part of the examination questions and answers;
adapting the computer program in case of being necessary for using;
making duplicates of the computer program to keep for reference or research of public interest.
Additionally, a reasonable recitation of, copying from, emulation of, or reference to any part of the copyrighted work, which is accompanied by acknowledgement of the copyright ownership in such work, shall not be deemed an infringement of copyright (Section 33).
Moreover, the Copyright Act B.E. 2537 states that any one of the following acts shall not be deemed an infringement of copyright:
1. reproduction for use in a library or for supplying to other libraries, or reasonable reproduction of certain parts of the work for supplying to other persons for the purpose of research or study, by librarians, if not being made for profit-making proposes (Section 34).
2. performing a dramatic work or musical work for suitable dissemination to the public, if not being made or conducted for making profit as a result of such dissemination, and not charging for admission fee, whether directly or indirectly, and the performers not receiving remuneration for such performance, in case of that being conducted by an association, foundation or other organizations with a charitable, educational, religious or social-welfare purpose (Section 36).
3. a reproduction, for the benefit of the government service by an authorized official or under the direction of the official, of a copyrighted work, which is in the possession of the government (Section 43).
However, such mentioned acts done in relation to the copyrighted work by virtue of this copyright Act, which shall not constitute the infringement of copyright, must not conflict with the normal exploitation in the copyrighted work of copyright ownership and not unreasonably affect the legitimate right of the copyright owner (Paragraph 1 of Section 32).
Furthermore, with regard to any act done to the artistic work, the Copyright Act B.E. 2537 states that any drawing, painting, building, engraving, moulding, carving, lithographing, photographing, cinematographic taking, video broadcasting or any similar in relation to any artistic work which is normally displayed in a public place and is not the work of architecture; or the drawing, painting, engraving, moulding, carving, lithographing, photographing, cinematographic taking, or video broadcasting in relation to the work of architecture; or the photographing or cinematographic taking or video broadcasting of any work in which any artistic work is included as a component part, shall not constitute an infringement of copyright in such artistic work (Section 37, Section 38 and Section 39).

Penalty and Prescription
The penalty stipulated in the Copyright Act B.E. 2537 is much higher than the one stipulated in the Copyright Act B.E. 2521. Any person directly infringing the copyright under Section 27, Section 28, Section 29 or Section 30 shall be liable to a fine from twenty thousand baht to two hundred thousand baht. If the said offence is committed for a commercial purpose, the offender shall be liable to imprisonment for a term from six months to four years or to a fine from one hundred thousand baht to eight hundred thousand baht or to both (Section 69).
Any person indirectly infringing the copyright under Section 31 shall be liable to a fine from ten thousand baht to one hundred thousand baht. If the said offence is committed for a commercial purpose, the offender shall be liable to imprisonment for a term of three months to two years or to a fine from fifty thousand baht to four hundred thousand baht, or to both (Section 70).
Furthermore, any person, who having been convicted of an offence under this Act, commits an offence hereunder again within five years from the date he is released from his punishment, shall be liable to double penalty prescribed for that penalty (Section 73).
In the case where a juristic person commits an offence under this Act, every director or manager of such juristic person shall be regarded as joint offenders with juristic person, unless he can prove that such act of the juristic person has been done without his knowledge or consent (Section 74).
In case of all articles made or imported into the Kingdom, which constitute an infringement of copyright under this Act, and still owned by the offender, they shall become the property of the copyright owner, whereas all articles used for committing an offence shall be forfeited (Section 75).
However, the offences under this Copyright Act shall be compoundable offences (Section 66). Additionally, the prescription of an action for infringement of copyright under this Act is a special prescription that differs from the prescription of wrongful acts in accordance with the Civil and Commercial Code. That is three years from the day when the copyright owner becomes aware of the infringement and the identity of the offender, but it must not be entered later than ten years from the date of infringement of copyright (Section 63).

The Use of Copyright in Special Circumstances
The new dimension of the Copyright Act B.E. 2537 is the stipulation of the provision relating to the use of copyright work in special circumstances. Section 54 of this Act provides that a Thai national who wants to apply for a license to use a copyright work which has been disseminated to the public in the form of printed matter or other similar forms, for the benefit of study, instruction or research, and not for making profit, may submit an application to the Director-General of the Department of Intellectual Property. Evidence is required to show that the applicant has applied for a license to use the copyright in the Thai translation of work into or in the reproduction of the duplicated work, which used to be published in the Thai translated version, from the copyright owner, but the application was rejected, or after a reasonable period of time, no agreement could be concluded, if it appears that at the time of submitting such application to the Director-General :
1. the copyright owner has not arranged for or permitted any person to make the Thai translation of such work for publication within three years after the first publication of the work; or
2. the copyright owner has published the Thai translation of his work for publication, but after three years from the most recent publication of the translation, there has been no further publication of that translation and there has been no duplication of that translation in the market.

International Copyright
Regarding the protection of international copyright, on July 17, 1931 (B.E. 2474), Thailand became a contracting state of the Berne Convention for the Protection of Literary and Artistic Works A.D. 1886 (B.E. 2429) or “the Berne Convention” (Tawach Rattanaphichat 1986 : 52) which was established in Berne, Switzerland on 9 September 1886 (B.E. 2429) by the International Union for the Protection of Copyright. Being a contracting state of the Berne Convention, Thailand is obliged to comply with this Convention. If Thailand desires the Convention to be legally applicable, it has to provide an internal law containing the provisions in the Convention, thus making the Convention become an internal law. (Ukrit Mongkolnavin 1976, 182)
Therefore, the Act for the Protection of Literary and Artistic Works B.E. 2474 began to stipulate the provision relating to the International Copyright in Chapter 2, but there was only a provision recognizing the translation work in that Act. Although Section 42 of the Copyright Act B.E. 2521 embraced the protection of international copyright more than that of the former Act, such Section 42 ambiguously provided the protection of international copyright, because of providing that international copyrights shall be protected according to the conditions stipulated by a Royal Decree. Besides this, the Royal Decree B.E. 2526 (A.D. 1983) and the Royal Decree B.E. 2536 (A.D. 1993) promulgated in accordance with such Section 42, stipulated too much complicated and restricted principles for the protection of international copyright in Thailand, for example the definition of the country of the origin of work, and the conditions regarding the term of the protection of international copyright work and the translation of literary or dramatic work.
Consequently, the Copyright Act B.E. 2537 protects international copyright more obviously than the provisions under the former copyright laws, because the conditions relating to the acquisition of a copyright of any work which a foreign author created in another country, which used to be stipulated in the said Royal decree, are included in Section 8 regarding the acquisition of copyright under Chapter 2 of this Act, as mentioned above. Moreover, in Chapter 5, the International of Copyright by virtue of this Act, Section 61 also provides distinctly the protection of copyrighted works belonging to foreign authors.
Section 61 of the Copyright Act B.E.2537 provides for the protection of international copyright as follows:
1. Any copyrighted work of the author of a contracting state to the convention relating to the protection of copyright to which Thailand is also a contracting state shall be protected by this Act. Therefore, any copyrighted work of an author of any contracting state to the Berne Convention for the Protection of Literary and Artistic Works, such as United State of America, United Kingdom and Japan, shall be protected under the Copyright Act B.E. 2537. (A.D. 1994)
2. Any copyrighted work of an international organization of which Thailand is a member shall be protected by this Act. By this principle, any copyrighted work of an international organization of which Thailand is a member, such as United Nations (UN), World Health Organization(WHO), shall also be protected under the Copyright Act B.E. 2537.
However, Paragraph 2 of Section 61 of the Copyright Act B.E. 2537 stipulates the Minister of Commerce to have an authority to announce the names of the countries which are the contracting states of the Berne Convention in the Government Gazette.

BIBLIOGRAPHY

Bainbridge, David I. Intellectual Property. London : Pitman, 1992.
Dworkin, Gerald and Taylor, Richard D. Blackstone’s Guide to Copyright, Designs and Patents Act 1988. London : Blackstone Press, 1990.
Mana Pittayaporn. The Explanation of the Act for the protection of the Literary andArtistic Works. Bangkok : Ramkhamhaeng University Press, 1965. (in Thai)
Phillips, Jeremy, and Alison Firth. Introduction to Intellectual Property Law. London : Butterworths, 1990.
Surat Numnont. “Copyright.” Humanity Journal Chapter 1 (1962) : 17. (in Thai)
Tawach Rattanapichat. The Protection of Literary and Artistic Works. Bangkok : Department of Fine Arts, 1968. (in Thai)
Ukrit Mongkolnavin. The Explanation of International Law. Bangkok : Faculty of
Law, Chulalongkorn University, 1966. (in Thai)


--------------------------------------------------------------------------


Fair user


What is fair use?
We would all appreciate a clear, crisp answer to that one, but far from clear and crisp, fair use is better described as a shadowy territory whose boundaries are disputed, more so now that it includes cyberspace than ever before. In a way, it's like a no-man's land. Enter at your own risk.

Why is it like this and does it have to be this way? Is there no alternative to the vagueness of the "four factor fair use analysis," to fear of lawsuits and frustration with uncertainty? Maybe it is reasonable to simply throw up our hands and say, "What's the use?" After all, many legal scholars, politicians, copyright owners and users and their lawyers agree that fair use is so hard to understand that it fails to provide effective guidance for the use of others' works today. But the fact is, we really must understand and rely on it.

So wouldn't Guidelines help? Many people who think so recently gathered in Washington to negotiate Guidelines for Educational Uses of Digital Works in a two-year-long Conference on Fair Use ("CONFU"). For many, the Guidelines that emerged satisfied the need for clarity; but for some, considerable objections remained. Some CONFU participants and their constituents complained that the Guidelines were too narrow; others that they were too broad; or unfounded in the law; or too premature; or too long; or unclear; and so on. In the minds of many, the Guidelines asked the right questions, but for some, they provided the wrong answers.

We have reviewed all the Guidelines and have decided to take a different approach to protecting our component institutions and our faculty, staff and students from the dangers of the no-man's land while supporting our exercise of fair use rights. We call our approach "Rules of Thumb" for the Fair Use of Copyrighted Materials. Like the Guidelines from which they are in some cases derived, the Rules of Thumb are tailored to different uses of others' works. But unlike the Guidelines, they are short, concise, and easy to read. And they are part of a larger strategy to meet our needs for permission when fair use is not enough; to reduce our need for permission in the future by licensing comprehensive access to works; and to take a more active role in the management of the copyrighted works created on our campuses for the benefit of our university community.

Copying, modifying, displaying, performing or distributing another's work beyond the suggestions of the Rules of Thumb may still be a fair use, so we'll use the four-factor fair use test to determine that. If you are part of U.T. System, you may confer with the Office of General Counsel or follow our published procedures for making fair use determinations. If the use seems risky or is clearly not a fair use, we'll try to make getting permission as easy as possible.

Please keep in mind that the information presented here is only general information. True legal advice must be provided in the course of an attorney-client relationship specifically with reference to all the facts of a particular situation. Such is not the case here, so this information must not be relied on as a substitute for obtaining legal advice from a licensed attorney.

วันจันทร์ที่ 10 พฤศจิกายน พ.ศ. 2551

Knowledge management

Knowledge management


Knowledge Management (KM) comprises a range of practices used in an organisation to identify, create, represent, distribute and enable adoption of insights and experiences. Such insights and experiences comprise knowledge, either embodied in individuals or embedded in organisational processes or practice. KM has been an established discipline since 1995 with a body of courses in universities to include business administration, information systems, management, and library and information sciences [1]. More recently, other schools, to include those focused on information and media, computer science, public health, and public policy, also have started to contribute. Many large companies and non-profit organisations have resources dedicated to internal KM efforts, often as a part of their 'Business Strategy', 'Information Technology', or 'Human Resource Management' departments [2]. Several consulting companies also exist that provide strategy and advice regarding KM to these organisations.

KM efforts typically focus on organisational objectives such as improved performance, competitive advantage, innovation, developmental processes, the sharing of lessons learned, and continuous improvement of the organisation. KM efforts overlap with Organisational Learning, and may be distinguished from by a greater focus on the management of knowledge as a strategic asset and a focus on encouraging the exchange of knowledge. KM efforts can help individuals and groups to share valuable organisational insights, to reduce redundant work, to avoid 're-inventing the wheel' per se, to reduce training time for new employees, to retain intellectual capital as employees turnover in an organisation, and to adapt to changing environments and markets [3] [4].




History and research

KM efforts have a long history, to include on-the-job discussions, formal apprenticeship, discussion forums, corporate libraries, professional training and mentoring programs. More recently, with computers becoming more widespread in the second half of the 20th century, specific adaptations of technologies such as knowledge bases, expert systems, knowledge repositories, group decision support systems, and computer supported cooperative work have been introduced to further enhance the process [5][6].

There is a broad range of thoughts on the KM discipline with no unanimous agreement; approaches vary by author and school. As the discipline is maturing, academic debates have increased regarding both the theory and practice of KM, to include the following perspectives:

Techno-centric with a focus on technology, ideally those that enhance knowledge sharing and creation.
Organisational with a focus on how an organisation can be designed to facilitate knowledge processes; which organisations work best with what processes?
Ecological with a focus on the interaction of people, identity, knowledge, and environmental factors as a complex adaptive system akin to a natural ecosystem.
Regardless of the school of thought, core components of KM include People, Processes, Technology (or) Culture, Structure, Technology, depending on the specific perspective [7]. Different KM schools of thought include various lenses through which KM can be viewed and explained, to include:

community of practice [8] [9]
social network analysis [10] [11]
intellectual capital [12] [13]
information theory [14] [15]
complexity science [16] [17]
constructivism [18] [19]

form http://en.wikipedia.org/wiki/Knowledge_management

วันอาทิตย์ที่ 9 พฤศจิกายน พ.ศ. 2551

about infomation systems

Information systems


The term information system (IS) sometimes refers to a system of persons, data records and activities that process the data and information in an organization, and it includes the organization's manual and automated processes. Computer-based information systems are the field of study for information technology, elements of which are sometimes called an "information system" as well, a usage some consider to be incorrect.



Overview
The term "information system" has different meanings:

In computer security, an information system is described by three objects (Aceituno, 2004):
Structure:
Repositories, which hold data permanently or temporarily, such as buffers, RAM, hard disks, cache, etc.
Interfaces, which exchange information with the non-digital world, such as keyboards, speakers, scanners, printers, etc.
Channels, which connect repositories, such as buses, cables, wireless links, etc. A Network is a set of logical or physical channels.
Behavior:
Services, which provide value to users or to other services via messages interchange.
Messages, which carries a meaning to users or services.
In geography and cartography, a geographic information system (GIS) is used to integrate, store, edit, analyze, share, and display georeferenced information. There are many applications of GIS, ranging from ecology and geology, to the social sciences.
In knowledge representation, an information system consists of three components: human, technology, organization. In this view, information is defined in terms of the three levels of semiotics. Data which can be automatically processed by the application system corresponds to the syntax-level. In the context of an individual who interprets the data they become information, which correspond to the semantic-level. Information becomes knowledge when an individual knows (understands) and evaluates the information (e.g., for a specific task). This corresponds to the pragmatic-level.
In mathematics in the area of domain theory, a Scott information system (after its inventor Dana Scott) is a mathematical 'structure' that provides an alternative representation of Scott domains and, as a special case, algebraic lattices.
In mathematics rough set theory, an information system is an attribute-value system.
In sociology information systems are also social systems whose behavior is heavily influenced by the goals, values and beliefs of individuals and groups, as well as the performance of the technology.[1]
In systems theory, an information system is a system, automated or manual, that comprises people, machines, and/or methods organized to collect, process, transmit, and disseminate data that represent user information.
In telecommunications, an information system is any telecommunications and/or computer related equipment or interconnected system or subsystems of equipment that is used in the acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of voice and/or data, and includes software, firmware, and hardware.[2]
In organisational informatics an information system is a system of communication between people. Information systems are systems involved in the gathering, processing, distribution and use of information and as such support human activity systems [3].
The most common[citation needed]. view of an information system is one of Input-Process-Output.

[edit] History of information systems
The study of information systems originated as a sub-discipline of computer science in an attempt to understand and rationalize the management of technology within organizations. It has matured into a major field of management, that is increasingly being emphasized as an important area of research in management studies, and is taught at all major universities and business schools in the world. Börje Langefors introduced the concept of "Information Systems" at the third International Conference on Information Processing and Computer Science in New York in 1965. [4]

Information technology is a very important malleable resource available to executives.[5] Many companies have created a position of Chief Information Officer (CIO) that sits on the executive board with the Chief Executive Officer (CEO), Chief Financial Officer (CFO), Chief Operating Officer (COO) and Chief Technical Officer (CTO).The CTO may also serve as CIO, and vice versa.


[edit] Applications of information systems
Information systems deal with the development, use and management of an organization's IT infrastructure.

In the post-industrial information age, the focus of companies has shifted from being product-oriented to knowledge-oriented in the sense that market operators today compete in process and innovation rather than in products: the emphasis has shifted from the quality and quantity of production to the production process itself--and the services that accompany the production process.

The biggest asset of companies today is their information--represented by people, experience, know-how, innovations (patents, copyrights, trade secrets)--and for a market operator to be able to compete, he or she must have a strong information infrastructure, at the heart of which lies the information technology infrastructure. Thus the study of information systems focuses on why and how technology can be put into best use to serve the information flow within an organization.


[edit] Areas of work
Information Systems has a number of different areas of work:

Information Systems Strategy
Information Systems Management
Information Systems Development
Each of which branches out into a number of sub disciplines, that overlap with other science and managerial disciplines such as computer science, pure and engineering sciences, social and behavioral sciences, and business management.

There are a wide variety of career paths in the information systems discipline. "Workers with specialized technical knowledge and strong communications skills will have the best prospects. People with management skills and an understanding of business practices and principles will have excellent opportunities, as companies are increasingly looking to technology to drive their revenue." [6]


[edit] Information technology development
The IT Department partly governs the information technology development, use, application and influence on a business or corporation. A computer based information system, following a definition of Langefors[7], is:

a technologically implemented medium for recording, storing, and disseminating linguistic expressions,
as well as for drawing conclusions from such expressions.
which can be formulated as a generalized information systems design mathematical program.

วันจันทร์ที่ 27 ตุลาคม พ.ศ. 2551

Evaluation

Evaluation is systematic determination of merit, worth, and significance of something or someone using criteria against a set of standards. Evaluation often is used to characterize and appraise subjects of interest in a wide range of human enterprises, including the arts, criminal justice, foundations and non-profit organizations, government, health care, and other human services.

Evaluation standards and meta-evaluation
Depending on the topic of interest, there are professional groups which look to the quality and rigor of the evaluation process. One guiding principle within the U.S. evaluation community, energetically supported by Michael Quinn-Patton has been that evaluations be useful.

Furthermore, the international organizations such as the I.M.F. and the World Bank have independent evaluation functions. The various funds, programmes, and agencies of the United Nations has a mix of independent, semi-independent and self-evaluation functions, which have organized themselves as a system-wide UN Evaluation Group (UNEG)[1], that works together to strengthen the function, and to establish UN norms and standards for evaluation. There is also an evaluation group within the OECD-DAC, which endeavors to improve development evaluation standards. [2]

The Joint Committee on Standards for Educational Evaluation [3] has developed standards for educational programmes, personnel, and student evaluation. The Joint Committee standards are broken into four sections: Utility, Feasibility, Propriety, and Accuracy. Various European institutions have also prepared their own standards, more or less related to those produced by the Joint Committee. They provide guidelines about basing value judgments on systematic inquiry, evaluator competence and integrity, respect for people, and regard for the general and public welfare.

The American Evaluation Association has created a set of Guiding Principles [4] for evaluators. The order of these principles does not imply priority among them; priority will vary by situation and evaluator role. The principles run as follows:

Systematic Inquiry: Evaluators conduct systematic, data-based inquiries about whatever is being evaluated.
Competence: Evaluators provide competent performance to stakeholders.
Integrity / Honesty: Evaluators ensure the honesty and integrity of the entire evaluation process.
Respect for People: Evaluators respect the security, dignity and self-worth of the respondents, program participants, clients, and other stakeholders with whom they interact.
Responsibilities for General and Public Welfare: Evaluators articulate and take into account the diversity of interests and values that may be related to the general and public welfare


Evaluation approaches
Main article: Evaluation approaches
Evaluation approaches are conceptually distinct ways of thinking about, designing and conducting evaluation efforts. Many of the evaluation approaches in use today make truly unique contributions to solving important problems, while others refine existing approaches in some way.


[edit] Classification of approaches
Two classifications of evaluation approaches by House [5] and Stufflebeam & Webster [6] can be combined into a manageable number of approaches in terms of their unique and important underlying principles.

House considers all major evaluation approaches to be based on a common ideology, liberal democracy. Important principles of this ideology include freedom of choice, the uniqueness of the individual, and empirical inquiry grounded in objectivity. He also contends they are all based on subjectivist ethics, in which ethical conduct is based on the subjective or intuitive experience of an individual or group. One form of subjectivist ethics is utilitarian, in which “the good” is determined by what maximizes some single, explicit interpretation of happiness for society as a whole. Another form of subjectivist ethics is intuitionist / pluralist, in which no single interpretation of “the good” is assumed and these interpretations need not be explicitly stated nor justified.

These ethical positions have corresponding epistemologies—philosophies of obtaining knowledge. The objectivist epistemology is associated with the utilitarian ethic. In general, it is used to acquire knowledge capable of external verification (intersubjective agreement) through publicly inspectable methods and data. The subjectivist epistemology is associated with the intuitionist/pluralist ethic. It is used to acquire new knowledge based on existing personal knowledge and experiences that are (explicit) or are not (tacit) available for public inspection.

House further divides each epistemological approach by two main political perspectives. Approaches can take an elite perspective, focusing on the interests of managers and professionals. They also can take a mass perspective, focusing on consumers and participatory approaches.

Stufflebeam and Webster place approaches into one of three groups according to their orientation toward the role of values, an ethical consideration. The political orientation promotes a positive or negative view of an object regardless of what its value actually might be. They call this pseudo-evaluation. The questions orientation includes approaches that might or might not provide answers specifically related to the value of an object. They call this quasi-evaluation. The values orientation includes approaches primarily intended to determine the value of some object. They call this true evaluation.

When the above concepts are considered simultaneously, fifteen evaluation approaches can be identified in terms of epistemology, major perspective (from House), and orientation (from Stufflebeam & Webster). Two pseudo-evaluation approaches, politically controlled and public relations studies, are represented. They are based on an objectivist epistemology from an elite perspective. Six quasi-evaluation approaches use an objectivist epistemology. Five of them—experimental research, management information systems, testing programs, objectives-based studies, and content analysis—take an elite perspective. Accountability takes a mass perspective. Seven true evaluation approaches are included. Two approaches, decision-oriented and policy studies, are based on an objectivist epistemology from an elite perspective. Consumer-oriented studies are based on an objectivist epistemology from a mass perspective. Two approaches—accreditation/certification and connoisseur studies—are based on a subjectivist epistemology from an elite perspective. Finally, adversary and client-centered studies are based on a subjectivist epistemology from a mass perspective.







from http://en.wikipedia.org/wiki/Evaluation

search engine and information literacy

How Web search engines work

A search engine operates, in the following order

Web crawling
Indexing
Searching
Web search engines work by storing information about many web pages, which they retrieve from the WWW itself. These pages are retrieved by a Web crawler (sometimes also known as a spider) — an automated Web browser which follows every link it sees. Exclusions can be made by the use of robots.txt. The contents of each page are then analyzed to determine how it should be indexed (for example, words are extracted from the titles, headings, or special fields called meta tags). Data about web pages are stored in an index database for use in later queries. Some search engines, such as Google, store all or part of the source page (referred to as a cache) as well as information about the web pages, whereas others, such as AltaVista, store every word of every page they find. This cached page always holds the actual search text since it is the one that was actually indexed, so it can be very useful when the content of the current page has been updated and the search terms are no longer in it. This problem might be considered to be a mild form of linkrot, and Google's handling of it increases usability by satisfying user expectations that the search terms will be on the returned webpage. This satisfies the principle of least astonishment since the user normally expects the search terms to be on the returned pages. Increased search relevance makes these cached pages very useful, even beyond the fact that they may contain data that may no longer be available elsewhere.

When a user enters a query into a search engine (typically by using key words), the engine examines its index and provides a listing of best-matching web pages according to its criteria, usually with a short summary containing the document's title and sometimes parts of the text. Most search engines support the use of the boolean operators AND, OR and NOT to further specify the search query. Some search engines provide an advanced feature called proximity search which allows users to define the distance between keywords.

The usefulness of a search engine depends on the relevance of the result set it gives back. While there may be millions of webpages that include a particular word or phrase, some pages may be more relevant, popular, or authoritative than others. Most search engines employ methods to rank the results to provide the "best" results first. How a search engine decides which pages are the best matches, and what order the results should be shown in, varies widely from one engine to another. The methods also change over time as Internet usage changes and new techniques evolve.

Most Web search engines are commercial ventures supported by advertising revenue and, as a result, some employ the practice of allowing advertisers to pay money to have their listings ranked higher in search results. Those search engines which do not accept money for their search engine results make money by running search related ads alongside the regular search engine results. The search engines make money every time someone clicks on one of these ads.

Revenue in the web search portals industry is projected to grow in 2008 by 13.4 percent, with broadband connections expected to rise by 15.1 percent. Between 2008 and 2012, industry revenue is projected to rise by 56 percent as Internet penetration still has some way to go to reach full saturation in American households. Furthermore, broadband services are projected to account for an ever increasing share of domestic Internet users, rising to 118.7 million by 2012, with an increasing share accounted for by fiber-optic and high speed cable lines.[8]





Information literacy


Several conceptions and definitions of information literacy have become prevalent. For example, one conception defines information literacy in terms of a set of competencies that an informed citizen of an information society ought to possess to participate intelligently and actively in that society (from [1]).

The American Library Association's (ALA) Presidential Committee on Information Literacy, Final Report states that, "To be information literate, a person must be able to recognize when information is needed and have the ability to locate, evaluate, and use effectively the needed information" (1989).

Jeremy Shapiro & Shelley Hughes (1996) define information literacy as "A new liberal art that extends from knowing how to use computers and access information to critical reflection on the nature of information itself its technical infrastructure and its social, cultural, and philosophical context and impact." (from [2])

Information literacy is becoming a more important part of K-12 education. It is also a vital part of university-level education (Association of College Research Libraries, 2007). In our information-centric world, students must develop skills early on so they are prepared for post-secondary opportunities whether that be the workplace or in pursuit of education.

History of the concept
A seminal event in the development of the concept of information literacy was the establishment of the American Library Association's Presidential Committee on Information Literacy whose final report outlined the importance of the concept. The concept of information literacy built upon and expanded the decades-long efforts of librarians to help their users learn about and how to utilize research tools (e.g., periodical indexes) and materials in their own libraries. Librarians wanted users to be able to transfer and apply this knowledge to new environments and to research tools that were new to them. Information literacy expands this effort beyond libraries and librarians, and focuses on the learner, rather than the teacher (Grassian, 2004; Grassian and Kaplowitz, 2001, pp.14-20).

Other important events include:

1974: The related term ‘Information Skills’ was first introduced in 1974 by Zurkowski to refer to people who are able to solve their information problems by using relevant information sources and applying relevant technology (Zurkowski, 1974).
1983: A Nation at Risk: The Imperative for Education Reform
shows that we are "raising a new generation of Americans that is scientifically and technologically illiterate."
1986: Educating Students to Think: The Role of the School Library Media Program
outlines the roles of the library and the information resources in K-12 education
1987: Information Skills for an Information Society: A Review of Research
includes library skills and computer skills in the definition of information literacy
1988: Information Power: Guidelines for School Library Media Programs
1989: National Forum on Information Literacy (NFIL), a coalition of more than 90 national and international organizations, has its first meeting
1998: Information Power: Building Partnerships for Learning

วันจันทร์ที่ 6 ตุลาคม พ.ศ. 2551

history of internet


Prior to the widespread internetworking that led to the Internet, most communication networks were limited by their nature to only allow communications between the stations on the network, and the prevalent computer networking method was based on the central mainframe method. In the 1960s, computer researchers, Levi C. Finch and Robert W. Taylor pioneered calls for a joined-up global network to address interoperability problems. Concurrently, several research programs began to research principles of networking between separate physical networks, and this led to the development of Packet switching. These included Donald Davies (NPL), Paul Baran (RAND Corporation), and Leonard Kleinrock's MIT and UCLA research programs.

This led to the development of several packet switched networking solutions in the late 1960s and 1970s, including ARPANET and X.25. Additionally, public access and hobbyist networking systems grew in popularity, including UUCP and FidoNet. They were however still disjointed separate networks, served only by limited gateways between networks. This led to the application of packet switching to develop a protocol for inter-networking, where multiple different networks could be joined together into a super-framework of networks. By defining a simple common network system, the Internet protocol suite, the concept of the network could be separated from its physical implementation. This spread of inter-network began to form into the idea of a global inter-network that would be called 'The Internet', and this began to quickly spread as existing networks were converted to become compatible with this. This spread quickly across the advanced telecommunication networks of the western world, and then began to penetrate into the rest of the world as it became the de-facto international standard and global network. However, the disparity of growth led to a digital divide that is still a concern today.

Following commercialisation and introduction of privately run Internet Service Providers in the 1980s, and its expansion into popular use in the 1990s, the Internet has had a drastic impact on culture and commerce. This includes the rise of near instant communication by e-mail, text based discussion forums, the World Wide Web. Investor speculation in new markets provided by these innovations would also lead to the inflation and collapse of the Dot-com bubble, a major market collapse. But despite this, Internet continues to grow.


Before the Internet
In the 1950s and early 1960s, prior to the widespread inter-networking that led to the Internet, most communication networks were limited by their nature to only allow communications between the stations on the network. Some networks had gateways or bridges between them, but these bridges were often limited or built specifically for a single use. One prevalent computer networking method was based on the central mainframe method, simply allowing its terminals to be connected via long leased lines. This method was used in the 1950s by Project RAND to support researchers such as Herbert Simon, in Pittsburgh, Pennsylvania, when collaborating across the continent with researchers in Sullivan, Illinois, on automated theorem proving and artificial intelligence.

วันจันทร์ที่ 29 กันยายน พ.ศ. 2551

Hamster


What is the hamster like?
H amsters are nocturnal rodents, A hamster in captivity is still distinguished by its greater inclination towards activity by night rather than by day. Hence is the hamster handled somewhat reluctantly during the day, as its biological clock recommends sleep at that time of the day, which may lead to a certain grumpyness and a bite or two in case of incautious managing of the animal. Hamsters are indeed antisocial animals and they must be kept singly in order to avoid fights with deadly or injurious outcome. The only occasion at which hamsters may be brought together is in connection to mating, in which overview and readiness to intervention is still required. The rule is then to put the female in the territory of the male hamster. Hamsters are prone to escape and they are very elusive as runaways. Complications such as these are most likely to happen by night. Before the day the hamster then lies down to sleep at some sheltered nook. An important matter as to the hamsters facilities to escape its captivity is its rodent nature. All plastic cages must be kept devoid of weak spots.



* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *

Food
T he basic fodder should be lean seeds (not oats), rich in carbonhydrates, with the addition of fresh plant stuff such as vegetables or fruit. Avoid sour fruits and lettuce. Neutral additions of powdered vitamins and minerals may be strewn over the food in recommended amounts. Make sure that the fodder is adapted to the hamster in a sense of size, even though the hamster is a rodent. Concerning the teeth of the hamster single measures should be taken, so that the animal gets a supply of chewy pieces, either usual, unprepared wood, or chewing biscuits or stones specially made and sold in stores for that purpose. The hamster must have a supply of fresh water. Choose a water bottle designed for hamsters. Make sure that the animal learns to drink from the bottle, in case this doesnดt happen by its own initiative you must help it by carefully feeding it with the lip, so that it learns the connection. Without the supply of fresh water the hamster may suffer from constipation. Be consistent in the diet and avoid fast changes. The hamster is not to be fed with sweets, especially not chocolate. Calcium shortage may be prevented by making sure that the animal has access to a mineral stone.



* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * *

Diseases of the hamster
T he hamster may be stricken by colds, also by such kinds that otherwise hits humans. For that reason you should be careful about your own hygiene if you in case of cold should have to manage the hamster. If the hamster sneezes and its nose or eyes runs, the cage should be cleaned immediately. Polish the cage extra carefully (not cotton) and place it where it is varm and free from draught. In case the hamster doesnดt recover after a few days, a veterinarian should be contacted. A typical hamster disease is what in English is called “wet tail” with diarrhoea and apathy. This disease may, if nothing is done, lead to the death. The preparation “dry tail”, which is intended to repeal this condition, is sold in hamster shops. The hamster must receive additional liquid to compensate for the loss of liquid caused by the diarrhoea, as well. “Wet tail” could very likely break out because of sudden changes in environment and handling. Young hamsters should not be subject to an excess of sudden managing. Hamsters are sensitive to falling and may never be dropped by an upright standing person.