• Nem Talált Eredményt

sztaki kopi

N/A
N/A
Protected

Academic year: 2022

Ossza meg "sztaki kopi"

Copied!
1
0
0

Teljes szövegt

(1)

It makes copying more difficult and complicated Protection level can be adjusted (against copying or printing

etc.) If it is a proprietary work, the copyright holders get more

income Most copy protection mechanisms can be easily circumvented (Ready-made tools available on the Internet) Some are harder to break, but the official use is also made too

complex If once broken, the document is unprotected In some cases legal users also have to circumvent it or have to

ask for removal of the protection (e.g. blind people) People using special tools (mobile phones, screen readers)

cannot access them Web crawlers cannot index a lot of the protected documents

Copy Protection KOPI Protection

Does not protect against making a copy of the document People have to use it to discover copy violation

A couple of larger plagiarism search systems have to be used to be really effective

Documents can be freely distributed

Can be used together with any other protection mechanism Protects also parts of the document

Any type of copy (digitized or paper) is protected Can tell the source of the work plagiarized

Exposes plagiarists when submitting others’ work as their own Cannot be automatically circumvented

Versus

Máté Pataki

Mate.Pataki@sztaki.hu

László Kovács

Laszlo.Kovacs@sztaki.hu

http://kopi.sztaki.hu/

sztaki kopi

M T A S Z T A K I , H u n g a r i a n A c a d e m y o f S c i e n c e s , C o m p u t e r a n d A u t o m a t i o n R e s e a r c h I n s t i t u t e D e p a r t m e n t o f D i s t r i b u t e d S y s t e m s A d d r e s s : H - 1 1 1 1 B u d a p e s t , H u n g a r y , L a g y m a n y o s i u . 1 1 . P h o n e : + 3 6 1 2 7 9 - 6 2 6 9 , F a x : + 3 6 1 2 7 9 - 6 2 0 0 W e b : h t t p : / / d s d . s z t a k i . h u

SERVER INTER-

OPERABILITY

OTHER SERVERSKOPI

DOCUMENT METADATA (DC FORMAT)

DOCUMENT REPOSITORY PORTAL

DB

MESSAGE HANDLER

SET/GET METADATA

CONVERT CHUNKED VIEW

DOCUMENT SEARCH

SIMILAR SEARCH FINISHED/

STARTED

PORTAL ENGINE - FORUM - FAQ - HELP

- USER MGM.

PLAGIARISM SEARCH

ENGINE

DOCUMENT CONVERTER

UPLOAD DOCUMENT

DOCUMENT UPLOAD AND MANAGEMENT

Architecture of the KOPI System

Public accessibility of digital libraries (DLs) highly depends on the characteristics of the works the respective DL contains.

Recent works, publications and theses are rarely accessible for the wide public, or in case they are, they use some kind of copy protection (like protected PDF files, Java Applets or even proprietary client applications) to avoid plagiarism. However, preventing unauthorized copying and, at the same time, ensuring that authorized people can easily access them is very difficult. With ready-made tools available on the Internet free of charge, most copy protection mechanisms can be easily circumvented. Other mechanisms are harder to break, while the official use is also made too complex, in many cases users have to install special programs or tools, which may not work in all systems or which may take too long to get through and would discourage people to further attempt access. Also, other users may face access difficulties when using special tools, such as mobile phones or home page readers.

The KOPI Plagiarism Search System developed by the Distributed Systems Department of the MTA SZTAKI proposes an interim solution to protect DLs against plagiarism. Here the protection is twofold: Firstly, if a work is copied, the system can tell whom it was copied from. Secondly, ubiquitous access, the widespread use and wide familiarity of the system can prevent people from presenting others` work as their respective work, as nobody would risk being exposed to be a plagiarist.

The academic society can have the greatest advantage of the system, as information (theses, papers etc.) could be freely circulated among students and professors without worrying about mass plagiarism. This way students may build on the knowledge and achievements of the others, may use appropriate references and would most probably make better achievements in their work. If digital libraries at the universities also comprise the theses and other works of the students freely available to the public, then companies and enterprises might search for future employees there as they could have an insight into the theses in their area of interest and could make a “pre-selection” based on the profile and the quality of the work.

Future Work

During the last 4 years, we gathered a lot of useful information from our own experience and from the feedback and comments of our users regarding the system and the way to make it more effective. Based on these, we would like to implement an external interface for automatic document upload and plagiarism search (e.g. SOAP), as this way KOPI could be easily integrated to existing systems. Also, some universities would require a system which can be operated by themselves, and so they could upload also sensitive data into it. KOPI would be installed at different institutions, yet, the systems would be able to initiate searches in one an other’s database without giving access to their documents. The implementation of the distributed plagiarism search system would be the next step to encourage a widespread use of the KOPI System at Hungarian universities.

Hivatkozások

KAPCSOLÓDÓ DOKUMENTUMOK

the proof is to adapt the proof of the Gaus- sian counterpart to this case and to exploit that if we have a subclass of F with not too large cardinality which is dense also in the L

My thanks are also due to many authors and publishers who have permitted the reproduction of their illustrations, and individual acknowledgment is made to them at the

We found two SNe, 2005ad and 2005af, which likely have newly formed dust in their environment, while in the other seven cases the observed MIR flux may originate from

We found two SNe, 2005ad and 2005af, which likely have newly-formed dust in their environment, while in the other seven cases the observed MIR flux may originate from

In addition, the Directive enumerates several cases when its provisions are not applicable, such as (i) in cases where special rules apply which derive from international

One has to take into consideration the complex approach in which the other elements of the ecosystem are also included: people, government, economy, environment,

Thus, the contemporary challenges claiming legal responses are also special challenges to the constitutional systems of the various countries in which constitutional and other

Colour revolutions are symptoms of decay, since in many cases all they achieved was the coming to power of a new but not necessarily better elite; they are also hellfire, because