Unidad 2

domingo, 3 de abril de 2016

ACTIVITY 3

ACTIVITY 3

3.1 Final version of the essay


Group 9

Team Members: Sirley Pérez
Jesus Andrade
Ronny Pérez
Juan Gómez


3.1.2 Introduction
Based on our business idea (developed in the Guide 1 Communication skills and autonomous learning) to establish a translation agency, we focus on "the challenges of translation companies and information security". It is essential to protect the confidentiality of documents handled by the translation agency so that customers feel that they have a reliable partner and unauthorized disclosures cannot occur. 
Companies looking for translation services tend to listen to the recommendations from others. That’s why we must ensure the confidentiality and privacy with all our customers to strengthen business relationships and to build a growing customer base, who will also recommend us for new potential customers.  
We plan not to count only on reliable and highly qualified personnel, but also on technological tools to provide us the required information security protection valued by the customers. 
The information security is an essential element in today's business world as technology advancements facilitate access to contents in networks, where information is not always automatically protected. Companies need to ensure that the information is treated as confidential to prevent unauthorized disclosures by using security tools. 

 3.1.3 Development  
One of the main pillars of a contractual relationship with a client is the protection of confidentiality and intellectual property. In the daily management of translations, you have access to countless documents. You have private information from companies to be translated. 
According to Brown (2016): "The translators should have documented evidence that they can fulfill at least one of the following criteria: experience in the translation of an institution of higher education; recognized in any other field of higher education institution, plus two years of professional full-time experience in translation, five years of full-time professional experience in translation, and a certificate of competency in the translation degree from a corresponding government agency. The last requirement is new and it refers to an important ability to understand and manage content produced in the source language. However, the law fails to require proof of experience in the field. '' 
Based on Brown (2016), many companies do not meet these requirements and this is the picture we got as well. Many companies claim to provide services in several languages and are intermediaries and not simply translators. Others say they are certified by ISO, but it is often not true. Many say they are specialized in translating various languages and specialize in all translations and such claims often seem not be true. Some say they have undergone several quality controls, and this may also be false, as often only big companies have the financial capacity to pay for such quality controls and some others can try to save time by using information technology and translation software CAT (computer-aided translation) and this can be a big problem as words and phrases are translated technically literally, but the message is altered, while the privacy of the document is also uploaded to external databases and their security cannot often be trusted. 
Although the interconnected world poses challenges like these, the following recommendations can be presented to avoid the problems. 
A legal measure that should be taken, before a contractual relationship with a client, is the signing of a confidentiality agreement. Confidentiality agreement is an agreement between two parties, which are committed to keep confidential certain information to be supplied in the course of a business relationship (Blog Global Negotiator, 2014). This contract protects the client legally against any unauthorized use or disclosure of the information and content delivered to the translation agency. 
There are also various methods for encrypting electronic documents to provide additional protection in the transmission of information. You can have a backup of the information for both parties. Responsible use of the Internet and having reliable staff who handle the confidential information with good care are part of the protection of information. 
According to Safar (2016), when Ccnsidering that the information security has not only to do with the confidentiality of information, but also to not change the ideas in clients’ texts, i.e. not alter the information in any way, we can say that to meet all mentioned requirements a company should meet the ISO 17100 standards and preferably to be able to verify it; however, the rule has limitations, since according Brown (2016), ''in general, these qualification requirements are potentially an area of lost opportunity to embrace new trends and developments in the industry. '' 
This leads us to an idea that the field of translations has more challenges to face than security of the information and that our translation company not only has to meet ISO standards, but go a steps ahead in qualifications and diversity to meet all the expectations that today's world puts in the minds of entrepreneurs who want to be at the forefront of development. If we accomplish this, it would be a big step towards success, not only of our company but also that of our clients. 

3.1.4 Conclusion
Our working relationships with customers, mostly companies, will be based on respect of confidential information and protection of all content, which the translation agency has an access to. It is essential to use all legal measures available to ensure such confidentiality. Companies must feel that their information will be treated with the strictest confidence and privacy, since the development of their business activities can depend of it (cf. Schneier, 2016)
The use of technological tools helps us create a secure environment through the use of technological protections for electronic files, which will ensure that information is protected and confidentiality is guaranteed to prevent unauthorized disclosure. 
You have trained staff, who is multiculturally aware of the reality of today's world. Good staff helps us achieve our goals so that in the course of our business relationships with our customers, we can guarantee that their information and documents will not only be protected but also translated according to the highest standards to create confidence in customers and achieve a status, which is communicated around customers by recommendations of our services. 
We must comply with confidentiality laws on electronic media. We will work mostly with electronic documents and it is vital that customer information is handled confidentially. Companies are going to trust sensitive documents and their protection will be quranreed. We must create a safe environment in our computer systems to prevent unauthorized access to our files. In this way, companies and individuals who request our services will have the confidence that their information will be handled with the strictest confidence and they will return to us also with the next translation needs. 

Brown, A. (2016). Beware of Translation Agencies - How to Identify? (With image, tweet) Sheribrown. [Online] Available at: https://storify.com/sheribrown/beware-of-translation-agencies-how-to-identify [Accessed 1 Mar. 2016].
Blog Global Negotiator (2014). What is a confidentiality agreement? - Model. [Online] Available at: http://www.globalnegotiator.com/blog/que-es-un-contrato-de-confidencialidad/ [Accessed 3 Mar. 2016].
Resources, N. and Translation, T. (2016). The Unseen Security and Compliance Risks of free online translation. [Online] TodayTranslations.com. Available in: https://www.todaytranslations.com/news/unseen-security-compliance-risks-of-free-online-translation [Accessed 27 Feb. 2016].
Safar, L. (2016). ISO 17100 10 Questions about the New Translation Services Standard, Answered. [Online] Info.moravia.com. Available in: http://info.moravia.com/blog/bid/353203/ISO-17100-10-Questions-about-the-New-Translation-Services-Standard-Answered [Accessed 1 Mar. 2016].
Schneier.com (2016). Essays: The Eternal Value of Privacy - Schneier on Security. https://www.schneier.com/essays/archives/2006/05/the_eternal_value_of.html [Accessed 27 Feb. 2016].

BIBLIOGRAPHY


Lyberger, J Sterns, P, Fugleberg, N (2016) PLAGIARISM, COPYRIGHT     INFRINGEMENT, AND INTELLECTUAL PROPERTY."Presentation "." N.p., n.d. Web. 23 Mar. 2016.        
 Sciencedirect.com. (2016). Understanding “Internet plagiarism”. [Online] Available    at: http://www.sciencedirect.com/science/article/pii/S8755461506000831 [Accessed 21 Mar. 2016].
IMPLICATION ETICAS DEL PLAGIO ACADEMICO "PAMABRIT N.p., 04 Sept. 2013. Web. 21Mar.2016 https://pamabrit.wordpress.com/2013/09/05/implicaciones-eticas-del-plagio-academico/
Cómo Citar Una Referencia Que Incluye a Otra Cita Dentro Del Texto Con Normas APA?" Normas APA. N.p., 04 Nov. 2014. Web. 22 Mar. 2016.




ACTIVITY 1

ACTIVITY 1

1. 1 Evidence of his/her visit to the databases of the university and the internet search

Illustration 1 - Databases



Illustration 2 – Search of publications


Illustration 2 – Search of publications


Ilustration 4 -Downloading e-publication



1.2 Annotated Bibliography and critical reflection of their findings

Illustration 5 – Selected bibliagraphical reference



The moral right of the author

If the author later decides to resume exploitation shall offer the corresponding rights the previous owner thereof and on terms reasonably similar to the original conditions. " 
Critical reflection 
Intellectual property is the right of every person who has created something to be the only recipient of benefits and that all moral rights to his work are taken into account.  Based on the information from the internet I understood well the concept of intellectual property and the implications of plagiarism. Using the Virtual Library I focus more on studying the ethical implications of plagiarism.  I found the book particularly important because it views moral rights from different perspectives and also goes deeper on the issues. 

1.3 Concept map about copyright, intellectual property and plagiarism

Illustration 6 – Conceptual map of intellectual property








1.4 A written text with the ethical implications of plagiarism


Ethical implications of plagiarism

The definition of plagiarism according to Webster's Dictionary is an "act of using another person's words or ideas without giving credit to the author." 
As cited in (Trujillo, 2013) , some ethical implications of plagiarism with various edges include, for example, the following. Teachers can falsely believe that a student is doing well when it may be the opposite. It becomes difficult to reach a real educational cognitive assessment. People who do violate the original writer's legal and economic rights and damage the creative process and their own personal growth. These actions violate the professional conduct shared among authors, writers, and others in the literal community. This can also diminish and trivialize the many hours and time devoted to research given to specific work or idea. Finally, ethical implications and or consequences of plagiarism minimize the worth and value placed on original work. This ultimately will create a climate of mistrusts and suspicion on the motives of those who would illegally use published and or copy written materials as theirs own.


ACTIVITY 1

ACTIVITY 2

ACTIVITY 2

2.1 Diagnostic survey of the state of development of oral skills and improvements plan ‘individually

Illustration 7 – Diagnostic survey





TABLE  1 – Improvement plan
Problem
Strategy
I am very rarely aware of the audience listening to my speech or presentation. I've only have had some general preconceived ideas about, e.g., the age, sex, ideology or culture of the public.  

I should investigate the location and the public better to be able to modify my talk and messages according to audiences. 
I have almost never prepared my vocalization techniques or when I have, I've done it very briefly 
The book of Sierra and Vanegas (2006) teaches how to develop the discourse and I plan to practice some of the techniques and use them more often. 



My nervousness is sometimes seen in my body language. 
I should study the topic of my talk thoroughly and try to figure out the possible questions from audience beforehand. 
I’m going to watch some tutorial on the subject. I’m going to record or practice in front of a friend and ask for feedback.  

I have rarely used technological tools such as Power Point slides among others for giving more clarity to my presentations. 

I can work with what I know; in this case it would be to use a board for writing and graphics. As a general objective, I'm going to investigate the technological tools in order to be able to present a subject in a conference more easily. For example, I will go through some Microsoft material such as: https://support.office.com/en-us/article/PowerPoint-2013-videos-and-tutorials-bd93efc0-3582-49d1-b952-3871cde07d8a  


2.2 Esquematic representation of the procedure to follow of the different techniques in speaking group

Illustration 8- Oral expression techniques




2.3 Evidence of sending the message with the group and topic to present at the final ‘meeting ‘in group 

 Prepare a document where you explain how did you and your group worked collaborative to develop this activity. Consider the format presented in guide 2.


How did we worked collaborative to develop this activity

 We use the available tools to exchange our ideas, such as Skype, email, Whatsapp, Powtoon.com and CmapTools. Our process is mainly based on the exchange of information through the media, We developed the technique of oral expression: the Conference.
In our collaborative work, we have learned to use tools that help us form our learning in a more appropriate and participatory way in order to share our knowledge to the indicatedactivities.
Each member of the group provided their own versions of the activities, and then we have  combined them to create the final product. We use the available resources to make our searches and gain understanding of the subject. We met each other to reach a consensus and express our views throughout the process, before  the final version presented in this guide.
Illustration 9 - Sending messages


Link to see the video presentation Speaking Technical Conference.

2.4 Document with the way to do collaborative group work

TABLE  2 - Learning goals for the group
Set learning goals
Planning
Monitoring
Assessment
Plans
- Development of activities 2 and 3 of the guide.
- Development of collaborative work among group members.
- Using web tools to create a scheme of representation on the techniques of oral expressions.
- Creating a video to introduce our   research.


How is task being performed? If necessary, establish improvement strategies.

- Using web tools to develop activities.
- Constant exchange of information among team members.
- We individually researched each topic and then we integrated everything to create the final product.

Did you get the expected results? Weight the results from 1 to 10.


We want to evaluate the experience of this development activity with a 10 as there was a constant flow of information between us that allowed us to reach a consensus and great results.

2.5 Reflexion and self-regulation

TABLE  3 – Learning goals for myself
Set learning goals
Planning
Monitoring
Assesment
How is task being performed? If necessary, establish improvement strategies.
1. Read the full guide.
2.  Read the instructions of each item to find the target.
3. Start researching each topic. Take note of the author’s bibliographies.
4. Develop the guide for topics.  Do it point-by-point through the prior knowledge and the information found.
5. See tutorials to learn more about APA rules
6. Organize the written work according to them
- I used self-motivation to understand what requirements were set in each point of the guide.
- Motivation for learning of the subject matter was based on considering the important issues for both academic and professional performances.



- Finding the target settled in the directory. I used time management strategy and I also took the necessary breaks when it felt mentally and physically needing them.

Did you get the expected results? Weight the results from 1 to 10.


I obtained the expected results and I acquired knowledge and understood the importance of ‘’copyright and intellectual property with the ethical implications of academic plagiarism.’’ Similarly I learned about the techniques of oral expression, so I can continue using them.

2.6 Link of the e-portfolio in the delivery document

https://www.blogger.com/blogger.g?blogID=7821474777280130412#allposts