A basic course on Research data management: part 1 - part 4Leon Osinski
Slides belonging to a basic course on research data management. The course consists of 4 parts:
Part 1: what and why
1.1 data management plans
Part 2: protecting and organizing your data
2.1 data safety and data security
2.2 file naming, organizing data (TIER documentation protocol)
Part 3: sharing your data
3.1 via collaboration platforms (during research)
3.2 via data archives (after your research)
Part 4: caring for your data, or making data usable
4.1 tidy data
4.2 documentation/metadata
4.3 licenses
4.4 open data formats
This document discusses subprograms and parameter passing in programming languages. It covers fundamental concepts of subprograms like definitions, calls, headers, and parameters. It then describes different parameter passing methods like pass-by-value, pass-by-reference, and pass-by-name. It also discusses how major languages like C, C++, Java, Ada, C#, and PHP implement parameter passing and type checking.
Implementation details and performance traits of generics in .NET, Java and C++. Presentation for the Jerusalem .NET/C++ User Group by Sasha Goldshtein.
The document discusses inheritance in C# through an example program. The Child class inherits from the Parent class and overrides the print() method. When an instance of the Child class is created, it first calls the Parent class constructor through the base keyword, then the Child constructor is called. When print() is called on the Child instance, it first calls the base print() method from the Parent class, then calls the Child's print() method.
This document discusses subprograms in programming languages. It covers the fundamentals of subprograms including definitions, parameters, and parameter passing methods. Key points include:
- A subprogram has a single entry point and control returns to the caller when execution terminates. Parameters can be passed by value, reference, result, or name.
- Issues around subprograms include parameter type checking, local variable scope, and parameter passing semantics and implementation. Languages support different parameter passing methods like pass-by-value or pass-by-reference.
- Parameter passing methods have tradeoffs between efficiency and aliasing. Multidimensional arrays as parameters require type information to be passed correctly in some languages. Subprograms can also
This document discusses collections in C#. It defines collections as enumerable data structures that can be accessed using indexes or keys. It then covers the different types of collections in C#, including stacks, queues, lists, and dictionaries. Examples are provided for queues, arrays, arraylists, and dictionaries to illustrate how they can be used.
A basic course on Research data management, part 4: caring for your data, or ...Leon Osinski
A basic course on research data management for PhD students. The course consists of 4 parts. The course was given at Eindhoven University of Technology (TUe), 24-01-2017
A basic course on Research data management: part 1 - part 4Leon Osinski
Slides belonging to a basic course on research data management. The course consists of 4 parts:
Part 1: what and why
1.1 data management plans
Part 2: protecting and organizing your data
2.1 data safety and data security
2.2 file naming, organizing data (TIER documentation protocol)
Part 3: sharing your data
3.1 via collaboration platforms (during research)
3.2 via data archives (after your research)
Part 4: caring for your data, or making data usable
4.1 tidy data
4.2 documentation/metadata
4.3 licenses
4.4 open data formats
This document discusses subprograms and parameter passing in programming languages. It covers fundamental concepts of subprograms like definitions, calls, headers, and parameters. It then describes different parameter passing methods like pass-by-value, pass-by-reference, and pass-by-name. It also discusses how major languages like C, C++, Java, Ada, C#, and PHP implement parameter passing and type checking.
Implementation details and performance traits of generics in .NET, Java and C++. Presentation for the Jerusalem .NET/C++ User Group by Sasha Goldshtein.
The document discusses inheritance in C# through an example program. The Child class inherits from the Parent class and overrides the print() method. When an instance of the Child class is created, it first calls the Parent class constructor through the base keyword, then the Child constructor is called. When print() is called on the Child instance, it first calls the base print() method from the Parent class, then calls the Child's print() method.
This document discusses subprograms in programming languages. It covers the fundamentals of subprograms including definitions, parameters, and parameter passing methods. Key points include:
- A subprogram has a single entry point and control returns to the caller when execution terminates. Parameters can be passed by value, reference, result, or name.
- Issues around subprograms include parameter type checking, local variable scope, and parameter passing semantics and implementation. Languages support different parameter passing methods like pass-by-value or pass-by-reference.
- Parameter passing methods have tradeoffs between efficiency and aliasing. Multidimensional arrays as parameters require type information to be passed correctly in some languages. Subprograms can also
This document discusses collections in C#. It defines collections as enumerable data structures that can be accessed using indexes or keys. It then covers the different types of collections in C#, including stacks, queues, lists, and dictionaries. Examples are provided for queues, arrays, arraylists, and dictionaries to illustrate how they can be used.
A basic course on Research data management, part 4: caring for your data, or ...Leon Osinski
A basic course on research data management for PhD students. The course consists of 4 parts. The course was given at Eindhoven University of Technology (TUe), 24-01-2017
A basic course on Research data management, part 1: what and whyLeon Osinski
A basic course on research data management for PhD students. The course consists of 4 parts. The course was given at Eindhoven University of Technology (TUe), 24-01-2017
PL/SQL is a programming language that combines the SQL operations of querying and manipulating data in an Oracle database with the procedural language constructs of variables, conditions, and loops. PL/SQL can be used for database-side programming as well as client-side application development. It provides advantages like better performance, portability, higher productivity, and integration with Oracle. PL/SQL supports various data types, control structures, exception handling, and object-oriented programming features. Cursors allow processing of multiple rows returned from a SQL statement and can be static, dynamic, or reference types. Procedures and functions are reusable program units that allow passing parameters and returning values.
Research Data Management: Part 1, Principles & ResponsibilitiesAmyLN
This two-part course is a collaboration between CU Libraries/Information Services and the Office of Research Compliance & Training. The purpose of this course is to familiarize you with the various aspects of research data management (RDM)
Part 1: Why RDM is both recommended and required
What research data are
Who is responsible for RDM
Part 2:
When RDM activities occur
How you can carry out RDM activities
This document discusses exception handling in Java. It defines exceptions as objects that describe errors during code execution. The try, catch, and finally keywords are used to handle exceptions. Exceptions can be generated by the Java runtime system or manually coded. The try block contains code that could cause exceptions. Catch blocks handle specific exception types. Finally blocks contain cleanup code. All exceptions extend the Throwable class. The Exception class is for program exceptions, while Error is for environmental errors. Uncaught exceptions use the default exception handler.
Logic programming deals with relations rather than functions. It separates logic from control by having the programmer declare facts and relations that are true, while the system determines how to use those facts to solve problems. Horn clauses are used to specify relations, with the consequent stating what is true if the conjunction of antecedents are true. Queries in Prolog can ask if a specific tuple belongs to a relation or if there exists a value for a variable such that a clause is true.
A basic course on Reseach data management, part 2: protecting and organizing ...Leon Osinski
A basic course on research data management for PhD students. The course consists of 4 parts. The course was given at Eindhoven University of Technology (TUe), 24-01-2017
The document discusses generics in C#, explaining that generics allow defining type-safe data structures without committing to actual data types, improving performance and code quality. It covers why generics are required by discussing issues with non-generic stacks, and describes generic type parameters, constraints, methods, delegates and event handling using generics.
Compiler Components and their Generators - Lexical AnalysisGuido Wachsmuth
The document discusses lexical analysis in compiler construction, including an overview of the topics covered such as regular languages represented as regular grammars, regular expressions, and finite state automata. It also discusses the equivalence between these formalisms and techniques for constructing tools for lexical analysis.
The document discusses C# delegates and events. It defines a delegate as a class that encapsulates a method signature and can be used to pass methods as parameters. Delegates allow methods to be assigned and invoked dynamically. Events are a special type of delegate used to define callbacks that are invoked when an event occurs. The document provides examples of singlecast and multicast delegates, declaring and using delegates, and creating a custom delegate and event.
This document provides an overview and instructions for using Oracle's SQL Fundamentals II course. It discusses copyright and usage restrictions, outlines the course objectives and prerequisites. It also lists additional resources for SQL and describes the HR schema used in examples.
A basic course on Research data management, part 3: sharing your dataLeon Osinski
A basic course on research data management for PhD students. The course consists of 4 parts. The course was given at Eindhoven University of Technology (TUe), 24-01-2017
The document discusses different software engineering process models including:
1. The waterfall model which is a linear sequential model where each phase must be completed before moving to the next.
2. Prototyping models which allow requirements to be refined through building prototypes.
3. RAD (Rapid Application Development) which emphasizes short development cycles through reuse and code generation.
4. Incremental models which deliver functionality in increments with early increments focusing on high priority requirements.
5. The spiral model which has multiple iterations of planning, risk analysis, engineering and evaluation phases.
Survey around Semantics for Programming Languages, and Machine Proof using Coqbellbind
The document surveys semantics for programming languages and machine proof using Coq. It discusses various type systems for lambda calculus, encoding styles for target languages, and proving properties of programming languages using Coq. The author aims to continue their work on definitional interpreters, gradual typing, and learning techniques for defining languages with proofs in Coq.
The document discusses e-commerce business models, outlining seven unique features that define an e-business model including value proposition, revenue model, market opportunity, competitive environment, competitive advantage, market strategy, and organizational development. It then describes the multistage model for e-commerce consisting of search and identification, selection and negotiation, purchasing electronically, product delivery, and after-sales service. Finally, it lists some major business-to-consumer and business-to-business e-commerce business models.
This document defines and describes different types of e-commerce. It explains that e-commerce involves the buying and selling of products or services over electronic systems like the internet. The main types of e-commerce discussed are business-to-business (B2B), business-to-consumer (B2C), business-to-government (B2G), and consumer-to-consumer (C2C). It also covers mobile commerce (m-commerce) and provides examples of common business applications that relate to electronic commerce.
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesKaushal Kaith
This Presentation is explaining all about the Generations of Mobile or Cellular Technology (1G/2G/2.5/ 3G/4g/5G). This explain the invented details ,features,drawbacks,look of wireless models and comparison and evolution of technology from 1G to 5G and also explaining about wireless application and their services.
Basiscursus auteursrechten voor onderwijs, bibliotheek en in de eloRaymond Snijders
Presentatie gebruikt voor een interne cursus auteursrecht voor hbo bibliotheken met toelichting op de Auteurswet, de excepties uit de Auteurswet, Creative Commons licenties en met de nadruk op de onderwijsbeperking en bijbehorende readerovereenkomst voor het hbo.
Auteursrechten in de onderwijspraktijk: over excepties, licenties, onderwijsm...Raymond Snijders
Presentatie, gegeven op 22 oktober 2015, voor het Netwerk Auteursrechten Informatiepunten-hbo over auteursrecht in het algemeen, gebruiksrecht, content & Creative Commons licenties en de diverse excepties die in de Auteurswet zijn opgenomen en waar je in de onderwijs- en bibliotheekpraktijk mee te maken kunt krijgen.
Tot slot gaat de presentatie nog over het gebruik van foto's en video in het onderwijs en waar je als Auteursrechten Informatiepunt vragen over kunt krijgen op auteursrechtgebied.
A basic course on Research data management, part 1: what and whyLeon Osinski
A basic course on research data management for PhD students. The course consists of 4 parts. The course was given at Eindhoven University of Technology (TUe), 24-01-2017
PL/SQL is a programming language that combines the SQL operations of querying and manipulating data in an Oracle database with the procedural language constructs of variables, conditions, and loops. PL/SQL can be used for database-side programming as well as client-side application development. It provides advantages like better performance, portability, higher productivity, and integration with Oracle. PL/SQL supports various data types, control structures, exception handling, and object-oriented programming features. Cursors allow processing of multiple rows returned from a SQL statement and can be static, dynamic, or reference types. Procedures and functions are reusable program units that allow passing parameters and returning values.
Research Data Management: Part 1, Principles & ResponsibilitiesAmyLN
This two-part course is a collaboration between CU Libraries/Information Services and the Office of Research Compliance & Training. The purpose of this course is to familiarize you with the various aspects of research data management (RDM)
Part 1: Why RDM is both recommended and required
What research data are
Who is responsible for RDM
Part 2:
When RDM activities occur
How you can carry out RDM activities
This document discusses exception handling in Java. It defines exceptions as objects that describe errors during code execution. The try, catch, and finally keywords are used to handle exceptions. Exceptions can be generated by the Java runtime system or manually coded. The try block contains code that could cause exceptions. Catch blocks handle specific exception types. Finally blocks contain cleanup code. All exceptions extend the Throwable class. The Exception class is for program exceptions, while Error is for environmental errors. Uncaught exceptions use the default exception handler.
Logic programming deals with relations rather than functions. It separates logic from control by having the programmer declare facts and relations that are true, while the system determines how to use those facts to solve problems. Horn clauses are used to specify relations, with the consequent stating what is true if the conjunction of antecedents are true. Queries in Prolog can ask if a specific tuple belongs to a relation or if there exists a value for a variable such that a clause is true.
A basic course on Reseach data management, part 2: protecting and organizing ...Leon Osinski
A basic course on research data management for PhD students. The course consists of 4 parts. The course was given at Eindhoven University of Technology (TUe), 24-01-2017
The document discusses generics in C#, explaining that generics allow defining type-safe data structures without committing to actual data types, improving performance and code quality. It covers why generics are required by discussing issues with non-generic stacks, and describes generic type parameters, constraints, methods, delegates and event handling using generics.
Compiler Components and their Generators - Lexical AnalysisGuido Wachsmuth
The document discusses lexical analysis in compiler construction, including an overview of the topics covered such as regular languages represented as regular grammars, regular expressions, and finite state automata. It also discusses the equivalence between these formalisms and techniques for constructing tools for lexical analysis.
The document discusses C# delegates and events. It defines a delegate as a class that encapsulates a method signature and can be used to pass methods as parameters. Delegates allow methods to be assigned and invoked dynamically. Events are a special type of delegate used to define callbacks that are invoked when an event occurs. The document provides examples of singlecast and multicast delegates, declaring and using delegates, and creating a custom delegate and event.
This document provides an overview and instructions for using Oracle's SQL Fundamentals II course. It discusses copyright and usage restrictions, outlines the course objectives and prerequisites. It also lists additional resources for SQL and describes the HR schema used in examples.
A basic course on Research data management, part 3: sharing your dataLeon Osinski
A basic course on research data management for PhD students. The course consists of 4 parts. The course was given at Eindhoven University of Technology (TUe), 24-01-2017
The document discusses different software engineering process models including:
1. The waterfall model which is a linear sequential model where each phase must be completed before moving to the next.
2. Prototyping models which allow requirements to be refined through building prototypes.
3. RAD (Rapid Application Development) which emphasizes short development cycles through reuse and code generation.
4. Incremental models which deliver functionality in increments with early increments focusing on high priority requirements.
5. The spiral model which has multiple iterations of planning, risk analysis, engineering and evaluation phases.
Survey around Semantics for Programming Languages, and Machine Proof using Coqbellbind
The document surveys semantics for programming languages and machine proof using Coq. It discusses various type systems for lambda calculus, encoding styles for target languages, and proving properties of programming languages using Coq. The author aims to continue their work on definitional interpreters, gradual typing, and learning techniques for defining languages with proofs in Coq.
The document discusses e-commerce business models, outlining seven unique features that define an e-business model including value proposition, revenue model, market opportunity, competitive environment, competitive advantage, market strategy, and organizational development. It then describes the multistage model for e-commerce consisting of search and identification, selection and negotiation, purchasing electronically, product delivery, and after-sales service. Finally, it lists some major business-to-consumer and business-to-business e-commerce business models.
This document defines and describes different types of e-commerce. It explains that e-commerce involves the buying and selling of products or services over electronic systems like the internet. The main types of e-commerce discussed are business-to-business (B2B), business-to-consumer (B2C), business-to-government (B2G), and consumer-to-consumer (C2C). It also covers mobile commerce (m-commerce) and provides examples of common business applications that relate to electronic commerce.
Presentation on 1G/2G/3G/4G/5G/Cellular & Wireless TechnologiesKaushal Kaith
This Presentation is explaining all about the Generations of Mobile or Cellular Technology (1G/2G/2.5/ 3G/4g/5G). This explain the invented details ,features,drawbacks,look of wireless models and comparison and evolution of technology from 1G to 5G and also explaining about wireless application and their services.
Basiscursus auteursrechten voor onderwijs, bibliotheek en in de eloRaymond Snijders
Presentatie gebruikt voor een interne cursus auteursrecht voor hbo bibliotheken met toelichting op de Auteurswet, de excepties uit de Auteurswet, Creative Commons licenties en met de nadruk op de onderwijsbeperking en bijbehorende readerovereenkomst voor het hbo.
Auteursrechten in de onderwijspraktijk: over excepties, licenties, onderwijsm...Raymond Snijders
Presentatie, gegeven op 22 oktober 2015, voor het Netwerk Auteursrechten Informatiepunten-hbo over auteursrecht in het algemeen, gebruiksrecht, content & Creative Commons licenties en de diverse excepties die in de Auteurswet zijn opgenomen en waar je in de onderwijs- en bibliotheekpraktijk mee te maken kunt krijgen.
Tot slot gaat de presentatie nog over het gebruik van foto's en video in het onderwijs en waar je als Auteursrechten Informatiepunt vragen over kunt krijgen op auteursrechtgebied.
Presentatie voor het gebruikersoverleg van de HBO Kennisbank over de auteursrechtelijke aspecten van publicaties die in de HBO Kennisbank komen. Hierbij is behalve voor het auteursrecht ook aandacht voor Open Access en het gebruiksrecht van de publicaties.
Auteursrecht & Open Onderwijs voor VO-docenten (iTunesU bootcamp)Kennisland
Presentatie gegeven door Lisette Kalshoven tijdens de iTunesU Bootcamp in oktober 2014. Onderwerpen zijn het auteursrecht, Creative Commons-licenties, en het vinden van herbruikbare open content. Case study gaat over de Eerste Wereldoorlog.
contact: lk@kl.nl / @LNKalshoven
Presentatie is CC BY-SA, foto's in presentatie zijn apart gelicenseerd.
omgaan met auteursrecht in het moderne onderwijs train-de-trainer iScholengroepKennisland
Train-de-Trainer voor VO-docenten die digitaal onderwijsmateriaal produceren. Achtergrond over het auteursrecht, handige tips voor open platforms en opdrachten.
Similar to Auteursrecht in academische omgeving: DPO Professionaliseringsbijeenkomst, 23-06-2015 (11)
PROOF course Writing articles and abstracts in English, part: Copyright in ac...Leon Osinski
For this presentation students need to have seen 5 web lectures on copyright. During the presentation, the knowledge gained by the students by looking at the web lectures will be tested on the basis of a number of practical questions.
Good (enough) research data management practicesLeon Osinski
Slides of a lecture on research data management (RDM), given for 3rd year students (Eindhoven University of Technology, major Psychology & Technology), as part of the course 0HV90 Quantitative Research. At the end of the slides a handy summary 'Research data management basics in a nutshell' is added.
What funders want you to do with your dataLeon Osinski
Funders want researchers to 1) deposit the relevant data from their research in an approved repository to make it FAIR (Findable, Accessible, Interoperable, Reusable), 2) make the data openly available whenever possible, and 3) write a Data Management Plan describing how they will manage their data during and after the project. Funders require depositing data in repositories to enable reuse, making data open access "as open as possible, as closed as necessary", and having a Data Management Plan that addresses reuse according to FAIR principles.
Research data management at TU EindhovenLeon Osinski
The document discusses research data management at TU Eindhoven. It outlines the long process of developing RDM practices since 2008. It describes the current organization and governance structure for RDM. Key external requirements for RDM from funders, regulations, and integrity standards are also summarized. The document concludes by outlining RDM support services available and the benefits of good RDM practices.
Research data management: course OGO Quantitative research (21-11-2018)Leon Osinski
Research data management involves three key aspects: 1) protecting data through organized file naming and folder structures, 2) sharing data via collaboration platforms or archives to enable reproducibility and reuse, and 3) caring for data through tidy formatting, thorough metadata and documentation, and use of open standards to ensure understandability and usability.
The document discusses the use of Creative Commons licenses for research data. It notes that funders and universities are pushing for open access to research articles and data. However, applying a CC BY license fully transfers copyright to the public domain. For data, researchers must ensure they own the copyright and are authorized to license it. Less restrictive licenses like CC BY-NC still allow commercial reuse with permission. The document debates finding a balance between open access and allowing researchers to control dissemination and potential rewards from their data.
Be open: what funders want you to do with your publications and research dataLeon Osinski
Research funders want researchers to:
1. Publish research articles through open access to make the articles widely available.
2. Deposit the underlying research data in repositories to make the data findable, accessible, interoperable, and reusable (FAIR).
3. Attach open licenses like CC BY to both publications and data to allow for commercial reuse when possible.
3TU.Datacentrum: presentation for OpenML Workshop (III) at Eindhoven, 22-10-2...Leon Osinski
This document discusses sharing and reusing research data. It explains that sharing data is expected by funders and important for reproducibility, reusing results, and increasing visibility. To be reusable, data should be findable, accessible, intelligible, interoperable, and preserved. The 3TU.Datacentrum assists with assigning DOIs for citation, makes data openly accessible with some embargo options, and ensures long-term preservation. DOIs are assigned through DataCite Netherlands, which research organizations can register with for a fee.
Horizon 2020 and research data : info meeting Horizon 2020 @ TUe, 07-10-2014 ...Leon Osinski
This document discusses research data management (RDM) and the open data pilot program in Horizon 2020. It provides information on why RDM is important, noting key stakeholders that expect data sharing, and how RDM enables data re-use and integrity. The Horizon 2020 open data pilot program is described, including the seven research areas included in the pilot and funder requirements for a Data Management Plan and depositing data in repositories. Guidance and support resources for participating in the open data pilot are also listed.
Copyright and citation issues : PROOF course Writing articles and abstracts /...Leon Osinski
As an author of scholarly papers, you will use in your paper materials (text fragments, picture, tables, figures) of other people. In most cases this material is copyright-protected which means that in most cases, not always, you have to ask permission to re-use that material and to attribute the source of the material. This is also the first topic of this lecture: you as a user of copyright-protected material.
In the second place, when you’re done writing you want to publish your paper in a journal. In most cases, not always, this goes with a transfer of the copyright that you initially own to a publisher. Transfer of copyright has some consequences and this is the second topic of this presentation: you as a producer of copyright-protected material.
Onderzoeksdata-bepalingen van financiers van universitair onderzoek in NL: Ma...Leon Osinski
Onderzoeksdata-bepalingen van financiers van universitair onderzoek in NL : presentatie Master Class Research Data Management in Nederland, Maastricht, 3/4 april 2014.
UKB Werkgroep Datamanagement,Voorwaarden van Financiers.
Maarten van Bentum, Henk van den Hoogen, Leon Osinski
OA beleid subscriptie-uitgevers / Saskia Woutersen-Windhouwer, Leon Osinski
Auteursrecht in academische omgeving: DPO Professionaliseringsbijeenkomst, 23-06-2015
1. Auteursrecht in een
academische omgeving
DPO Professionaliseringsbijeenkomst
23-06-2015
l.osinski@tue.nl, TU/e IEC/Bibliotheek
Beschikbaar onder een CC BY licentie. Bewerken en
verspreiden (publiceren en kopieren) van deze
presentatie in elk medium en format is toegestaan,
mits de maker en bron van het werk worden
vermeld
2. Agenda
1. Een paar woorden over auteursrecht
2. Het gebruik van auteursrechtelijk beschermd materiaal zonder dat
je toestemming hoeft te vragen [volgens de wet]:
a. Citeren van tekstfragmenten en figuren / plaatjes / tabellen ;
bronvermelding
b. Gebruik in het onderwijs ; readerovereenkomst
3. Het gebruik van beschermd materiaal zonder dat je toestemming
hoeft te vragen
a. Onderwijsgebruik in tijdschriftlicenties
b. CC BY licenties
c. Hyperlinking
d. Eigen werk
3. Over welke rechten hebben we eigenlijk het als we het hebben
over auteursrecht?
+ Exploitatie- of economische rechten: het recht het werk te
verspreiden (publiceren, kopieren) en te bewerken
+ Morele- of persoonlijke rechten: het recht van de auteur om
als auteur genoemd te worden bij elke uitgave van het werk
en het recht om bezwaar te maken tegen verminkingen van
het werk
Als jij het auteursrecht bezit mag jij en jij alleen het werk verspreiden en
bewerken. Wil iemand anders dat doen (hergebruik van andermans werk),
dan moet hij of zij daar (bijna) altijd toestemming voor vragen
Auteursrecht
4. Wanneer hoef je (volgens het auteursrecht) geen toestemming
voor hergebruik te vragen?
+ Citeren
+ Bij gebruik in onderwijs (soms)
Uitzonderingen (‘beperkingen’)
5. Citaat
+ Kort, wetenschappelijke context, functioneel; niet om je werk
op te leuken
+ Bronvermelding
Niet alleen tekstfragmenten
maar ook figuren, foto’s en
tabellen kunnen geciteerd
worden!
Uitzondering: citeren
6. Citeren: bronvermelding
Doel = publicaties ondubbelzinnig kunnen identificeren en terugvinden
beschrijvende elementen [auteursnamen, jaar, titel …] ;
gescheiden door leestekens [: , . _ ( )] ;
geplaatst in een bepaalde volgorde ;
en soms typografisch benadrukt [schuinschrift, onderstrepen, hoofdletters]
Regelsystemen
Publication manual of the American Psychological Association (6th ed.). (2009), The
Chicago manual of style (16th ed.). (2010), Vancouver, IEEE
Software
Reference management software
<
8. Dit plaatje mag waarschijnlijk niet als
‘citaat’ gebruikt worden in een
wetenschappelijk artikel
9. Maar als je onderzoek gaat over
verschillende voorstellingen van
wetenschappers in cartoons, dan is
het wel toegestaan, mits je
natuurlijk de bron vermeldt
<
10. Zonder toestemming te vragen mag een auteursrechtelijk
beschermd werk in het onderwijs gebruikt worden:
+ van gedeelten van dat werk
+ ter toelichting bij het onderwijs
+ het onderwijs niet commercieel is
+ er een vergoeding betaald wordt
Uitzondering: gebruik in het onderwijs
11. Uitwerking van onderwijsgebruik in de readerregeling of –
overeenkomst
+ omschrijving gedeelte van het werk
- definitie van korte gedeelten: 10.000 woorden uit een boek; 8000
woorden uit een tijdschrift; nooit meer dan 1/3 van het werk; maximaal
25 grafieken uit een werk ; maximaal 25 illustraties uit een werk
+ bepaling vergoeding
+ afkoopsom voor gebruik van korte gedeelten (op basis van aantal
studenten)
+ vaste standaardbedragen voor lange gedeelten
Alle readers moeten worden gemeld!
Gebruik in het onderwijs: readerregeling