SlideShare a Scribd company logo
1 of 23
SOFTWARE PIRACY AND ETHICS 10064559 TI SUN
What is Software Piracy ? Adobe:  Software piracy is the illegal distribution and/or reproduction of Adobe software applications or fonts for business or personal use.  The unauthorized use, reproduction, distribution, or transmission of copyrighted material. Illegal copying of programs, counterfeiting and distributing software, purchasing pirated software and renting unauthorized software.
PIRACY METHOS Licensed user duplication for unlicensed users Commercial reproduction  Software Cracks/Key generator
Reports on Software piracy Cases IIPA claims US businesses lost an estimated almost US$3 billion in revenues in 2003 due to copyright violations in China alone. The software piracy rate in China is estimated in a range of 92%  for business software applications to 96%  for entertainment software. CHICAGO – Seventeen defendants from across the United States and Europe were indicted by a federal grand jury today for allegedly conspiring to infringe the copyright of more than 5,000 computer software programs that were available through a hidden Internet site, the Justice Department announced.  Twelve of the defendants were members or leaders of an international organization of software pirates known as “Pirates with Attitudes,” an underground group that disseminates stolen copies of software, including programs that are not yet commercially available.
Some history of software piracy Software was not recognized as intellectual property until the Computer Software Copyright Act of 1980. Origins are very innocent in nature: computer geeks meet in computer clubs Clubs offered a way for club members to share the software that they had written with other members.  The first act of piracy was probably something like this: Geek 1: ..I wish I had a compiler, I would love to make my own applications, I want to make something I call a "Spreadsheet", so I can do my accounts with... Geek 2:My company just bought a copy of that compiler, ill copy the disk and bring it next month for you. Geek 1:Oh wow man thanks, I have a copy of Edit the editor v1, ill swap you if you like. Geek 2: Wicked, I need an editor, its a deal!
Some history of software piracy Design games       many of these early software pirates went on to start some of the most successful game development companies in the world. Bulletin Board Systems(BBS)      groups that would race to crack and upload the latest software to their affiliated BBS Access all over the world  The first patent issued for a piece of software in 1983      acts of copyright infringement could be tried in court.
THE DIFFERENCE BETWEEN STEALING Virtual vs. physical  sharing and curiosity vs benefit of money or power Benefit the community vs benefit themselves
Commercial reproduction  Piracy case      Eleven individuals were convicted in a southern China court of participating in a sophisticated counterfeiting ring that enabled them to mass-produce and distribute pirated Microsoft software globally. The group reportedly operated like an international corporation that produced and sold CDs an DVD that were not only of high quality, but packaged nearly identically to real products despite the high level of anti-piracy security measures taken by Microsoft.
Utilitarian/Consequentialist Perspective Stake holder: Software company Piracy and copyright been violated Financial damage Stake holder: pirates Financial income Taking the risk of  being put into prison Stake holder: Community ,[object Object], Traian Basescu, Romanian president as of 2010, .said: "piracy helped the young generation discover computers. It set off the development of the IT industry in Romania.“ ,[object Object],(means people who couldn’t afford it have access to it now) ,[object Object],[object Object]
Software Cracks +ORC “  ...  Cracking it's not just about software, it's about information, about all patterns of life. To crack is to refuse to be controlled and used by others, to crack is to be free... ”
Software Cracks What are cracks The modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods: copy protection, trial/demo version, serial number, hardware key, date checks, CD check or software annoyances like nag screens and adware.  Piracy  case : Angry Atari Software Developers CodeHead released this version on Saturday, September 12, 1992 at                    the Glendale Atari Faire. By Sunday, before the second day of the                    show was even over, it was already in distribution by pirates.
Utilitarian/Consequentialist Perspective Stake holder: Software company Piracy and copyright been violated Financial damage Stake holder: cracker Self content Taking the risk of  being put into prison Stake holder: Community ,[object Object], Traian Basescu, Romanian president as of 2010, .said: "piracy helped the young generation discover computers. It set off the development of the IT industry in Romania.“ ,[object Object],(means people who couldn’t afford it have access to it now) ,[object Object],[object Object]
John Stuart Mill “ o n liberty” The harm principle Each individual has the right to act as he wants, so long as these actions do not harm others ,[object Object]
Each individual has the right to act as he wants, if the action ( in this case crack a software program) only directly affects the person undertaking the action, the society has no right to intervene.,[object Object]
SOFTWARE PIRACY AND THE LAW Piracy case     “United States Attorney announced that SabujPattanayek, age 21, was sentenced to 41months in federal prison by the United States District Judge, for conspiring to violate the criminal copyright member of one of the oldest and largest international software piracy rings on the Internet.             Old times:  Until the Computer Software Copyright Act of 1980, software was not recognized as intellectual       property, so there were no laws against theft or reproduction. Computer forensics was unheard of and most law enforcement agencies did not have computers.  Organizations such as the SPA, CAAST, BSA were offered rewards for information leading to the arrest of a software pirate.  There were over 10,000 active BBS’ in the United States alone, and law enforcement agencies only arrested a handful of BBS owners each year.
SOFTWARE PIRACY AND THE LAW Software piracy is considered organized crime and is classified as a federal offense. Federal law offenders, as defined by the Sentencing Reform Act of 1984, have no chance of parole. Additionally, good behaviour has little impact on their sentence. The average sentence in America for a convicted rapist is nine years, while the average time served is only five years. In many circumstances, a pirate receives a longer jail sentence than a convicted rapist. Law agencies are trying to make a point to the Internet community: do not be a pirate.
What's the Alternative ? FLOSS(Free/Libre/Open/Source Software) Is software that is liberally licensed to grant the right of users to use, study, change, and improve its design through the availability of its source code.  Goal: fostering the development of software to be made freely available for others to copy ,use, modify , and then redistribute.
FLOSS In Practice: the linux operation system Early 1990s, developed LinusTorvalds UNIX system FLOSS work focused on the development and distribution of the linux operation system of linux that can be freely download,t he Ubunutu distribution is one of the most popular one. “Our work is driven by a philosophy on software freedom that aims to spread and bring the benefits of software to all parts of the world”
SOFTWARE PIRACY AND CULTURE Software piracy rates :Vietnam(95%),China(92%),and Indonesia(89%)(BSA,2003)   Different attitudes towards copyright ,[object Object]
Asia            inclusive property right.
SOFTWARE PIRACY AND CULTURE Confucian Confucian tradition emphasizes emulation of revered classics-and in this way, copying expresses highest respect for the work of author( Dan Burk,2007:IOI) (southern)African cultural tradition Ubuntu They share the sense that individuals are relational being, ones centrally interdependent with larger community for their very existence and sense of meaning as human being.
..... What is your opinion? ,[object Object]
 2    Should we take consideration of  culture differences         refer to the software ethics?   Relativism, pluralism? 

More Related Content

What's hot

Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityTushar Nikam
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityRonson Fernandes
 
Software piracy
Software piracySoftware piracy
Software piracyAkhil Tiwari
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityArshad Khan
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organizationTejas Wasule
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Securityxtin101
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet vimal kumar arora
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensingtravellingpolander
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Faridah Husin
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPTAnandKaGe
 
Cyber-Security & Hacking
Cyber-Security & HackingCyber-Security & Hacking
Cyber-Security & HackingZayedMufti
 

What's hot (20)

Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Security
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensing
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Cyber-Security & Hacking
Cyber-Security & HackingCyber-Security & Hacking
Cyber-Security & Hacking
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 

Viewers also liked

Software Piracy
Software PiracySoftware Piracy
Software Piracyjvonschilling
 
Software piracy
Software piracySoftware piracy
Software piracyJohn Pereless
 
Internet Piracy and Book Sales
Internet Piracy and Book SalesInternet Piracy and Book Sales
Internet Piracy and Book SalesGRAPE
 
Copyright and online piracy
Copyright and online piracyCopyright and online piracy
Copyright and online piracyshelana
 
REDIC: Final Presentation by the RO Team
REDIC: Final Presentation by the RO TeamREDIC: Final Presentation by the RO Team
REDIC: Final Presentation by the RO TeamApostolos Syropoulos
 
Online piracy
Online piracyOnline piracy
Online piracyzim94
 
Film Piracy
Film PiracyFilm Piracy
Film Piracymishalacko
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracyguesteb94797
 
Corporate Communication
Corporate CommunicationCorporate Communication
Corporate CommunicationKalahub
 

Viewers also liked (9)

Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Internet Piracy and Book Sales
Internet Piracy and Book SalesInternet Piracy and Book Sales
Internet Piracy and Book Sales
 
Copyright and online piracy
Copyright and online piracyCopyright and online piracy
Copyright and online piracy
 
REDIC: Final Presentation by the RO Team
REDIC: Final Presentation by the RO TeamREDIC: Final Presentation by the RO Team
REDIC: Final Presentation by the RO Team
 
Online piracy
Online piracyOnline piracy
Online piracy
 
Film Piracy
Film PiracyFilm Piracy
Film Piracy
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracy
 
Corporate Communication
Corporate CommunicationCorporate Communication
Corporate Communication
 

Similar to Software piracy

MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesTushar B Kute
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several typesAssignment Studio
 
Foundations Of Info Justice
Foundations Of Info JusticeFoundations Of Info Justice
Foundations Of Info JusticeMatt Butcher
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 

Similar to Software piracy (10)

Essay On Piracy
Essay On PiracyEssay On Piracy
Essay On Piracy
 
Piracy
PiracyPiracy
Piracy
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
Spyware
SpywareSpyware
Spyware
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Foundations Of Info Justice
Foundations Of Info JusticeFoundations Of Info Justice
Foundations Of Info Justice
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Malwares
MalwaresMalwares
Malwares
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂşjo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Software piracy

  • 1. SOFTWARE PIRACY AND ETHICS 10064559 TI SUN
  • 2. What is Software Piracy ? Adobe: Software piracy is the illegal distribution and/or reproduction of Adobe software applications or fonts for business or personal use. The unauthorized use, reproduction, distribution, or transmission of copyrighted material. Illegal copying of programs, counterfeiting and distributing software, purchasing pirated software and renting unauthorized software.
  • 3. PIRACY METHOS Licensed user duplication for unlicensed users Commercial reproduction Software Cracks/Key generator
  • 4. Reports on Software piracy Cases IIPA claims US businesses lost an estimated almost US$3 billion in revenues in 2003 due to copyright violations in China alone. The software piracy rate in China is estimated in a range of 92% for business software applications to 96% for entertainment software. CHICAGO – Seventeen defendants from across the United States and Europe were indicted by a federal grand jury today for allegedly conspiring to infringe the copyright of more than 5,000 computer software programs that were available through a hidden Internet site, the Justice Department announced. Twelve of the defendants were members or leaders of an international organization of software pirates known as “Pirates with Attitudes,” an underground group that disseminates stolen copies of software, including programs that are not yet commercially available.
  • 5. Some history of software piracy Software was not recognized as intellectual property until the Computer Software Copyright Act of 1980. Origins are very innocent in nature: computer geeks meet in computer clubs Clubs offered a way for club members to share the software that they had written with other members. The first act of piracy was probably something like this: Geek 1: ..I wish I had a compiler, I would love to make my own applications, I want to make something I call a "Spreadsheet", so I can do my accounts with... Geek 2:My company just bought a copy of that compiler, ill copy the disk and bring it next month for you. Geek 1:Oh wow man thanks, I have a copy of Edit the editor v1, ill swap you if you like. Geek 2: Wicked, I need an editor, its a deal!
  • 6. Some history of software piracy Design games many of these early software pirates went on to start some of the most successful game development companies in the world. Bulletin Board Systems(BBS) groups that would race to crack and upload the latest software to their affiliated BBS Access all over the world The first patent issued for a piece of software in 1983 acts of copyright infringement could be tried in court.
  • 7. THE DIFFERENCE BETWEEN STEALING Virtual vs. physical sharing and curiosity vs benefit of money or power Benefit the community vs benefit themselves
  • 8. Commercial reproduction Piracy case Eleven individuals were convicted in a southern China court of participating in a sophisticated counterfeiting ring that enabled them to mass-produce and distribute pirated Microsoft software globally. The group reportedly operated like an international corporation that produced and sold CDs an DVD that were not only of high quality, but packaged nearly identically to real products despite the high level of anti-piracy security measures taken by Microsoft.
  • 9.
  • 10. Software Cracks +ORC “ ... Cracking it's not just about software, it's about information, about all patterns of life. To crack is to refuse to be controlled and used by others, to crack is to be free... ”
  • 11. Software Cracks What are cracks The modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods: copy protection, trial/demo version, serial number, hardware key, date checks, CD check or software annoyances like nag screens and adware. Piracy case : Angry Atari Software Developers CodeHead released this version on Saturday, September 12, 1992 at the Glendale Atari Faire. By Sunday, before the second day of the show was even over, it was already in distribution by pirates.
  • 12.
  • 13.
  • 14.
  • 15. SOFTWARE PIRACY AND THE LAW Piracy case “United States Attorney announced that SabujPattanayek, age 21, was sentenced to 41months in federal prison by the United States District Judge, for conspiring to violate the criminal copyright member of one of the oldest and largest international software piracy rings on the Internet. Old times: Until the Computer Software Copyright Act of 1980, software was not recognized as intellectual property, so there were no laws against theft or reproduction. Computer forensics was unheard of and most law enforcement agencies did not have computers. Organizations such as the SPA, CAAST, BSA were offered rewards for information leading to the arrest of a software pirate. There were over 10,000 active BBS’ in the United States alone, and law enforcement agencies only arrested a handful of BBS owners each year.
  • 16. SOFTWARE PIRACY AND THE LAW Software piracy is considered organized crime and is classified as a federal offense. Federal law offenders, as defined by the Sentencing Reform Act of 1984, have no chance of parole. Additionally, good behaviour has little impact on their sentence. The average sentence in America for a convicted rapist is nine years, while the average time served is only five years. In many circumstances, a pirate receives a longer jail sentence than a convicted rapist. Law agencies are trying to make a point to the Internet community: do not be a pirate.
  • 17. What's the Alternative ? FLOSS(Free/Libre/Open/Source Software) Is software that is liberally licensed to grant the right of users to use, study, change, and improve its design through the availability of its source code.  Goal: fostering the development of software to be made freely available for others to copy ,use, modify , and then redistribute.
  • 18. FLOSS In Practice: the linux operation system Early 1990s, developed LinusTorvalds UNIX system FLOSS work focused on the development and distribution of the linux operation system of linux that can be freely download,t he Ubunutu distribution is one of the most popular one. “Our work is driven by a philosophy on software freedom that aims to spread and bring the benefits of software to all parts of the world”
  • 19.
  • 20. Asia inclusive property right.
  • 21. SOFTWARE PIRACY AND CULTURE Confucian Confucian tradition emphasizes emulation of revered classics-and in this way, copying expresses highest respect for the work of author( Dan Burk,2007:IOI) (southern)African cultural tradition Ubuntu They share the sense that individuals are relational being, ones centrally interdependent with larger community for their very existence and sense of meaning as human being.
  • 22.
  • 23. 2 Should we take consideration of culture differences refer to the software ethics? Relativism, pluralism? 

Editor's Notes

  1. Software piracy is the illegal distribution and/or reproduction of Adobe software applications or fonts for business or personal use.
  2. the unauthorized use, reproduction, distribution, or transmission of copyrighted material.infosat.tamu.edu/students/glossary.htm
  3. International Intellectual Property Alliance (IIPA 2004) Disseminate 散播, 公开, 宣传[di'semineit, di'semə.neitindict[in'daitv.  起诉,  控告,  指控http://www.ehow.com/list_6669954_ethical-issues-software-piracy.html
  4. Software piracy’s origins are very innocent in nature. Before pirated material became hot property, before the widespread use of the Internet,and even before laptops and CDs, there were computer geeks.Computer geeks are the forefathers of software piracy. Piracy began in the 1980s when computer technology was still new.  They flocked to local universities, which held monthly computer clubs which offered a way for them to share the software that they had written with other members. Some of the first games ever developed were first shown off in computer clubs
  5. Computer geeks were curious about what their computers coulddo.Without piracy, they could never have experimented with technology and never written their own applications. It is important to note that many of these early software pirates went on to start some of the most successful game development companies in the world. Experimentation with software and the availability of software piracy was essential to the success of computers and software.Many of these early software pirates went on to start some of the most successful game development companies in the worldAround this time, a new era of computer club called Bulletin BoardSystems (BBS’) was almost entirely digital.Users of itcould connect a modem and soon have access to a text-based, menu-driven interface.BBS’ were very popular; pirates from all over the world wanted to callthem to access their often massive repositories of data.the software industry began to feel the burn of piracy. 
  6. No costs, without “ using up” any of the original version.So,while software piracy t is quite different in nature than the stealing of material item
  7. If the organization was not going to purchase the software under any circumstance,it is difficult to claim that the company is financially damagedhttp://www.tgdaily.com/business-and-law-features/40786-eleven-jailed-in-2-billion-software-piracy-case
  8. the greatest goods for the greatest amount of people
  9. What if everyone pirated software instead of just one individual?Kant categorical imperative:so act of your will could always hold at the same time as a principle establishing universal law”Use software company as a mean to a end
  10. Old Red Cracker Old Red Cracker (abbreviate +ORC) is a screenname for a cracker that wrote the now famous +ORC "how to crack" lessons. He was one of the pioneers of publishing cracking lessons on the Internet and therefore very well known among thereverser scene. Not much is known about +ORC since he has never revealed his identity but he has left clues and puzzles on how to reach him[1]. This has led to so called "+ORC Stalking" where individuals have tried to find out who he really is.
  11. 25 pafeThe BBS referred to here,“The Rats Nest,” was located IN, California, and in its day, was one of the largest Atari pirate BBS’ on the west coast
  12. If the organization was not going to purchase the software under any circumstance,it is difficult to claim that the company is financially damaged, While the creator of the software is not sianificantly harmed , The orangzation,and even society, may also benefit as the individual . Take photoshop for example.Software licenses cost the same wherever in the world you buy them, but wages vary greatly over the world. People in countries will therefore find it harder to buy software, which can be considered to be unfair to them and emerging market economies.Some researchers have claimd that software piracy ,ay even benefit software companies, as individuals who would never have been exposed to a software product are given the opportunity to try the software at no cost , which may lead to future purchases of the product if it benefits the user(Givon,Mahajan,&Muller,1995) From the utilitarian viewpoint, the benefits of this single case of piracy may outweigh the costs, implying that the act is ethical in nature
  13. What if everyone pirated software instead of just one individual?Kant categorical imperative:so act of your will could always hold at the same time as a principle establishing universal law”The software corporation has expended its research and development to create the software, usually for the purpose of recouping the development money to costs and creating an income stream.Nearly all cracls originate from a relatively small number of very knowledgeable computer enthusiasts who post them on the internet for all the see anf use
  14. <<on liberty>>he harm principle holds that each individual has the right to act as he wants, so long as these actions do not harm others.
  15. The notion of the social contract is that individuals unite into a society by a process of mutual consent, agreeing to abide by certain rules and to accept duties to protect one another from violence, fraud, or negligence. Negative right: A right that another can guarantee by leaving you alonePositive right: A right obligating others to do something on your behalfNegative right The theory of the social contract focuses on people’s social right, This weighs up the software computer ‘s copyright to be protected
  16. Software Publisher’s Association (SPA), the Canadian Alliance Against Software Theft (CAAST), and the Business Software Alliance BSA
  17. In the context of free and open-source software, free refers to the freedom to copy and re-use the software, rather than to the price of the software]
  18. LinusTorvalds developed a variant of the UNIX operating system in the eraly 1990s that was intented for free distribution from the outsetSubsequently, a great deal of FLOSS work focused on the development and distribution of the linux operation system of linux that can be freely downloadThe clear intersection between free software sensibilities and the ubuntutradition,then is emphasis on inclusive rather than exclisive right
  19. 751 As the example of Ubuntu and the differences between US and EU approaches to copyright suggest that our attitudes and approaches to matters of intellectual property and how far and under what circumstances such materials may be justifiably shared with others are strongly shaped by culture.The US and European copyright apparoaches tend to start with the favor exclusive property rights. That is ,property rights (of access and use) belong exclusively to the individual owner.Copyleft/FLOSS approaches,by contrast,include notions of inclusive property right.so ,in Richard Stallman’s definition of free software .the starting point is users freedom---a community of software users-not the individual’s right ti exclude others from use and access.
  20. 79a master philosopher or thinker is motivated primarily by the desire to benefit others with his or her work- rather than say, personally profit through the sale of that work- and so he would want to see that work copied and distribution .2 Both confucian and southern)African cultural tradition , stressing instead the importance of individual and individual interests, stressing instead the importance of contributing to and maintaining the harmony and well-being of the larger community3Ubuntu as a free software project hence directly reflects the greater emphasis on community well-being that charactrizesindigeousafrican culture values.
  21. Moral relativism may be any of several descriptive, meta-ethical, or normative positions. Each of them is concerned with the differences in moral judgments across different people and cultures:value pluralism is the idea that there are several values which may be equally correct and fundamental, and yet in conflict with each other. In addition, value-pluralism postulates that in many cases, such incompatible values may be incommensurable, in the sense that there is no objective ordering of them in terms of importance.