SlideShare a Scribd company logo
1 of 23
SOFTWARE PIRACY AND ETHICS 10064559 TI SUN
What is Software Piracy ? Adobe:  Software piracy is the illegal distribution and/or reproduction of Adobe software applications or fonts for business or personal use.  The unauthorized use, reproduction, distribution, or transmission of copyrighted material. Illegal copying of programs, counterfeiting and distributing software, purchasing pirated software and renting unauthorized software.
PIRACY METHOS Licensed user duplication for unlicensed users Commercial reproduction  Software Cracks/Key generator
Reports on Software piracy Cases IIPA claims US businesses lost an estimated almost US$3 billion in revenues in 2003 due to copyright violations in China alone. The software piracy rate in China is estimated in a range of 92%  for business software applications to 96%  for entertainment software. CHICAGO – Seventeen defendants from across the United States and Europe were indicted by a federal grand jury today for allegedly conspiring to infringe the copyright of more than 5,000 computer software programs that were available through a hidden Internet site, the Justice Department announced.  Twelve of the defendants were members or leaders of an international organization of software pirates known as “Pirates with Attitudes,” an underground group that disseminates stolen copies of software, including programs that are not yet commercially available.
Some history of software piracy Software was not recognized as intellectual property until the Computer Software Copyright Act of 1980. Origins are very innocent in nature: computer geeks meet in computer clubs Clubs offered a way for club members to share the software that they had written with other members.  The first act of piracy was probably something like this: Geek 1: ..I wish I had a compiler, I would love to make my own applications, I want to make something I call a "Spreadsheet", so I can do my accounts with... Geek 2:My company just bought a copy of that compiler, ill copy the disk and bring it next month for you. Geek 1:Oh wow man thanks, I have a copy of Edit the editor v1, ill swap you if you like. Geek 2: Wicked, I need an editor, its a deal!
Some history of software piracy Design games       many of these early software pirates went on to start some of the most successful game development companies in the world. Bulletin Board Systems(BBS)      groups that would race to crack and upload the latest software to their affiliated BBS Access all over the world  The first patent issued for a piece of software in 1983      acts of copyright infringement could be tried in court.
THE DIFFERENCE BETWEEN STEALING Virtual vs. physical  sharing and curiosity vs benefit of money or power Benefit the community vs benefit themselves
Commercial reproduction  Piracy case      Eleven individuals were convicted in a southern China court of participating in a sophisticated counterfeiting ring that enabled them to mass-produce and distribute pirated Microsoft software globally. The group reportedly operated like an international corporation that produced and sold CDs an DVD that were not only of high quality, but packaged nearly identically to real products despite the high level of anti-piracy security measures taken by Microsoft.
Utilitarian/Consequentialist Perspective Stake holder: Software company Piracy and copyright been violated Financial damage Stake holder: pirates Financial income Taking the risk of  being put into prison Stake holder: Community ,[object Object], Traian Basescu, Romanian president as of 2010, .said: "piracy helped the young generation discover computers. It set off the development of the IT industry in Romania.“ ,[object Object],(means people who couldn’t afford it have access to it now) ,[object Object],[object Object]
Software Cracks +ORC “  ...  Cracking it's not just about software, it's about information, about all patterns of life. To crack is to refuse to be controlled and used by others, to crack is to be free... ”
Software Cracks What are cracks The modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods: copy protection, trial/demo version, serial number, hardware key, date checks, CD check or software annoyances like nag screens and adware.  Piracy  case : Angry Atari Software Developers CodeHead released this version on Saturday, September 12, 1992 at                    the Glendale Atari Faire. By Sunday, before the second day of the                    show was even over, it was already in distribution by pirates.
Utilitarian/Consequentialist Perspective Stake holder: Software company Piracy and copyright been violated Financial damage Stake holder: cracker Self content Taking the risk of  being put into prison Stake holder: Community ,[object Object], Traian Basescu, Romanian president as of 2010, .said: "piracy helped the young generation discover computers. It set off the development of the IT industry in Romania.“ ,[object Object],(means people who couldn’t afford it have access to it now) ,[object Object],[object Object]
John Stuart Mill “ o n liberty” The harm principle Each individual has the right to act as he wants, so long as these actions do not harm others ,[object Object]
Each individual has the right to act as he wants, if the action ( in this case crack a software program) only directly affects the person undertaking the action, the society has no right to intervene.,[object Object]
SOFTWARE PIRACY AND THE LAW Piracy case     “United States Attorney announced that SabujPattanayek, age 21, was sentenced to 41months in federal prison by the United States District Judge, for conspiring to violate the criminal copyright member of one of the oldest and largest international software piracy rings on the Internet.             Old times:  Until the Computer Software Copyright Act of 1980, software was not recognized as intellectual       property, so there were no laws against theft or reproduction. Computer forensics was unheard of and most law enforcement agencies did not have computers.  Organizations such as the SPA, CAAST, BSA were offered rewards for information leading to the arrest of a software pirate.  There were over 10,000 active BBS’ in the United States alone, and law enforcement agencies only arrested a handful of BBS owners each year.
SOFTWARE PIRACY AND THE LAW Software piracy is considered organized crime and is classified as a federal offense. Federal law offenders, as defined by the Sentencing Reform Act of 1984, have no chance of parole. Additionally, good behaviour has little impact on their sentence. The average sentence in America for a convicted rapist is nine years, while the average time served is only five years. In many circumstances, a pirate receives a longer jail sentence than a convicted rapist. Law agencies are trying to make a point to the Internet community: do not be a pirate.
What's the Alternative ? FLOSS(Free/Libre/Open/Source Software) Is software that is liberally licensed to grant the right of users to use, study, change, and improve its design through the availability of its source code.  Goal: fostering the development of software to be made freely available for others to copy ,use, modify , and then redistribute.
FLOSS In Practice: the linux operation system Early 1990s, developed LinusTorvalds UNIX system FLOSS work focused on the development and distribution of the linux operation system of linux that can be freely download,t he Ubunutu distribution is one of the most popular one. “Our work is driven by a philosophy on software freedom that aims to spread and bring the benefits of software to all parts of the world”
SOFTWARE PIRACY AND CULTURE Software piracy rates :Vietnam(95%),China(92%),and Indonesia(89%)(BSA,2003)   Different attitudes towards copyright ,[object Object]
Asia            inclusive property right.
SOFTWARE PIRACY AND CULTURE Confucian Confucian tradition emphasizes emulation of revered classics-and in this way, copying expresses highest respect for the work of author( Dan Burk,2007:IOI) (southern)African cultural tradition Ubuntu They share the sense that individuals are relational being, ones centrally interdependent with larger community for their very existence and sense of meaning as human being.
..... What is your opinion? ,[object Object]
 2    Should we take consideration of  culture differences         refer to the software ethics?   Relativism, pluralism? 

More Related Content

What's hot

Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
Open Source Software
Open Source Software Open Source Software
Open Source Software Ali Yavari
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Computer security risks
Computer security risksComputer security risks
Computer security risksAasim Mushtaq
 
Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensingtravellingpolander
 
introduction to Operating system. (windows)
introduction to Operating system. (windows)introduction to Operating system. (windows)
introduction to Operating system. (windows)shantanu milkhe
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceTushar Rajput
 

What's hot (20)

Software piracy
Software piracySoftware piracy
Software piracy
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Digital Piracy
Digital PiracyDigital Piracy
Digital Piracy
 
Open Source Software
Open Source Software Open Source Software
Open Source Software
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Piracy and Types
Piracy and TypesPiracy and Types
Piracy and Types
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensing
 
Computer security
Computer securityComputer security
Computer security
 
Spyware
SpywareSpyware
Spyware
 
introduction to Operating system. (windows)
introduction to Operating system. (windows)introduction to Operating system. (windows)
introduction to Operating system. (windows)
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Unit 2 Regulation of Cyberspace
Unit 2 Regulation of CyberspaceUnit 2 Regulation of Cyberspace
Unit 2 Regulation of Cyberspace
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 

Viewers also liked

Internet Piracy and Book Sales
Internet Piracy and Book SalesInternet Piracy and Book Sales
Internet Piracy and Book SalesGRAPE
 
Copyright and online piracy
Copyright and online piracyCopyright and online piracy
Copyright and online piracyshelana
 
REDIC: Final Presentation by the RO Team
REDIC: Final Presentation by the RO TeamREDIC: Final Presentation by the RO Team
REDIC: Final Presentation by the RO TeamApostolos Syropoulos
 
Online piracy
Online piracyOnline piracy
Online piracyzim94
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracyguesteb94797
 
Corporate Communication
Corporate CommunicationCorporate Communication
Corporate CommunicationKalahub
 

Viewers also liked (9)

Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Internet Piracy and Book Sales
Internet Piracy and Book SalesInternet Piracy and Book Sales
Internet Piracy and Book Sales
 
Copyright and online piracy
Copyright and online piracyCopyright and online piracy
Copyright and online piracy
 
REDIC: Final Presentation by the RO Team
REDIC: Final Presentation by the RO TeamREDIC: Final Presentation by the RO Team
REDIC: Final Presentation by the RO Team
 
Online piracy
Online piracyOnline piracy
Online piracy
 
Film Piracy
Film PiracyFilm Piracy
Film Piracy
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracy
 
Corporate Communication
Corporate CommunicationCorporate Communication
Corporate Communication
 

Similar to Software piracy

Similar to Software piracy (10)

Essay On Piracy
Essay On PiracyEssay On Piracy
Essay On Piracy
 
Piracy
PiracyPiracy
Piracy
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
Spyware
SpywareSpyware
Spyware
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Foundations Of Info Justice
Foundations Of Info JusticeFoundations Of Info Justice
Foundations Of Info Justice
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Malwares
MalwaresMalwares
Malwares
 

Recently uploaded

Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Software piracy

  • 1. SOFTWARE PIRACY AND ETHICS 10064559 TI SUN
  • 2. What is Software Piracy ? Adobe: Software piracy is the illegal distribution and/or reproduction of Adobe software applications or fonts for business or personal use. The unauthorized use, reproduction, distribution, or transmission of copyrighted material. Illegal copying of programs, counterfeiting and distributing software, purchasing pirated software and renting unauthorized software.
  • 3. PIRACY METHOS Licensed user duplication for unlicensed users Commercial reproduction Software Cracks/Key generator
  • 4. Reports on Software piracy Cases IIPA claims US businesses lost an estimated almost US$3 billion in revenues in 2003 due to copyright violations in China alone. The software piracy rate in China is estimated in a range of 92% for business software applications to 96% for entertainment software. CHICAGO – Seventeen defendants from across the United States and Europe were indicted by a federal grand jury today for allegedly conspiring to infringe the copyright of more than 5,000 computer software programs that were available through a hidden Internet site, the Justice Department announced. Twelve of the defendants were members or leaders of an international organization of software pirates known as “Pirates with Attitudes,” an underground group that disseminates stolen copies of software, including programs that are not yet commercially available.
  • 5. Some history of software piracy Software was not recognized as intellectual property until the Computer Software Copyright Act of 1980. Origins are very innocent in nature: computer geeks meet in computer clubs Clubs offered a way for club members to share the software that they had written with other members. The first act of piracy was probably something like this: Geek 1: ..I wish I had a compiler, I would love to make my own applications, I want to make something I call a "Spreadsheet", so I can do my accounts with... Geek 2:My company just bought a copy of that compiler, ill copy the disk and bring it next month for you. Geek 1:Oh wow man thanks, I have a copy of Edit the editor v1, ill swap you if you like. Geek 2: Wicked, I need an editor, its a deal!
  • 6. Some history of software piracy Design games many of these early software pirates went on to start some of the most successful game development companies in the world. Bulletin Board Systems(BBS) groups that would race to crack and upload the latest software to their affiliated BBS Access all over the world The first patent issued for a piece of software in 1983 acts of copyright infringement could be tried in court.
  • 7. THE DIFFERENCE BETWEEN STEALING Virtual vs. physical sharing and curiosity vs benefit of money or power Benefit the community vs benefit themselves
  • 8. Commercial reproduction Piracy case Eleven individuals were convicted in a southern China court of participating in a sophisticated counterfeiting ring that enabled them to mass-produce and distribute pirated Microsoft software globally. The group reportedly operated like an international corporation that produced and sold CDs an DVD that were not only of high quality, but packaged nearly identically to real products despite the high level of anti-piracy security measures taken by Microsoft.
  • 9.
  • 10. Software Cracks +ORC “ ... Cracking it's not just about software, it's about information, about all patterns of life. To crack is to refuse to be controlled and used by others, to crack is to be free... ”
  • 11. Software Cracks What are cracks The modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods: copy protection, trial/demo version, serial number, hardware key, date checks, CD check or software annoyances like nag screens and adware. Piracy case : Angry Atari Software Developers CodeHead released this version on Saturday, September 12, 1992 at the Glendale Atari Faire. By Sunday, before the second day of the show was even over, it was already in distribution by pirates.
  • 12.
  • 13.
  • 14.
  • 15. SOFTWARE PIRACY AND THE LAW Piracy case “United States Attorney announced that SabujPattanayek, age 21, was sentenced to 41months in federal prison by the United States District Judge, for conspiring to violate the criminal copyright member of one of the oldest and largest international software piracy rings on the Internet. Old times: Until the Computer Software Copyright Act of 1980, software was not recognized as intellectual property, so there were no laws against theft or reproduction. Computer forensics was unheard of and most law enforcement agencies did not have computers. Organizations such as the SPA, CAAST, BSA were offered rewards for information leading to the arrest of a software pirate. There were over 10,000 active BBS’ in the United States alone, and law enforcement agencies only arrested a handful of BBS owners each year.
  • 16. SOFTWARE PIRACY AND THE LAW Software piracy is considered organized crime and is classified as a federal offense. Federal law offenders, as defined by the Sentencing Reform Act of 1984, have no chance of parole. Additionally, good behaviour has little impact on their sentence. The average sentence in America for a convicted rapist is nine years, while the average time served is only five years. In many circumstances, a pirate receives a longer jail sentence than a convicted rapist. Law agencies are trying to make a point to the Internet community: do not be a pirate.
  • 17. What's the Alternative ? FLOSS(Free/Libre/Open/Source Software) Is software that is liberally licensed to grant the right of users to use, study, change, and improve its design through the availability of its source code.  Goal: fostering the development of software to be made freely available for others to copy ,use, modify , and then redistribute.
  • 18. FLOSS In Practice: the linux operation system Early 1990s, developed LinusTorvalds UNIX system FLOSS work focused on the development and distribution of the linux operation system of linux that can be freely download,t he Ubunutu distribution is one of the most popular one. “Our work is driven by a philosophy on software freedom that aims to spread and bring the benefits of software to all parts of the world”
  • 19.
  • 20. Asia inclusive property right.
  • 21. SOFTWARE PIRACY AND CULTURE Confucian Confucian tradition emphasizes emulation of revered classics-and in this way, copying expresses highest respect for the work of author( Dan Burk,2007:IOI) (southern)African cultural tradition Ubuntu They share the sense that individuals are relational being, ones centrally interdependent with larger community for their very existence and sense of meaning as human being.
  • 22.
  • 23. 2 Should we take consideration of culture differences refer to the software ethics? Relativism, pluralism? 

Editor's Notes

  1. Software piracy is the illegal distribution and/or reproduction of Adobe software applications or fonts for business or personal use.
  2. the unauthorized use, reproduction, distribution, or transmission of copyrighted material.infosat.tamu.edu/students/glossary.htm
  3. International Intellectual Property Alliance (IIPA 2004) Disseminate 散播, 公开, 宣传[di'semineit, di'semə.neitindict[in'daitv.  起诉,  控告,  指控http://www.ehow.com/list_6669954_ethical-issues-software-piracy.html
  4. Software piracy’s origins are very innocent in nature. Before pirated material became hot property, before the widespread use of the Internet,and even before laptops and CDs, there were computer geeks.Computer geeks are the forefathers of software piracy. Piracy began in the 1980s when computer technology was still new.  They flocked to local universities, which held monthly computer clubs which offered a way for them to share the software that they had written with other members. Some of the first games ever developed were first shown off in computer clubs
  5. Computer geeks were curious about what their computers coulddo.Without piracy, they could never have experimented with technology and never written their own applications. It is important to note that many of these early software pirates went on to start some of the most successful game development companies in the world. Experimentation with software and the availability of software piracy was essential to the success of computers and software.Many of these early software pirates went on to start some of the most successful game development companies in the worldAround this time, a new era of computer club called Bulletin BoardSystems (BBS’) was almost entirely digital.Users of itcould connect a modem and soon have access to a text-based, menu-driven interface.BBS’ were very popular; pirates from all over the world wanted to callthem to access their often massive repositories of data.the software industry began to feel the burn of piracy. 
  6. No costs, without “ using up” any of the original version.So,while software piracy t is quite different in nature than the stealing of material item
  7. If the organization was not going to purchase the software under any circumstance,it is difficult to claim that the company is financially damagedhttp://www.tgdaily.com/business-and-law-features/40786-eleven-jailed-in-2-billion-software-piracy-case
  8. the greatest goods for the greatest amount of people
  9. What if everyone pirated software instead of just one individual?Kant categorical imperative:so act of your will could always hold at the same time as a principle establishing universal law”Use software company as a mean to a end
  10. Old Red Cracker Old Red Cracker (abbreviate +ORC) is a screenname for a cracker that wrote the now famous +ORC "how to crack" lessons. He was one of the pioneers of publishing cracking lessons on the Internet and therefore very well known among thereverser scene. Not much is known about +ORC since he has never revealed his identity but he has left clues and puzzles on how to reach him[1]. This has led to so called "+ORC Stalking" where individuals have tried to find out who he really is.
  11. 25 pafeThe BBS referred to here,“The Rats Nest,” was located IN, California, and in its day, was one of the largest Atari pirate BBS’ on the west coast
  12. If the organization was not going to purchase the software under any circumstance,it is difficult to claim that the company is financially damaged, While the creator of the software is not sianificantly harmed , The orangzation,and even society, may also benefit as the individual . Take photoshop for example.Software licenses cost the same wherever in the world you buy them, but wages vary greatly over the world. People in countries will therefore find it harder to buy software, which can be considered to be unfair to them and emerging market economies.Some researchers have claimd that software piracy ,ay even benefit software companies, as individuals who would never have been exposed to a software product are given the opportunity to try the software at no cost , which may lead to future purchases of the product if it benefits the user(Givon,Mahajan,&Muller,1995) From the utilitarian viewpoint, the benefits of this single case of piracy may outweigh the costs, implying that the act is ethical in nature
  13. What if everyone pirated software instead of just one individual?Kant categorical imperative:so act of your will could always hold at the same time as a principle establishing universal law”The software corporation has expended its research and development to create the software, usually for the purpose of recouping the development money to costs and creating an income stream.Nearly all cracls originate from a relatively small number of very knowledgeable computer enthusiasts who post them on the internet for all the see anf use
  14. <<on liberty>>he harm principle holds that each individual has the right to act as he wants, so long as these actions do not harm others.
  15. The notion of the social contract is that individuals unite into a society by a process of mutual consent, agreeing to abide by certain rules and to accept duties to protect one another from violence, fraud, or negligence. Negative right: A right that another can guarantee by leaving you alonePositive right: A right obligating others to do something on your behalfNegative right The theory of the social contract focuses on people’s social right, This weighs up the software computer ‘s copyright to be protected
  16. Software Publisher’s Association (SPA), the Canadian Alliance Against Software Theft (CAAST), and the Business Software Alliance BSA
  17. In the context of free and open-source software, free refers to the freedom to copy and re-use the software, rather than to the price of the software]
  18. LinusTorvalds developed a variant of the UNIX operating system in the eraly 1990s that was intented for free distribution from the outsetSubsequently, a great deal of FLOSS work focused on the development and distribution of the linux operation system of linux that can be freely downloadThe clear intersection between free software sensibilities and the ubuntutradition,then is emphasis on inclusive rather than exclisive right
  19. 751 As the example of Ubuntu and the differences between US and EU approaches to copyright suggest that our attitudes and approaches to matters of intellectual property and how far and under what circumstances such materials may be justifiably shared with others are strongly shaped by culture.The US and European copyright apparoaches tend to start with the favor exclusive property rights. That is ,property rights (of access and use) belong exclusively to the individual owner.Copyleft/FLOSS approaches,by contrast,include notions of inclusive property right.so ,in Richard Stallman’s definition of free software .the starting point is users freedom---a community of software users-not the individual’s right ti exclude others from use and access.
  20. 79a master philosopher or thinker is motivated primarily by the desire to benefit others with his or her work- rather than say, personally profit through the sale of that work- and so he would want to see that work copied and distribution .2 Both confucian and southern)African cultural tradition , stressing instead the importance of individual and individual interests, stressing instead the importance of contributing to and maintaining the harmony and well-being of the larger community3Ubuntu as a free software project hence directly reflects the greater emphasis on community well-being that charactrizesindigeousafrican culture values.
  21. Moral relativism may be any of several descriptive, meta-ethical, or normative positions. Each of them is concerned with the differences in moral judgments across different people and cultures:value pluralism is the idea that there are several values which may be equally correct and fundamental, and yet in conflict with each other. In addition, value-pluralism postulates that in many cases, such incompatible values may be incommensurable, in the sense that there is no objective ordering of them in terms of importance.