Discussing The Critical Issue Of Software Piracy Information Technology Essay

Software piracy is known as to be unethical therefore act may hugely influence the right of your respective possession towards his/her products and piece of works. However, reports (refer:http://www. nationmaster. com/graph/cri_sof_pir_rat-crime-software-piracy-rate) show that the rate of software piracy is high especially on the list of developing nations, in which majority of them are Muslims. In fact, this problem appears to have no closing point despite all the work and initiatives done either at the average person, group, nationwide or international levels.

Discuss this critical issue of software piracy in the light of Islamic viewpoint on ethics and ownership.

Everywhere in the face of this earth, the problem of using pirated software is widely talked and talked about by people. However, do people really understand and know very well what is this is of software piracy, the copyright infringement of software (often referred to as software piracy) refers to several techniques which entail the unauthorized copying of computer software. Copyright infringement of the kind is extremely common. Most countries have copyright laws which connect with software, but the degree of enforcement varies. There are several reasons not to use pirated or pirate software. First of all, it is against the law and there is responsibility on your part. It's dangerous. If the software is from an unauthorized source, you will be getting a program that is not fully functional. Secondly, there will not be another version of the software if there is no revenue to put back to research and development. This income has made the product affordable to legitimate users. Thirdly, it is very not ethical. Or we like to say "doing the right thing when nobody is looking. " Consider how you would feel if your life's work travelled without compensation? Begin right now and become an moral professional.

Software piracy identifies the act of copying different software applications and never have to purchase them. That is a kind of stealing intellectual property. Intellectual property and copyright fall under the same area which announced that copyright provides legal rights solely given for a particular periods to the makers associated with an intellectual work, e. g. literary works (anything on paper), imaginative works (drawings, maps, strategies etc), musical works, movies, audio recordings, computer programs (source and object code) for sale or any other use. It is, in process, not worried about things that are not perceivable, such as abstract ideas, concept, and so on. Copyright protection commences when works are in reality created and fixed in a tangible form. the growing digital technology, increasing use of computers, communication technology and their convergence into an integrated information technology, have given rise to challenging legalities for copyright and many mire are anticipated in the foreseeable future, the simple distribution, modifying digital information and proliferation of computer networking, increase concerns about copyright. Copyright was designed for three basic reasons: to encourage creators because of their original works: to encourage availability of the works to the public; and to help in access and use of copyrighted functions by their public using circumstances.

As discussed earlier, software piracy is outlawed. Sarcastically, many who are 'rehearsing' and affecting in pirate software are totally alert to the legalities, though they are able to reduce continuing the practice. Some think about the only solution that works without splurging too much money on purchasing the product.

Around the earth, authorities already are enlisted and explained the regulations regarding software piracy, they are some of them:

Counterfeit Copies - Producing counterfeit copies and providing those to other consumers is a grave criminal offense. There are different punishments in different countries but all are in contract that making money off of somebody else's intellectual property can be an offense. This includes making copies of different software, such as game titles, video gaming and other software that is employed for the computer.

Distributing Counterfeit Copies - Creating counterfeit copies and giving them away is also a form of piracy. Even though the person does not bill anything for these copies, it is considered an criminal offense as the individual is not who owns the copyright or doesn't have the consent of the copyright owner to disperse the copies. This is one of the most rampant piracy procedures that the anti-piracy connection is trying to fight.

Selling Computers with Pre-installed Pirated Software - Although that for sale this is actually the computer, this is considered an offense as the computer on the market is packed with different pirated programs. This work is also known as hard disk launching. That is considered an criminal offense because the consumer who will buy the computer does not receive the backup of the original program and the other items incorporated with it, like the CDs or license agreements.

Online Sharing - Sharing of software online is prohibited. Freeware and shareware programs are the only programs that can be sent out online. Other software is not allowed to be distributed to other people over the Internet. This also includes piracy music. The Internet can be used as a way of transmitting unlawful software to different people across the world. This is the case for plenty of copyright software.

Shareware with No License - Although shareware can be legally distributed over the Internet, it becomes unlawful when the license for use has already expired. This works for software that may be downloaded for a free of charge trial. Applying this software following the trial offer has expired is considered software piracy. Software licensing must be obtained before these shareware programs can be distributed to other people.

Islam is supposed to be always a complete way of life. LADY is destined by Islamic rules and hence is obliged to check out the instructions as recommended in the Quran and Hadiths. Islam is a faith based after the surrender to God (Allah). The very name of the religious beliefs, al-Islam in Arabic, means submission and peace, for it is at submitting to God's will that humans gain tranquility in their lives nowadays and in the hereafter. Islam is known as to be a comprehensive religion and its ethical system is considered to be one of the major honest systems. Due to the value of creating an honest system in neuro-scientific IT, especially at our present time which is witnessing an ever increasing honest problems, several specialist organizations have prepared codes of ethics to be complied with by users of those organizations.

The main agendas which is often recognized to ethics with regards to information technology can be tied down to hacking, personal privacy, software piracy and IT personnel work ethics. By firmly taking into deeper look, we get started to realize that ethics and it involve more issues which overall are equally worst. They are some issues related:

Computer professionals' obligations towards their employers and their clients;

Proper documentation of software by designers and developers;

Proper assessment of software by designers and builders;

Handover of systems to clients;

Designers and programmers leaving some type of computer task mid-stream;

Providing maximum security of software to clients;

Computer experts honoring the proprietary issues associated with the algorithms, techniques and data;

Computer professionals working towards correct systems with desire to of

Complete data integrity; and

Computer pros' involvement in producing systems targeted at unethical ends.

In defining the idea of "harm" that you can do by an IT professional or just normal people and civilians, injury can be explained as the undesired effects to individuals or organizations caused by any activity or system (software) used. In order to avoid the damage Allah has warned us in all honesty and reliable through his term of intelligence which is Al-Qur'an in Surah 13, Ayah 119: "O ye who consider! Fear Allah and become with those who find themselves truthful. " And Prophet Muhammad (saw) has said: "The investor must avoid five features, otherwise he should not buy or sell: Usury, swearing by God that the item is good, withholding the defect, commending (the commodity) when offering and belittling (it) when he is buying" (Tahtheeb al-Ahkam Ch. 7).

The verses above clearly emphasize the importance of telling the reality and how God perceives those who notify the truth and how they can be rewarded. The first verse induces people to maintain the group of those who are honest and only tell the truth whilst the second verse portrays the fantastic reward of those who have been truthful on the planet.

Suggest potential answers to - at least - decrease the take action of software piracy among these societies.

Before we can move on to the deeper solutions, you will want to we discover what the real are cause the event of software piracy. Factors behind piracy and counterfeiting may include rising cost of original software, making them unaffordable to a large segment of the populace, advancements in technology (tools for reproduction of copyright product) making piracy an easy process, low starting cost for pirating, absence or insufficient enforcing copyright laws, huge earnings can be produced easily by pirates and weakened deterrent (fines and jail sentences are nominal).

The literature suggests that many factors describe the program piracy phenomena. These factors are grouped into four categories: first is an economic factor; claim that Gross Domestic Product (GDP) per capita is inversely related to software piracy level. Given the reduction in software prices, it may be that a country's GDP has a less effect on piracy than it does some years ago. Second is ethnical factors; software piracy is assumed to become more prevalent in countries with a vulnerable IT infrastructure since the quality of available software is leaner. Thus, people often copy and use pirated software. The problem is compounded as software revisions arise. As the need to remain competitive through updates is important, it is useful only once affordable. Finally is regulatory factors; expanding countries may unintentionally encourage software piracy by imposing high tariffs, hence increasing the expense of software. Additionally it is believed that insufficient penalties for buying pirated software are also known reasons for piracy development. And lastly cultural/cultural factors; these factors make reference to the prevailing interpersonal and cultural attitudes shared by associates of a world. Many reports have mentioned that the culture factor affects a country's software piracy rate.

Getting through with the complexities, the disadvantages have emerged to come along due to lack of public awareness of in third world countries. There is just about the lost income to the companies and countries engaged, the increased prices by software companies to compensate for deficits, lost careers wherever software companies have vegetation, lost home and foreign purchases, lost trust in the power of some countries to safeguard intellectual property, immoral activity condemned by all religions, against the law activity leading to prosecution and increased international pressure at the financial, financial, Politics level. According to Robert Hollyman, BSA chief executive and chief executive officer, software piracy robs the global overall economy of thousands of jobs and vast amounts of dollars in salary and tax income.

Given the situation of software piracy in campus since it is a little community yet has quite big of potential software piracy practice. Software piracy on school campuses may be generally divided into two categories. The first occurs when the organization itself is violating copyright laws. This results when installations of software packages are in excess of the terms mentioned in the licensing arrangement or under law. For example, software that is qualified for use on a single machine is installed on many computer systems or on a network server, allowing unlimited access. Oftentimes, the institution is unacquainted with the problem consequently of poor or no software management.

In other situations the school simply cannot afford to buy software and selects to risk the infringements. Students additionally conduct the next kind of piracy. In this scenario the piracy often occurs on the web where students trade or simply give away software programs as you would trade. If the students are using the school's network or computers to aid their illegitimate activity, the college itself may be organised liable. All people of the campus community may take steps to prevent such illegal activity and lessen misuse of computer resources. It's important to promote a knowledge of the law and also to ensure that specific types of procedures and protocols are carried out to determine a foundation on which illegal activity may be avoided.

Discussing both of these issues, there are five solutions offered to enable academic institutions to be software legal:

Appoint a software supervisor.

Create and put into practice a computer utilization insurance policy, including software and Access to the internet.

Conduct regular software audits.

Establish and maintain a software log of licenses and enrollment materials.

Teach and promote awareness of software conformity.

It is stated above that in the case of school, college or university or school software piracy where some alternatives are suggested but, generally they are some more alternatives and tips to avoid or lessen the software piracy. The first hint is through the use of the code key - For the past 5 to 7 years, software creators have devised a plan to reduce or prevent software piracy. That is by using a code key. A code key includes the program that you get. Before fully installing the software on your pc, you must provide the precise code key that was included with the program. After providing the code key, you can run the program on your computer. The code key also locks after it's been used. This is so the software cannot be installed on other computers after it's been installed using one. You will have to call the manufacturer of the software to have the ability to use the code key again. This isn't good news to people who pirate software.

Secondly is the advantages of open source; referred to as free software that anyone can download from the Internet. A whole lot of different software can are qualified as open source. Open up source software is under the license free software certificate. There are also different updates for these open source software that can be freely downloaded from the Internet. By using open up source software, people won't need to fret about spending a lot of money for original copies of software. This will also lessen the number of people who are using pirated software as there are different programs that can be used and they do not have to pay fines when they are trapped.

Third is the hardware key; a hardware key is a tool that is employed for anti-piracy. This tool prevents software vendors to disperse their products or utilize them without authorization from the copyright owner of the software. The hardware key works when it is attached to your personal computer. It screens software licensing and enforces licensing of the shielded software that is detected on the computer. This tool will decrease software vendors from illegally distributing the software they have and is a good prevention solution for piracy.

And lastly is anti-piracy software; there will vary types of anti-piracy software that exist free of charge. Anti-piracy software is used to prevent unlawful duplication or against the law use of copyrighted software. Addititionally there is an anti-piracy software that prevents hackers from getting into the program and duplicating it without consent from the copyright owner. A few of them are also already included on the disks of the software that contains this program. This may also be for piracy music. The anti-piracy association is also looking for other ways to prevent software piracy. Reporting anti-piracy may prevent it from going on.

These are some of the measures which may have been carried out or created to stop and stop software piracy. Using the improvement of technology, there are a lot of things people can use to bypass these piracy options but there are always new and effective things to use against piracy.

The issue of software piracy seems to remain a long lasting feature of industry. It is an issue that will not go away, but it could be manipulated or curbed to reduce its negative influence on the firms and countries engaged. There are some measures that can be taken up to reduce piracy works and the loss associated with them. Piracy won't be taken away or eradicated from the planet, but it absolutely sure can be curbed and reduced to its least activities with the cooperation of the developed and the growing countries in taking these drastic measures to help make the world an improved location to live.

  • More than 7,000 students prefer us to work on their projects
  • 90% of customers trust us with more than 5 assignments
Special
price
£5
/page
submit a project

Latest posts

Read more informative topics on our blog
Shiseido Company Limited Is A Japanese Makeup Company Marketing Essay
Marketing Strength: Among the main talents of Shiseido is its high quality products. To be able to satisfy customers, the company invested a great deal...
Fail To Plan You Plan To Fail Management Essay
Management This report will concentrate on two aspects of project management, their importance within the overall project management process. The report...
Waste To Prosperity Program Environmental Sciences Essay
Environmental Sciences Urban and rural regions of India produce very much garbage daily and hurting by various kinds of pollutions which are increasing...
Water POLLUTING OF THE ENVIRONMENT | Analysis
Environmental Studies Pollution Introduction Many people across the world can remember having walked on the street and seen smoke cigars in the air or...
Soft System Methodology
Information Technology Andrzej Werner Soft System Methodology can be described as a 7-step process aimed to help provide a solution to true to life...
Strategic and Coherent methods to Recruiting management
Business Traditionally HRM has been regarded as the tactical and coherent method of the management of the organizations most appreciated assets - the...
Enterprise Rent AN AUTOMOBILE Case Analysis Business Essay
Commerce With a massive network of over 6,000 local rental locations and 850,000 automobiles, Organization Rent-A-Car is the greatest rental car company...
The Work OF ANY Hotels Front Office Staff Travel and leisure Essay
Tourism When in a hotel there are careers for everyone levels where in fact the front office manager job and responsibilities,assistant professionals...
Strategy and international procedures on the Hershey Company
Marketing The Hershey Company was incorporated on October 24, 1927 as an heir to an industry founded in 1894 by Milton S. Hershey fiscal interest. The...
Check the price
for your project
we accept
Money back
guarantee
100% quality