Exploring Software Piracy Essay

1083 words - 4 pages

Exploring Software Piracy

Software Piracy refers to the unauthorized use or copying of software.
When a user purchases a software program, he does not purchase the
software itself, but the right to use the software. This right is
governed by a licence. When you purchase a boxed software product, you
receive a CD, manuals and a licence agreement. This licence generally
allows you to use the software on one workstation. In the work place,
it may be tempting to install this software onto all of your
workstations. Where the user acts in a manner contradictory to the
terms of the licence, he has probably committed software piracy.

Advantages of Piracy:

There are certainly advantages to pirating software. Main benefits
include:

· Cost: Pirated software costs nothing, or close to nothing, to
obtain. When a consumer wants to buy a software package which costs
upwards of € 2,000 (example: AutoCAD, Starry Night), the amount of
money saved by pirating software is certainly really big. The consumer
cannot afford to buy all the software’s of the market in order to have
a complete opinion of which one is the most appropriate for the
working sector, because usually the software’s have a demo edition in
which the most important components are disabled.

· Easy to Acquire: Pirated software is extremely easy to find, whether
online, or sold openly in foreign countries, or simply provided by
friends. In fact, in many cases, it easier for someone to go online
and download an illegal copy of a software program than to drive to a
store and buy it from a retailer.

· Anonymity and Personal Privacy: Pirating software can be committed
without going out of the house, or even interacting with any person.
Thus, it is very tempting to commit this "victimless" crime. A major
issue is the anonymity we have when we do not need to subscribe with
our real ID because we can never be sure that no third-party people
are getting our so called “personal privacy”(how can we be sure that
when we send Microsoft our serial number only, is not receiving some
other personal information also?). And most of the times we all have
seen our mailbox full of junk e-mails and we try to understand how did
these people got our e-mail address…

· Profit: Although most software pirates do not profit directly from
pirating software, the temptation to make money by selling illegal
programs is strong. All one needs to become a software pirate is a CD
burner, which now cost as little as €100, and the pirate's computer
can become a virtual cash cow. Even selling a pirate cd on the cost of
1/3 of the...

Find Another Essay On Exploring Software Piracy

This paper is about computer copyright laws. It also goes itto software copyright laws.

2676 words - 11 pages -obvioussoftware functions comes serious problems. The latest new technology, be it ray-tracing 3D engines,anti-aliasing software, or a new internet exploring fad can be patented. This would mean that only onecompany and its software could use it. Any other companies that wanted to use the software would have topay them a large sum of money for the rights. Also, since patent hearings are conducted over a period of3 years, and in secrecy, company

Computer Crime, hacking, phreaking and software piracy

1399 words - 6 pages as Boxes inthe underground. Most are the size of a pack of smokes, or than can besmaller or bigger. I will not go too deep. They are electronic devicesthan do various things, such as make outgoing calls free, make incomingcalls free, simulate coins dropping in a phone, etc. People who 'Phreak'are caught alot these days thanks to the new technology.Software Piracy is the most common computer crime, it is the illegalcoping of software. 'People

The Ethics of Microsoft’s Product Pricing Structure

3465 words - 14 pages decisions often help sway consumers. In recent years, many governments around the world have begun exploring using open source products such as Linux to trim the costs associated with buying software. In response to this, “Microsoft has stepped up its efforts to work with governments, significantly boosting its government relations staff in recent years.”[6] In addition to being a customer, Governments are also key players in protecting the

The music Industry

6981 words - 28 pages sharing services. The music industry claims that these are centres for illegal piracy. Even though this option is illegal, more and more such networks and software to support them keep emerging. In a report from NPD Group (October 2004) it was found that between 4.7 million and 6.4 million US households still had someone using peer-to-peer (P2P) sites. Even though not covering Europe this statistic shows the proportion of illegal downloads that may

Computer crimes need to be prevented and halted through increased computer network security measures as well as tougher laws and enforcement of those laws in cyberspace

3335 words - 13 pages trespassing, copyrighted-information piracy, and vandalism--have been perpetrated by computer hobbyists, known as 'hackers,' who display a high level of technical expertise. For many years, the term hacker defined someone who was a wizard with computers and programing. It was an honor to be considered a hacker. But when a few hackers began to use their skills to break into private computer systems and steal money, or interfere with the system's operations

proposal

4020 words - 16 pages easy generation of graphs and tables. The next step is to use software such as Statistical Package for the Social Sciences (SPSS) to get the readings for data interpretation. SPSS is a comprehensive and flexible statistical analysis and data management solution. SPSS can take data from almost any type of file and use them to generate tabulated reports, charts, and plots of distributions and trends, descriptive statistics, and conduct complex

Reality and Illusion in Shakespeare's Hamlet - Reality, Appearance and Deception

896 words - 4 pages Reality and Illusion in Hamlet   Shakespeare’s play, Hamlet, begins with the appearance of a ghost, an apparition, possibly a hallucination. Thus, from the beginning, Shakespeare presents the air of uncertainty, of the unnatural, which drives the action of the play and develops in the protagonist as a struggle to clarify what only seems to be absolute and what is actually reality. Hamlet's mind, therefore, becomes the central force of the

Sub-plots in Hamlet

1118 words - 4 pages Sub-plots in Hamlet   There are many things that critics say make Hamlet a "Great Work," one of which is the way that Shakespeare masterfully incorporates so many sub-plots into the story, and ties them all into the main plot of Hamlet’s revenge of his father’s murder. By the end of Act I, not only is the main plot identified, but many other sub-plots are introduced. Among the sub-plots are trust in the Ghost of King Hamlet, Fortinbras, and

Hamlet as Victim and Hero

1301 words - 5 pages Hamlet as Victim and Hero      Hamlet, Prince of Denmark, a Shakespearean tragedy, tells the story of Prince Hamlet, who gained the knowledge of a terrible incident that his kingdom had suffered. Claudius, the king of Denmark and Hamlet's uncle, had killed his own brother, the king, who was also the father of Hamlet, and married his brother's widow. Hamlet suffered these traumas to a severe degree, and his only relief was to defeat his

Essay on Light and Dark in Antigone

1188 words - 5 pages Use of Light and Dark in Antigone   The "Golden Age" of Greece is noted for its many contributions to the creative world, especially in its development of the play. These performances strived to emphasize Greek morals, and were produced principally for this purpose. Antigone, by Sophocles, is typical. The moral focused on in Antigone is the conflict between physis (nature) and nomos (law), with physis ultimately presiding over nomos

charant Creon as the Main Character of Antigone

1231 words - 5 pages Creon as the Main Character of Antigone   Throughout the Greek play Antigone by Sophocles, there exists a dispute as to who should receive the designation of main character. Antigone, the daughter of the cursed King Oedipus, as well as Creon, stately king of Thebes, both appear as the key figures in this historic play. I believe that Creon, king of Thebes, should be considered the main character in this work of Greek theater. Three

Similar Essays

Cyber Criminology: Exploring Internet Crimes And Criminal Behavior By K. Jaishankar

3422 words - 14 pages or sharing copyrighted digital goods, software, digital documents, and digital audio without the permission from the owner or without paying for it (Higgins & Jaishankar, 2011, p.141). Digital piracy became illegal when the 1974 Copyright Act was made and established (Higgins & Jaishankar, 2001, p.141). This act was then followed by the making of the No Electronic Theft Act (Higgins & Jaishankar, 2011, p.141). The people who download any of

Internet Ethics: Issues That Push The Boundaries

1371 words - 5 pages . Business Software Alliance(BSA). (2000-2001). Internet Piracy. Retrieved December 6, 2001, from http://new.bsa.org/usa/netpiracy. Salon.com. (2001). Life After Napster. Retrieved December 11, 2001, from http://www.salon.com/audio/col/tech/2001/02/16/technology/index.html).

Software And Copyright Essay

2838 words - 11 pages , but to not change the laws will cost more. With the ability to patent new and non-obvious software functions comes serious problems. The latest new technology, be it ray-tracing 3D engines, anti-aliasing software, or a new internet exploring fad can be patented. This would mean that only one company and its software could use it. Any other companies that wanted to use the software would have to pay them a large sum of money for the rights. Also

Software And Copyright. Essay

2805 words - 11 pages patent new and non-obvious software functions comes serious problems. The latest new technology, be it ray-tracing 3D engines, anti-aliasing software, or a new internet exploring fad can be patented. This would mean that only one company and its software could use it. Any other companies that wanted to use the software would have to pay them a large sum of money for the rights. Also, since patent hearings are conducted over a period of 3 years, and