.

Saturday, March 30, 2019

Software Piracy From An Islamic Perspective Information Technology Essay

Softw ar Piracy From An Islamic Perspective Information Technology attemptSoftw be plagiarisation is considered to be un ethical as such practice whitethorn hugely affect the right of ones ownership towards his/her mathematical products and piece of leans. However, statistics ( conferhttp//www.nationmaster.com/graphical record/cri_sof_pir_rat-crime- package- buc cle atomic number 18ering-rate) indicate that the rate of computer softw ar program system package plagiarisation is graduate(prenominal) especially among the ontogenesis nations, in which studyity of them be Muslims. In fact, this trouble seems to eat no ending point despite all the efforts and initiatives done either at the individual, group, national or international levels.Discuss this critical issue of bundle plagiarization in the light of Islamic point of view on ethics and ownership.Everywhere in the face of this earth, the issue of exploitation pirated packet is widely talked and discussed by people . However, do people really understand and crawl in what is the meaning of parcel program system piracy, the procure irreverence of packet (often referred to as package piracy) refers to several practices which involve the unaccredited copying of computer bundle. Copyright infringement of this kind is extremely common. Most countries have secure laws which apply to softw atomic number 18, however the degree of enforcement varies1. There are several reasons not to use pirated or pirate packet. Firstly, it is misappropriated and thither is liability on your part. Its risky. If the software is from an unauthorized source, you could be getting a program that is not fully functional. second, there wont be an opposite version of the software if there is no revenue to put back into research and development. This revenue has made the product affordable to legitimate users. 3rdly, it is totally not ethical. Or we like to verify doing the right thing when no one is looking. A sk yourself how you would feel if your lifes work went without compensation? Start now and be an ethical professional.2Software piracy refers to the act of copying unalike computer software without having to pay for them. This is a form of stealing intellectual property. Intellectual property and copyright run under the same area which declared that copyright provides legal rights alone given for a definite periods to the creators of an intellectual work, e.g. literary kit and caboodle (anything in writing), artistic kit and boodle (drawings, maps, plans etc), musical works, films, sound recordings, computer programs (source and object mark) for bar clear or any otherwise use. It is, in principle, not concerned with things that are not perceivable, such as abstract ideas, theory, and the like. Copyright protection begins when works are actually created and fixed in a tangible form. the uphill digital engine room, increasing use of computers, communication technology and th eir convergence into an compound information technology, have given rise to challenging legal issues for copyright and many mire are expected in the future, the ease of distribution, fastener digital information and proliferation of computer mesh topologys, raise concerns about copyright. Copyright was knowing for three basic reasons to reward creators for their authoritative works to encourage accessibility of the works to the reality and to facilitate access and use of copyrighted works by their public in certain circumstances.3As mentioned out front, software piracy is illegal. Sarcastically, many who are practicing and involving in pirate software are fully aware of the legalities, though they are able to reduce continuing the practice. more or less think about the only solution that works without splurging too oftentimes money on purchasing the product.Around the world, authorities are already enlisted and stated the laws regarding software piracy, these are few of th em4 cook Copies Producing counterfeit copies and merchandising them to other consumers is a grave iniquity. There are unlike punishments in different countries but all are in agreement that base money off of someone elses intellectual property is an offense. This includes making copies of different software, such as games, video games and other software that is used for the computer.Distributing Counterfeit Copies Creating counterfeit copies and giving them remote is too a form of piracy. tear down if the person does not charge anything for these copies, it is considered an offense as the person is not the owner of the copyright or does not have the consent of the copyright owner to distribute the copies. This is one of the most rampant piracy practices that the anti-piracy necktie is trying to fight.Selling computing artifices with Pre-installed Pirated Software Although the item for sale here is the computer, this is considered an offense as the computer for sale is lo aded with different pirated programs. This act is as well as known as hard disk loading. This is considered an offense be baffle the consumer who entrust grease ones palms the computer does not receive the copy of the original program and the other items included with it, including the CDs or license agreements.Online Sharing Sharing of software online is prohibited. Freeware and shareware programs are the only programs that potbelly be distributed online. Other software is not allowed to be shared with other people everytouch the net income. This as well includes piracy music. The Internet butt be used as a means of transfer illegal software to different people around the world. This is the case for fix of copyright software.Shareware with No License Although shareware lav be legally distributed over the Internet, it becomes illegal when the license for use has already expired. This works for software that can be downloaded for a unleash trial. Using this software aft er the free trial has expired is considered software piracy. Software licensing must be acquired before these shareware programs can be shared with anyone else.Islam is supposed to be a carry out way of life. A Muslim is bound by Islamic rules and then is obliged to follow the instructions as prescribed in the record book and Hadiths. Islam is a religion based upon the surrender to God (Allah). The very constitute of the religion, al-Islam in Arabic, means submission and peace, for it is in submitting to Gods will that human beings gain peace in their lives in this world and in the hereafter. Islam is considered to be a comprehensive religion and its ethical system is considered to be one of the major ethical systems. Owing to the importance of establishing an ethical system in the athletic field of IT, especially at our present time which is witnessing an ever increasing ethical problems, several specialist organizations have prepared write in codes of ethics to be complied w ith by members of those organizations.5The main agendas which can be recognized to ethics in notification to information technology can be tied down to hacking, privacy, software piracy and IT personnel work ethics. By taking into deeper look, we begin to gather that ethics and information technology involve more issues which on the full are just as worst. These are some issues relatedComputer professionals responsibilities towards their employers and their clientsProper documentation of software by designers and developersProper testing of software by designers and developersHandover of systems to clientsDesigners and developers leaving a computer project mid-streamProviding maximum shelter of software to clientsComputer professionals honoring the proprietary issues relating to the algorithms, procedures and dataComputer professionals working towards accurate systems with the aim ofComplete data integrity andComputer professionals contact in developing systems aimed at unethic al ends.In defining the concept of harm that can be done by an IT professional or just normal people and civilians, harm can be outlined as the undesired effects to individuals or organizations go outing from any task or system (software) used. In order to avoid the harm Allah has warned us to be honest and putworthy through his word of wisdom which is Al-Quran in Surah 13, Ayah 119 O ye who believe Fear Allah and be with those who are truthful. And Prophet Muhammad (saw) has said The dealer must avoid five qualities, otherwise he should not steal or sell Usury, swearing by God that the merchandise is skillful, refuse the defect, commending (the commodity) when selling and belittling (it) when he is buying (Tahtheeb al-Ahkam Ch. 7).6The verses above clearly try the importance of telling the truth and how God perceives those who tell the truth and how they are rewarded. The first verse encourages people to be in the group of those who are honest and only tell the truth whilst t he second verse portrays the groovy reward of those who were truthful on earth.Suggest potential solutions to at least minimise the act of software piracy among these societies. onward we can lam on to the deeper solutions, why not we discover what the real are cause the occurrence of software piracy. Causes of piracy and counterfeiting whitethorn include rising damage of original software, making them unaffordable to a large segment of the population, advances in technology (tools for reproduction of copyright product) making piracy an easy task, low starting cost for pirating, absence or lack of enforcing copyright laws, huge acquire can be made easily by pirates and weak arrest (fines and prison sentences are minimal).The literature fires that many factors explain the software piracy phenomena. These factors are grouped into four categories first is an economic factor suggest that Gross Domestic Product (GDP) per capita is inversely related to software piracy level. Giv en the decrease in software prices, it may be that a countrys GDP has a less effect on piracy than it did some years ago. Second is ethnical factors software piracy is assumed to be more prevalent in nations with a weak IT infrastructure since the tonus of available software is lower. Thus, people often copy and work with pirated software. The problem is compounded as software revisions occur. While the remove to dwell emulous through upgrades is important, it is worthwhile only when affordable. Thirdly is regulatory factors developing countries may unintentionally encourage software piracy by imposing high tariffs, hence increasing the cost of software. It is also believed that lack of penalties for buying pirated software are also reasons for piracy growth. And lastly social/cultural factors these factors refer to the prevailing social and cultural attitudes shared by members of a society. many studies have indicated that the culture factor influences a countrys software pirac y rate.7 get through with the causes, the disadvantages are seen to come along due to lack of public awareness of in third world countries. There is probably the wooly revenue to the companies and countries involved, the change magnitude prices by software companies to compensate for losses, lost jobs wherever software companies have plants, lost domestic and foreign investments, lost trust in the ability of some countries to protect intellectual property, immoral occupation condemned by all religions, illegal activity leading to prosecution and increased international pressure at the economic, financial, Political level. According to Robert Hollyman, BSA president and master(prenominal) executive officer, software piracy robs the global economy of hundreds of thousands of jobs and billions of dollars in struggle and tax revenues.8Given the situation of software piracy in campus since it is a small community yet has quite big of potential software piracy practice. Software pir acy on college campuses may be mostly divided into two categories. The first occurs when the institution itself is violating copyright law. This results when installations of software programs are in excess of the terms stated in the licensing agreement or under law. For example, software that is licensed for use on a single machine is installed on many computers or on a network server, allowing unlimited access. Oftentimes, the condition is unaware of the problem as a result of poor or no software management.In other instances the school simply cannot afford to buy software and chooses to risk the infringements. Students more normally conduct the second type of piracy. In this scenario the piracy often takes place on the Internet where students trade or simply give away software programs as one would trade. If the students are apply the schools network or computers to facilitate their illegal activity, the college itself may be held liable. All members of the campus community c an take steps to embarrass such illegal activity and minimize misuse of computer resources. It is important to promote an understanding of the law and to control that unique(predicate) procedures and protocols are implemented to establish a foundation on which illegal activity may be prevented.9Discussing these two issues, there are five solutions offered to enable schools to be software legalAppoint a software manager.Create and implement a computer usage policy, including software and Internet access.Conduct periodic software audits.Establish and maintain a software log of licenses and registration materials.Teach and promote awareness of software compliance.It is stated above that in the case of school, college or university software piracy where some solutions are proposed but, generally these are some more solutions and tips to prevent or lessen the software piracy. The first tip is by applying the code key For the past 5 to 7 years, software developers have devised a plan to lessen or prevent software piracy. This is by using a code key. A code key comes with the software that you buy. Before fully installing the software on your computer, you must provide the specific code key that came with the software. After providing the code key, you can run the software on your computer. The code key also locks after it has been used. This is so that the software cannot be installed on other computers after it has been installed on one. You will have to call the manufacturer of the software to be able to use the code key again. This is not good news to people who pirate software.Secondly is the introduction of open source described as free software that anyone can download from the Internet. A lot of different software can are licensed as open source. Open source software is under the license free software license. There are also different upgrades for these open source software that can also be freely downloaded from the Internet. By using open source softwar e, people dont need to worry about spending a lot of money for original copies of software. This will also lessen the number of people who are using pirated software as there are alternative programs that can be used and they do not have to pay fines when they are caught.Third is the hardware key a hardware key is a device that is used for anti-piracy. This tool prevents software vendors to distribute their products or use them without confidence from the copyright owner of the software. The hardware key works when it is attached to a computer. It monitors software licensing and enforces licensing of the protected software that is detected on the computer. This tool will lessen software vendors from illegally distributing the software that they have and is a good prevention measure for piracy.And lastly is anti-piracy software there are different types of anti-piracy software that are available for free. Anti-piracy software is used to prevent illegal duplication or illegal use of copyrighted software. There is also an anti-piracy software that prevents hackers from getting into the software and copying it without consent from the copyright owner. roughly of them are also already integrated on the disks of the software that contains the program. This may also be for piracy music. The anti-piracy association is also looking for other ways to prevent software piracy. Reporting anti-piracy may prevent it from happening.10These are some of the measures that have been implemented or created to stop and prevent software piracy. With the improvement of technology, there are a lot of things people can use to bypass these piracy measures but there are constantly new and effective things to use against piracy.The issue of software piracy seems to remain a permanent feature of the marketplace. It is a problem that will not go away, but it can be controlled or curbed to reduce its contradict effect on the companies and countries involved. There are some measures that can be taken to reduce piracy acts and the losses associated with them. Piracy is not departure to be eliminated or eradicated from the world, but it sure can be curbed and cut back to its minimum activities with the cooperation of the developed and the developing countries in taking these drastic measures to make the world a better place to live.

No comments:

Post a Comment