Friday, May 31, 2019

Piracy Essay -- Technology Software Computers Essays

piracyPiracy is the unauthorized writeing, counterfeiting or distribution of software. Piracy is essentially stealing someone elses adroit property. The five most common types of software piracy are end physical exerciser piracy, client-server overuse, Internet piracy, hard disk loading, and software counterfeiting. End User Piracy occurs when an employee of a company reproduces software without the proper authorization. End User Piracy can be done in several different ways. utilize one licensed copy to install a program on multiple computers . Copying disks for installation and distribution . Taking advantage of upgrade offers without having a legal copy of the version to be upgraded . Acquiring academic or other restricted or non-retail software without a license for commercial use . Swapping disks in or outside the workplace 6 Client-Server overuse occurs when too many employees on a network are use a central copy of a program at the same time. When using a program in this way, it must be stated in the license. By having more employees using the software than stated in the license, is defined as overuse. Internet Piracy occurs when software is transfered from the Internet. Although the product was acquired through the Internet, the same rules apply as if it were bought in a store. Internet Piracy can be done in several different ways. Pirate websites that make software available for free download or in exchange for uploaded programs . Internet auction sites that offer counterfeit, out-of-channel, infringing copyright software . Peer-to-Peer networks that enable unauthorized transfer of copyrighted programs. 6 Hard-Disk Loading occurs when a chore w... ...chelle, China on Pirates Blow Em Down, Wired Online Magazine, October 17, 2001. <http//www.wired.com/news/politics/0,1283,47617,00.html6 Business Software Alliance, Types of Piracy, Business Software Alliance, 2004. <http//www.bsa.org/usa/antipiracy/Types- of-Piracy.cfm7 Copyright Law of the United States of America, US Copyright Office. <http//www.copyright.gov/title17/92chap1.html1028 Travel Pictures. <http//www.cs.unm.edu/dlchao/travel/9 Business Software Alliance, Sixth Annual BSA Global Software Piracy Study, Business Software Alliance, June 2000. <http//global.bsa.org/resources/2001-05- 21.55.pdf10 The Complete Reference to the web Sites of China Law, <http//www.chinasite.com/Law.html11 Markkula Center for Applied Ethics,<http//www.scu.edu/ethics/

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.