SlideShare a Scribd company logo
1 of 17
Motivations behind Software Piracy:
Relevance to Computer Ethics Theories
DR. SAPTARSHI GHOSH
Computer Ethics
• Computer Ethics is a study of ethical issues that are related mainly
with computing machines and computing profession. The features of
internet that, it is global and interactive, it allows users to stay
anonymous, and it enables reproducibility of information possible
unlike before makes the online behavior morally different. Computer
ethics studies the nature and social influence of computing machines
and ethical issues in formulating and justification of policies.
19/05/2020 2
Software Piracy
• Software Piracy, which is the unauthorized use or copying of software
illegally, has become a major problem for businesses and it is
widespread in many parts of the world which led to drain of economy.
As the access to use computer grows, the percentage for using
pirated software also grows. The Business Software Alliance (BSA) and
the Software Publishers Association (SPA) made estimation (2010)
that there are two-ten illegal copies of software are available for
every legal copy of software sold.
19/05/2020 3
Ethical Issues
• According to Kizza, the role of ethics is to help societies distinguish
between right and wrong and to give each society a basis for
justifying the judgment of human actions. Thus the purpose of ethics
is to analyze the morality of human behaviors, policies, laws
and social structures. (Kizza, 2013)
19/05/2020 4
What constitutes Computer Ethics?
• Computer ethics is a field of applied ethics that addresses ethical
issues in the use, design, and management of information technology
and in the formulation of ethical policies for its regulation in the
society. (Brey & Søraker, 2009) Computer ethics analyzes the moral
responsibilities of computer professionals and computer users and
ethical issues in public policy for information technology development
and use. (Brey, 2007)
19/05/2020 5
Utilitarianism and Software Piracy
• Assessing software piracy from a utilitarian perspective gives very interesting and conflicting
ideas. As the focus here is on the results of the action than the action itself, arguments can be
made that an individual act of piracy is not unethical.
• In other words, it is possible to conclude that piracy results in the greatest good for the greatest
number, because many users get the benefit of the software at little or no cost, while only those
directly involved in producing it suffer any harm. The argument is strengthened when the cost of
the software in low-income countries is considered.
• As people could not afford the software at its regular price, the benefit seems especially great,
while the producers having more access to resources do not suffer a corresponding harm.
• Many people also cite the fact that much of software is overpriced, which probably makes it ok
to illegally copy it when users can.
• However, at the same time utilitarianism also suggests different conclusion. If the consideration is
extended to who benefits and who is harmed, the results are different. In this case, the question
to be asked is what good a person would derive by using something that belongs to someone else
without paying for it.
19/05/2020 6
Social Contract Theories
• Philosophers such as Rousseau, Locke, Hobbes, and more recently Rawls
are generally considered to be social contract theorists.
• Individuals are rational free agents and hence it is immoral to exert undue
power over them. At the same time government and society treat
individuals as means to social good, and hence are problematic
institutions.
• Social contract theories explain this problem by claiming that morality is
the outcome of rational agents agreeing to social rules, hence the name
social contract.
• Individuals essentially freely agree to follow rules set by the government
and the society, meaning that they are not coerced but freely choose to
participate in the activity. Shared morality is what rational individuals agree
as a group in order to make a social contract. (Johnson & Miller, 2004).
19/05/2020 7
THEORIES OF COMPUTER ETHICS
Weiner’s theoretical underpinning on computer ethics:
• MIT Professor Norbert Wiener argued:
All the process and objects in the universe comprise of matter/energy and
information (Bynum, 2010)
•
All animals are information-processing beings whose behavior depends of
their processing and reasoning capabilities (Bynum, 2010)
•
Humans, unlike other animals, have bodies that make the information
processing in their central nervous system especially sophisticated.
(Bynum, 2010)
19/05/2020 8
Prescriptions by Weiner
• Each human being in the society must be liberated enough to have
the freedom to explore his full extent of abilities, also known as the
principle of freedom (Bynum, 2010)
• The social policies should be equal to everyone living within the
community, also known as the principle of equality (Bynum, 2010)
• The actual goodwill existing between people of the society has no
limits short of those of humanity itself, also known as the principle of
benevolence (Bynum, 2010)
19/05/2020 9
Luciano Floridi’s information ethics
• Information ethics was defined by Luciano Floridi and his colleagues including Jeff
Sanders, who took a radical perspective on computer ethics, taking in account the
nature of computing a well as the presence of human and software agents in
digital environments.
1. The null law which states that entropy should not be cause in the infosphere at
all.
2. Entropy should be prevented from occurring or increasing in the infosphere.
3. Entropy should be removed from the infosphere, if possible
4. The growth and development of all informational objects in the infosphere
should be done in a way that preserves, cultivates and enriches their properties.
19/05/2020 10
Temptations offered by computerization
• Speed
• Privacy and anonymity
• Nature of medium
• Aesthetic attraction
• Increased availability of potential victims
• International scope
• The power to destroy
19/05/2020 11
FACTORS INFLUENCING SOFTWARE PIRACY
• Public Awareness
• High software prices
• Risk of Penalty
• Opportunity
• Equity Theory
• Demographic Variables
• Previous Behaviour
• Moral and social factors
19/05/2020 12
Religion and Computing
• Religion — «Kopimism» — Ctrl+C, Ctrl+V - Missionary Church of
Kopimism
• Kopimism is a religious group centered in Sweden who believe that
copying and the sharing of information is the best and most
beautiful that is. To have your information copied is a token of
appreciation, that someone think you have done something good.
• Isak Gerson: "I'm not the Kopimist Jesus“:
19/05/2020 13
Religion and Computing
• This line of faith is called Kopimism (which originates from the Swedish
pirate term "kopimi," a play on the words “copy me”) and worships the
holy act of copying and spreading information.
• They do not only consider it to be the meaning of life–growing by copying
and spreading knowledge and information–but also its origin, since life
began with the DNA molecule's ability to duplicate itself.
• Kopimism’s religious symbols are CTRL+C and CTRL+V. Their gospel is
spreading fast. Having been around for merely a year, the religion already
counts 4,000 members, and its Swedish mother site has already been
copied everywhere from Russia and Canada, to France and Romania. The
crusade has begun and it looks like Sweden can now enjoy the possibility of
jumping from being one of the least to being one of the most religious
countries in the world.
19/05/2020 14
Missionary church of Kopimism
http://kopimistsamfundet.se/english/
• A religion is a belief system with rituals. The missionary
kopimistsamfundet is a religious group centered in Sweden who
believe that copying and the sharing of information is the best and
most beautiful that is. To have your information copied is a token of
appreciation, that someone think you have done something good.
• * All knowledge to all
• * The search for knowledge is sacred
• * The circulation of knowledge is sacred
• * The act of copying is sacred.
We challenge all copyright believers – most
of which have a great deal of influence in
politics, and who derive their power by
limiting people’s lives and freedom. What
they most of all want to limit the
knowledge. We need to steel ourselves for
their hatred and aggression.
– Copy. download, uplooad!
– All knowlegde to all!
– Information technology is not to be
feathered by laws.
19/05/2020 15
Online Software Piracy Act
?????
19/05/2020 16
References
• Adams, A. A., & McCrindle, R. (2008). Pandora's Box: Social and Professional Issues of the
Information Age. Chichester: John Wiley & Sons.
Arslan, E. (2006). The Repercussions of Software Piracy: Damages, Approaches of Control, and
Benefits from Reducing Piracy Rates. University of Sunderland. GRIN Verlag.
Baldwin, T. (1999). G.E. Moore: The Arguments of the Philosophers. New York: Routledge.
Brey, P., & Søraker, J. H. (2009). Philosophy of Computing and Information Technology. In D.
M. Gabbay, A. Meijers, & J. Woods, Philosophy of Technology and Engineering
Sciences, Volume 9 (pp. 1341-1408). Oxford: Elsevier.
Briggle, A., & Mitcham, C. (2012). Ethics and Science: An Introduction. Cambridge: Cambridge
University Press.
Brooks, L. J., & Dunn, P. (2011). Business & Professional Ethics, 6th edition. Cengage Learning.
Business Software Alliance. (2010). Global Software Piracy 2010. Retrieved from Business
Software Alliance Web site: http://globalstudy.bsa.org/2010/
19/05/2020 17

More Related Content

What's hot

3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and EnterpriseRaymond Gao
 
Could i live without the internet final presentation
Could i live without the internet final presentationCould i live without the internet final presentation
Could i live without the internet final presentationAndrutza Bd
 
Internet a boon or curse
Internet  a boon or curseInternet  a boon or curse
Internet a boon or curseArif Farhan
 
The internet-presentation
The internet-presentationThe internet-presentation
The internet-presentationarmilapratiwi
 
Internet.Presentation
Internet.PresentationInternet.Presentation
Internet.PresentationDinh Dang
 
Internet and www (world wide web )
Internet and www (world wide web )Internet and www (world wide web )
Internet and www (world wide web )FaisalAli244
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentationadriana ahner
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsJyrki Kasvi
 
The Digital Divide for MCO435
The Digital Divide for MCO435The Digital Divide for MCO435
The Digital Divide for MCO435asuforkem
 
About internet by krishna tibdewal...!!!!
About internet by krishna tibdewal...!!!!About internet by krishna tibdewal...!!!!
About internet by krishna tibdewal...!!!!Krishna Tibdewal
 
Systems of Justice over the Internet.
Systems of Justice over the Internet.Systems of Justice over the Internet.
Systems of Justice over the Internet.Paolo Cirio
 
Linking online and offline: digital media and political processes in Indonesia
Linking online and offline: digital media and political processes in IndonesiaLinking online and offline: digital media and political processes in Indonesia
Linking online and offline: digital media and political processes in IndonesiaFoME_Symposium
 
10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for ChangeTeodoro Llanes II
 
Impact of internet in day to day life
Impact of internet in day to day lifeImpact of internet in day to day life
Impact of internet in day to day lifeVidhyalakshmi K
 

What's hot (20)

3 - Social Media and Enterprise
3 - Social Media and Enterprise3 - Social Media and Enterprise
3 - Social Media and Enterprise
 
The Fifth Estate and Its Future
The Fifth Estate and Its FutureThe Fifth Estate and Its Future
The Fifth Estate and Its Future
 
Could i live without the internet final presentation
Could i live without the internet final presentationCould i live without the internet final presentation
Could i live without the internet final presentation
 
Knowledge society
Knowledge societyKnowledge society
Knowledge society
 
Internet a boon or curse
Internet  a boon or curseInternet  a boon or curse
Internet a boon or curse
 
The internet-presentation
The internet-presentationThe internet-presentation
The internet-presentation
 
Internet.Presentation
Internet.PresentationInternet.Presentation
Internet.Presentation
 
Internet and www (world wide web )
Internet and www (world wide web )Internet and www (world wide web )
Internet and www (world wide web )
 
5th Estate Talk for eGov-CeDem-ePart 2018 Conference
5th Estate Talk for eGov-CeDem-ePart 2018 Conference5th Estate Talk for eGov-CeDem-ePart 2018 Conference
5th Estate Talk for eGov-CeDem-ePart 2018 Conference
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentation
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
 
Critical Debates in Internet Studies
Critical Debates in Internet StudiesCritical Debates in Internet Studies
Critical Debates in Internet Studies
 
The Digital Divide for MCO435
The Digital Divide for MCO435The Digital Divide for MCO435
The Digital Divide for MCO435
 
About internet by krishna tibdewal...!!!!
About internet by krishna tibdewal...!!!!About internet by krishna tibdewal...!!!!
About internet by krishna tibdewal...!!!!
 
Systems of Justice over the Internet.
Systems of Justice over the Internet.Systems of Justice over the Internet.
Systems of Justice over the Internet.
 
Linking online and offline: digital media and political processes in Indonesia
Linking online and offline: digital media and political processes in IndonesiaLinking online and offline: digital media and political processes in Indonesia
Linking online and offline: digital media and political processes in Indonesia
 
Cyber security issues part a
Cyber security issues  part a Cyber security issues  part a
Cyber security issues part a
 
mohammed ppt
mohammed pptmohammed ppt
mohammed ppt
 
10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for Change
 
Impact of internet in day to day life
Impact of internet in day to day lifeImpact of internet in day to day life
Impact of internet in day to day life
 

Similar to Motivations behind Software Piracy: Relevance to Computer Ethics Theories

Web 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher EducationWeb 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher EducationAnne Arendt
 
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsICT Watch - Indonesia
 
Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The InternetJacob Gee
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxOxfordRiNorth
 
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...ijtsrd
 
Web Science Session 2: Social Media
Web Science Session 2: Social MediaWeb Science Session 2: Social Media
Web Science Session 2: Social MediaStefanie Panke
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethicsSaqib Raza
 
Group 1 STS Respi - Information Society
Group 1 STS Respi - Information SocietyGroup 1 STS Respi - Information Society
Group 1 STS Respi - Information SocietyAngellaReignCunanan
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsScøtt Lıgøckı
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethicssyed ahmed
 
Young Canadians, Participatory Digital Culture and Policy Literacy
Young Canadians, Participatory Digital Culture and Policy LiteracyYoung Canadians, Participatory Digital Culture and Policy Literacy
Young Canadians, Participatory Digital Culture and Policy Literacydmcolab
 
A professional work environment is one that results in a workplace full of hi...
A professional work environment is one that results in a workplace full of hi...A professional work environment is one that results in a workplace full of hi...
A professional work environment is one that results in a workplace full of hi...alldesign
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social MediaPhysiopedia
 
Wedf brochure (september)
Wedf brochure (september)Wedf brochure (september)
Wedf brochure (september)Morne Olivier
 
Alternative Media for Social Change in Africa: Myths and realities
Alternative Media for Social Change in Africa: Myths and realitiesAlternative Media for Social Change in Africa: Myths and realities
Alternative Media for Social Change in Africa: Myths and realitiesInformation for Change
 

Similar to Motivations behind Software Piracy: Relevance to Computer Ethics Theories (20)

Web 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher EducationWeb 20 (Social Media) Policies in Higher Education
Web 20 (Social Media) Policies in Higher Education
 
Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media Ethics
 
Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The Internet
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
Cyber Ethics An Introduction by Paul A. Adekunte | Matthew N. O. Sadiku | Jan...
 
Digital Ethics
Digital EthicsDigital Ethics
Digital Ethics
 
Web Science Session 2: Social Media
Web Science Session 2: Social MediaWeb Science Session 2: Social Media
Web Science Session 2: Social Media
 
Introduction to ethics
Introduction to ethicsIntroduction to ethics
Introduction to ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Group 1 STS Respi - Information Society
Group 1 STS Respi - Information SocietyGroup 1 STS Respi - Information Society
Group 1 STS Respi - Information Society
 
PPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer EthicsPPT Lab Assignment - Computers - Computer Ethics
PPT Lab Assignment - Computers - Computer Ethics
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
239 325 ethics
239 325 ethics239 325 ethics
239 325 ethics
 
Young Canadians, Participatory Digital Culture and Policy Literacy
Young Canadians, Participatory Digital Culture and Policy LiteracyYoung Canadians, Participatory Digital Culture and Policy Literacy
Young Canadians, Participatory Digital Culture and Policy Literacy
 
Module 7.pptx
Module 7.pptxModule 7.pptx
Module 7.pptx
 
A professional work environment is one that results in a workplace full of hi...
A professional work environment is one that results in a workplace full of hi...A professional work environment is one that results in a workplace full of hi...
A professional work environment is one that results in a workplace full of hi...
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social Media
 
Wedf brochure (september)
Wedf brochure (september)Wedf brochure (september)
Wedf brochure (september)
 
Alternative Media for Social Change in Africa: Myths and realities
Alternative Media for Social Change in Africa: Myths and realitiesAlternative Media for Social Change in Africa: Myths and realities
Alternative Media for Social Change in Africa: Myths and realities
 

More from Saptarshi Ghosh

Human Capital and Growth For Development of Knowledge Economy
Human Capital and Growth For Development of Knowledge EconomyHuman Capital and Growth For Development of Knowledge Economy
Human Capital and Growth For Development of Knowledge EconomySaptarshi Ghosh
 
Open Disntace Learning and OER
Open Disntace Learning and OEROpen Disntace Learning and OER
Open Disntace Learning and OERSaptarshi Ghosh
 
Online Tools for Scholars
Online Tools for ScholarsOnline Tools for Scholars
Online Tools for ScholarsSaptarshi Ghosh
 
Software Tools for Effective Research.pptx
Software Tools for Effective Research.pptxSoftware Tools for Effective Research.pptx
Software Tools for Effective Research.pptxSaptarshi Ghosh
 
Software Tools for Effective Research.pptx
Software Tools for Effective Research.pptxSoftware Tools for Effective Research.pptx
Software Tools for Effective Research.pptxSaptarshi Ghosh
 
Predatory Publications and Software Tools for Identification
Predatory Publications and Software Tools for IdentificationPredatory Publications and Software Tools for Identification
Predatory Publications and Software Tools for IdentificationSaptarshi Ghosh
 
Selective Reporting and Misrepresentation of Data
Selective Reporting and Misrepresentation of DataSelective Reporting and Misrepresentation of Data
Selective Reporting and Misrepresentation of DataSaptarshi Ghosh
 
Finding the Right Journal at the Right Time for the Right Work
Finding the Right Journal at the Right Time for the Right WorkFinding the Right Journal at the Right Time for the Right Work
Finding the Right Journal at the Right Time for the Right WorkSaptarshi Ghosh
 
Impact Factor Journals as per JCR, SNIP, SJR, IPP, CiteScore
Impact Factor Journals as per JCR, SNIP, SJR, IPP, CiteScoreImpact Factor Journals as per JCR, SNIP, SJR, IPP, CiteScore
Impact Factor Journals as per JCR, SNIP, SJR, IPP, CiteScoreSaptarshi Ghosh
 
Library and New Normal(?)
Library and New Normal(?)Library and New Normal(?)
Library and New Normal(?)Saptarshi Ghosh
 
DUALITY OF MIND: GENIUS OR LUNATIC
DUALITY OF MIND: GENIUS OR LUNATICDUALITY OF MIND: GENIUS OR LUNATIC
DUALITY OF MIND: GENIUS OR LUNATICSaptarshi Ghosh
 
Implementation of instructional design in OER materials: a conceptual discourse
Implementation of instructional design in OER materials: a conceptual discourseImplementation of instructional design in OER materials: a conceptual discourse
Implementation of instructional design in OER materials: a conceptual discourseSaptarshi Ghosh
 
ALTMETRICS : A HASTY PEEP INTO NEW SCHOLARLY MEASUREMENT
ALTMETRICS : A HASTY PEEP INTO NEW SCHOLARLY MEASUREMENTALTMETRICS : A HASTY PEEP INTO NEW SCHOLARLY MEASUREMENT
ALTMETRICS : A HASTY PEEP INTO NEW SCHOLARLY MEASUREMENTSaptarshi Ghosh
 
Paradoxical betweenness in Academic endeavors and research metrics
Paradoxical betweenness in Academic endeavors and research metricsParadoxical betweenness in Academic endeavors and research metrics
Paradoxical betweenness in Academic endeavors and research metricsSaptarshi Ghosh
 
Will the Digital library sustain as a Social Capital for dissemination of Inf...
Will the Digital library sustain as a Social Capital for dissemination of Inf...Will the Digital library sustain as a Social Capital for dissemination of Inf...
Will the Digital library sustain as a Social Capital for dissemination of Inf...Saptarshi Ghosh
 
Information System Design in Context of Social Informatics
Information System Design in Context of Social InformaticsInformation System Design in Context of Social Informatics
Information System Design in Context of Social InformaticsSaptarshi Ghosh
 
Library intelligence : EMOTIONAL ISSUES
Library intelligence : EMOTIONAL ISSUESLibrary intelligence : EMOTIONAL ISSUES
Library intelligence : EMOTIONAL ISSUESSaptarshi Ghosh
 
Information Ecology: Legacy Practices with changing dynamics
Information Ecology: Legacy Practices with changing dynamicsInformation Ecology: Legacy Practices with changing dynamics
Information Ecology: Legacy Practices with changing dynamicsSaptarshi Ghosh
 

More from Saptarshi Ghosh (20)

Human Capital and Growth For Development of Knowledge Economy
Human Capital and Growth For Development of Knowledge EconomyHuman Capital and Growth For Development of Knowledge Economy
Human Capital and Growth For Development of Knowledge Economy
 
Open Disntace Learning and OER
Open Disntace Learning and OEROpen Disntace Learning and OER
Open Disntace Learning and OER
 
Online Tools for Scholars
Online Tools for ScholarsOnline Tools for Scholars
Online Tools for Scholars
 
Software Tools for Effective Research.pptx
Software Tools for Effective Research.pptxSoftware Tools for Effective Research.pptx
Software Tools for Effective Research.pptx
 
Software Tools for Effective Research.pptx
Software Tools for Effective Research.pptxSoftware Tools for Effective Research.pptx
Software Tools for Effective Research.pptx
 
Predatory Publications and Software Tools for Identification
Predatory Publications and Software Tools for IdentificationPredatory Publications and Software Tools for Identification
Predatory Publications and Software Tools for Identification
 
Selective Reporting and Misrepresentation of Data
Selective Reporting and Misrepresentation of DataSelective Reporting and Misrepresentation of Data
Selective Reporting and Misrepresentation of Data
 
Finding the Right Journal at the Right Time for the Right Work
Finding the Right Journal at the Right Time for the Right WorkFinding the Right Journal at the Right Time for the Right Work
Finding the Right Journal at the Right Time for the Right Work
 
Impact Factor Journals as per JCR, SNIP, SJR, IPP, CiteScore
Impact Factor Journals as per JCR, SNIP, SJR, IPP, CiteScoreImpact Factor Journals as per JCR, SNIP, SJR, IPP, CiteScore
Impact Factor Journals as per JCR, SNIP, SJR, IPP, CiteScore
 
Library and New Normal(?)
Library and New Normal(?)Library and New Normal(?)
Library and New Normal(?)
 
DUALITY OF MIND: GENIUS OR LUNATIC
DUALITY OF MIND: GENIUS OR LUNATICDUALITY OF MIND: GENIUS OR LUNATIC
DUALITY OF MIND: GENIUS OR LUNATIC
 
Implementation of instructional design in OER materials: a conceptual discourse
Implementation of instructional design in OER materials: a conceptual discourseImplementation of instructional design in OER materials: a conceptual discourse
Implementation of instructional design in OER materials: a conceptual discourse
 
ALTMETRICS : A HASTY PEEP INTO NEW SCHOLARLY MEASUREMENT
ALTMETRICS : A HASTY PEEP INTO NEW SCHOLARLY MEASUREMENTALTMETRICS : A HASTY PEEP INTO NEW SCHOLARLY MEASUREMENT
ALTMETRICS : A HASTY PEEP INTO NEW SCHOLARLY MEASUREMENT
 
Paradoxical betweenness in Academic endeavors and research metrics
Paradoxical betweenness in Academic endeavors and research metricsParadoxical betweenness in Academic endeavors and research metrics
Paradoxical betweenness in Academic endeavors and research metrics
 
Management of Change
Management of ChangeManagement of Change
Management of Change
 
Will the Digital library sustain as a Social Capital for dissemination of Inf...
Will the Digital library sustain as a Social Capital for dissemination of Inf...Will the Digital library sustain as a Social Capital for dissemination of Inf...
Will the Digital library sustain as a Social Capital for dissemination of Inf...
 
Information System Design in Context of Social Informatics
Information System Design in Context of Social InformaticsInformation System Design in Context of Social Informatics
Information System Design in Context of Social Informatics
 
ORGANISATION BEHAVIOUR
ORGANISATION BEHAVIOURORGANISATION BEHAVIOUR
ORGANISATION BEHAVIOUR
 
Library intelligence : EMOTIONAL ISSUES
Library intelligence : EMOTIONAL ISSUESLibrary intelligence : EMOTIONAL ISSUES
Library intelligence : EMOTIONAL ISSUES
 
Information Ecology: Legacy Practices with changing dynamics
Information Ecology: Legacy Practices with changing dynamicsInformation Ecology: Legacy Practices with changing dynamics
Information Ecology: Legacy Practices with changing dynamics
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 

Motivations behind Software Piracy: Relevance to Computer Ethics Theories

  • 1. Motivations behind Software Piracy: Relevance to Computer Ethics Theories DR. SAPTARSHI GHOSH
  • 2. Computer Ethics • Computer Ethics is a study of ethical issues that are related mainly with computing machines and computing profession. The features of internet that, it is global and interactive, it allows users to stay anonymous, and it enables reproducibility of information possible unlike before makes the online behavior morally different. Computer ethics studies the nature and social influence of computing machines and ethical issues in formulating and justification of policies. 19/05/2020 2
  • 3. Software Piracy • Software Piracy, which is the unauthorized use or copying of software illegally, has become a major problem for businesses and it is widespread in many parts of the world which led to drain of economy. As the access to use computer grows, the percentage for using pirated software also grows. The Business Software Alliance (BSA) and the Software Publishers Association (SPA) made estimation (2010) that there are two-ten illegal copies of software are available for every legal copy of software sold. 19/05/2020 3
  • 4. Ethical Issues • According to Kizza, the role of ethics is to help societies distinguish between right and wrong and to give each society a basis for justifying the judgment of human actions. Thus the purpose of ethics is to analyze the morality of human behaviors, policies, laws and social structures. (Kizza, 2013) 19/05/2020 4
  • 5. What constitutes Computer Ethics? • Computer ethics is a field of applied ethics that addresses ethical issues in the use, design, and management of information technology and in the formulation of ethical policies for its regulation in the society. (Brey & Søraker, 2009) Computer ethics analyzes the moral responsibilities of computer professionals and computer users and ethical issues in public policy for information technology development and use. (Brey, 2007) 19/05/2020 5
  • 6. Utilitarianism and Software Piracy • Assessing software piracy from a utilitarian perspective gives very interesting and conflicting ideas. As the focus here is on the results of the action than the action itself, arguments can be made that an individual act of piracy is not unethical. • In other words, it is possible to conclude that piracy results in the greatest good for the greatest number, because many users get the benefit of the software at little or no cost, while only those directly involved in producing it suffer any harm. The argument is strengthened when the cost of the software in low-income countries is considered. • As people could not afford the software at its regular price, the benefit seems especially great, while the producers having more access to resources do not suffer a corresponding harm. • Many people also cite the fact that much of software is overpriced, which probably makes it ok to illegally copy it when users can. • However, at the same time utilitarianism also suggests different conclusion. If the consideration is extended to who benefits and who is harmed, the results are different. In this case, the question to be asked is what good a person would derive by using something that belongs to someone else without paying for it. 19/05/2020 6
  • 7. Social Contract Theories • Philosophers such as Rousseau, Locke, Hobbes, and more recently Rawls are generally considered to be social contract theorists. • Individuals are rational free agents and hence it is immoral to exert undue power over them. At the same time government and society treat individuals as means to social good, and hence are problematic institutions. • Social contract theories explain this problem by claiming that morality is the outcome of rational agents agreeing to social rules, hence the name social contract. • Individuals essentially freely agree to follow rules set by the government and the society, meaning that they are not coerced but freely choose to participate in the activity. Shared morality is what rational individuals agree as a group in order to make a social contract. (Johnson & Miller, 2004). 19/05/2020 7
  • 8. THEORIES OF COMPUTER ETHICS Weiner’s theoretical underpinning on computer ethics: • MIT Professor Norbert Wiener argued: All the process and objects in the universe comprise of matter/energy and information (Bynum, 2010) • All animals are information-processing beings whose behavior depends of their processing and reasoning capabilities (Bynum, 2010) • Humans, unlike other animals, have bodies that make the information processing in their central nervous system especially sophisticated. (Bynum, 2010) 19/05/2020 8
  • 9. Prescriptions by Weiner • Each human being in the society must be liberated enough to have the freedom to explore his full extent of abilities, also known as the principle of freedom (Bynum, 2010) • The social policies should be equal to everyone living within the community, also known as the principle of equality (Bynum, 2010) • The actual goodwill existing between people of the society has no limits short of those of humanity itself, also known as the principle of benevolence (Bynum, 2010) 19/05/2020 9
  • 10. Luciano Floridi’s information ethics • Information ethics was defined by Luciano Floridi and his colleagues including Jeff Sanders, who took a radical perspective on computer ethics, taking in account the nature of computing a well as the presence of human and software agents in digital environments. 1. The null law which states that entropy should not be cause in the infosphere at all. 2. Entropy should be prevented from occurring or increasing in the infosphere. 3. Entropy should be removed from the infosphere, if possible 4. The growth and development of all informational objects in the infosphere should be done in a way that preserves, cultivates and enriches their properties. 19/05/2020 10
  • 11. Temptations offered by computerization • Speed • Privacy and anonymity • Nature of medium • Aesthetic attraction • Increased availability of potential victims • International scope • The power to destroy 19/05/2020 11
  • 12. FACTORS INFLUENCING SOFTWARE PIRACY • Public Awareness • High software prices • Risk of Penalty • Opportunity • Equity Theory • Demographic Variables • Previous Behaviour • Moral and social factors 19/05/2020 12
  • 13. Religion and Computing • Religion — «Kopimism» — Ctrl+C, Ctrl+V - Missionary Church of Kopimism • Kopimism is a religious group centered in Sweden who believe that copying and the sharing of information is the best and most beautiful that is. To have your information copied is a token of appreciation, that someone think you have done something good. • Isak Gerson: "I'm not the Kopimist Jesus“: 19/05/2020 13
  • 14. Religion and Computing • This line of faith is called Kopimism (which originates from the Swedish pirate term "kopimi," a play on the words “copy me”) and worships the holy act of copying and spreading information. • They do not only consider it to be the meaning of life–growing by copying and spreading knowledge and information–but also its origin, since life began with the DNA molecule's ability to duplicate itself. • Kopimism’s religious symbols are CTRL+C and CTRL+V. Their gospel is spreading fast. Having been around for merely a year, the religion already counts 4,000 members, and its Swedish mother site has already been copied everywhere from Russia and Canada, to France and Romania. The crusade has begun and it looks like Sweden can now enjoy the possibility of jumping from being one of the least to being one of the most religious countries in the world. 19/05/2020 14
  • 15. Missionary church of Kopimism http://kopimistsamfundet.se/english/ • A religion is a belief system with rituals. The missionary kopimistsamfundet is a religious group centered in Sweden who believe that copying and the sharing of information is the best and most beautiful that is. To have your information copied is a token of appreciation, that someone think you have done something good. • * All knowledge to all • * The search for knowledge is sacred • * The circulation of knowledge is sacred • * The act of copying is sacred. We challenge all copyright believers – most of which have a great deal of influence in politics, and who derive their power by limiting people’s lives and freedom. What they most of all want to limit the knowledge. We need to steel ourselves for their hatred and aggression. – Copy. download, uplooad! – All knowlegde to all! – Information technology is not to be feathered by laws. 19/05/2020 15
  • 16. Online Software Piracy Act ????? 19/05/2020 16
  • 17. References • Adams, A. A., & McCrindle, R. (2008). Pandora's Box: Social and Professional Issues of the Information Age. Chichester: John Wiley & Sons. Arslan, E. (2006). The Repercussions of Software Piracy: Damages, Approaches of Control, and Benefits from Reducing Piracy Rates. University of Sunderland. GRIN Verlag. Baldwin, T. (1999). G.E. Moore: The Arguments of the Philosophers. New York: Routledge. Brey, P., & Søraker, J. H. (2009). Philosophy of Computing and Information Technology. In D. M. Gabbay, A. Meijers, & J. Woods, Philosophy of Technology and Engineering Sciences, Volume 9 (pp. 1341-1408). Oxford: Elsevier. Briggle, A., & Mitcham, C. (2012). Ethics and Science: An Introduction. Cambridge: Cambridge University Press. Brooks, L. J., & Dunn, P. (2011). Business & Professional Ethics, 6th edition. Cengage Learning. Business Software Alliance. (2010). Global Software Piracy 2010. Retrieved from Business Software Alliance Web site: http://globalstudy.bsa.org/2010/ 19/05/2020 17