IP Law Software Research Paper

PAGES
2
WORDS
883
Cite

Abandoned Software That most people do not "have the facts" about copyrights should surprise nobody. Let's be real here -- copyright law is complex, often vague or nuanced, and there are multiple different copyright regimes. No reasonable person would believe in this 24-hour rule, but there should be zero expectation that anybody other than copyright lawyers would have a firm grasp of copyright law.

That people do not know about copyright law by no means is the driving factor for unauthorized copyright usage -- let's dispense with the childish, loaded word "piracy." We're talking about people who are using software, not hijacking, raping and murdering it. The Moores and Esichaikul (2010) highlights a couple of things that are worth considering in this discussion. First, they note that people like to share software, and that this sharing is a far more common occurrence than, say, people who would violate most other aspects of law. People tend not to use physical goods without paying, and are far more likely to use non-physical goods like software without paying. Most people have only a rough familiarity with criminal law, yet tend to err on the side of caution with respect to committing acts that might be deemed illegal. The same cannot be said about software. Ignorance...

...

The Moores article inadvertently highlights one reason -- nobody trusts either the software companies nor the law on this issue. Consider the absurd statement "counterfeiting and piracy…cost the U.S. economy $200-250 billion a year, with the subsequent loss of some 750,000 jobs." The dollar figure is tough to pin down, but anybody with even the slightest proclivity to critical thought will know that there are no incremental job gains to purchasing MS Office (this paper was written on a purchased version, thank you very much). The product has been made, MSFT records massive profits with their 80% gross margin, and if they make a few billion more or a few billion less, there is no correlation with job creation. There is a credibility gap with such statements, or claims of poverty from the world's richest software, media and clothing companies. Or facile misstatements of Econ 101 dogma as we see at the beginning of Asongu (2014) -- competition does not derive from IPRs, profits do. "Anti-piracy" discussions are too often riddled with this sort of…

Sources Used in Documents:

References

Asongu, S. (2014). Fighting software piracy: Which IPRs laws matter in Africa? Institutions and Economies. Vol. 6 (2) 1-26.

Moores, T. & Esichaikul, V. (2010). Socialization and software piracy: A study. Journal of Computer Information Systems. Vol. Spring 2011, 1-8.

Stropkova, A. (no date). The ethical dimension of software piracy. In possession of the author


Cite this Document:

"IP Law Software" (2015, March 19) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/ip-law-software-2149494

"IP Law Software" 19 March 2015. Web.19 April. 2024. <
https://www.paperdue.com/essay/ip-law-software-2149494>

"IP Law Software", 19 March 2015, Accessed.19 April. 2024,
https://www.paperdue.com/essay/ip-law-software-2149494

Related Documents

" (Information Society and Media, 2005) f. The eContent Programme and the eTen Programme The 100 million dollar eContent Programme (2001-2005) focuses on encouraging growth and development of tie European digital content industry. This programme funds projects with short time-to-market and as well experiments with new models in business and partnerships through use of technology that is presently available. The programme's stated 'main thrust' is to; Improve access to an expand the

Laws on Cyber Crimes
PAGES 10 WORDS 2997

Cyber Security Currently, the internet has become a significant infrastructure, which has brought new degrees of productivity, convenience, and effectiveness for the private and public firms. The many incidents of internet attacks reflect the vulnerability of the information systems, the severity of malicious programs and the offensive nature of technology. Similarly, either attackers can hide their identity, through disabling logging facilities or altering event logs, which makes them go undetected. On

Copyright Laws vs. Peer-to-Peer File Transfer This paper presents a detailed examination of copyright laws, with a comparison to peer-to-peer file transfer. The author will take the reader on an exploratory journey, in which the details and outcomes of several well-known cases will be scrutinized. The author will also discuss the importance of copyright laws, and the elements of various cases that caused the rulings to go the way they did.

Copyright Computer Software Piracy and Copyright Infringement This work completes my portion of the Blue Team's group project where we were each assigned a set of cases to review and summarize. This report is the summary for case number 3 called, Universal City Studios, Inc. V. Reimerdes. The purpose was to read and then assess each case. The objective of the paper is to provide a case summary and the rules of

It is therefore a reiterative process for the benefit of the public. This is then also the basis of the claim that software evolution is faster via OSS because of its multiple participants in the processes of writing, testing, or debugging. According to Raymond [42], the participation of more people will result in the identification and elimination of more bugs, which in turn will likely result in faster software

Internet Laws
PAGES 8 WORDS 3271

Internet Ethics and the consumer's private existence in an unstable regulatory environment -- untapped economic waters in a wild, wild west of identity theft and chronic consumption When it comes to Internet ethics, even in the absence of legal requirements, businesses must themselves self-regulate when it comes to consumer privacy. If they do not, it is likely that the government will step in to do so, as the government has done