StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Use of Authentic and Licensed Software in an Organization - Assignment Example

Cite this document
Summary
The paper "The Use of Authentic and Licensed Software in an Organization" focuses on the aspect of software piracy. It will drastically influence the software engineers, publishers of genuine software, and most importantly the overall economy of a nation…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.6% of users find it useful
The Use of Authentic and Licensed Software in an Organization
Read Text Preview

Extract of sample "The Use of Authentic and Licensed Software in an Organization"

? Software Piracy B1-Privacy-Related Matrix (12 Ethical dilemma: Software Piracy Stakeholders Autonomy Non-maleficence Vera Creator Creatorshave the right to develop software according to their preferences Creators have the duty not to harm through the software to other persons by any means It is the duty of creator to be truthful, i.e. the software must fulfill the expectations of users when it is purchased legally and used by genuine ways 2: Users Users have the right to select pirated or genuine software for their personal use The utilization of pirated software must not harm other persons It is the duty of users to strictly understand about different aspects and penalties of using pirated software 3: Internet Service Providers Internet service providers have the autonomy to deliver contents according to the wishes of creators The contents provided by internet service providers must not harm the interests of specific group or individual Internet service providers must be truthful to sell software products by legal and ethical means 4: Government Government must provide the autonomy to each stakeholder about the use of software for their interests Government must ensure that pirated software does not harm the interests of the original creator as well as other stakeholders It is the duty of government to tell the truth about software piracy The Dilemma (Software Piracy) Software consists of programs that are designed to perform specific tasks for the different classes of users. Today, software applications are widely being used by individuals, government and business organizations for a variety of purposes. The software programs’ utilities are numerous in certain areas such as hospitals, banking education and space studies. Software programs can be purchased from software vendors. Eventually, certain general purpose software programs are available on internet, as freeware and shareware. However, the freeware and shareware software do not have much capabilities that are owned by the retail software packages (University of West Florida, 2012). Software piracy can be defined as the illegal copying, distribution or in general the illegal use of software. In other words, software piracy can be described as copying of software programs by individuals or business organizations either with profit motive or to harm others. The advancement in technological systems and tools has not only a favorable impact on the society but has also contributed immensely towards software piracy throughout the globe. Software piracy has serious impacts both on national economy as well as on the software producing organizations. The software producing companies spend millions of Dollars on their research activities for inventing particular software. Unfortunately, a few individuals and organizations take negative advantage of the technological advancements bothering less about the nation’s economy and software producing organizations which results in the form of pirated software (Ohio Literacy Resource Centre, 2001). Consequently, such factors have attracted the interests of many researchers to choose software piracy as one of the largely debated ethical issues. Three Principles The three principles selected for the matrix include Autonomy, Non-maleficence and Veracity. Autonomy can be described as freedom of an individual to take his/her own decisions. Every individual is free to use genuine or pirated software which is solely based on the conscience of an individual to consider it as ethical or unethical. However, the decision an individual takes should not harm any other individual or group or it should be non-maleficence. At the same time, the decision should not violate the rules and the laws established by the state or federal government. The truth related to incurrence of any act in relation to software piracy should be brought into limelight so that any such occurrence of piracy in future can be prevented. It can also benefit to create awareness about software piracy and the harm that it can create to the users in the long run. Thus, the individuals have the right to chose products or take decisions but their decisions should in no case affect other individuals or groups and the decisions should coincide with legal requirements. These three principles when combined together contribute towards ethics. For these reasons, the above stated three principles are selected. Identification of the Matrix Action It is widely believed that ethical issues take place due to ubiquity of technology. Many a times, IT professionals and students have to face a situation where the choice has to be made. The aspect of software piracy is considered to be illegal in many of the countries. Piracy has social, political, economic and values attached to it. Hence, it can be stated that every individual has pre-conceived duties towards other groups. The creator has the autonomy to produce software but it should be ensured that it does not harm individuals or groups and at the same time should be able to deliver desired service as promised by the creator. On the other hand, users need to understand the ethical issues related to the use of pirated software and if a person uses pirated software it should not harm other individuals or groups. Government should provide each stakeholder with the autonomy to use software along with considering the national interest and making sure that an individual or an organization by utilization of software does not harm other individuals and stated rules and regulations are strictly followed by the users (University of West Florida, 2012). B2- Organizational Policy The advancement in technology has benefitted society in many ways. At the same time, it has given birth to many social, economic, political and ethical issues. Contextually, software piracy is one of the vital issues, which has been discussed largely. Hence, each organization should develop a software management policy on the purchase and utilization of software by the organizations and their employees. The organizations should ensure that they do not acquire, pirated software, copy or dispense such software or violate intellectual property laws like copyrights. The organizational policies may include: Licensed and properly accepted software are installed in the organization’s computers, personal computers and servers. The stated policy should also be valid for shareware, freeware as well as demonstration software All the software acquired by the organizations should have a license agreement with the software publishers. The agreement shall state criteria as to whom and how the software shall be utilized and distributed The organization should ensure that no software shall be installed for use for which no license has been procured or renewed The organization should strictly follow the terms and conditions stated by the software publishers and in no ways shall violate the stated terms and conditions The organization should ensure that each software installed on their computers are according to the copyright laws and they do not violate or infringe any intellectual laws in any form The organization should have proper record of paid invoice for the software acquired so that it can be produced at the time of the software audit It has to be made certain that the original software used is protected from intruders, who may remotely access or copy the software installed in the computers The organization should be committed towards using the original software. Furthermore, use of unlawful software or replication of software in any form should be considered as a serious offense and against the law The organization should inspect the software installed in the computers to ensure that the installed software is legitimately acquired The organizational software should not be installed in the personal system without the permission of the seniors accountable for managing the organizational information. Simultaneously, personally owned software should not be installed in the organization’s computer system as it may create a threat to the privacy of the organization Certain software such as freeware and shareware are available on the internet at free of cost for limited periods use in order to test the utility of the software. Such software should not be downloaded without the approval of the seniors The organization should educate its members relating to the use of original software and their responsibilities in protecting the privacy of the organization The organization should destroy those software that are obsolete and not use such software for which the company does not have proper license Password sharing with other members or individuals should be restricted. Such act will make the intruders to easily access the private information stored in the organization’s computer system The organization should upgrade its software programs and keep in track with the new release Any suspicious software installed within the organization has to be immediately reported to concerned authority Those employees or any member of the organization who fails to abide by the policies stated will be liable to legal and organizational actions. He/she shall be sued against the copyright laws and will be charged penalties on such activities The offender will be debarred or terminated from his/her post within the organization Source: (United States Environmental Protection Agency, 2010). The stated policies will aid an organization from losing its vital information and secure its privacy. The use of authentic and licensed software will enable the organization to protect its critical information from intruders’ attacks. The use of authentic software benefits an organization in a number of ways. The authentic software can be full upgraded at discount price. Moreover, these software are reliable and are less vulnerable to malicious programs like viruses and worms. However, acquiring licensed software will be quite expensive. It will also require an additional supervision on the part of the organization. The policy may also create conflicts between the organization and the employees. The implementation of such policies may increase the workloads of the employees. The employees and the users will have to focus more on the software licensing and software agreements and less on their own work. This will reduce the productivity of the organization. The conflicts may tend to rise as the members have to comply with numerous restrictions and prohibitions relating to the use of software. The above framed policies shall act in a way that is in the best interest of the organization and the employees. The policies will ensure privacy of the organizational key information consistent with the organizational interests and the federal laws. The policies can promote ethical use of the software and help in reducing software piracy which is considered to be indeed unethical (IEEE Computer Society, 2005). If the policy is not followed, it will promote unethical activities. The organizations private and confidential information will be in a serious threat. The aspect of software piracy will drastically influence the software engineers, publishers of genuine software and most importantly the overall economy of a nation. Therefore, not only from an ethical point of view but also from an economics and moral viewpoint software piracy requires to be prevented and policies need to be enacted. References IEEE Computer Society. (2005). Software engineering code of ethics, version 3.0. Retrieved from http://www.itk.ilstu.edu/faculty/bllim/itk178/Software%20Engineering%20Code%20of%20Ethics,%20Version%203_0.htm Ohio Literacy Resource Centre. (2001). What is software piracy. Retrieved from http://literacy.kent.edu/Oasis/Pubs/techtalk6-1.pdf United States Environmental Protection Agency. (2010). Software management and piracy policy. Retrieved from http://www.epa.gov/irmpoli8/policies/CIO2104.1.pdf University of West Florida. (2012). Chapter 3: Application Software. Retrieved from http://uwf.edu/clemley/cgs1570w/notes/concepts-3.htm Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Software Piracy Assignment Example | Topics and Well Written Essays - 1750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1457648-software-piracy
(Software Piracy Assignment Example | Topics and Well Written Essays - 1750 Words)
https://studentshare.org/information-technology/1457648-software-piracy.
“Software Piracy Assignment Example | Topics and Well Written Essays - 1750 Words”, n.d. https://studentshare.org/information-technology/1457648-software-piracy.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Use of Authentic and Licensed Software in an Organization

E-Commerce: Software Supplies and Support

In this essay, the writer tries to figure out the main principles of how e-commerce (electronic commerce) interacts with software supply business and Customer Support sector.... In the essay "E-commerce: software Supply and Support", the author describes a new, but now the common trend in business, called E-commerce in the case of software Supply companies, who are trading products, which are dedicated to the internet.... Using the Internet, a small software company dies not have to cut a CD, write a manual and get a box printed....
9 Pages (2250 words) Essay

Paper 2: Proposal for Your final Researched Proposal in IT Business Problem

Today is… However, technology has a great impact on the overall performance of the organizations whether from internal processes to final outcomes, strategy to action plans and communication to The world is quickly moving towards a paper free environment and easy management of data within the organization but as the cyber space is now well-connected, competition is high and cyber security issues are increasingly affecting organizational functions and privacy (Brown).... Most of the organizations are facing security challenges while implementing IT based systems within organization and connecting with other stakeholders....
4 Pages (1000 words) Assignment

Security of Big Data

 … Big Data is defined as “the ability for an organization to take multiple pieces of information the exponential growth and availability of data, both structured and unstructured.... Imagine an organization in which the marketing department requires key reports from the technology department.... Moreover, it allows the organization to understand customer behavior in a much meaningful way.... Another huge aspect of Big Data is the collaboration aspect as it allows users to interact and use this data....
8 Pages (2000 words) Case Study

The Performance Objectives of Microsoft

In the paper, Microsoft has been analyzed in order to assess the performance objectives of the organization.... The company was chosen out of a multitude of options since it is comparatively easier to compile data owing to the transparency policy of the organization.... hellip; Any organization may be analyzed based on its pre-determined performance objectives and the delivered results against those objectives.... An apparent gap between the two directly points out to failure in strategy while having met certain objectives point to the strengths of the organization....
8 Pages (2000 words) Case Study

Software Piracy and Privacy Policy

The author of this paper "Software Piracy and Privacy Policy" discusses the benefit of the use of authentic and licensed software protection, the organization policy, the three principles selected for the matrix, software application piracy and dilemma, the factors that attract researchers.... Software piracy can be defined as the illegal copying, distribution, or in general the illegal use of the software.... Every individual is free to use genuine or pirated software which is solely based on the conscience of an individual to consider it as ethical or unethical....
7 Pages (1750 words) Assignment

Qualification Requirements of Security Personnel in the UK

The non-physical security services include the use of electronic devices in the shape of CCTV cameras, surveillance devices, and electronic access control and other relevant devices.... The dissertation “Qualification Requirements of Security Personnel in the UK” estimates the current provided and required qualification standards appropriately aligned to meet the demands of the roles in which the UK frontline security staff are employed....
32 Pages (8000 words) Dissertation

Fingerprint Biometrics

The paper gives detailed information about the fingerprint biometrics.... nbsp;Fingerprint biometric-based identification system is one of the oldest techniques which have been effectively employed in a wide variety of departments.... nbsp;It is an admitted fact that everybody has exclusive fingerprints....
6 Pages (1500 words) Research Paper

Managing Copyright, Ethics, and Privacy in an IT Environment

The act serves to ensure that use copyright materials are fair; innovation is available to the public through the right channel and control access or use of the digital content.... wnership of copyright in computer softwareSoftware developers are considered as innovators whenever they come up with new software capable of manipulating a task.... The ownership of software can be traced back to the developers of programming languages such as Pascal, Java, and C+ all have patent rights....
10 Pages (2500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us