Реферат

Реферат на тему H1 Of Paper Software Piracy

Работа добавлена на сайт bukvasha.net: 2015-06-14

Поможем написать учебную работу

Если у вас возникли сложности с курсовой, контрольной, дипломной, рефератом, отчетом по практике, научно-исследовательской и любой другой работой - мы готовы помочь.

Предоплата всего

от 25%

Подписываем

договор

Выберите тип работы:

Скидка 25% при заказе до 25.11.2024


Title Of Paper : Software Piracy : A Worldwide Problem Essay, Research Paper

Grade Received on Report : 98

Software Piracy: A Worldwide Problem

Software piracy is defined as the illegal copying of software for commercial or personal gain.

Software companies have tried many methods to prevent piracy, with varying degrees of success. Several

agencies like the Software Publishers Association and the Business Software Alliance have been formed to

combat both worldwide and domestic piracy. Software piracy is an unresolved, worldwide problem, costing

millions of dollars in lost revenue.

Software companies have used many different copy protection schemes. The most annoying form

of copy protection is the use of a key disk. This type of copy protection requires the user to insert the

original disk every time the program is run. It can be quite difficult to keep up with disks that are years old.

The most common technique of copy protection requires the user to look up a word or phrase in the

program’s manual. This method is less annoying than other forms of copy protection, but it can be a

nusance having to locate the manual everytime. Software pirates usually have no trouble “cracking” the

program, which permanently removes the copy protection.

After the invention of CD-ROM, which until lately was uncopyable, most software companies

stopped placing copy protection in their programs. Instead, the companies are trying new methods of disc

impression. 3M recently developed a new technology of disc impression which allows companies to

imprint an image on the read side of a CD-ROM. This technology would not prevent pirates from copying

the CD, but it would make a “bootleg” copy differ from the original and make the copy traceable by law

enforcement officials (Estes 89). Sometimes, when a person uses a pirated program, there is a “virus”

attached to the program. Viruses are self-replicating programs that, when activated, can damage a

computer. These viruses are most commonly found on pirated computer games, placed there by some

malignant computer programmer. In his January 1993 article, Chris O’ Malley points out that if piracy was

wiped out viruses would eventually disappear (O’ Malley 60).

There are ways that a thrifty consumer can save money on software without resorting to piracy.

Computer companies often offer discounts on new software if a person has previously purchased an earlier

version of the software. Competition between companies also drives prices low and keeps the number of

pirated copies down (Morgan 45). People eventually tire or outgrow their software and decide to sell it.

Usually, there is no problem transferring the program from one person to another unless the original owner

had been bound by a license agreement. In order for the new owner to legally own the software, the old

owner must tell the company, in writing, that he would like to transfer the license to the new owner. Most

people fail to notify the company when selling software, thus making the unsuspecting new owner a

software pirate (Morgan 46).

Consumers must be careful when dealing with used software. United States copyright law allows

consumers to place a copy of a program on their computer and also make another copy for backup

purposes, in case the original disk fails or is destroyed. Some software companies use licensing agreements

to restrict people from making more than one copy of a program. Such use of agreements can make an

average consumer into a software pirate, in his effort to make sure his expensive software is safe (Murdoch

2).

Before 1990 movie rental stores could rent computer software. People who rented the software

would copy the software before returning it. In defense, Congress passed the Software Rental Act,

outlawing the rental of software. Even though illegal, many stores and even some software companies still

rent software. Since retail space in stores is extremely limited, companies could rent older software that did

not have a good showing in retail stores (Champion 128).

Software companies could take an idea from the home video industry. The larger video makers

found that if they sold videos in foreign countries through their own dealerships, the amount of piracy

decreased (Weisband 33). A rather unique strategy used by American software manufactures helps raise

local intrest in stopping software piracy. Companies invest money to begin software corporations in foreign

countries. After a few years, the US companies hope that the new, foreign companies will initiate their own

anti-piracy organizations (Weisband 30). Microsoft has led the venture by creating small software

companies to help battle piracy. By doing this, the companies would want to report piracy because they

would be losing money just like American companies are doing now (Weisband 33).

The Software Publishers Association, based in Washington, D.C., was developed to combat

software piracy. As of 1993 the SPA has brought more than 1300 court cases against software pirates. The

SPA has a toll-free number that has helped catch many pirates and prosecute them (O’ Malley 50). The SPA

is not merely a law enforement agency. It meets twice a year with representatives from software

companies. Together they decide how to make their software better and also how to better serve the

consumer. In the spring 1993 conference the SPA decided that if software packagers could develop a

standard way to clearly label a software box, the consumer would immediately know if the program would

run well on his computer. This labeling would help reduce the number of software returns in stores (Karnes

4). Since software stores cannot resell returned software, the software companies lose money on the

software.

Even though only a few of the larger corporations have been prosecuted by the SPA, the penalties

are extremely severe. A company that is caught making or owning illegal software can face jail time and

fines of double the cost of the software or fifty thousand dollars, whichever is greater (Mamis 127).

Companies need to keep good records in order to survive a suprise audit by the SPA. The SPA is not

without heart; they offer companies amnesty if the companies confess and pay for all illegally copied

software (Davis 50).

Unfortunately, there are some people who support software piracy. These people see software

companies as rich, coldhearted businesses who make so much profit that they can afford to take a loss.

While this statement might prove true for large companies like Microsoft or IBM, smaller businesses can

be financially devistated by even a few pirated copies (Hope 40). Supporters of software piracy do not

consider their actions wrong. They argue that software needs to be freely distributed in order to speed

economic development (Weisband 30).

The Software Publishers Association and its sister company the Business Software Alliance have

succeeded where the US government has failed. The SPA handles cases in the US, while the BSA works in

over thirty foreign countries. In cooperation with local law enforcement, these two organizations have

attacked individual companies with moderate success (Weisband 31). The toughest obstacle the BSA faces

is trying to get local governments to make copyright laws and to get local law enforcement to cooperate in

investigations. The BSA has to rely on diplomatic threats in countries like China and Thailand where the

governments are totally uncooperative. While the US government has the power to impose trade sanctions

on guilty countries, they rarely use this power (Gwynne 16).

Many Asian businesses are not used to copyright laws, so the consider violations as minor

infractions, much like excedding the speed limit. The BSA tries to educate these companies by holding

software seminars (Gwynne 16). Asian retail centers also frequently give away pirated copies along with

their new computers. These crooked dealers are the main targets of Microsoft, developer of MS-DOS, the

most widely used operating system in the world (Gwynne 15). Asian software pirates are so good that they

are able to release pirated software copies before the real copies are released to the market. Pirate prices,

which are usually nintey-five percent lower than retail, still nets the pirates a good profit. In most countries,

including the US, the public is more interested in a lower price instead of a clear conscience (Gwynne 15).

The largest case of Asian piracy involved Microsoft in Taiwan. A large pirate ring had made perfect copies

of Microsoft’s MS-DOS. Microsoft traced the cop!

ies through five Asian countries until they found the source in a Chinese government supported “research

institute.” Microsoft confiscated 450,000 fake MS-DOS stickers. Microsoft was shocked when they

discoverd these stickers, which were made out of metal embossed with a hologram and thought to be

uncopyable. Microsoft also found records showing orders for three million more copies (Weisband 33).

After this monumental case, China introduced a copyright law. The law is very weak and only protects

Chinese produced software. Microsoft is sitll tying to recover some of the millions of dollars they and

many other companies lost in China (Young 42).

In most foreign countries software costs more than a worker would make in a month. These high

prices combined with a disregard for copyright laws, drive the amount of software copied in foreign

countries into the high thousands. The main question to be asked is: “Why would anybody want to pay

seventy dollars for an original copy when they could buy the same program for fifteen dollars on the

street?” (Weisband 30).

Extremely expensive hardware in the United Kingdom has led to mass piracy by most of the

computer users. The main problems are the high costs that software vendors have to pay for American

software. IBM brand PCs are not the mainstay as they are in the US. In the UK technology tends to lag

behing the US by two to three years. This lag, combined with high prices for American hardware, has led

Europeans to purchase older Amiga brand computers. Piracy between the one million Amiga owners has

forced manufacturers to stop producing software for the Amiga. Since the Amiga software and the IBM

software are incompatible, the software companies have shifted to producing software for the smaller IBM

market (Nelson S-15).

Mexico’s software police is a government-sponsored agency called the National Association of the

Computer Program Industry. In conjunction with large software firms like Microsoft and Lotus they have

sucessfully prosecuted over thirty companies. The Association has made other Mexican companies better

educated on software laws and has gotten many companies to confess and pay for their pirated software

before the Association prosecuted them (Hope 40). One of the most blatant examples of government

supported piracy is in Cuba, where any Cuban can call the National Software Interchange Center and

download any foreign software for free (Weisband 30). The US government has failed, in most cases, to act

against countries found guilty of software piracy. Fear of starting trade wars and the US need to keep good

relations with hostile countries keep the government from trying to prosecute these countries. Even when

the US acts on countries with large scale piracy, America’s actions are!

so weak they have no effect on the offending country (Weisband 30).

Piracy is not just a foreign problem. The largest example of US piracy happened in 1993 when the

FBI and the SPA joined together to raid the headquartes of Rusty and Edie’s Bulletin Board System, a

private operation, one of the largest in the world, with 124 phone lines. The FBI received tips from the

SPA’s 1-800 line that the bulletin board was distributing pirated software. The FBI confiscated the

equipment and arrested the owners (Chamption 128).

As more people buy computers, software piracy will increase. When software companies develop

new ways to protect their software, software pirates will find ways to defeat these protection schemes and

ways to avoid weak copyright laws. Perhaps in the future the US government will help the software

designers by passing stronger laws and penalizing countries that do not abide by international copyright

laws.

Champion, Jill. “Not Such a Glorious Thing.” Compute! May 1993: 128.

—. “Software Rental.” Compute! July 1992: 128.

Davis, Stephen. “The Crackdown on Corporate Pirates.” Working Woman March 1990: 50.

Estes, Billy. “3M Technology Helps Prevent Piracy.” CD-ROM Professional February 1995: 89.

Gwynne, Peter. “Stalking Asian Software Pirates.” Technology Review February/March 1992:

15-17.

Hope, Maria. “Mexico vs. the Software Pirates.” World Press Review December 1993: 40.

Karnes, Clifton. “Editorial License.” Compute! May 1993: 4.

Mamis, Edward A. “Don’t Copy That Floppy.” Inc. June 1992: 127.

Morgan, Phillip. “The Great Software Bargain Hunt.” Compute! May 1994: 42-47.

Murdoch, Guy. “Sneaking Software.” Consumers’ Research Magazine February 1993: 2.

Nelson Mike. “How PC Games Play In Europe.” Compute! January 1994: S-15–S-16.

O’Malley, Chris. “Copying the Floppy.” Popular Science December 1993: 50.

—. “Stalking Stealth Viruses.” Popular Science January 1993: 54-60.

Weisband, Suzanne P. and Seymour E. Goodmannery. “Subduing Software Pirates.”

Technology Review October 1993: 30-34.

Young, Jim. “China’s New Wall.” World Press Review Feburary 1992: 42.


1. Реферат Налбандян, Микаэл
2. Реферат География запасов и добычи железной руды в мире
3. Реферат на тему The Influence Of Personal Experiences In Emily
4. Реферат Классификация управленческих решений 5
5. Реферат на тему Madonna And Marylin Monroe
6. Контрольная работа на тему Стылістыка беларускай мовы
7. Доклад на тему Заболевания головного мозга
8. Реферат Понятие объекта преступления
9. Курсовая Учет кассовых операций 4
10. Статья Загрязнения от свалок