Researchers in virtually every discipline rely on sophisticated proprietary software for their work. However, some researchers are unable to afford the licenses and instead procure the software illegally. We discuss the prohibition of software piracy by intellectual property laws, and argue that the moral basis for the copyright law offers the possibility of cases where software piracy may be morally justified. The ethics codes that scientific institutions abide by are informed by a rule-consequentialist logic: by preserving personal rights to authored works, people able to do so will be incentivized to create. By showing that the law has this rule-consequentialist grounding, we suggest that scientists who blindly adopt their institutional ethics codes will commit themselves to accepting that software piracy could be morally justified, in some cases. We hope that this conclusion will spark debate over important tensions between ethics codes, copyright law, and the underlying moral basis for these regulations. We conclude by offering practical solutions (other than piracy) for researchers.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1007/s11948-014-9573-5 | DOI Listing |
Sci Rep
May 2024
Department of Physics, National Institute of Technology Durgapur, Durgapur, 713209, West Bengal, India.
Illegal file sharing of copyrighted contents through popular file sharing networks poses an enormous threat to providers of digital contents, such as, games, softwares, music and movies. Though empirical studies of network effects on piracy is a well-studied domain, the dynamics of peer effect in the context of evolving social contagion has not been enough explored using dynamical models. In this research, we methodically study the trends of online piracy with a continuous ODE approach and differential equations on graphs to have a clear comparative view.
View Article and Find Full Text PDFPLoS One
October 2023
National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, USM, Penang, Malaysia.
The role that vehicular fog computing based on the Fifth Generation (5G) can play in improving traffic management and motorist safety is growing quickly. The use of wireless technology within a vehicle raises issues of confidentiality and safety. Such concerns are optimal targets for conditional privacy-preserving authentication (CPPA) methods.
View Article and Find Full Text PDFPLoS One
April 2020
Department of Software, Konkuk University, Seoul, South Korea.
As eBook readers have expanded on the market, various online eBook markets have arisen as well. Currently, the online eBook market consists of at least publishers and online platform providers and authors, and these actors inevitably incur intermediate costs between them. In this paper, we introduce a blockchain-based eBook market system that enables self-published eBook trading and direct payments from readers to authors without any trusted party; because authors publish themselves and readers purchase directly from authors, neither actor incurs any intermediate costs.
View Article and Find Full Text PDFScientificWorldJournal
January 2016
Institute of Management Sciences, Peshawar 25000, Pakistan.
Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!