Software Piracy in Research: A Moral Analysis.

Sci Eng Ethics

Department of Philosophy, Binghamton University, 4400 Vestal Parkway East, Box 6000, Binghamton, NY, 13902-6000, USA,

Published: August 2015

Researchers in virtually every discipline rely on sophisticated proprietary software for their work. However, some researchers are unable to afford the licenses and instead procure the software illegally. We discuss the prohibition of software piracy by intellectual property laws, and argue that the moral basis for the copyright law offers the possibility of cases where software piracy may be morally justified. The ethics codes that scientific institutions abide by are informed by a rule-consequentialist logic: by preserving personal rights to authored works, people able to do so will be incentivized to create. By showing that the law has this rule-consequentialist grounding, we suggest that scientists who blindly adopt their institutional ethics codes will commit themselves to accepting that software piracy could be morally justified, in some cases. We hope that this conclusion will spark debate over important tensions between ethics codes, copyright law, and the underlying moral basis for these regulations. We conclude by offering practical solutions (other than piracy) for researchers.

Download full-text PDF

Source
http://dx.doi.org/10.1007/s11948-014-9573-5DOI Listing

Publication Analysis

Top Keywords

software piracy
16
ethics codes
12
moral basis
8
copyright law
8
piracy morally
8
morally justified
8
software
6
piracy moral
4
moral analysis
4
analysis researchers
4

Similar Publications

Illegal file sharing of copyrighted contents through popular file sharing networks poses an enormous threat to providers of digital contents, such as, games, softwares, music and movies. Though empirical studies of network effects on piracy is a well-studied domain, the dynamics of peer effect in the context of evolving social contagion has not been enough explored using dynamical models. In this research, we methodically study the trends of online piracy with a continuous ODE approach and differential equations on graphs to have a clear comparative view.

View Article and Find Full Text PDF

The role that vehicular fog computing based on the Fifth Generation (5G) can play in improving traffic management and motorist safety is growing quickly. The use of wireless technology within a vehicle raises issues of confidentiality and safety. Such concerns are optimal targets for conditional privacy-preserving authentication (CPPA) methods.

View Article and Find Full Text PDF

As eBook readers have expanded on the market, various online eBook markets have arisen as well. Currently, the online eBook market consists of at least publishers and online platform providers and authors, and these actors inevitably incur intermediate costs between them. In this paper, we introduce a blockchain-based eBook market system that enables self-published eBook trading and direct payments from readers to authors without any trusted party; because authors publish themselves and readers purchase directly from authors, neither actor incurs any intermediate costs.

View Article and Find Full Text PDF
Article Synopsis
  • Software birthmarks help identify software theft by comparing unique qualities of programs to determine if they've been copied.
  • Software piracy is a growing issue, and accurately estimating these birthmarks can help combat it.
  • A new fuzzy logic-based technique evaluates the credibility and resilience of software birthmarks, showing effective results in a case study on assessing software originality.
View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!