Tuesday, February 12, 2019
Software Piracy :: Exploratory Essays Research Papers
Software Piracy It is decorous increasingly difficult to manage a company without being heterogeneous with findings concerning computer parcel package. In our cur look at North American society, nearly every dissolute lend oneselfs some form of specialized packet whether in the payroll subdivision where the Chief Financial Officer most certainly employs specialized m wholenesstary software to make financial projections, or through the use of computer interaction with the company bank. Manufacturing riotouss for example, rely heavily on specialized software for inventory control, billing, shipping and other critical functions. There are too various signs that develop new products and lots use computer-aided design (CAD) software to develop and refine product ideas. This perhaps may lead one to argue that virtually every department within a modern company relies somewhat on the use of computer software (Baumer & Poindexter, 2002 85). As such(prenominal), it be comes increasingly important to recognize the various forms of software buccaneering and the demand steps to be taken in order to prevent such abuses of Intellectual Property.Make or Buy Weisband and Goodman (1993 30-33) define software piracy as the direct, unauthorized copying of a program for commercial gain. The use of software involves a classic make or buy decision based on three options. The first option is that a firm may hire programmer-employees or an outside firm to create the software. The drawback in this situation is that the final product may be less than perfect, as employees who have previously created working software for a firm ofttimes re-use certain parts of it to save money. In these situations, the issue of ownership of the software is relatively simple. If the creator of the software is an employee, the employer of that person is automatically the owner of the copyright. The due south option available to the firm is to contract with a softwa re vender of copyrighted and trademarked software for installation of their software, noting that a license engagement is necessary and secondly that various terms in the license correspondence can be negotiable. In this situation the use of software is often restricted to normal operations meaning that the licensee cannot sell or rent access of the software to any other firm, and secondly that the use of software is restricted to a limited number of people within the firm (Baumer & Poindexter, 2002 102).
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.