The document discusses ethical considerations around the use of open-source software. It notes that while developers can use open-source code to further their own projects, they must give proper credit to the original creators. When credit is not given, it can be seen as theft. The document examines the perspectives of utilitarianism and deontology on how to address uncredited use of open-source code. A utilitarian view would favor moderate actions to avoid lawsuits that could financially harm companies. A deontological view would support enforcing guidelines to prevent treating open-source creators as a means to an end and to ensure they receive proper recognition. The document concludes that a middle-ground approach is needed, such as voluntary codes of conduct, to
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING IAEME Publication
Due to the truth that traditional centralized trusting mechanism cannot adapt to the call for of P2P network, we need installation a dispensed trusting mechanism to power the reliability of device. The accept as true with models consciousness o the participants. It divides P2P network into numerous overlapped companies with unique features and treats it as undergo in mind courting of companies preserve in thoughts relationship among agencies and friends and agree with dating amongst pals within the same organization. in a single corporation the evaluations among individuals come into being thru combos of records statistics of item peers written thru participants and individual experience of appreciators moreover via amending those statistics in keeping with versions of human beings abilities to statement. In P2P community the agree with evaluation among companies are obtained by means of way of the usage of a technique of global hold in mind. At last the take into account degree of aimed pals is calculated with the useful aid of valuations among participants in the same employer and receive as right with reviews amongst agencies, then corresponding selection of trade can be made via the recall degree. The experiments in simulation have demonstrated our version has strong ability for protective malicious peers and it has fewer errors in desires searching. It additionally costs little charge inside the re-convergence technique whilst community topology changes.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Understanding the Role of the Mobile Operator in Mobile Social NetworkingPriya Prakash
Understanding the Role of the Mobile Operator in Mobile Social Networking and the differences between On-Deck and Off-Deck Communities. Presented at the Mobile Web Europe Conference 2008.
Security and Privacy Measurements in Social Networks: Experiences and Lessons...FACE
We describe our experience gained while exploring practical security and privacy problems in a real-world, large- scale social network (i.e., Facebook), and summarize our conclu- sions in a series of “lessons learned”. We first conclude that it is better to adequately describe the potential ethical concerns from the very beginning and plan ahead the institutional review board (IRB) request. Even though sometimes optional, the IRB approval is a valuable point from the reviewer’s perspective. Another aspect that needs planning is getting in touch with the online social network security team, which takes a substantial amount of time. With their support, “bending the rules” (e.g., using scrapers) when the experimental goals require so, is easier. Clearly, in cases where critical technical vulnerabilities are found during the research, the general recommendations for responsible disclosure should be followed. Gaining the audience’s engagement and trust was essential to the success of our user study. Participants felt more comfortable when subscribing to our experiments, and also responsibly reported bugs and glitches. We did not observe the same behavior in crowd-sourcing workers, who were instead more interested in obtaining their rewards. On a related point, our experience suggests that crowd sourcing should not be used alone: Setting up tasks is more time consuming than it seems, and researchers must insert some sentinel checks to ensure that workers are not submitting random answers.
From a logistics point of view, we learned that having at least a high-level plan of the experiments pays back, especially when the IRB requires a detailed description of the work and the data to be collected. However, over planning can be dangerous because the measurement goals can change dynamically. From a technical point of view, partially connected to the logistics remarks, having a complex and large data-gathering and analysis framework may be counterproductive in terms of set-up and management overhead. From our experience we suggest to choose simple technologies that scale up if needed but, more importantly, can scale down. For example, launching a quick query should be straightforward, and the frameworks should not impose too much overhead for formulating it. We conclude with a series of practical recommendations on how to successfully collect data from online social networks (e.g., using techniques for network multi presence, mimicking user behavior, and other crawling “tricks”’) and avoid abusing the online service, while gathering the data required by the experiments.
Over the past few years, we've seen anonymous social media slowly gain a foothold among young millennials and older centennials in the United States.
Yik Yak is arguably the hottest social network platform to take over high school and college campuses, boasting 1.7 million monthly users. Essentially an anonymous virtual bulletin board, those logged into Yik Yak can read the yaks of anyone within a 1.5 radius of them.
Learn more about the platform and the implications for brands in this presentation.
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING IAEME Publication
Due to the truth that traditional centralized trusting mechanism cannot adapt to the call for of P2P network, we need installation a dispensed trusting mechanism to power the reliability of device. The accept as true with models consciousness o the participants. It divides P2P network into numerous overlapped companies with unique features and treats it as undergo in mind courting of companies preserve in thoughts relationship among agencies and friends and agree with dating amongst pals within the same organization. in a single corporation the evaluations among individuals come into being thru combos of records statistics of item peers written thru participants and individual experience of appreciators moreover via amending those statistics in keeping with versions of human beings abilities to statement. In P2P community the agree with evaluation among companies are obtained by means of way of the usage of a technique of global hold in mind. At last the take into account degree of aimed pals is calculated with the useful aid of valuations among participants in the same employer and receive as right with reviews amongst agencies, then corresponding selection of trade can be made via the recall degree. The experiments in simulation have demonstrated our version has strong ability for protective malicious peers and it has fewer errors in desires searching. It additionally costs little charge inside the re-convergence technique whilst community topology changes.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Understanding the Role of the Mobile Operator in Mobile Social NetworkingPriya Prakash
Understanding the Role of the Mobile Operator in Mobile Social Networking and the differences between On-Deck and Off-Deck Communities. Presented at the Mobile Web Europe Conference 2008.
Security and Privacy Measurements in Social Networks: Experiences and Lessons...FACE
We describe our experience gained while exploring practical security and privacy problems in a real-world, large- scale social network (i.e., Facebook), and summarize our conclu- sions in a series of “lessons learned”. We first conclude that it is better to adequately describe the potential ethical concerns from the very beginning and plan ahead the institutional review board (IRB) request. Even though sometimes optional, the IRB approval is a valuable point from the reviewer’s perspective. Another aspect that needs planning is getting in touch with the online social network security team, which takes a substantial amount of time. With their support, “bending the rules” (e.g., using scrapers) when the experimental goals require so, is easier. Clearly, in cases where critical technical vulnerabilities are found during the research, the general recommendations for responsible disclosure should be followed. Gaining the audience’s engagement and trust was essential to the success of our user study. Participants felt more comfortable when subscribing to our experiments, and also responsibly reported bugs and glitches. We did not observe the same behavior in crowd-sourcing workers, who were instead more interested in obtaining their rewards. On a related point, our experience suggests that crowd sourcing should not be used alone: Setting up tasks is more time consuming than it seems, and researchers must insert some sentinel checks to ensure that workers are not submitting random answers.
From a logistics point of view, we learned that having at least a high-level plan of the experiments pays back, especially when the IRB requires a detailed description of the work and the data to be collected. However, over planning can be dangerous because the measurement goals can change dynamically. From a technical point of view, partially connected to the logistics remarks, having a complex and large data-gathering and analysis framework may be counterproductive in terms of set-up and management overhead. From our experience we suggest to choose simple technologies that scale up if needed but, more importantly, can scale down. For example, launching a quick query should be straightforward, and the frameworks should not impose too much overhead for formulating it. We conclude with a series of practical recommendations on how to successfully collect data from online social networks (e.g., using techniques for network multi presence, mimicking user behavior, and other crawling “tricks”’) and avoid abusing the online service, while gathering the data required by the experiments.
Over the past few years, we've seen anonymous social media slowly gain a foothold among young millennials and older centennials in the United States.
Yik Yak is arguably the hottest social network platform to take over high school and college campuses, boasting 1.7 million monthly users. Essentially an anonymous virtual bulletin board, those logged into Yik Yak can read the yaks of anyone within a 1.5 radius of them.
Learn more about the platform and the implications for brands in this presentation.
All things considered, as a bundle, social media applications are flawed, nor are they static. Like most technologies, these remain imperfect and are dependent upon future developments.
Open Source Governance in Highly Regulated Companiesiasaglobal
Open source governance is part of IT governance and focuses on the specific issues related to the acquisition, use and management of OSS, and ensuring it is done in alignment with a company?s stated objectives, policies and risk profile. And as open source becomes more common, the need for governance increases dramatically. Without proper controls and processes to ensure compliance and reduce exposure, organizations will be at risk from technical and operational, regulatory, security, legal and brand factors.
Don't coast along this summer – make the most of your downtime with CIPR CPD.
Social media has revolutionised the public relations industry but are you fully equipped to navigate the legal challenges of the new landscape?
Produced by the CIPR Social Media Panel (#CIPRSM), our latest guide answers the top 15 most commonly asked questions on social media and the law.
Get reading and bag yourself 5 CPD points today. Find out more at www.cipr.co.uk/summerofcpd
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
Exploring new mobile and cloud platforms without a governance strategy can
have consequences.
At the beginning of my IT career, I witnessed a number of decisions and project management practices which, at the
time, just didn't seem to make sense. But I was young, and I often thought to myself that the people involved must have
some other reasoning, some justification for their actions that I was just not privy to.
In short, I remained quiet when I should have spoken up. What two decades of experience has taught me is that there
is rarely reasoning or justification behind actions that, at a gut-level, are clearly bad IT practices. We inherently
recognize when common sense has taken a back seat.
There is most definitely a dark side to BYOD. For the most part, I am an advocate for the consumerization of IT (using
non-standard apps and tools as a way to increase end user engagement and productivity) and support the bring-your-
own-device model.
However, as a seasoned manager and IT operations leader, I recognize the risks that come with the model if
organizations do not properly plan out their strategies, putting sufficient protections and governance practices in place
to manage the potential risks that could come from these unsupported devices and applications. End users often want
what’s NEW, but there are valid reasons for imposing and enforcing safeguards when giving mobile business users
access to your otherwise secure, scalable, and compliant systems.
Some people equate governance with bureaucracy and hierarchical systems, but those perceptions often come from a
lack of appreciation for the potential risks involved. Governance is about checks and balances -- supporting the tools
and systems your end users want, but in a way that is manageable and which follows defined protocols.
Examples of rogue IT practices
A (http://harmon.ie/blog/new-survey-reveals-mobile-rogue-it-costing-us-organizations-almost-2b)recent uSamp survey
(http://harmon.ie/blog/new-survey-reveals-mobile-rogue-it-costing-us-organizations-almost-2b) found that 41% of US mobile business
users have used unsanctioned services to share or sync files, despite 87% saying they are aware that their company
has a document sharing policy that prohibits this practice. And, 27% of mobile business users who “went rogue”,
reported immediate and direct repercussions, from lost business to expensive lawsuits and financial penalties that cost
$2 billion.
While most IT professionals understand these risks viscerally, some business users need to crash and burn before
they are willing to adjust their risky behaviors, which is not a message your employer wants to hear. Luckily, there is
another way: learning from the mistakes of others. This month, I am one of six mobile security and IT experts judging a
(http://www.rogueitstories.com/)"Rogue IT" contest (http://www.rogueitstories.com/). We’re collecting anonymous stories from the
community ...
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?Jennifer O'Neill
The line between intellectual property lawyers and general practitioners was once a clear one. IP lawyers filed patent applications, registered trademarks, and counseled their clients on whether reprinting an article was “fair use” of a copyrighted work. Generalists negotiated contracts, prosecuted and defended litigation, and drafted corporate filings.
In the current economy, a generalist may not be able to consult an IP specialist. And the pervasive quality of technology means that IP issues are present in many transactions, particularly with respect to the use and licensing of software.
You don’t have to be a programmer to help your client address these concerns. But inevitably, you will need to understand the concept of open source.
Software and Media PiracySalvador ValleCollege f.docxwhitneyleman54422
Software and Media Piracy
Salvador Valle
College for America
12/20/16
Software and Media Piracy
Piracy, originally referred to the theft and violence at sea, has now been associated with copyright infringement. Piracy includes the illegal activities of duplicating, selling and using commercial products without permission. A counterfeit is an imitated product or service. Counterfeited products are usually fake and unlawful copies of the original ones. The aim of production a counterfeit product is to take advantage of the higher value of the copied product. An intellectual property is an invention or work that results from creativity. It includes designs or manuscripts to which an individual may seek copyright, patent, trademark, etc. A trademark is an identifiable sign, expression or design that is used to differentiate products or services of a given source from those of another source. A copyright is a legal right that gives an inventor of the original work to exclusively use and distribute it. Licensing is the issuances of a permit to a party to allow them undertake a certain activity.
The issue of piracy or copyright infringement has resulted in the licensed products having low revenue since they face competition from the counterfeit products. The fake identities posted by the counterfeit products replicate the actual products making it difficult for consumers to know whether they are purchasing the right products. However, the counterfeit software and media produce positive effects on the competitive pricing of the products. The counterfeit items may have the quality which matches their prices. On the other hand, the licensed commodities may have exaggerated prices which do not warrant their set prices. The government and other legal multinational authorities should lessen the prohibition of counterfeit products due to the high prices of major brands.
Counterfeiting which is a form of piracy refers to the imitation of the real products with the intention of taking advantage of the superior quality of the imitated product. Software products are categorized as intellectual property which are the unique creations of inventions by a software company and can also include the brand and commercial identity of the company. The law protects the intellectual properties through licenses, trademarks and copyright agreements which avert copyright infringements. For instance, the original copies of media e.g. movie DVDs limit the user to acquire them for personal use and not to reproduce the product for commercial profit. The trademark shows the registered and licensed brand of the company that cannot be used by other companies to promote their identities or products. The government gives licenses to the legitimate companies so that they can legally conduct business within a particular region. The copyrights describe the intellectual property rights that the companies have over their products.
According to a study of global software piracy conduc.
Commercial software, purchased with a licence for one or more computers. This generally is coupled with some form of support and regular updates to patch errors etc. Sometimes a new version of the software is offered at a reduced rate as "update". This type of software is generally relatively expensive and is often designed to cover specific industrial purposes. The big exception is the various sets of "office" software, which are designed for use in the commercial environment, but can naturally be equally used for various tasks at home.
For many years, we have relied on a big, ALL CAPS waiver of liability in licenses and the ability of the recipient to examine and run the code to ensure software freedom for all. But the cloud, AI and now a wave of European regulation have eroded that dream. Where have we got to, and is software freedom still a viable objective?
All things considered, as a bundle, social media applications are flawed, nor are they static. Like most technologies, these remain imperfect and are dependent upon future developments.
Open Source Governance in Highly Regulated Companiesiasaglobal
Open source governance is part of IT governance and focuses on the specific issues related to the acquisition, use and management of OSS, and ensuring it is done in alignment with a company?s stated objectives, policies and risk profile. And as open source becomes more common, the need for governance increases dramatically. Without proper controls and processes to ensure compliance and reduce exposure, organizations will be at risk from technical and operational, regulatory, security, legal and brand factors.
Don't coast along this summer – make the most of your downtime with CIPR CPD.
Social media has revolutionised the public relations industry but are you fully equipped to navigate the legal challenges of the new landscape?
Produced by the CIPR Social Media Panel (#CIPRSM), our latest guide answers the top 15 most commonly asked questions on social media and the law.
Get reading and bag yourself 5 CPD points today. Find out more at www.cipr.co.uk/summerofcpd
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
Exploring new mobile and cloud platforms without a governance strategy can
have consequences.
At the beginning of my IT career, I witnessed a number of decisions and project management practices which, at the
time, just didn't seem to make sense. But I was young, and I often thought to myself that the people involved must have
some other reasoning, some justification for their actions that I was just not privy to.
In short, I remained quiet when I should have spoken up. What two decades of experience has taught me is that there
is rarely reasoning or justification behind actions that, at a gut-level, are clearly bad IT practices. We inherently
recognize when common sense has taken a back seat.
There is most definitely a dark side to BYOD. For the most part, I am an advocate for the consumerization of IT (using
non-standard apps and tools as a way to increase end user engagement and productivity) and support the bring-your-
own-device model.
However, as a seasoned manager and IT operations leader, I recognize the risks that come with the model if
organizations do not properly plan out their strategies, putting sufficient protections and governance practices in place
to manage the potential risks that could come from these unsupported devices and applications. End users often want
what’s NEW, but there are valid reasons for imposing and enforcing safeguards when giving mobile business users
access to your otherwise secure, scalable, and compliant systems.
Some people equate governance with bureaucracy and hierarchical systems, but those perceptions often come from a
lack of appreciation for the potential risks involved. Governance is about checks and balances -- supporting the tools
and systems your end users want, but in a way that is manageable and which follows defined protocols.
Examples of rogue IT practices
A (http://harmon.ie/blog/new-survey-reveals-mobile-rogue-it-costing-us-organizations-almost-2b)recent uSamp survey
(http://harmon.ie/blog/new-survey-reveals-mobile-rogue-it-costing-us-organizations-almost-2b) found that 41% of US mobile business
users have used unsanctioned services to share or sync files, despite 87% saying they are aware that their company
has a document sharing policy that prohibits this practice. And, 27% of mobile business users who “went rogue”,
reported immediate and direct repercussions, from lost business to expensive lawsuits and financial penalties that cost
$2 billion.
While most IT professionals understand these risks viscerally, some business users need to crash and burn before
they are willing to adjust their risky behaviors, which is not a message your employer wants to hear. Luckily, there is
another way: learning from the mistakes of others. This month, I am one of six mobile security and IT experts judging a
(http://www.rogueitstories.com/)"Rogue IT" contest (http://www.rogueitstories.com/). We’re collecting anonymous stories from the
community ...
I\'m Not an IT Lawyer: Why Does Open Source Matter to Me?Jennifer O'Neill
The line between intellectual property lawyers and general practitioners was once a clear one. IP lawyers filed patent applications, registered trademarks, and counseled their clients on whether reprinting an article was “fair use” of a copyrighted work. Generalists negotiated contracts, prosecuted and defended litigation, and drafted corporate filings.
In the current economy, a generalist may not be able to consult an IP specialist. And the pervasive quality of technology means that IP issues are present in many transactions, particularly with respect to the use and licensing of software.
You don’t have to be a programmer to help your client address these concerns. But inevitably, you will need to understand the concept of open source.
Software and Media PiracySalvador ValleCollege f.docxwhitneyleman54422
Software and Media Piracy
Salvador Valle
College for America
12/20/16
Software and Media Piracy
Piracy, originally referred to the theft and violence at sea, has now been associated with copyright infringement. Piracy includes the illegal activities of duplicating, selling and using commercial products without permission. A counterfeit is an imitated product or service. Counterfeited products are usually fake and unlawful copies of the original ones. The aim of production a counterfeit product is to take advantage of the higher value of the copied product. An intellectual property is an invention or work that results from creativity. It includes designs or manuscripts to which an individual may seek copyright, patent, trademark, etc. A trademark is an identifiable sign, expression or design that is used to differentiate products or services of a given source from those of another source. A copyright is a legal right that gives an inventor of the original work to exclusively use and distribute it. Licensing is the issuances of a permit to a party to allow them undertake a certain activity.
The issue of piracy or copyright infringement has resulted in the licensed products having low revenue since they face competition from the counterfeit products. The fake identities posted by the counterfeit products replicate the actual products making it difficult for consumers to know whether they are purchasing the right products. However, the counterfeit software and media produce positive effects on the competitive pricing of the products. The counterfeit items may have the quality which matches their prices. On the other hand, the licensed commodities may have exaggerated prices which do not warrant their set prices. The government and other legal multinational authorities should lessen the prohibition of counterfeit products due to the high prices of major brands.
Counterfeiting which is a form of piracy refers to the imitation of the real products with the intention of taking advantage of the superior quality of the imitated product. Software products are categorized as intellectual property which are the unique creations of inventions by a software company and can also include the brand and commercial identity of the company. The law protects the intellectual properties through licenses, trademarks and copyright agreements which avert copyright infringements. For instance, the original copies of media e.g. movie DVDs limit the user to acquire them for personal use and not to reproduce the product for commercial profit. The trademark shows the registered and licensed brand of the company that cannot be used by other companies to promote their identities or products. The government gives licenses to the legitimate companies so that they can legally conduct business within a particular region. The copyrights describe the intellectual property rights that the companies have over their products.
According to a study of global software piracy conduc.
Commercial software, purchased with a licence for one or more computers. This generally is coupled with some form of support and regular updates to patch errors etc. Sometimes a new version of the software is offered at a reduced rate as "update". This type of software is generally relatively expensive and is often designed to cover specific industrial purposes. The big exception is the various sets of "office" software, which are designed for use in the commercial environment, but can naturally be equally used for various tasks at home.
For many years, we have relied on a big, ALL CAPS waiver of liability in licenses and the ability of the recipient to examine and run the code to ensure software freedom for all. But the cloud, AI and now a wave of European regulation have eroded that dream. Where have we got to, and is software freedom still a viable objective?
1. I. Name:
Justin Andrews
ACSG 575
Essay #2 – Ethical Considerations in Open-Source Software Usage
II. Introduction:
Free, open-source software is a movement which continues to increase in size as time
goes on. The growth has gotten to a point that it is affecting corporations and many
developers in the software world, whether or not they participate in developing the
specific software themselves. The reason for this is because of the fact that developers
may use the open-source software in order to further develop their own programs and
projects, and while there is nothing wrong with this initially, problems do ensue. The
problems mostly revolve around the fact that the code is not noted to have been acquired
from those who made it available, and with a lack of recognition being properly given.
Due to this recognition and credit not being given, the use of this code can be seen as
blatant theft. To combat this issue, people that support the movement do their best to find
open-source software that is used without proper credit being given, which may result in
lawsuits for the offenders. While such actions can help remove misunderstandings and
dishonest use of free software, an excess use of force in dealing with this may result in
unnecessary laws and regulations being passed. With code sometimes compared to being
that of ideas, attempts to protect such in an overdone manner can harm the creative force
driving the open-source movement, which is in contrast to why it was begun in the first
place. The problem that can be seen here is finding a proper balance, one that will help
ensure credit is given where due, and one that can ensure blatant thievery of such code
goes punished, while innocent mistakes are mended properly. It could also be considered
2. a question of whether or not it is right to try and enforce the guidelines that go with using
free software as if they were laws, especially considering the possible consequences.
III. Stakeholders:
Developers have reputation at stake as well as their own sense of a larger scope when
including the possibility that they have access to open-source code, yet must follow
specific guidelines if they plan on using such. Companies such as Google, Sony, and
Best Buy have similar factors at stake as their reputation could go down when their
products turn out to use open-source code without their knowledge. They also have
variations of cash at stake as lawsuits concerning the use of this code can hurt them
should they choose to ignore the guidelines that had been put in place regarding the use
of open-source software. Developers also have careers at stake should they prove to be
liabilities for companies that get targeted for lawsuits concerning these issues. Those
involved with free software have creativity and a community at stake being the type of
people who are developing this software, as they not only have to be watchful of people
ignorant of the guidelines but also be vigilant if they wish to keep the movement going as
a professional, competitive force in the world of computing. In a way, users have
everything on the line as excessive control over their code or a lack thereof can result in
the movement falling apart, and the community of users who take part in developing
open-source software could thus cease to exist. Users and customers can be seen as a
group with little at stake, yet any conflict that results between companies and users can
affect them negatively. On the other hand, cooperation between the two groups can result
in a more expansive field that can improve itself at a faster rate which will allow
customers access to much better technology much sooner.
3. IV. Utilitarian analysis:
A Utilitarian who happened to see the issue at hand may have trouble in choosing which
side to take, however it can be argued that their viewpoint would tend to favor companies
in having moderate and mild actions taken on violations of the guidelines regarding free
software. The reason behind this would have to do with the fact that the companies who
violate these guidelines, even though such violations may be unintentional, can face
major setbacks through complaints and lawsuits filed against them. Due to these
potential problems, companies could stand to lose business or trust in the consumers’
eyes, or lose money to the point that it would affect their business with their customers.
One specific issue that companies may encounter concern the costs from judicial
procedures. The software in question would have to be taken off the market in order to
fix legal compliance issues if the incident occurred post-release, or delay the
development process for a varied amount of time, which could in turn affect other
projects within a given corporation.1 Due to all these potential, unforeseen consequences,
all of which would result in much reduced happiness, it is easy to argue that enforcing the
guidelines as a sort of law would not be the best approach. While they may respect the
views and efforts of those who participate in the free software movement, these people
are a clear minority, and they are one that consumers are still in the process of
understanding and acknowledging. After some time has passed, and after working
through alternative means to resolving potential conflicts dealing with a lack of
recognition, it can be possible to have all interested parties happy, but for the moment,
the current situation would be one not well received by a Utilitarian.
1
“Legal Compliance: Open Source and Quality Assurance” Dr. Dobb’s “The World of Software
Development”
http://www.drdobbs.com/open-source/221901137
4. V. Deontological Analysis:
Through a sense of duty and the known consequences, a Kantian could see the issue
through different views, depending on the argument they wished to make. More likely
than not, however, it can be expected that through a sense of duty, justice should be
served in favor of getting people the deserved recognition and reputation for the software
they have developed. Due to this, even if the measures may be extreme, they can be seen
as those who would support actions such as issued laws and lawsuits in order to help
companies and developers understand the guidelines that come with using open-source
software. Whether or not violations of these guidelines were done intentionally, proper
actions would be supported in order to rectify any situations that had resulted from
ignoring them, even if they are not necessarily rules. With honesty being something held
in high regard, a Kantian would expect companies to understand the open-source
movement especially, as they are also a source of competition as much as they are a
source to help enhance their own efforts. Another way of looking at the situation would
show how the open-source software, along with those who participate in developing it,
are being used as means and not an end in themselves. A Kantian is known to object to
customers being used as a means to an end, regardless of the reason. Similarly, people
with that viewpoint would not stand for anyone else, even if they are a form of
competition, to be used accordingly, regardless of the reasons behind such treatment.
Due to this viewpoint in regards to means and ends, a Kantian would have further reason
to support participants in the free software movement in ensuring their software is not
used inappropriately in violation of the requirements that accompany its use. In the end,
5. it is clear that a Kantian would see nothing wrong with ensuring simple guidelines are
followed.
VI. Conclusion:
It is clear that a simple lack of knowledge has caused many types of open-source
software to be used without proper recognition being given to the original developers of
the many instances of code. Due to such an oversight on behalf of companies and
developers, those who are a part of the free software movement have in turn issued
complaints and lawsuits in order to rectify the problem. Whether or not this is the proper
way to handle the situation, it is an action that many companies are showing concern
over, and favoring either side in this situation may prove harmful to all involved parties,
including customers of the many companies. A utilitarian would like to see a minimal
amount of damage done to all concerned parties, and the simplest way to follow this
practice would be to limit the amount of lawsuits filed, as companies will lose business
and money due to them. As long as the many companies are not negatively affected,
complaints would be seen as a fair approach in order to get the point across, and try to
convince developers that people who manage the open-source software have a reputation
at stake that must be upheld. A Kantian, on the other hand, would support those involved
in free software as the companies, through neglect, are causing these people a great deal
of harm which in the end can be summed up as treating them as means to an end. Before
and after performing these analyses, I would have to agree with a Kantian that the many
companies are at fault here, even if through no fault of their own. However, I myself
would look for some kind of middle ground for reasons that my Utilitarian analysis
expresses. I believe such is necessary due to the whole field risking damage from the
6. many potential lawsuits and laws that can be put in place against the use of free software,
which in an extreme could make the movement rather hypocritical. As far as codes of
conduct could go, one for developers to follow should focus on ensuring that the original
developers are given proper credit and recognition. Out of respect, the conduct should
also state that those who plan to use open-source software take the time to understand
how to use it, as well as ensure it is clear they themselves have used such for the
programs and projects they are working on. The code of conduct for organizations to
follow is closely similar to that for developers, yet differs as it is something an entire
organization must take care to pay attention to. For organizations, the code of conduct
should clearly state this in conjunction with the proper citations of whose open-source
code was used. The code of conduct for users differs as it is more informative than
anything else, and should be one that informs users and customers how it is important to
recognize the use of open-source software on its own and within organizations, like that
of Cisco. On a similar note, a code of conduct for those who develop free software
would also be more informative, as it should be one that motivates these developers to
help ensure everyone is aware of their presence along with how they are making an
impact in the world of computing.