SlideShare a Scribd company logo
[object Object]
ACSG-575
Essay #2 – Ethical Considerations in Open-Source Software Usage
Introduction
Open source refers to any program whose source code is made available for use or modification as users or other developers wants. Most Open Source software is distributed under the GNU General Public License (GPL), additionally requires that if a modified version of the software is distributed, the source code for such modified version must be made freely available. In essence, creators of Open Source software hold the copyright for their work, but grant a license (the GPL) to anyone who wants to use it. It is important to understand that open source comes with license obligations. Most software engineers download the free open source and use it within their own commercial software without attending to those obligations. The important thing is to understand these obligations and to be clear about which license obligations are acceptable to you and which license obligations are not. The most important use of open source software is on university level student where they can not only learn about software but with the source code they can also have in-depth knowledge about the software and can learn much about it. <br />Comparing open source and proprietary software both have some pros and cons. Open source software is very low priced or even free. With free software, such as Linux, the source is freely available for download. People are encouraged to look at it and try to find bugs. And thousands of people do look at the code. The end result is that there are far more people proofreading and fixing code, and the program has fewer bugs and is more stable. The risk in open source software is potential liability for intellectual property infringement. While proprietary software is one that is owned by an individual or a company. There are almost always major restrictions on its use, and its source code is almost always kept secret and one of the most common prohibitions for such programs are making unauthorized copies, using it on more than a certain number of computers. With proprietary software only the developer of the program have access to its source code which makes it impossible for others to find problems in the code before they cause damage. <br />In the article the defenders of free software, Armijn Hemel who lives in Netherlands is against the use of free software. From the past 5 year he has been working as a volunteer watchman for free, open-source software like Linux operating system and is monitoring on the companies who uses open source instead of building software for their products from scratch and he found some companies who violated the law associated with that free software like dell got a cease and desist letter for shipping its new Streak tablet without providing the open source software code and later they published the code on their website but other companies may be  because of their ignorance or negligence  have to pay large amount of money to the one whom that software belongs. There are some high profile companies like Cisco System, Best Buy, and Verizon Communication who have been sued by Software Freedom Law Center. There is some rule associated with open source software and some company fears that programmer of that software may charge them some large amount for violating their law. <br />Stakeholders<br />,[object Object]
Some of the stakeholders on this issue are

More Related Content

Viewers also liked

Presentation mar2016
Presentation mar2016Presentation mar2016
Presentation mar2016
Krista Scammahorn
 
Comunicación no verbal
Comunicación no verbalComunicación no verbal
Comunicación no verbal
ColegioMiranda
 
Seed Saving ~ College of Tropical Agriculture
Seed Saving ~ College of Tropical AgricultureSeed Saving ~ College of Tropical Agriculture
Seed Saving ~ College of Tropical Agriculture
Seeds
 
Talleres ecuaciones diferenciales
Talleres ecuaciones diferencialesTalleres ecuaciones diferenciales
Talleres ecuaciones diferenciales
José Beltrán Arens
 
JENNIFER A SOTAK RESUME number 2
JENNIFER A SOTAK RESUME number 2JENNIFER A SOTAK RESUME number 2
JENNIFER A SOTAK RESUME number 2Jen Sotak
 
Basic Concepts of Seed Production and Seed Regeneration
Basic Concepts of Seed Production and Seed RegenerationBasic Concepts of Seed Production and Seed Regeneration
Basic Concepts of Seed Production and Seed Regeneration
Seeds
 
ATENCION PRIMARIA
ATENCION PRIMARIAATENCION PRIMARIA
ATENCION PRIMARIA
kadaverik6
 
Methods of-seed-harvesting
Methods of-seed-harvestingMethods of-seed-harvesting
Methods of-seed-harvesting
Junaid Abbas
 
Online marketing
Online marketingOnline marketing
Online marketing
gayathri ramanathan
 
Examen PAU Economia 5
Examen PAU Economia 5Examen PAU Economia 5
Examen PAU Economia 5
Laura Ceballos Leva
 
Verdades y mentiras del SEO 2016
Verdades y mentiras del SEO 2016Verdades y mentiras del SEO 2016
Verdades y mentiras del SEO 2016
Youngle
 

Viewers also liked (15)

Attract audience
Attract audienceAttract audience
Attract audience
 
Presentation mar2016
Presentation mar2016Presentation mar2016
Presentation mar2016
 
Ethics
EthicsEthics
Ethics
 
Comunicación no verbal
Comunicación no verbalComunicación no verbal
Comunicación no verbal
 
Attract audience
Attract audienceAttract audience
Attract audience
 
Impro
ImproImpro
Impro
 
Seed Saving ~ College of Tropical Agriculture
Seed Saving ~ College of Tropical AgricultureSeed Saving ~ College of Tropical Agriculture
Seed Saving ~ College of Tropical Agriculture
 
Talleres ecuaciones diferenciales
Talleres ecuaciones diferencialesTalleres ecuaciones diferenciales
Talleres ecuaciones diferenciales
 
JENNIFER A SOTAK RESUME number 2
JENNIFER A SOTAK RESUME number 2JENNIFER A SOTAK RESUME number 2
JENNIFER A SOTAK RESUME number 2
 
Basic Concepts of Seed Production and Seed Regeneration
Basic Concepts of Seed Production and Seed RegenerationBasic Concepts of Seed Production and Seed Regeneration
Basic Concepts of Seed Production and Seed Regeneration
 
ATENCION PRIMARIA
ATENCION PRIMARIAATENCION PRIMARIA
ATENCION PRIMARIA
 
Methods of-seed-harvesting
Methods of-seed-harvestingMethods of-seed-harvesting
Methods of-seed-harvesting
 
Online marketing
Online marketingOnline marketing
Online marketing
 
Examen PAU Economia 5
Examen PAU Economia 5Examen PAU Economia 5
Examen PAU Economia 5
 
Verdades y mentiras del SEO 2016
Verdades y mentiras del SEO 2016Verdades y mentiras del SEO 2016
Verdades y mentiras del SEO 2016
 

Similar to Ethical consideration in open source software

Software piracy
Software piracySoftware piracy
Software piracy
John Pereless
 
Software Licences
Software LicencesSoftware Licences
Software Licences
Ajay Jassi
 
Essay #2 ethical considerations
Essay #2   ethical considerationsEssay #2   ethical considerations
Essay #2 ethical considerationsjandrewsxu
 
Essay #2 ethical considerations
Essay #2   ethical considerationsEssay #2   ethical considerations
Essay #2 ethical considerationsjandrewsxu
 
Open source technology
Open source technologyOpen source technology
Open source technologyRohit Kumar
 
Types of software, advantages and disadvantages
Types of software, advantages and disadvantagesTypes of software, advantages and disadvantages
Types of software, advantages and disadvantages
Rocket11986
 
Open source software
Open source softwareOpen source software
Open source softwarematschu5
 
Open source software
Open source softwareOpen source software
Open source softwarematschu5
 
Open Source VP.pptx
Open Source VP.pptxOpen Source VP.pptx
Open Source VP.pptx
vishnupriyapm4
 
Open Source and You
Open Source and YouOpen Source and You
Open Source and You
Jeff Stoner
 
The Aspects of Choosing Open Source Versus Closed Source
The Aspects of Choosing Open Source Versus Closed SourceThe Aspects of Choosing Open Source Versus Closed Source
The Aspects of Choosing Open Source Versus Closed SourceJeet Prakash
 
Kick Start to Open Source
Kick Start to Open SourceKick Start to Open Source
Kick Start to Open Source
Tharindu Dassanayake
 
Why Businesses Need Open Source Software
Why Businesses Need Open Source Software Why Businesses Need Open Source Software
Why Businesses Need Open Source Software
Andolasoft Inc
 
Linux and the Open Source- D Sarkar
Linux and the Open Source- D SarkarLinux and the Open Source- D Sarkar
Linux and the Open Source- D Sarkar
Dipayan Sarkar
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual propertyaamatya
 
Chapter5 freesoftware
Chapter5 freesoftwareChapter5 freesoftware
Chapter5 freesoftware
aamatya
 
Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensing
travellingpolander
 
Ijetr042189
Ijetr042189Ijetr042189
Succeeding with FOSS!
Succeeding with FOSS!Succeeding with FOSS!
Succeeding with FOSS!
M A Hossain Tonu
 
Open source software, commercial software, freeware software, shareware softw...
Open source software, commercial software, freeware software, shareware softw...Open source software, commercial software, freeware software, shareware softw...
Open source software, commercial software, freeware software, shareware softw...
Muhammad Haroon
 

Similar to Ethical consideration in open source software (20)

Software piracy
Software piracySoftware piracy
Software piracy
 
Software Licences
Software LicencesSoftware Licences
Software Licences
 
Essay #2 ethical considerations
Essay #2   ethical considerationsEssay #2   ethical considerations
Essay #2 ethical considerations
 
Essay #2 ethical considerations
Essay #2   ethical considerationsEssay #2   ethical considerations
Essay #2 ethical considerations
 
Open source technology
Open source technologyOpen source technology
Open source technology
 
Types of software, advantages and disadvantages
Types of software, advantages and disadvantagesTypes of software, advantages and disadvantages
Types of software, advantages and disadvantages
 
Open source software
Open source softwareOpen source software
Open source software
 
Open source software
Open source softwareOpen source software
Open source software
 
Open Source VP.pptx
Open Source VP.pptxOpen Source VP.pptx
Open Source VP.pptx
 
Open Source and You
Open Source and YouOpen Source and You
Open Source and You
 
The Aspects of Choosing Open Source Versus Closed Source
The Aspects of Choosing Open Source Versus Closed SourceThe Aspects of Choosing Open Source Versus Closed Source
The Aspects of Choosing Open Source Versus Closed Source
 
Kick Start to Open Source
Kick Start to Open SourceKick Start to Open Source
Kick Start to Open Source
 
Why Businesses Need Open Source Software
Why Businesses Need Open Source Software Why Businesses Need Open Source Software
Why Businesses Need Open Source Software
 
Linux and the Open Source- D Sarkar
Linux and the Open Source- D SarkarLinux and the Open Source- D Sarkar
Linux and the Open Source- D Sarkar
 
Intellectual property
Intellectual propertyIntellectual property
Intellectual property
 
Chapter5 freesoftware
Chapter5 freesoftwareChapter5 freesoftware
Chapter5 freesoftware
 
Introduction to Software Licensing
Introduction to Software LicensingIntroduction to Software Licensing
Introduction to Software Licensing
 
Ijetr042189
Ijetr042189Ijetr042189
Ijetr042189
 
Succeeding with FOSS!
Succeeding with FOSS!Succeeding with FOSS!
Succeeding with FOSS!
 
Open source software, commercial software, freeware software, shareware softw...
Open source software, commercial software, freeware software, shareware softw...Open source software, commercial software, freeware software, shareware softw...
Open source software, commercial software, freeware software, shareware softw...
 

Recently uploaded

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 

Recently uploaded (20)

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 

Ethical consideration in open source software

  • 1.
  • 3. Essay #2 – Ethical Considerations in Open-Source Software Usage
  • 5.
  • 6. Some of the stakeholders on this issue are
  • 7. Developer who creates open source
  • 8. Programmer who creates it has their ideas, thoughts, hard work, time all are in stake.
  • 9. Companies that uses Open Source Software
  • 10. Sometimes companies may fail to move according open source software law due to which they may have to face charge, so their reputation are on stake.
  • 11. Companies that develop proprietary software have their business in risk.
  • 12. Programmer who uses that open source
  • 13. Sometimes developer they write their own code and publish it along with open source without stating it so due to which their own creation which they don’t want to make it open source get published unknowingly.
  • 15. Their overall safety might be on stake because while using open source no one takes responsibility if anything goes wrong.
  • 17.
  • 18. So since Kantian view focuses on fulfilling one’s responsibility or duty, one should be careful while using open source software and make sure the terms and conditions are fulfilled. A developer cannot just copy the codes/techniques and claim it as his own innovation nor can he resell that product under his name. One should also make sure that if he is using even smallest part from some open source and he gives him the credit for that. The one who is using other’s open source software should take care of other’s intellectual property and make sure he goes through all the terms and conditions of the open source software he is using or going to use.
  • 19. Not just the developer, but the responsibility also lies on the company. Sometimes, the developers in company may miss to follow the terms and conditions. So at that time, the companies should make sure that they have some kind of procedure that takes care of these kinds of issues; because, if developer makes the mistake and the company fails to verify that, they will be the one to face the legal consequence.
  • 21. So, in open source software ethical consideration, utilitarian and deontological analysis, both, are pointing towards same direction. In this case, both analyses seem to be in line with each other where deontological analysis focuses on following one’s responsibility of taking care of other’s property and which fulfills the condition made by utilitarian view by make majority of people happy. The developer should make sure he gives credit to the original developer. When a developer uses open source software, he gets bind with the same rules as the original developer and thus, he should make his work publicly available as his source was. And when he does that, more people are benefitted. More people get free software and more people can learn. It is like knowledge sharing and hence supporting utilitarian view too.
  • 22. To summarize my article with my own open-source code of conduct, I would list it in this way:-
  • 23. Developer - Developer should protect one’s intellectual property. He should follow the terms carefully. Whenever copying from an open source, he should make sure that he also makes his copy publicly available. He should make sure that he doesn’t claim other’s work as his own and gives proper credit to the main developer.
  • 24. Organization – Organization should not rely on developers to follow the rules. So, there must be some kind of automated procedure which checks the originality of work. They have to make sure that the codes are not being copied from other open source for the products which they are going to launch as proprietary. The procedure should also check the proper credits being given.
  • 25. Users – User who modifies the open source code and publishes it must make it free of cost and should provide their source code along with the original open source code.References<br />http://true-reality.net/csc300/resources/assets/Example%20Term%20Paper%20-%20Whitney.pdf<br />http://questioncopyright.org/copyright_and_open_source<br />http://www.osnews.com/story/18610/Open_Source_Risks_and_Responsibilities/page2/<br />http://www.techsoup.org/learningcenter/software/archives/page9905.cfm<br />http://hubpages.com/hub/Open-Source-Search-Engine<br />http://www.asiaosc.org/benefits-of-open-source.html<br />http://www.gnu.org/philosophy/free-software-for-freedom.html<br />http://eu.conecta.it/paper/Advantages_open_source_soft.html<br />http://cogprints.org/3538/1/vinson01_source_NRC-46544.pdf<br />http://www.emeraldinsight.com/journals.htm?articleid=1621508&show=pdf<br />http://www.gnu.org/philosophy/open-source-misses-the-point.html<br />http://emoglen.law.columbia.edu/my_pubs/anarchism.html<br />http://www.abanet.org/intelprop/opensource.html<br />http://www.allbusiness.com/legal/contracts-agreements/3874378-1.html<br />http://lwn.net/Articles/375940/<br />http://en.wikipedia.org/wiki/Open-source_software<br />http://www.linuxinsider.com/story/Open-Source-Software-Your-Companys-Legal-Risks-64378.html?wlc=1289712819<br />http://books.google.com/books?id=s5EwJk0tUJAC&pg=PA107&lpg=PA107&dq=stakeholders+in+open+source+software+issue&source=bl&ots=blOx9NAdFg&sig=5A-WIfNep1i7sv_zYnR2JNEL6Ng&hl=en&ei=aXLfTLa3MsPPngeKx7nrDQ&sa=X&oi=book_result&ct=result&resnum=9&ved=0CFAQ6AEwCA#v=onepage&q=stakeholders%20in%20open%20source%20software%20issue&f=false<br />http://my.safaribooksonline.com/technology-management/0201734966/stakeholders-who-are-the-developers-and-organizations-involved/ch07#X2ludGVybmFsX0ZsYXNoUmVhZGVyP3htbGlkPTAtMjAxLTczNDk2LTYvdmk=<br />http://www.osnews.com/story/18610/Open_Source_Risks_and_Responsibilities/page2/<br />http://questioncopyright.org/copyright_and_open_source<br />http://hubpages.com/hub/Open-Source-Search-Engine<br />http://www.collaborativeconsulting.com/uploads/file/10%20Rules%20for%20Open%20Source%20Software.pdf<br />http://brian.teeman.net/joomla-gps/roles-and-responsibilities-of-users-and-community-members.html<br />