SlideShare a Scribd company logo
Property Rights and Software
Dr. Varun Kumar
Dr. Varun Kumar (IIIT Surat) Lecture-22 1 / 7
Outlines
1 Scenarios
Pirated Software from Abroad
Stealing an Idea
Improving Software
2 Some Definitions
Algorithm
Source Code
Object Code
Dr. Varun Kumar (IIIT Surat) Lecture-22 2 / 7
Pirated Software from Abroad
Scenario 1
⇒ Ramesh works for a large consulting company.
⇒ When he was on holiday in Indonesia he found an office suit that
looks identical to Microsoft office.
⇒ The package he found costs R50 compared to the price tag of R3000
back home.
⇒ Cracked version of a software
⇒ Ramesh knew that the seller does not honour US copyright law.
⇒ Despite the documentation looking like it has been photocopied, he
decided to buy it and returned home with it.
Dr. Varun Kumar (IIIT Surat) Lecture-22 3 / 7
Stealing an Idea
Scenario 2
⇒ In 1980; a Bingo software has just developed a new operating system
called BOS.
⇒ BOS is better than anything else around but Bingo is a small firm and
needed venture capitol to start-up.
⇒ It spent 3 years bringing the product to the market, after which it
launched and sold well for a year.
⇒ It has recovered about 25% of initial investments.
⇒ Pirate Pete entered the market with PPOS.
It was cheaper and had more features than BOS.
It appears to be a copied or slightly modified version of BOS.
⇒ Copying of BOS is rampant.
Bingo didn’t last long and went bankrupt within a year.
Dr. Varun Kumar (IIIT Surat) Lecture-22 4 / 7
Improving Software
Scenario 3
⇒ Mr. Venkat develops a virus tester which is very good.
Features: It detects and repairs all known viruses.
⇒ He makes the software and its source code available on the web.
It is free and he also publishes an article on it.
⇒ Jake reads the article and downloads a copy.
⇒ He figures out how it works, downloads the source code and makes
several changes to enhance it.
⇒ After this, Jake sends Mr Venkat a copy of the modified software
together with an explanation.
⇒ Jake then puts a copy on the web, explains what he has done and
gives appropriate credit to Mr Venkat.
Q Discuss whether or not you think Mr Venkat or Jake has done
anything wrong?
Dr. Varun Kumar (IIIT Surat) Lecture-22 5 / 7
Continued–
Open Problem
Write down any thoughts you might have on each of the following:
Q-1 Distinction between hardware and software is often blurred.
Q-2 Macro issues - should software be owned? Should it be protected
like property?
⇒ Micro issues
Q-3 Are un-authorized copies illegal?
⇒ They may also store information about websites that you have visited.
⇒ Legal and moral issues
Descriptive
⇒ What the law say?
Normative
⇒ What the law should say?
Dr. Varun Kumar (IIIT Surat) Lecture-22 6 / 7
Some Definitions
⇒ Algorithm -
It is a finite sequence of well-defined instructions.
It is used to solve a class of specific problems or to perform a
computation.
⇒ Source Code -
Step by step solution to a problem.
It needs high level programming language.
It is usually created by a programmer employing one or more
algorithms.
⇒ Object Code -
Actuates the setting of switches to enable the computer to perform the
underlying algorithm
Dr. Varun Kumar (IIIT Surat) Lecture-22 7 / 7

More Related Content

Similar to Property Right and Software

Legal Issues in Developing in a Hybrid Envionment with Open Source Software
Legal Issues in Developing in a Hybrid Envionment with Open Source SoftwareLegal Issues in Developing in a Hybrid Envionment with Open Source Software
Legal Issues in Developing in a Hybrid Envionment with Open Source Software
Mark Radcliffe
 
CaseMark Weekly Webinar: AI-in-Legal Q3'2023
CaseMark Weekly Webinar: AI-in-Legal Q3'2023CaseMark Weekly Webinar: AI-in-Legal Q3'2023
CaseMark Weekly Webinar: AI-in-Legal Q3'2023
Scott Kveton
 
Copyright on Computer Software in Indonesia and China
Copyright on Computer Software in Indonesia and ChinaCopyright on Computer Software in Indonesia and China
Copyright on Computer Software in Indonesia and China
HanSangWoo7
 
CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...
CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...
CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...
Suma Kamadod
 
Isms - cyber law
Isms  - cyber lawIsms  - cyber law
Isms - cyber law
jayashri1991
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
Mahesh Athani
 
Impacts of ICT on social effects
Impacts of ICT on social effectsImpacts of ICT on social effects
Impacts of ICT on social effects
Nandhini Sathiyanarayanan
 
penalties offences with case studies
penalties offences with case studiespenalties offences with case studies
penalties offences with case studies
Kirtesh Dudawat
 
How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost
coldfire007
 
swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdf
RijuDasgupta
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software Piracy
Pallavi Agarwal
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
Fizaril Amzari Omar
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
Fizaril Amzari Omar
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment
9945446746
 
Dangerous Liaisons - Software Combinations as Derivative Works?
Dangerous Liaisons - Software Combinations as Derivative Works?Dangerous Liaisons - Software Combinations as Derivative Works?
Dangerous Liaisons - Software Combinations as Derivative Works?
Tal Lavian Ph.D.
 
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
wokk1d337
 

Similar to Property Right and Software (19)

Copyright Ingringement
Copyright IngringementCopyright Ingringement
Copyright Ingringement
 
Legal Issues in Developing in a Hybrid Envionment with Open Source Software
Legal Issues in Developing in a Hybrid Envionment with Open Source SoftwareLegal Issues in Developing in a Hybrid Envionment with Open Source Software
Legal Issues in Developing in a Hybrid Envionment with Open Source Software
 
CaseMark Weekly Webinar: AI-in-Legal Q3'2023
CaseMark Weekly Webinar: AI-in-Legal Q3'2023CaseMark Weekly Webinar: AI-in-Legal Q3'2023
CaseMark Weekly Webinar: AI-in-Legal Q3'2023
 
Copyright on Computer Software in Indonesia and China
Copyright on Computer Software in Indonesia and ChinaCopyright on Computer Software in Indonesia and China
Copyright on Computer Software in Indonesia and China
 
CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...
CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...
CYBER LAW - With regard to jurisprudence relating to pornography, tick the mo...
 
Isms - cyber law
Isms  - cyber lawIsms  - cyber law
Isms - cyber law
 
ICT Cybe laws
ICT Cybe lawsICT Cybe laws
ICT Cybe laws
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
Nlu 03
Nlu 03Nlu 03
Nlu 03
 
Impacts of ICT on social effects
Impacts of ICT on social effectsImpacts of ICT on social effects
Impacts of ICT on social effects
 
penalties offences with case studies
penalties offences with case studiespenalties offences with case studies
penalties offences with case studies
 
How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost How to get genuine windows 7 with low cost
How to get genuine windows 7 with low cost
 
swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdf
 
Presentation on Software Piracy
Presentation on Software PiracyPresentation on Software Piracy
Presentation on Software Piracy
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 
Cyber law case Assignment
Cyber law case AssignmentCyber law case Assignment
Cyber law case Assignment
 
Dangerous Liaisons - Software Combinations as Derivative Works?
Dangerous Liaisons - Software Combinations as Derivative Works?Dangerous Liaisons - Software Combinations as Derivative Works?
Dangerous Liaisons - Software Combinations as Derivative Works?
 
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
 

More from VARUN KUMAR

Distributed rc Model
Distributed rc ModelDistributed rc Model
Distributed rc Model
VARUN KUMAR
 
Electrical Wire Model
Electrical Wire ModelElectrical Wire Model
Electrical Wire Model
VARUN KUMAR
 
Interconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignInterconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI Design
VARUN KUMAR
 
Introduction to Digital VLSI Design
Introduction to Digital VLSI DesignIntroduction to Digital VLSI Design
Introduction to Digital VLSI Design
VARUN KUMAR
 
Challenges of Massive MIMO System
Challenges of Massive MIMO SystemChallenges of Massive MIMO System
Challenges of Massive MIMO System
VARUN KUMAR
 
E-democracy or Digital Democracy
E-democracy or Digital DemocracyE-democracy or Digital Democracy
E-democracy or Digital Democracy
VARUN KUMAR
 
Action Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionAction Lines of Geneva Plan of Action
Action Lines of Geneva Plan of Action
VARUN KUMAR
 
Geneva Plan of Action
Geneva Plan of ActionGeneva Plan of Action
Geneva Plan of Action
VARUN KUMAR
 
Fair Use in the Electronic Age
Fair Use in the Electronic AgeFair Use in the Electronic Age
Fair Use in the Electronic Age
VARUN KUMAR
 
Orthogonal Polynomial
Orthogonal PolynomialOrthogonal Polynomial
Orthogonal Polynomial
VARUN KUMAR
 
Gaussian Numerical Integration
Gaussian Numerical IntegrationGaussian Numerical Integration
Gaussian Numerical Integration
VARUN KUMAR
 
Censorship and Controversy
Censorship and ControversyCensorship and Controversy
Censorship and Controversy
VARUN KUMAR
 
Romberg's Integration
Romberg's IntegrationRomberg's Integration
Romberg's Integration
VARUN KUMAR
 
Introduction to Censorship
Introduction to Censorship Introduction to Censorship
Introduction to Censorship
VARUN KUMAR
 
Protect your online privacy-2
Protect your online privacy-2Protect your online privacy-2
Protect your online privacy-2
VARUN KUMAR
 
Interception Act vs Privacy Act
Interception Act vs Privacy ActInterception Act vs Privacy Act
Interception Act vs Privacy Act
VARUN KUMAR
 
Simpson's rule of integration
Simpson's rule of integrationSimpson's rule of integration
Simpson's rule of integration
VARUN KUMAR
 
Understanding the computer and privacy issues-2
Understanding the computer and privacy issues-2Understanding the computer and privacy issues-2
Understanding the computer and privacy issues-2
VARUN KUMAR
 
Understanding the computer and privacy issues
Understanding the computer and privacy issuesUnderstanding the computer and privacy issues
Understanding the computer and privacy issues
VARUN KUMAR
 
Numerical Integration: Trapezoidal Rule
Numerical Integration: Trapezoidal RuleNumerical Integration: Trapezoidal Rule
Numerical Integration: Trapezoidal Rule
VARUN KUMAR
 

More from VARUN KUMAR (20)

Distributed rc Model
Distributed rc ModelDistributed rc Model
Distributed rc Model
 
Electrical Wire Model
Electrical Wire ModelElectrical Wire Model
Electrical Wire Model
 
Interconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI DesignInterconnect Parameter in Digital VLSI Design
Interconnect Parameter in Digital VLSI Design
 
Introduction to Digital VLSI Design
Introduction to Digital VLSI DesignIntroduction to Digital VLSI Design
Introduction to Digital VLSI Design
 
Challenges of Massive MIMO System
Challenges of Massive MIMO SystemChallenges of Massive MIMO System
Challenges of Massive MIMO System
 
E-democracy or Digital Democracy
E-democracy or Digital DemocracyE-democracy or Digital Democracy
E-democracy or Digital Democracy
 
Action Lines of Geneva Plan of Action
Action Lines of Geneva Plan of ActionAction Lines of Geneva Plan of Action
Action Lines of Geneva Plan of Action
 
Geneva Plan of Action
Geneva Plan of ActionGeneva Plan of Action
Geneva Plan of Action
 
Fair Use in the Electronic Age
Fair Use in the Electronic AgeFair Use in the Electronic Age
Fair Use in the Electronic Age
 
Orthogonal Polynomial
Orthogonal PolynomialOrthogonal Polynomial
Orthogonal Polynomial
 
Gaussian Numerical Integration
Gaussian Numerical IntegrationGaussian Numerical Integration
Gaussian Numerical Integration
 
Censorship and Controversy
Censorship and ControversyCensorship and Controversy
Censorship and Controversy
 
Romberg's Integration
Romberg's IntegrationRomberg's Integration
Romberg's Integration
 
Introduction to Censorship
Introduction to Censorship Introduction to Censorship
Introduction to Censorship
 
Protect your online privacy-2
Protect your online privacy-2Protect your online privacy-2
Protect your online privacy-2
 
Interception Act vs Privacy Act
Interception Act vs Privacy ActInterception Act vs Privacy Act
Interception Act vs Privacy Act
 
Simpson's rule of integration
Simpson's rule of integrationSimpson's rule of integration
Simpson's rule of integration
 
Understanding the computer and privacy issues-2
Understanding the computer and privacy issues-2Understanding the computer and privacy issues-2
Understanding the computer and privacy issues-2
 
Understanding the computer and privacy issues
Understanding the computer and privacy issuesUnderstanding the computer and privacy issues
Understanding the computer and privacy issues
 
Numerical Integration: Trapezoidal Rule
Numerical Integration: Trapezoidal RuleNumerical Integration: Trapezoidal Rule
Numerical Integration: Trapezoidal Rule
 

Recently uploaded

Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 

Recently uploaded (20)

Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 

Property Right and Software

  • 1. Property Rights and Software Dr. Varun Kumar Dr. Varun Kumar (IIIT Surat) Lecture-22 1 / 7
  • 2. Outlines 1 Scenarios Pirated Software from Abroad Stealing an Idea Improving Software 2 Some Definitions Algorithm Source Code Object Code Dr. Varun Kumar (IIIT Surat) Lecture-22 2 / 7
  • 3. Pirated Software from Abroad Scenario 1 ⇒ Ramesh works for a large consulting company. ⇒ When he was on holiday in Indonesia he found an office suit that looks identical to Microsoft office. ⇒ The package he found costs R50 compared to the price tag of R3000 back home. ⇒ Cracked version of a software ⇒ Ramesh knew that the seller does not honour US copyright law. ⇒ Despite the documentation looking like it has been photocopied, he decided to buy it and returned home with it. Dr. Varun Kumar (IIIT Surat) Lecture-22 3 / 7
  • 4. Stealing an Idea Scenario 2 ⇒ In 1980; a Bingo software has just developed a new operating system called BOS. ⇒ BOS is better than anything else around but Bingo is a small firm and needed venture capitol to start-up. ⇒ It spent 3 years bringing the product to the market, after which it launched and sold well for a year. ⇒ It has recovered about 25% of initial investments. ⇒ Pirate Pete entered the market with PPOS. It was cheaper and had more features than BOS. It appears to be a copied or slightly modified version of BOS. ⇒ Copying of BOS is rampant. Bingo didn’t last long and went bankrupt within a year. Dr. Varun Kumar (IIIT Surat) Lecture-22 4 / 7
  • 5. Improving Software Scenario 3 ⇒ Mr. Venkat develops a virus tester which is very good. Features: It detects and repairs all known viruses. ⇒ He makes the software and its source code available on the web. It is free and he also publishes an article on it. ⇒ Jake reads the article and downloads a copy. ⇒ He figures out how it works, downloads the source code and makes several changes to enhance it. ⇒ After this, Jake sends Mr Venkat a copy of the modified software together with an explanation. ⇒ Jake then puts a copy on the web, explains what he has done and gives appropriate credit to Mr Venkat. Q Discuss whether or not you think Mr Venkat or Jake has done anything wrong? Dr. Varun Kumar (IIIT Surat) Lecture-22 5 / 7
  • 6. Continued– Open Problem Write down any thoughts you might have on each of the following: Q-1 Distinction between hardware and software is often blurred. Q-2 Macro issues - should software be owned? Should it be protected like property? ⇒ Micro issues Q-3 Are un-authorized copies illegal? ⇒ They may also store information about websites that you have visited. ⇒ Legal and moral issues Descriptive ⇒ What the law say? Normative ⇒ What the law should say? Dr. Varun Kumar (IIIT Surat) Lecture-22 6 / 7
  • 7. Some Definitions ⇒ Algorithm - It is a finite sequence of well-defined instructions. It is used to solve a class of specific problems or to perform a computation. ⇒ Source Code - Step by step solution to a problem. It needs high level programming language. It is usually created by a programmer employing one or more algorithms. ⇒ Object Code - Actuates the setting of switches to enable the computer to perform the underlying algorithm Dr. Varun Kumar (IIIT Surat) Lecture-22 7 / 7