SlideShare une entreprise Scribd logo
1  sur  54
SOFTWARE PIRACY




                                             http://ashrafsau.blogspot.in/
TERM PAPER PRESENTATION
              BY
        ASHRAF UDDIN
     South Asian University
(Master of Computer Applications)
http://ashrafsau.blogspot.in/
       Monday, April 23, 201223 April 2012
KEY ITEMS
   ABOUT SOFTWARE PIRACY
   HISTORY
   TYPES




                                     http://ashrafsau.blogspot.in/
   WHY SOFTWARE PIRACY?
   EFFECTS ON USERS
   EFFECTS ON DEVELOPERS
   REDUCING SP VS ECONOMIC GROWTH
   HOW TO REDUCE IT?
   LAWS & PENALTIES
   RESPONCIBLITIES AS A USER
   COPYRIFGHT & BENIFICIARIES
   THE FUTURE OF SP
   CONCLUSION
ABOUT SOFTWARE PIRACY

 copying and using commercial software purchased by
  someone else.
 One purchase software, he is actually purchasing a
  license to use it, not the actual software.




                                                          http://ashrafsau.blogspot.in/
 loaning CDs, downloading or distributing pirated software
  from the Internet, or buying a single software program
  and then installing it
  -copyright infringement => software piracy
http://ashrafsau.blogspot.in/
A COMMON VIEW
http://ashrafsau.blogspot.in/
KEY ITEMS
   ABOUT SOFTWARE PIRACY
   HISTORY
   TYPES




                                     http://ashrafsau.blogspot.in/
   WHY SOFTWARE PIRACY?
   EFFECTS ON USERS
   EFFECTS ON DEVELOPERS
   REDUCING SP VS ECONOMIC GROWTH
   HOW TO REDUCE IT
   LAWS & PENALTIES
   RESPONCIBLITIES AS A USER
   COPYRIFGHT & BENIFICIARIES
   THE FUTURE OF SP
   CONCLUSION
HISTORY OF SOFTWARE PIRACY
 The history of software piracy dates back almost to the
  invention of the consumer computer itself, MITS’ altair
  8800 by Ed Roberts in 1975.




                                                            http://ashrafsau.blogspot.in/
 Bill Gates and Paul Allen persuaded Roberts to license
  BASIC, a programming language from them.
 They used to invite people to see the low priced
  computer running various programs.
 Someone then borrowed one of the paper tapes lying
  around.
FIRST SOFTWARE PIRACY

   Homebrew     member         Dan   Sokol   ;   after
    somehow obtaining a pre-market tape of the
    interpreter, he made 25 copies and distributed




                                                          http://ashrafsau.blogspot.in/
    them at the next Homebrew meeting, urging
    recipients to make more copies. Gates
    responded     in    1976      with   a    strongly
    worded    Open     Letter    to   Hobbyists   that
    accused the copiers of theft and declared that
    he could not continue developing computer
    software that people did not pay for.
KEY ITEMS
   ABOUT SOFTWARE PIRACY
   HISTORY
   TYPES




                                     http://ashrafsau.blogspot.in/
   WHY SOFTWARE PIRACY?
   EFFECTS ON USERS
   EFFECTS ON DEVELOPERS
   REDUCING SP VS ECONOMIC GROWTH
   HOW TO REDUCE IT
   LAWS & PENALTIES
   RESPONCIBLITIES AS A USER
   COPYRIFGHT & BENIFICIARIES
   THE FUTURE OF SP
   CONCLUSION
TYPES OF SOFTWARE PIRACY

   1. Soft Lifting




                                        http://ashrafsau.blogspot.in/
   2. Hard Disk Loading

   3. Renting

   4. OEM Unbundling

   5. Counterfeiting

   6. Online Piracy
TYPES CONTINUED
                       1. Soft Lifting

 means sharing a program with someone who is not




                                                           http://ashrafsau.blogspot.in/
  authorized by the license agreement to use it.
 Also known as soft loading.

 A common form of soft lifting involves purchasing a single
  licensed copy of software and then loading the software
  onto several computers
TYPES CONTINUED
                     2. Hard Disk Loading


   Often committed by hardware dealers




                                                                http://ashrafsau.blogspot.in/
   this form of piracy involves loading an unauthorized copy
    of software onto a computer being sold to the end user.

   To attract customers
TYPES CONTINUED
                          3. Renting

   Renting involves someone renting out a copy of software




                                                               http://ashrafsau.blogspot.in/
    for temporary use, without the permission of the copyright
    holder.

   The practice, similar to that of renting a video from
    Blockbuster, violates the license agreement of software.
TYPES CONTINUED
                     4. OEM Unbundling

   means selling stand-alone software originally meant to be




                                                             http://ashrafsau.blogspot.in/
    included with a specific accompanying product.

   An example of this form of piracy is someone providing
    drivers to a specific printer without authorization.
TYPES CONTINUED
                       5. Counterfeiting

   means producing fake copies of software, making it look




                                                              http://ashrafsau.blogspot.in/
    authentic.

   This involves providing the box, CDs, and manuals, all
    designed to look as much like the original product as
    possible.
http://ashrafsau.blogspot.in/
TYPES CONTINUED
                      6. Online Piracy




                                                           http://ashrafsau.blogspot.in/
 The fastest-growing form of piracy is Internet piracy.
 there are hundreds of thousands of "warez" sites
  providing unlimited downloads to any user.
KEY ITEMS
   ABOUT SOFTWARE PIRACY
   HISTORY
   TYPES




                                     http://ashrafsau.blogspot.in/
   WHY SOFTWARE PIRACY?
   EFFECTS ON USERS
   EFFECTS ON DEVELOPERS
   REDUCING SP VS ECONOMIC GROWTH
   HOW TO REDUCE IT
   LAWS & PENALTIES
   RESPONCIBLITIES AS A USER
   COPYRIFGHT & BENIFICIARIES
   THE FUTURE OF SP
   CONCLUSION
WHY SOFTWARE PIRACY?

   Expensive

   Availability

    Not convenient to buy for each computer




                                                      http://ashrafsau.blogspot.in/


   Ask to buy new version although having original
    one

   The CD/backup damaged…
       Buy another!! Ridiculous!!
KEY ITEMS
   ABOUT SOFTWARE PIRACY
   HISTORY
   TYPES




                                     http://ashrafsau.blogspot.in/
   WHY SOFTWARE PIRACY?
   EFFECTS ON USERS
   EFFECTS ON DEVELOPERS
   REDUCING SP VS ECONOMIC GROWTH
   HOW TO REDUCE IT
   LAWS & PENALTIES
   RESPONCIBLITIES AS A USER
   COPYRIFGHT & BENIFICIARIES
   THE FUTURE OF SP
   CONCLUSION
EFFECTS ON USERS

   1. Lower productivity

   2. Malware Infection




                                     http://ashrafsau.blogspot.in/
   3. Subject to raid

   4. Unusual sufferings
EFFECTS ON USERS…………

1. Lower productivity




                                                         http://ashrafsau.blogspot.in/
   that pirated software often includes incomplete or
    damaged programs
EFFECTS ON USERS…………

2. Malware Infection




                                                           http://ashrafsau.blogspot.in/
   Pirated software can also include computer viruses
    (malware) which can destroy data on a user’s hard drive.
    “Computer viruses can have a devastating impact on any
    computer user -- from the home user to a large business,
http://ashrafsau.blogspot.in/
EFFECTS ON USERS…………

3. Subject to raid




                                                         http://ashrafsau.blogspot.in/
   Companies can also be subject to raids by the SIIA
    (Software & Information Industry Association).

   An informant can initiate the process.
EFFECTS ON USERS…………

4. Unusual sufferings




                                                                http://ashrafsau.blogspot.in/
   copy protection can create a nightmare for users.
   Most users hate dongles for a variety of reasons. Dongles can
    be troublesome to install and use since they often require a
    special hardware driver for dongles.
   each protected program requires an additional dongle, which
    causes an unwieldy “pile” of connected dongles on the back of
    the PC.
EFFECTS ON USERS…………

                           Others

   Usually no manuals.




                                                       http://ashrafsau.blogspot.in/
   No access to support in many cases.

   No access to bug fixes and maintenance releases.
KEY ITEMS
   ABOUT SOFTWARE PIRACY
   HISTORY
   TYPES




                                     http://ashrafsau.blogspot.in/
   WHY SOFTWARE PIRACY?
   EFFECTS ON USERS
   EFFECTS ON DEVELOPERS
   REDUCING SP VS ECONOMIC GROWTH
   HOW TO REDUCE IT
   LAWS & PENALTIES
   RESPONCIBLITIES AS A USER
   COPYRIFGHT & BENIFICIARIES
   THE FUTURE OF SP
   CONCLUSION
EFFECTS ON DEVELOPERS
   Software pirates can destroy the revenue stream of small
    companies.




                                                           http://ashrafsau.blogspot.in/
   these small companies often become economically
    unstable.

   No initiative for new software development program.
Asia Pacific Piracy rate and Revenue Losses
Overall piracy rate increased slightly but software revenue losses grew 44 percent last year
**Source: Business Software Alliance & IDC Asia Pacific
                                                        2006                                                     2005

         Country
                                   Piracy rate (%)             Revenue Losses ($M)             Piracy rate (%)          Revenue Losses ($M)


         Australia                        29                            515                          31                        361

          China                           82                           5429                          86                        3884




                                                                                                                                              http://ashrafsau.blogspot.in/
       Hong Kong                          53                            180                          54                        112

           India                          71                           1275                          72                        566

        Indonesia                         85                            350                          87                        280

          Japan                           25                           1781                          28                        1621

         Malaysia                         60                            289                          60                        149

       New Zealand                        22                            49                           23                         30

         Pakistan                         86                            143                          86                         48

        Philippines                       71                            119                          71                         76

        Singapore                         39                            125                          40                         86

       South Korea                        45                            440                          46                        400

          Taiwan                          41                            182                          43                        111

         Thailand                         80                            421                          80                        259

         Vietnam                          88                            96                           90                         38

          Others                          86                            202                          82                         29

          Total                           55                           11596                         54                        8050
http://ashrafsau.blogspot.in/
??????


 Can a developer be beneficiary of
 software piracy?




                                      http://ashrafsau.blogspot.in/
CAN A DEVELOPER BE BENEFICIARY OF SOFTWARE PIRACY?



YES.




                                                             http://ashrafsau.blogspot.in/
   Indirectly piracy makes manpower intelligent of
    using its software.



The company feel comfortable to use their software because
  human resource is more available.
KEY ITEMS
   ABOUT SOFTWARE PIRACY
   HISTORY
   TYPES




                                     http://ashrafsau.blogspot.in/
   WHY SOFTWARE PIRACY?
   EFFECTS ON USERS
   EFFECTS ON DEVELOPERS
   REDUCING SP VS ECONOMIC GROWTH
   HOW TO REDUCE IT
   LAWS & PENALTIES
   RESPONCIBLITIES AS A USER
   COPYRIFGHT & BENIFICIARIES
   THE FUTURE OF SP
   CONCLUSION
REDUCING SP VS ECONOMIC GROWTH

   A study finds that reducing the piracy rate for PC
    software by 10 percentage points in four years would
    create $142 billion in new economic activity — more than




                                                                                                               http://ashrafsau.blogspot.in/
    80 percent accruing to local industries .

   while adding nearly 500,000 new high-tech jobs and
    generating roughly $32 billion in new tax revenues.
           [Source: “BSA and IDC Global Piracy Software Study,” Business Software Alliance & IDC, May 2010)]
SOFTWARE PIRACY: STATISTICS AND FACTS

More than one third of adult Internet users say they have downloaded
commercial software online without paying for all the copies they made.
(Source: “Quantifying Online Downloading of Unlicensed Software –
Survey of Internet Users,” IPSOS Public Affairs, May 2002)




                                                                          http://ashrafsau.blogspot.in/
25% of users who download software say they never pay for it.
(Source: IPSOS, May 2002)

Last year, piracy cost the software industry an estimated $11 billion.
(Source: “2009 Global Software Piracy Report,” International Planning
and Research Corp., June 2002)

The loss to the economy has significant impact, including more than
111,000 jobs lost, $5.6 billion in lost wages and more than $1.5 billion in
lost tax revenue. (Source: “2001 State Software Piracy Study,”
International Planning and Research Corp., October 2002)
KEY ITEMS
   ABOUT SOFTWARE PIRACY
   HISTORY
   TYPES




                                     http://ashrafsau.blogspot.in/
   WHY SOFTWARE PIRACY?
   EFFECTS ON USERS
   EFFECTS ON DEVELOPERS
   REDUCING SP VS ECONOMIC GROWTH
   HOW TO REDUCE IT
   LAWS & PENALTIES
   RESPONCIBLITIES AS A USER
   COPYRIFGHT & BENIFICIARIES
   THE FUTURE OF SP
   CONCLUSION
HOW TO REDUCE IT(1)


   1. Increase Public Education and Awareness

   2. Implement the WIPO Copyright Treaty




                                                      http://ashrafsau.blogspot.in/
   3. Create Strong and Workable Enforcement
    Mechanisms as Required by TRIPS(trade-related
    aspects of intellectual property rights)

   4. Step Up Enforcement with Dedicated Resources

   5. Lead by example
HOW TO REDUCE IT(2)


   1. Software Protection: Registration Codes

   2. Online Activation




                                                          http://ashrafsau.blogspot.in/
   3. Media Protection

   One popular method involves using custom software
    drivers to deny copying of the media. Other methods
    introduce random errors into the media so copying
    doesn’t work.
KEY ITEMS
   ABOUT SOFTWARE PIRACY
   HISTORY
   TYPES




                                     http://ashrafsau.blogspot.in/
   WHY SOFTWARE PIRACY?
   EFFECTS ON USERS
   EFFECTS ON DEVELOPERS
   REDUCING SP VS ECONOMIC GROWTH
   HOW TO REDUCE IT
   LAWS & PENALTIES
   RESPONCIBLITIES AS A USER
   COPYRIFGHT & BENIFICIARIES
   THE FUTURE OF SP
   CONCLUSION
LAWS & PENALTIES


   Additional installation, distribution, or reproduction of the
    software in ways that the license prohibits is a violation of




                                                                    http://ashrafsau.blogspot.in/
    federal copyright law.

   Any person(s) practicing or participating in any of these
    illegal acts can be held liable.

   The laws varies over different regions.

   Generally punishment as fine up to a huge amount.
http://ashrafsau.blogspot.in/
SOME ORGANIZATIONS
KEY ITEMS
   ABOUT SOFTWARE PIRACY
   HISTORY
   TYPES




                                     http://ashrafsau.blogspot.in/
   WHY SOFTWARE PIRACY?
   EFFECTS ON USERS
   EFFECTS ON DEVELOPERS
   REDUCING SP VS ECONOMIC GROWTH
   HOW TO REDUCE IT
   LAWS & PENALTIES
   RESPONCIBLITIES AS A USER
   COPYRIFGHT & BENIFICIARIES
   THE FUTURE OF SP
   CONCLUSION
RESPONCIBLITIES AS A USER

 to purchase only legitimate software products.
 When buying software, it is necessary to be sure to get
  genuine disks, manuals and license documentation.
 When one purchases illegal or counterfeit copies, his




                                                           http://ashrafsau.blogspot.in/
  money goes straight into the pockets of software pirates .
 Buy from an authorized dealer

 Check the prices and ask for itemized quotations and
  receipts
 Call the software publisher
KEY ITEMS
   ABOUT SOFTWARE PIRACY
   HISTORY
   TYPES




                                     http://ashrafsau.blogspot.in/
   WHY SOFTWARE PIRACY?
   EFFECTS ON USERS
   EFFECTS ON DEVELOPERS
   REDUCING SP VS ECONOMIC GROWTH
   HOW TO REDUCE IT
   LAWS & PENALTIES
   RESPONCIBLITIES AS A USER
   COPYRIFGHT & BENIFICIARIES
   THE FUTURE OF SP
   CONCLUSION
COPYRIFGHT & BENIFICIARIES


   giving the creator of an original work, exclusive right to it.

   Generally, it is "the right to copy", but also gives the




                                                                     http://ashrafsau.blogspot.in/
    copyright holder the right to be credited for the work, to
    determine who may adapt the work to other forms.

   It’s true that copyright’s ultimate beneficiary is the public.
    But the immediate beneficiary is creators.
OPEN SOURCE SOFTWARE

   Why Be a Pirate? Use Open Source Software
    Instead




                                                http://ashrafsau.blogspot.in/
   Constraints
       Quality
       Not user friendly
       Rapid change
       Documentation
       Lack of focus on UI
KEY ITEMS
   ABOUT SOFTWARE PIRACY
   HISTORY
   TYPES




                                     http://ashrafsau.blogspot.in/
   WHY SOFTWARE PIRACY?
   EFFECTS ON USERS
   EFFECTS ON DEVELOPERS
   REDUCING SP VS ECONOMIC GROWTH
   HOW TO REDUCE IT
   LAWS & PENALTIES
   RESPONCIBLITIES AS A USER
   COPYRIFGHT & BENIFICIARIES
   THE FUTURE OF SP
   CONCLUSION
THE FUTURE OF SP

   CD checks, serial numbers, dongles, although this
    technology decreases the rate of piracy, it does not inhibit
    it.




                                                               http://ashrafsau.blogspot.in/
   With time any protection routine can be understood and
    defeated, they are by no means failsafe.
   No longer are developers keen to ship a completely
    standalone version of their flagship product.
   Instead, they are choosing a service-based, online
    model. The idea is simple. If the user never has the game
    in its entirety, it cannot be replicated or pirated.
KEY ITEMS
   ABOUT SOFTWARE PIRACY
   HISTORY
   TYPES




                                     http://ashrafsau.blogspot.in/
   WHY SOFTWARE PIRACY?
   EFFECTS ON USERS
   EFFECTS ON DEVELOPERS
   REDUCING SP VS ECONOMIC GROWTH
   HOW TO REDUCE IT
   LAWS & PENALTIES
   RESPONCIBLITIES AS A USER
   COPYRIFGHT & BENIFICIARIES
   THE FUTURE OF SP
   CONCLUSION
CONCLUSION


   Software Piracy is immoral.

   Software piracy is theft of intellectual property.




                                                             http://ashrafsau.blogspot.in/
   Developers invest time and money to develop a product
    and deserve to make a fair profit, so they can develop
    new products in future.

   the damage done to the industry and legitimate end
    users does not balance the few advantages that piracy
    does have.
REFERENCES
   [1]. Software Piracy Exposed BY Paul Craig, Ron Honick and Mark Burnettz, ISBN: 1-93226-698-
    4
   [2]. http://www.ed.uiuc.edu/wp/crime/piracy.htm
   [3]. http://www.bsa.org/country/Anti-Piracy/What-is-Software-Piracy.aspx
   [4]. The Effects of Software Piracy on Consumers and Software Developers By Adam Leinss
      http://www.leinss.com/files/piracy.pdf




                                                                                                    http://ashrafsau.blogspot.in/
   [5]. http://www-cs-faculty.stanford.edu/~eroberts/cs181/projects/software-piracy/types.html
   [6]. 2010, Piracy impact Study: the economic benefits of reducing software piracy.
      http://portal.bsa.org/piracyimpact2010/studies/piracyimpactstudy2010.pdf

   [7]. Effective Anti-Piracy Methods to employ in Software Development, Research Paper, EECS481
    Software Engineering, The University of Michigan
      http://nicj.net/files/effective_anti_piracy_methods_to_employ_in_software_development.pdf

   [8.] http://www.bw.edu/resources/infotech/pubs/software_piracy/
   [9]. http://en.wikipedia.org/wiki/Stop_Online_Piracy_Act
   [10]. http://en.wikipedia.org/wiki/PROTECT_IP_Act
   [11]. http://toostep.com/insight/software-piracy-and-the-law
   [12]. http://en.wikipedia.org/wiki/Copyright
   [13]. http://www.copyhype.com/2011/05/who-benefits-from-copyright/
http://ashrafsau.blogspot.in/
…………..

…………..
THANKS
http://ashrafsau.blogspot.in/
QUESTION

Contenu connexe

Tendances

Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber lawsishmecse13
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hackingVikram Khanna
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in CyberspaceTushar Rajput
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptxIkramSabir4
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber SecuritySazed Salman
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 

Tendances (20)

Introduction to cyber law.
Introduction to cyber law. Introduction to cyber law.
Introduction to cyber law.
 
What is malware
What is malwareWhat is malware
What is malware
 
Malware
MalwareMalware
Malware
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Unit 5 Intellectual Property Protection in Cyberspace
Unit 5  Intellectual Property Protection in CyberspaceUnit 5  Intellectual Property Protection in Cyberspace
Unit 5 Intellectual Property Protection in Cyberspace
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ransomware Attack.pptx
Ransomware Attack.pptxRansomware Attack.pptx
Ransomware Attack.pptx
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 

En vedette

Film Piracy Powerpoint
Film Piracy PowerpointFilm Piracy Powerpoint
Film Piracy Powerpointloisevz
 
Copyright And Piracy
Copyright And PiracyCopyright And Piracy
Copyright And Piracymsjasmin
 
A presentation on Copyright & Copyright Infringement
A presentation on Copyright & Copyright InfringementA presentation on Copyright & Copyright Infringement
A presentation on Copyright & Copyright InfringementAnand Prabhudesai
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracyguesteb94797
 

En vedette (6)

Software piracy
Software piracySoftware piracy
Software piracy
 
Film Piracy Powerpoint
Film Piracy PowerpointFilm Piracy Powerpoint
Film Piracy Powerpoint
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Copyright And Piracy
Copyright And PiracyCopyright And Piracy
Copyright And Piracy
 
A presentation on Copyright & Copyright Infringement
A presentation on Copyright & Copyright InfringementA presentation on Copyright & Copyright Infringement
A presentation on Copyright & Copyright Infringement
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracy
 

Similaire à Software piracy

SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxManojKhan7
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxpugazhendhiv2
 
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkwokk1d337
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezVi Tính Hoàng Nam
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Propertymanagement 2
 
swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfRijuDasgupta
 
Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software PiracyHeather Bauer
 
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...CSCJournals
 
Rothke Using Kazaa To Test Your Security Posture
Rothke   Using Kazaa To Test Your Security PostureRothke   Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security PostureBen Rothke
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
Legal Issues in Developing in a Hybrid Envionment with Open Source Software
Legal Issues in Developing in a Hybrid Envionment with Open Source SoftwareLegal Issues in Developing in a Hybrid Envionment with Open Source Software
Legal Issues in Developing in a Hybrid Envionment with Open Source SoftwareMark Radcliffe
 
SOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTSOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTHunny Jummani
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.Yury Chemerkin
 
Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementSebastiano Cobianco
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeMangesh wadibhasme
 

Similaire à Software piracy (20)

SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptx
 
Soft piracy
Soft piracySoft piracy
Soft piracy
 
SOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptxSOFTWARE PIRACY.pptx
SOFTWARE PIRACY.pptx
 
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhkпиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
пиратств.pptxghgkgkjhkjhkjhkjhjkhkjhkhkjhk
 
Ce hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warezCe hv6 module 50 software piracy and warez
Ce hv6 module 50 software piracy and warez
 
Chapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual PropertyChapter 7 Copy Rights And Intellectual Property
Chapter 7 Copy Rights And Intellectual Property
 
swpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdfswpiracyslideshare-180302131348.pdf
swpiracyslideshare-180302131348.pdf
 
Bauer Heather Software Piracy
Bauer Heather Software PiracyBauer Heather Software Piracy
Bauer Heather Software Piracy
 
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
Distributed Co-ordinator Model for Optimal Utilization of Software and Piracy...
 
Copyright Ingringement
Copyright IngringementCopyright Ingringement
Copyright Ingringement
 
Spyware
SpywareSpyware
Spyware
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 
Rothke Using Kazaa To Test Your Security Posture
Rothke   Using Kazaa To Test Your Security PostureRothke   Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security Posture
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Legal Issues in Developing in a Hybrid Envionment with Open Source Software
Legal Issues in Developing in a Hybrid Envionment with Open Source SoftwareLegal Issues in Developing in a Hybrid Envionment with Open Source Software
Legal Issues in Developing in a Hybrid Envionment with Open Source Software
 
SOTWARE INFRINGEMENT
SOTWARE INFRINGEMENTSOTWARE INFRINGEMENT
SOTWARE INFRINGEMENT
 
Spyware
SpywareSpyware
Spyware
 
When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.When developer's api simplify user mode rootkits developing.
When developer's api simplify user mode rootkits developing.
 
Open Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk ManagementOpen Source in the Enterprise: Compliance and Risk Management
Open Source in the Enterprise: Compliance and Risk Management
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 

Plus de Ashraf Uddin

A short tutorial on r
A short tutorial on rA short tutorial on r
A short tutorial on rAshraf Uddin
 
Big Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture CapabilitiesBig Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture CapabilitiesAshraf Uddin
 
MapReduce: Simplified Data Processing on Large Clusters
MapReduce: Simplified Data Processing on Large ClustersMapReduce: Simplified Data Processing on Large Clusters
MapReduce: Simplified Data Processing on Large ClustersAshraf Uddin
 
Text Mining Infrastructure in R
Text Mining Infrastructure in RText Mining Infrastructure in R
Text Mining Infrastructure in RAshraf Uddin
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routingAshraf Uddin
 

Plus de Ashraf Uddin (7)

A short tutorial on r
A short tutorial on rA short tutorial on r
A short tutorial on r
 
Big Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture CapabilitiesBig Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture Capabilities
 
MapReduce: Simplified Data Processing on Large Clusters
MapReduce: Simplified Data Processing on Large ClustersMapReduce: Simplified Data Processing on Large Clusters
MapReduce: Simplified Data Processing on Large Clusters
 
Text Mining Infrastructure in R
Text Mining Infrastructure in RText Mining Infrastructure in R
Text Mining Infrastructure in R
 
Naive bayes
Naive bayesNaive bayes
Naive bayes
 
Freenet
FreenetFreenet
Freenet
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
 

Dernier

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 

Dernier (20)

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 

Software piracy

  • 1. SOFTWARE PIRACY http://ashrafsau.blogspot.in/ TERM PAPER PRESENTATION BY ASHRAF UDDIN South Asian University (Master of Computer Applications) http://ashrafsau.blogspot.in/ Monday, April 23, 201223 April 2012
  • 2. KEY ITEMS  ABOUT SOFTWARE PIRACY  HISTORY  TYPES http://ashrafsau.blogspot.in/  WHY SOFTWARE PIRACY?  EFFECTS ON USERS  EFFECTS ON DEVELOPERS  REDUCING SP VS ECONOMIC GROWTH  HOW TO REDUCE IT?  LAWS & PENALTIES  RESPONCIBLITIES AS A USER  COPYRIFGHT & BENIFICIARIES  THE FUTURE OF SP  CONCLUSION
  • 3. ABOUT SOFTWARE PIRACY  copying and using commercial software purchased by someone else.  One purchase software, he is actually purchasing a license to use it, not the actual software. http://ashrafsau.blogspot.in/  loaning CDs, downloading or distributing pirated software from the Internet, or buying a single software program and then installing it -copyright infringement => software piracy
  • 6. KEY ITEMS  ABOUT SOFTWARE PIRACY  HISTORY  TYPES http://ashrafsau.blogspot.in/  WHY SOFTWARE PIRACY?  EFFECTS ON USERS  EFFECTS ON DEVELOPERS  REDUCING SP VS ECONOMIC GROWTH  HOW TO REDUCE IT  LAWS & PENALTIES  RESPONCIBLITIES AS A USER  COPYRIFGHT & BENIFICIARIES  THE FUTURE OF SP  CONCLUSION
  • 7. HISTORY OF SOFTWARE PIRACY  The history of software piracy dates back almost to the invention of the consumer computer itself, MITS’ altair 8800 by Ed Roberts in 1975. http://ashrafsau.blogspot.in/  Bill Gates and Paul Allen persuaded Roberts to license BASIC, a programming language from them.  They used to invite people to see the low priced computer running various programs.  Someone then borrowed one of the paper tapes lying around.
  • 8. FIRST SOFTWARE PIRACY  Homebrew member Dan Sokol ; after somehow obtaining a pre-market tape of the interpreter, he made 25 copies and distributed http://ashrafsau.blogspot.in/ them at the next Homebrew meeting, urging recipients to make more copies. Gates responded in 1976 with a strongly worded Open Letter to Hobbyists that accused the copiers of theft and declared that he could not continue developing computer software that people did not pay for.
  • 9. KEY ITEMS  ABOUT SOFTWARE PIRACY  HISTORY  TYPES http://ashrafsau.blogspot.in/  WHY SOFTWARE PIRACY?  EFFECTS ON USERS  EFFECTS ON DEVELOPERS  REDUCING SP VS ECONOMIC GROWTH  HOW TO REDUCE IT  LAWS & PENALTIES  RESPONCIBLITIES AS A USER  COPYRIFGHT & BENIFICIARIES  THE FUTURE OF SP  CONCLUSION
  • 10. TYPES OF SOFTWARE PIRACY  1. Soft Lifting http://ashrafsau.blogspot.in/  2. Hard Disk Loading  3. Renting  4. OEM Unbundling  5. Counterfeiting  6. Online Piracy
  • 11. TYPES CONTINUED 1. Soft Lifting  means sharing a program with someone who is not http://ashrafsau.blogspot.in/ authorized by the license agreement to use it.  Also known as soft loading.  A common form of soft lifting involves purchasing a single licensed copy of software and then loading the software onto several computers
  • 12. TYPES CONTINUED 2. Hard Disk Loading  Often committed by hardware dealers http://ashrafsau.blogspot.in/  this form of piracy involves loading an unauthorized copy of software onto a computer being sold to the end user.  To attract customers
  • 13. TYPES CONTINUED 3. Renting  Renting involves someone renting out a copy of software http://ashrafsau.blogspot.in/ for temporary use, without the permission of the copyright holder.  The practice, similar to that of renting a video from Blockbuster, violates the license agreement of software.
  • 14. TYPES CONTINUED 4. OEM Unbundling  means selling stand-alone software originally meant to be http://ashrafsau.blogspot.in/ included with a specific accompanying product.  An example of this form of piracy is someone providing drivers to a specific printer without authorization.
  • 15. TYPES CONTINUED 5. Counterfeiting  means producing fake copies of software, making it look http://ashrafsau.blogspot.in/ authentic.  This involves providing the box, CDs, and manuals, all designed to look as much like the original product as possible.
  • 17. TYPES CONTINUED 6. Online Piracy http://ashrafsau.blogspot.in/  The fastest-growing form of piracy is Internet piracy.  there are hundreds of thousands of "warez" sites providing unlimited downloads to any user.
  • 18. KEY ITEMS  ABOUT SOFTWARE PIRACY  HISTORY  TYPES http://ashrafsau.blogspot.in/  WHY SOFTWARE PIRACY?  EFFECTS ON USERS  EFFECTS ON DEVELOPERS  REDUCING SP VS ECONOMIC GROWTH  HOW TO REDUCE IT  LAWS & PENALTIES  RESPONCIBLITIES AS A USER  COPYRIFGHT & BENIFICIARIES  THE FUTURE OF SP  CONCLUSION
  • 19. WHY SOFTWARE PIRACY?  Expensive  Availability Not convenient to buy for each computer http://ashrafsau.blogspot.in/   Ask to buy new version although having original one  The CD/backup damaged…  Buy another!! Ridiculous!!
  • 20. KEY ITEMS  ABOUT SOFTWARE PIRACY  HISTORY  TYPES http://ashrafsau.blogspot.in/  WHY SOFTWARE PIRACY?  EFFECTS ON USERS  EFFECTS ON DEVELOPERS  REDUCING SP VS ECONOMIC GROWTH  HOW TO REDUCE IT  LAWS & PENALTIES  RESPONCIBLITIES AS A USER  COPYRIFGHT & BENIFICIARIES  THE FUTURE OF SP  CONCLUSION
  • 21. EFFECTS ON USERS  1. Lower productivity  2. Malware Infection http://ashrafsau.blogspot.in/  3. Subject to raid  4. Unusual sufferings
  • 22. EFFECTS ON USERS………… 1. Lower productivity http://ashrafsau.blogspot.in/  that pirated software often includes incomplete or damaged programs
  • 23. EFFECTS ON USERS………… 2. Malware Infection http://ashrafsau.blogspot.in/  Pirated software can also include computer viruses (malware) which can destroy data on a user’s hard drive. “Computer viruses can have a devastating impact on any computer user -- from the home user to a large business,
  • 25. EFFECTS ON USERS………… 3. Subject to raid http://ashrafsau.blogspot.in/  Companies can also be subject to raids by the SIIA (Software & Information Industry Association).  An informant can initiate the process.
  • 26. EFFECTS ON USERS………… 4. Unusual sufferings http://ashrafsau.blogspot.in/  copy protection can create a nightmare for users.  Most users hate dongles for a variety of reasons. Dongles can be troublesome to install and use since they often require a special hardware driver for dongles.  each protected program requires an additional dongle, which causes an unwieldy “pile” of connected dongles on the back of the PC.
  • 27. EFFECTS ON USERS………… Others  Usually no manuals. http://ashrafsau.blogspot.in/  No access to support in many cases.  No access to bug fixes and maintenance releases.
  • 28. KEY ITEMS  ABOUT SOFTWARE PIRACY  HISTORY  TYPES http://ashrafsau.blogspot.in/  WHY SOFTWARE PIRACY?  EFFECTS ON USERS  EFFECTS ON DEVELOPERS  REDUCING SP VS ECONOMIC GROWTH  HOW TO REDUCE IT  LAWS & PENALTIES  RESPONCIBLITIES AS A USER  COPYRIFGHT & BENIFICIARIES  THE FUTURE OF SP  CONCLUSION
  • 29. EFFECTS ON DEVELOPERS  Software pirates can destroy the revenue stream of small companies. http://ashrafsau.blogspot.in/  these small companies often become economically unstable.  No initiative for new software development program.
  • 30. Asia Pacific Piracy rate and Revenue Losses Overall piracy rate increased slightly but software revenue losses grew 44 percent last year **Source: Business Software Alliance & IDC Asia Pacific 2006 2005 Country Piracy rate (%) Revenue Losses ($M) Piracy rate (%) Revenue Losses ($M) Australia 29 515 31 361 China 82 5429 86 3884 http://ashrafsau.blogspot.in/ Hong Kong 53 180 54 112 India 71 1275 72 566 Indonesia 85 350 87 280 Japan 25 1781 28 1621 Malaysia 60 289 60 149 New Zealand 22 49 23 30 Pakistan 86 143 86 48 Philippines 71 119 71 76 Singapore 39 125 40 86 South Korea 45 440 46 400 Taiwan 41 182 43 111 Thailand 80 421 80 259 Vietnam 88 96 90 38 Others 86 202 82 29 Total 55 11596 54 8050
  • 32. ??????  Can a developer be beneficiary of software piracy? http://ashrafsau.blogspot.in/
  • 33. CAN A DEVELOPER BE BENEFICIARY OF SOFTWARE PIRACY? YES. http://ashrafsau.blogspot.in/  Indirectly piracy makes manpower intelligent of using its software. The company feel comfortable to use their software because human resource is more available.
  • 34. KEY ITEMS  ABOUT SOFTWARE PIRACY  HISTORY  TYPES http://ashrafsau.blogspot.in/  WHY SOFTWARE PIRACY?  EFFECTS ON USERS  EFFECTS ON DEVELOPERS  REDUCING SP VS ECONOMIC GROWTH  HOW TO REDUCE IT  LAWS & PENALTIES  RESPONCIBLITIES AS A USER  COPYRIFGHT & BENIFICIARIES  THE FUTURE OF SP  CONCLUSION
  • 35. REDUCING SP VS ECONOMIC GROWTH  A study finds that reducing the piracy rate for PC software by 10 percentage points in four years would create $142 billion in new economic activity — more than http://ashrafsau.blogspot.in/ 80 percent accruing to local industries .  while adding nearly 500,000 new high-tech jobs and generating roughly $32 billion in new tax revenues. [Source: “BSA and IDC Global Piracy Software Study,” Business Software Alliance & IDC, May 2010)]
  • 36. SOFTWARE PIRACY: STATISTICS AND FACTS More than one third of adult Internet users say they have downloaded commercial software online without paying for all the copies they made. (Source: “Quantifying Online Downloading of Unlicensed Software – Survey of Internet Users,” IPSOS Public Affairs, May 2002) http://ashrafsau.blogspot.in/ 25% of users who download software say they never pay for it. (Source: IPSOS, May 2002) Last year, piracy cost the software industry an estimated $11 billion. (Source: “2009 Global Software Piracy Report,” International Planning and Research Corp., June 2002) The loss to the economy has significant impact, including more than 111,000 jobs lost, $5.6 billion in lost wages and more than $1.5 billion in lost tax revenue. (Source: “2001 State Software Piracy Study,” International Planning and Research Corp., October 2002)
  • 37. KEY ITEMS  ABOUT SOFTWARE PIRACY  HISTORY  TYPES http://ashrafsau.blogspot.in/  WHY SOFTWARE PIRACY?  EFFECTS ON USERS  EFFECTS ON DEVELOPERS  REDUCING SP VS ECONOMIC GROWTH  HOW TO REDUCE IT  LAWS & PENALTIES  RESPONCIBLITIES AS A USER  COPYRIFGHT & BENIFICIARIES  THE FUTURE OF SP  CONCLUSION
  • 38. HOW TO REDUCE IT(1)  1. Increase Public Education and Awareness  2. Implement the WIPO Copyright Treaty http://ashrafsau.blogspot.in/  3. Create Strong and Workable Enforcement Mechanisms as Required by TRIPS(trade-related aspects of intellectual property rights)  4. Step Up Enforcement with Dedicated Resources  5. Lead by example
  • 39. HOW TO REDUCE IT(2)  1. Software Protection: Registration Codes  2. Online Activation http://ashrafsau.blogspot.in/  3. Media Protection  One popular method involves using custom software drivers to deny copying of the media. Other methods introduce random errors into the media so copying doesn’t work.
  • 40. KEY ITEMS  ABOUT SOFTWARE PIRACY  HISTORY  TYPES http://ashrafsau.blogspot.in/  WHY SOFTWARE PIRACY?  EFFECTS ON USERS  EFFECTS ON DEVELOPERS  REDUCING SP VS ECONOMIC GROWTH  HOW TO REDUCE IT  LAWS & PENALTIES  RESPONCIBLITIES AS A USER  COPYRIFGHT & BENIFICIARIES  THE FUTURE OF SP  CONCLUSION
  • 41. LAWS & PENALTIES  Additional installation, distribution, or reproduction of the software in ways that the license prohibits is a violation of http://ashrafsau.blogspot.in/ federal copyright law.  Any person(s) practicing or participating in any of these illegal acts can be held liable.  The laws varies over different regions.  Generally punishment as fine up to a huge amount.
  • 43. KEY ITEMS  ABOUT SOFTWARE PIRACY  HISTORY  TYPES http://ashrafsau.blogspot.in/  WHY SOFTWARE PIRACY?  EFFECTS ON USERS  EFFECTS ON DEVELOPERS  REDUCING SP VS ECONOMIC GROWTH  HOW TO REDUCE IT  LAWS & PENALTIES  RESPONCIBLITIES AS A USER  COPYRIFGHT & BENIFICIARIES  THE FUTURE OF SP  CONCLUSION
  • 44. RESPONCIBLITIES AS A USER  to purchase only legitimate software products.  When buying software, it is necessary to be sure to get genuine disks, manuals and license documentation.  When one purchases illegal or counterfeit copies, his http://ashrafsau.blogspot.in/ money goes straight into the pockets of software pirates .  Buy from an authorized dealer  Check the prices and ask for itemized quotations and receipts  Call the software publisher
  • 45. KEY ITEMS  ABOUT SOFTWARE PIRACY  HISTORY  TYPES http://ashrafsau.blogspot.in/  WHY SOFTWARE PIRACY?  EFFECTS ON USERS  EFFECTS ON DEVELOPERS  REDUCING SP VS ECONOMIC GROWTH  HOW TO REDUCE IT  LAWS & PENALTIES  RESPONCIBLITIES AS A USER  COPYRIFGHT & BENIFICIARIES  THE FUTURE OF SP  CONCLUSION
  • 46. COPYRIFGHT & BENIFICIARIES  giving the creator of an original work, exclusive right to it.  Generally, it is "the right to copy", but also gives the http://ashrafsau.blogspot.in/ copyright holder the right to be credited for the work, to determine who may adapt the work to other forms.  It’s true that copyright’s ultimate beneficiary is the public. But the immediate beneficiary is creators.
  • 47. OPEN SOURCE SOFTWARE  Why Be a Pirate? Use Open Source Software Instead http://ashrafsau.blogspot.in/  Constraints  Quality  Not user friendly  Rapid change  Documentation  Lack of focus on UI
  • 48. KEY ITEMS  ABOUT SOFTWARE PIRACY  HISTORY  TYPES http://ashrafsau.blogspot.in/  WHY SOFTWARE PIRACY?  EFFECTS ON USERS  EFFECTS ON DEVELOPERS  REDUCING SP VS ECONOMIC GROWTH  HOW TO REDUCE IT  LAWS & PENALTIES  RESPONCIBLITIES AS A USER  COPYRIFGHT & BENIFICIARIES  THE FUTURE OF SP  CONCLUSION
  • 49. THE FUTURE OF SP  CD checks, serial numbers, dongles, although this technology decreases the rate of piracy, it does not inhibit it. http://ashrafsau.blogspot.in/  With time any protection routine can be understood and defeated, they are by no means failsafe.  No longer are developers keen to ship a completely standalone version of their flagship product.  Instead, they are choosing a service-based, online model. The idea is simple. If the user never has the game in its entirety, it cannot be replicated or pirated.
  • 50. KEY ITEMS  ABOUT SOFTWARE PIRACY  HISTORY  TYPES http://ashrafsau.blogspot.in/  WHY SOFTWARE PIRACY?  EFFECTS ON USERS  EFFECTS ON DEVELOPERS  REDUCING SP VS ECONOMIC GROWTH  HOW TO REDUCE IT  LAWS & PENALTIES  RESPONCIBLITIES AS A USER  COPYRIFGHT & BENIFICIARIES  THE FUTURE OF SP  CONCLUSION
  • 51. CONCLUSION  Software Piracy is immoral.  Software piracy is theft of intellectual property. http://ashrafsau.blogspot.in/  Developers invest time and money to develop a product and deserve to make a fair profit, so they can develop new products in future.  the damage done to the industry and legitimate end users does not balance the few advantages that piracy does have.
  • 52. REFERENCES  [1]. Software Piracy Exposed BY Paul Craig, Ron Honick and Mark Burnettz, ISBN: 1-93226-698- 4  [2]. http://www.ed.uiuc.edu/wp/crime/piracy.htm  [3]. http://www.bsa.org/country/Anti-Piracy/What-is-Software-Piracy.aspx  [4]. The Effects of Software Piracy on Consumers and Software Developers By Adam Leinss  http://www.leinss.com/files/piracy.pdf http://ashrafsau.blogspot.in/  [5]. http://www-cs-faculty.stanford.edu/~eroberts/cs181/projects/software-piracy/types.html  [6]. 2010, Piracy impact Study: the economic benefits of reducing software piracy.  http://portal.bsa.org/piracyimpact2010/studies/piracyimpactstudy2010.pdf  [7]. Effective Anti-Piracy Methods to employ in Software Development, Research Paper, EECS481 Software Engineering, The University of Michigan  http://nicj.net/files/effective_anti_piracy_methods_to_employ_in_software_development.pdf  [8.] http://www.bw.edu/resources/infotech/pubs/software_piracy/  [9]. http://en.wikipedia.org/wiki/Stop_Online_Piracy_Act  [10]. http://en.wikipedia.org/wiki/PROTECT_IP_Act  [11]. http://toostep.com/insight/software-piracy-and-the-law  [12]. http://en.wikipedia.org/wiki/Copyright  [13]. http://www.copyhype.com/2011/05/who-benefits-from-copyright/