KEMBAR78
Lecture 17 | PDF
0% found this document useful (0 votes)
21 views22 pages

Lecture 17

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views22 pages

Lecture 17

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Beneficial Consequences of Open-

Source Software
• Gives everyone opportunity to improve program
• New versions of programs appear more
frequently
• Eliminates tension between obeying law and
helping others
• Programs belong to entire community
• Shifts focus from manufacturing to service

1-1
1-1
Examples of Open-Source Software

• BIND
• Apache
• Sendmail
• Android operating system for smartphones
• Firefox and Chrome
• OpenOffice.org
• Perl, Python, Ruby, TCL/TK, PHP, Zope
• GNU compilers for C, C++, Objective-C, Fortran, Java,
and Ada

1-2
1-2
Screenshot from OpenOffice.org, a registered trademark of Apache Software Foundation.
Copyright © 2012 by Apache Software Foundation. Reprinted with permission.
1-3
1-3
GNU Project and Linux

• GNU Project
– Begun by Richard Stallman in 1984
– Goal: Develop open-source, Unix-like operating
system
– Most components developed in late 1980s
• Linux
– Linus Torvalds wrote Unix-like kernel in 1991
– Combined with GNU components to make an O.S.
– Commonly called Linux
1-4
1-4
Impact of Open-Source Software

• Linux an alternative to proprietary versions


of Unix
• Linux operating system on 95% of the
world’s 500 fastest supercomputers

1-5
1-5
Crititique of the Open-Source
Software Movement
• Without critical mass of developers, quality can
be poor
• Without an “owner,” incompatible versions may
arise
• Relatively weak graphical user interface
• Poor mechanism for stimulating innovation (no
companies will spend billions on new programs)

1-6
1-6
4.9 Legitimacy of Intellectual
Property Protection for Software

1-7
1-7
Do We Have the Right System in Place?

• Software licenses typically prevent you


from making copies of software to sell or
give away
• Software licenses are legal agreements
• Not discussing morality of breaking the law
• Discussing whether society should give
intellectual property protection to software
1-8
1-8
Rights-based Analysis

• “Just deserts” argument


– Programming is hard work that only a few can do
– Programmers should be rewarded for their labor
– They ought to be able to own their programs
• Criticism of “just deserts” argument
– Why does labor imply ownership?
– Can imagine a just society in which all labor went
to common good
– Intellectual property not like physical property

1-9
1-9
A Consequentialist Argument Why
Software Copying Is Bad

Beth Anderson

1-10
1-10
Utilitarian Analysis
• Argument against copying
– Copying software reduces software purchases…
– Leading to less income for software makers…
– Leading to lower production of new software…
– Leading to fewer benefits to society
• Each of these claims can be debated
– Not all who get free copies can afford to buy software
– Open-source movement demonstrates many people
are willing to donate their software-writing skills
– Hardware industry wants to stimulate software industry
– Difficult to quantify how much society would be harmed
if certain software packages not released 1-11
1-11
Conclusion

• Natural rights argument weak


• Utilitarian argument not strong, either
• Nevertheless, society has granted
copyright protection to owners of computer
programs
• Breaking the law is wrong unless there is a
strong overriding moral obligation or
consequence
1-12
1-12
4.10 Creative Commons

1-13
1-13
Streamlining Creative Re-use
• Under current copyright law, eligible works
are copyrighted the moment they are created
• No copyright notice does not mean it’s okay
to copy
• Must contact people before using work
• That slows down creative re-use
• Free Creative Commons license indicates
– Which kinds of copying are okay
– Which rights are being retained
• Flickr and Magnatune two well-known sites
using Creative Commons licenses
1-14
1-14
Screenshot from Creative Commons. Copyright © 2011 by Creative Commons. Reprinted with permission. 1-15
1-15
Chapter 5:
Information
Privacy

1-16
Chapter Overview

• Introduction
• Perspectives on privacy
• Information disclosures
• Data mining
• Examples of consumer backlash

1-17
1-17
5.1 Introduction

1-18
1-18
Information Technology Erodes
Privacy
• Collection, exchange, combination, and
distribution of information easier than ever,
lessens privacy
• Scott McNealy: “You have zero privacy
anyway. Get over it.”
• We will consider how we leave an
“electronic trail” of information behind us
and what others can do with this info
1-19
1-19
NON SEQUITUR © 2005 Wiley Ink, Inc. Dist. By UNIVERSAL UCLICK.
Reprinted with permission. All rights reserved.
1-20
1-20
5.2 Perspectives on Privacy

1-21
1-21
Defining Privacy
• Privacy related to notion of access
• Access
– Physical proximity to a person
– Knowledge about a person
• Privacy is a “zone of inaccessibility”
• Privacy violations are an affront to human dignity
• Too much individual privacy can harm society
• Where to draw the line?

1-22
1-22

You might also like