ETHICS INTELLECTUAL PROPERTY

Slides:



Advertisements
Similar presentations
Professional Ethics Social Implications of Computers.
Advertisements

Intellectual Property (Unit III) 1.  1996, major conference in Geneva to devise a comprehensive international copyright treaty  Record companies, book.
Computer Literacy and ICT Engineers 橋本 義平 Hashimoto Yoshihei (情報工学)
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Vladimir Misic: 10 Professionalism and Ethics Ownership and Protection.
ICT Ethics 2 ICT 139.
Ethics CS-480b Network Security Dick Steflik. ACM Code of Ethics This Code, consisting of 24 imperatives formulated as statements of personal responsibility,
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Judge Rejects Google’s Deal to Digitize Books Rhea McCaslin CSCE390 – Spring 2011.
COMP 381.  Ownership and property  Rights of ownership: Blackstonian Bundle Exclude anyone from the property Use it as sees fit Receive income from.
Ownership of Computer Software Ethical Questions and Concerns.
COMP 381.  Copyright Term author + 70, corporate 95  DRM enabling copying is criminal constrains who can use tracks who is viewing Copyright and DRM.
Computers Are Your Future © 2005 Prentice-Hall, Inc.
ACM Code of Ethics and Professionalism (Excerpt)  GENERAL MORAL IMPERATIVES Contribute to society and human well-being Avoid harm to others Be honest.
Professional Codes of Ethics Professionalism and Codes of Ethics.
Intellectual Property
Ethics Lecture Dr. Christina Howe
Computers Are Your Future © 2008 Prentice-Hall, Inc.
INTELLECTUAL PROPERTY COPYRIGHTS, PATENTS AND TRADE MARKS.
7/3/08 Created by Mae Thomas Property Rights There can be consequences if you violate others' intellectual property rights. (That is, if you copy something.
What is Intellectual Property ? Patents- protection of technology Trademarks- protection of domain names and product identity Copyrights- protection of.
CS 3043 Social Implications Of Computing © 2010 Keith A. Pray Class 3 Professional Ethics Keith A. Pray Instructor socialimps.keithpray.net.
Computer Ethics for Computer Users
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
2 December Deliverables check list  Documentation: updated Functional spec Design doc User manuals Test plan  Code Commented source and how I.
13 Intellectual Property 1 Aaron Schiff ECON Reading: Cabral p , Deak p
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray Class 3 Professional Ethics Keith A. Pray Instructor socialimps.keithpray.net.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
The Freedom of Information Act (FOIA) is a law that gives you the right to access information from the federal government. It is often described as the.
General Moral imperatives
17 April Reverse Engineering Ethics Privacy Introduction.
Maintenance Reverse Engineering Ethics
21 April  Ownership and property  Rights of ownership: Blackstonian Bundle ◦ Exclude anyone from the property ◦ Use it as sees fit ◦ Receive income.
© Dr Adnan Gutub Ethics Dr Adnan Gutub. © Dr Adnan Gutub Outline What are Ethics? Protection of Rights Professional Ethics & Computer Ethics Moral & Ethical.
1 Gordana Dodig-Crnkovic Department of Computer Science and Engineering Mälardalen University 2004 PROFESSIONAL ETHICS IN SCIENCE AND ENGINEERING CD5590.
Ethics.
Ethics. Technology  Technology is not an immutable force – people make decisions about what technologies and products to develop and how to use them.
Legal and Ethical Issues in Computer Security Csilla Farkas
Copyright Donna Min Shiroma School Library Services Advanced Technology Research Branch Office of Curriculum, Instruction and Student Support © September.
©2001 Southern Illinois University, Edwardsville All rights reserved. Today Finish Ethics Next Week Research Topics in HCI CS 321 Human-Computer Interaction.
Intellectual Property Rights TrademarksTrademarks: protects novel marks & designs used in marketing & advertising for an indefinite period as long as in.
ACM Code of Ethics. Organization and Format O Organization: O Section 1: General Moral Imperatives (8) O Section 2: Professional Responsibilities (8)
TECH VOCAB. ETHICS The rules that we use to define behaviors as “right” or “wrong” page 6.
Creative Commons terms and definitions By Chelsey Maton.
Chapter Four Intellectual Property in Cyberspace.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
Lecture. 1.What are ethics? Why needed? 2.Islamic code of ethics 3.Network etiquette (8 broad rules) 4.Brief overview of ACM code of ethics 5.How to acquire.
What is it and why should I care?. Copyright Basic Copyright InternetMultimedia Fair Use.
Chap (3)1 Chapter 3 Professional Codes of Ethics Almost every professional organization dealing with the field of computing has published its own code.
Computers Are Your Future
CSCI 392 Review of Computing and Society
Copyright in the Classroom
CSCI 392: Seminar in Computing and Society
Ethics & Social Responsibility
A Gift of Fire Third edition Sara Baase
Legal and Ethical Issues in E-Commerce
Ethics & Social Responsibility
Professional Codes of Ethics
CS 115: COMPUTING FOR The Socio-Techno Web
Lesson 2- Ethical Use of Digital Resources
Evaluate It - Lesson 3.
Unit 4: Basic Video Segment Production
Intellectual Property Rights
Developed by Cool Pictures & MultiMedia Presentations
Lesson 2- Ethical Use of Digital Resources Edit all slides as needed.
ACM Code of Ethics CSCI 362: Data Structures.
Copyright & Fair Use.
CS-480b Network Security Dick Steflik
Presentation transcript:

ETHICS INTELLECTUAL PROPERTY

Ethics

ACM Code of Ethics and Professionalism (Excerpt) GENERAL MORAL IMPERATIVES Contribute to society and human well-being Avoid harm to others Be honest and trustworthy Be fair and take action not to discriminate Honor property rights including copyrights and patent Give proper credit for intellectual property Respect the privacy of others Honor confidentiality ORGANIZATIONAL LEADERSHIP IMPERATIVES Articulate social responsibilities Enhance the quality of working life Proper and authorized uses of computing and communication resources Ensure that those affected by a system have their needs clearly articulated; validate the system to meet requirements Protect the dignity of users

Intellectual Honesty McConnell, Code Complete Refusing to pretend you’re an expert when you’re not Readily admitting your mistakes Trying to understand a compiler warning rather than suppressing the message Clearly understanding your program – not compiling it to see if it works Providing realistic status reports Providing realistic schedule estimates and holding your ground when management asks you to adjust them

Whistle Blowing What are the alternatives? When is it okay? When is it not a choice?

Ethics of a project intended use potential misuse consequences fairness to the knowing users implications for unknowing users

Hyperlinks Responsibility to users Responsibility to other site owners Making it clear that its another site Protection from inappropriate material Responsibility to other site owners Bypassing advertisements Ticketmaster and Microsoft

SEO Techniques Lots of opinions Code of Ethics Ethical Guidelines

Intellectual Property

What is Intellectual Property? Ownership and property Rights of ownership: Blackstonian Bundle Exclude anyone from the property Use it as sees fit Receive income from Transfer property to someone else Intellectual property: intellectual objects

Intellectual Property v. Real Property Physical objects Zero-sum gain: one user at a time Significant cost in both development and replication Intellectual objects Used by many at once Significant cost in development, marginal cost in replication

Need for Protection need to recover the development costs knowledge of future ownership is incentive to increase value

Arguments against IP Free flow of ideas First amendment freedom of speech Creative ideas build on society and culture Noel Capon textbooks

Legal Protection Copyright Patent Trademark

Copyright:  giving the creator of an original work exclusive rights to it, usually for a limited time

Copyright: How Long? 1790: 14 + renew 1909: 28 + renew 1976 : author + 50, corporate 75 1998: author + 70, corporate 95

Digital Rights Management Enabling copying is criminal Preclude through architecture Problems Constrains who can use Exceptions will be too constrained for someone Tracks who is viewing

Digital Millenium Copyright Act (‘66) Illegal to … bypass technical measures used to protect access manufacture or distribute technologies primarily designed or produced to circumvent technical measures remove or alter copyright management information Universal City Studios, Inc. v. Reimerdes (Aug ‘00) 8 studios sued 2600 Magazine posting DeCSS bypasses Content Scrambling System (CSS) commercially distributed DVD

Copying copyrighted materials Responsibility of those enabling it Software Network providers Cases: software Napster Grockster Bit Torrent Cases: network providers Verizon Six Strikes

APIs: Oracle v Google Ruling: not copyrightable

Patents

Patents Physical objects Criteria Process, machine or composition of matter NOT laws of nature, scientific principles, algorithms Criteria Novel Not previously described Non-obvious Useful

Patents Hardware, software, processes NOT laws of nature, scientific principles, algorithms Can patent new applications or combinations Criteria Novel Not previously described Non-obvious Useful A man "has a right to use his knife to cut his meat, a fork to hold it; may a patentee take from him the right to combine their use on the same subject?" -- Thomas Jefferson

Software & Business Process Patents Processes vs. algorithms What is non-obvious? Examples Name Your Price (Priceline) One-click (Amazon) Opinions Marco Arment Paul Graham

Most Recent Cases In the last few years, situation has clarified Bilski v Kappos – software patents ok Machine or transformation Alice v CLS – abstract ideas not patentable LCS v American Airlines Extended to business

Trademarks

Trademarks Word, phrase or symbol “Pithily” identifies Infringement: used by someone else Dilutions Blurring – dissimilar products Tarnishment – negative or compromising Has been applied to domain names Cybersquatting Parody or criticism

Domain Names Cybersquatting .net, .org, .com, … Punctuation (hyphenation, etc.) Phrases, nicknames Parody, criticism, complaint (cybergriping) Property rights vs. free speech Bringing people to the site under false pretenses Including the name in the url vs. appearing to be the site