Abandonware in the Land of Pirates Demis Harper, James Cain, Keith Neer.

Slides:



Advertisements
Similar presentations
Thaiphoon Burner Super Blaster
Advertisements

Legal Meetings: Extended Instructions on Movica and Screencast.
Free Beer and Free Speech Thomas Krichel
COMPUTERS: TOOLS FOR AN INFORMATION AGE Chapter 3 Operating Systems.
Research Presentation: Video Game Piracy Edfan P. Tjandra Comp 450.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
Computer Software 3 Section A Software Basics CHAPTER PARSONS/OJA
Internet Piracy. History In the 1980’s mail was used to distribute pirated material Pirated material originally consisted of copyrighted games, software,
Operating Systems Or why is Bill Gates so rich? Computers Mr. Specter Steel Valley High School Or why is Bill Gates so rich? Computers Mr. Specter Steel.
Ethics & Computers Sources: “The Right Thing to Do”, P. Aarne Vesilind, Lakeshore Press, 2004, (ISBN ) “Ethics for the Information Age”, Michael.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
Ethics of Copyright Infringement Thomas H. Mak CS 301.
CptS 401 Adam Carter. Quiz Question 1 According to the book, it is important to legally protect intellectual property for the following reason(s): A.
Copyright Laws and Software By Shana Jenkins Carol Dickinson Brittany Caldarulo Sarah Hunkeler.
PLAYING WITH A NEW PROBLEM: COPYRIGHT AND VIDEO GAMES IN EDUCATION AND SCHOLARSHIP KEVIN SCHUT, ASSOCIATE PROFESSOR, TRINITY WESTERN UNIVERSITY, LANGLEY,
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
TEST REFLECTION CHAPTER 9 & 10. QUESTION 1 A spreadsheet is an application program you can use for working with numbers and doing math. False Look up.
ACCB 133 Information Technology and Accounting Applications Lecture 6: Application Software.
How Well Do You Know Copyright? Connie Murphy Hylton High School Library 2008.
Alexander Marlantes December 3 rd 2008
Programming and Application Packages
Computer Software CSCI N207 Data Analysis Using Spreadsheet Department of Computer and Information Science, IUPUI.
Computing Revision Notes. Index Software System Software Internet.
Computer Ethics for Computer Users
Chapter 2 – Software Part A. Definition Computer is made up of two components Hardware Physical components Software Instructions for the computer Two.
Development, Marketing, Licensing, and Distribution.
Reboot Your Attitude Internet Copyright and Piracy.
Application Software Performs a specific job or task. Helps people use their computers to perform their work more effectively. Categorized in two ways.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Copyright – What you should know! Matthew Mayo and Martha Nixon EDTC 6149.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
The Legalities of Technicalities By Kellie Birdwell.
Chapter 3 Software. Learning Objectives Upon successful completion of this chapter, you will be able to: Define the term software Describe the two primary.
Copyright Laws for Education Susan Rheinwald Fernando Prieto.
Software : Applications Software
Chapter 3 Installing and Learning Software. 2Practical PC 5 th Edition Chapter 3 Getting Started In this Chapter, you will learn: − What is in an application.
The Ethics of Emulation David Gale February 24 th.
APPLICATION SOFTWARE Objectives Describe several important trends occurring in computer software. Give examples of several major types of application.
Open Source Software This permits users to use, change, and improve the software, and to redistribute it in modified or unmodified forms. It is very often.
By Fintan Morrison. Why it has a place? It has a place because some people like to edit the software to their liking also the software may need to be.
به نام خدای مهربان زبان تخصصی دانشجویان کامپیوتر English for Computer Students درس 2 جوانمرد ejavanmard.blogfa.com
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
SOFTWARE PIRACY OF BUSINESS ETHICS PERSPECTIVE
Choose a category. You will be given the answer. You must give the correct question. Click to begin.
© Paradigm Publishing, Inc. 4-1 Chapter 4 System Software Chapter 4 System Software.
There’s a new kind of Pirate out there…. His ship of choice sails the internet.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
Open Source Software. Chris Moylan Group 5...I think.
Technology Education THE PERSONAL COMPUTER (PC) SOFTWARE PART 2.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Software Installation and Copyrights Basic Computer Concepts Installation Basics  Installation Process  Copy files from distribution disks.
Ethics Self Imposed Right and Wrong Behavior Described as:
Applications Software: Getting the Work Done Chapter 2.
John Samuels October, Why Now?  Vista Problems  New Features  >4GB Memory Support  Experience.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
© 2013 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Software Requirements
Computers Are Your Future Twelfth Edition
Ethical and Legal Issues
Chapter 3 Installing and Learning Software
Getting Innovative with OER
Chapter 3 Installing and Using Software
Thank you for your purchase!
Thank you for your purchase!
COPYRIGHT A Melbourne Athenaeum Library Cybersafety Information Guide
Computers Are Your Future
Thank you for your purchase!
Thank you for your purchase!
Chapter 3 Software.
Computer Concepts Module 3
Presentation transcript:

Abandonware in the Land of Pirates Demis Harper, James Cain, Keith Neer

What is abandonware? Abandonware is computer software which is no longer sold or supported by its publisher, but not officially discontinued The initial use of the term was for games that ran on console hardware in the late 1990s, but all types of software may fall into this category Software often remains under copyright and international law

What abandonware is available for download? ROMs-Read-Only Memory from a video game cartridge Transferred to a computer file using specialized hardware and dumping Played using an emulator – an application that emulates a game console MarioNES emulates the Nintendo Entertainment System in a window

Retrode Gold converts Super Nintendo and Sega Genesis games to backup copies on a computer

What abandonware is available for download? Warez-Executable programs (.exe files) that have been cracked These include eBooks, computer games, cracks, movies, etc. Warez can also use emulators Pronounced like wares, not Juarez Benito Juarez

DOSBox emulates the command-line interface of DOS

What determines the legality of downloading and using abandonware for private, personal use? Research – Using abandonware code is legal if released by the manufacturer Using code distributed by a pirate is illegal Entertainment – Downloading software distributed by a pirate is always illegal Even so, companies care more about pirates than users Distributing copyrighted software without the manufacturers permission is illegal, and often watched more closely

What determines the legality of downloading and using abandonware for private, personal use? Software used as a tool – May be downloaded for non-commercial use NeXTStep and OpenStep are abandoned APIs that may be downloaded for free Screenshot of OpenStep

Is it ethical to download and use a pirated copy of abandonware? Its morally sound if: The website it comes from includes a disclaimer The original copyright laws are ignored by the producers The producers wouldnt make a profit from the software if you purchased it Its morally wrong if: You can find and purchase the software without much difficulty You share it with others (for free or otherwise) The software comes out of abandonment

UP NEXT...KEITH NEER!

Educational Abandonware Many Educational games are Abandonware May benefit students – Low income families – Low income schools

Source Code Software is replaced about every 5 Years Life Expectancy – Average: 9 Years – Longest: 20 Years – Shortest: 2 Years

Educational Use Students can dissect the Source Code – Learn code writing techniques from a professional point of view – Learn which techniques work – Which techniques dont work

Commercial Use Companies buy software to last – Companies may be able to fix the problems themselves – Adapt to what they need

AND NOW...DEMIS HARPER!

Reasons for Distribution Abandoned Software not otherwise available. Supports use of Abandonware for archival purposes Hardly ever prosecuted Abandonia.com

The Counterargument Abandonware still copyrighted Publisher interest may be growing

Hacked Games Game modified from original version by third party. Example: Donkey Kong Role Reversal role-reversal/ role-reversal/

Problems Who owns copyright to hacked game? Does distribution of hacked game violate terms or copyright of original game? Solid answers difficult to find.

Kantian Analysis Maxim: I distribute/download abandonware in the case that it is not otherwise available for legal purchase in order to have the program available for the future. General: Everyone distributes/downloads abandonware in the case that it is not otherwise available for legal purchase in order to have the program available for the future.

Kantian Analysis (continued) PSW: Would it be rational to adopt this as natural law? If everyone distributed and downloaded abandonware, it would be widely available. Increased interest may cause companies to redistribute the abandonware making it available for purchase. Yes. This creates a symbiotic loop.

Act Utilitarian Analysis Option 1: Do not pirate abandonware Consequences: 1 Abandonware unavailable to self/public, 2 Copyright upheld Likelihood: 1 High, 2 Certain Utility:1 low, 2 high

Act Utilitarian analysis (continued) Option 2: download/distribute abandonware Consequences: 1 Copyright violated, 2 prosecution, 3 abandonware available for use. Likelihood: 1&3 Certain, 2 very low Utility: 1 low, 2 low, 3 high

Rule Utilitarian Analysis Rule: Everyone downloads/distributes abandonware. Consequence: Interest in abandonware product X grows. Company republish or update, product X is no longer abandonware. Product Y is abandoned. Repeat with product Y. Outcome: Beneficial to both parties, moral.

Social Contract Theory Analysis Current Contract in the form of Copyright violated by distribution of abandonware. Downloading/distribution violates copyright. Ergo, downloading/distribution is wrong. Implied contract: Abandonware downloads rarely prosecuted. Possible implied exception to copyright law? If so, downloading/distribution is acceptable.

Our Sources Wikipedia chttp:// abandonware-rights/copyright-office-grants-abandonware-rights/ ethics-and-essentials/ Ethics for the Information Age, 5 th Edition, Michael J. Quinn