The Ethics of Emulation David Gale February 24 th.

Slides:



Advertisements
Similar presentations
EECS 690 Patents and Software 23 February Patents Must be applied for In order to be patentable, a device or process must be: –New –Useful –Non-Obvious.
Advertisements

Abandonware in the Land of Pirates Demis Harper, James Cain, Keith Neer.
Changing the Network Infrastructure– Threats and Possibilities Alex Alben Nobember 6, 2003.
Embedded Systems Presentation David Tietz EEL6935 Spring 2009.
Software Evaluation Form Terminology. Version Changes as: Programs have "bugs" fixed Programs have new features added.
COMP 381.  Copyright Term author + 70, corporate 95  DRM enabling copying is criminal constrains who can use tracks who is viewing Copyright and DRM.
Intellectual Property Boston College Law School March 19, 2008 Software – Copyright – Fair Use.
1 CS 502: Computing Methods for Digital Libraries Lecture 27 Preservation.
CptS 401 Adam Carter. Quiz Question 1 According to the book, it is important to legally protect intellectual property for the following reason(s): A.
PLAYING WITH A NEW PROBLEM: COPYRIGHT AND VIDEO GAMES IN EDUCATION AND SCHOLARSHIP KEVIN SCHUT, ASSOCIATE PROFESSOR, TRINITY WESTERN UNIVERSITY, LANGLEY,
Development and Impact of Software Solutions Social and ethical issues.
Ethical Use of Computers. Ethics and Responsibilities in the Computing Process Every profession operates with a set of ethics that help to define the.
 Definition:  Internet safety is when you are safe and mindful of all the dangers of the internet.  Internet safety is also not getting harassed or.
DVD Decryption What happened and is it ethical?. DVD CSS n The purpose of encrypting data on DVD. n The CSS Security Model. n How that security model.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Information Ethics Objective: Students will understand how to use information ethically.
COPYRIGHT OR HOW TO AVOID PLAGIARISM OH BOY!!!. WHAT IS COPYRIGHT? THE EXCLUSIVE LEGAL RIGHT, GIVEN TO AN ORIGINATOR OR AN ASSIGNEE TO PRINT, PUBLISH,
Ch15QQ 1. Hardware theft includes the theft of portable computers as well as desktop computers. 2. A surge suppressor can be used to protect a computer.
Security Threats Connecting Computers Copyright Law & Ethics Storage & Memory Computer System
Copyright & Licensing. 2/18 Presentation Outline Copyright Law Software and copyright Licensing Software Piracy Copyright and the Internet.
CptS 401 Adam Carter Section 4.3.
COPYRIGHT LAW 2004 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
Piracy of Video Games By Scott Cowan. What Piracy Is Piracy is when a copy of a digital file is used by someone who did not purchase, and does not own.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Computer Ethics, Viruses, and Copyrights Ethical Computer Use Using computers for positive purposes Using computers for positive purposes  New technologies.
… concern the legal ownership and use of intellectual property, such as software, music, movies, data, and information. Links: Video: Too Much Copyright.
COMPUTER ETHICS Computer ethics is the study of standards of right and wrong.
6 th Grade. a. Identify Internet safety and security concerns (Cyber Predators, etc) b. Discuss illegal aspects of software piracy, hacking, and computer.
COPYRIGHT LAW 2003 Professor Fischer CLASS of April : TECHNOLOGICAL PROTECTION MEASURES.
Intellectual Property and Copyright Ethics Atif Imran Toor Computer Science with Artificial Intelligence Profile
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Digital Citizenship Project Lori Jones Franks University of West Alabama ED 505.
Copyright and the Law For more information contact:
Intellectual Property. The intangible creative work (not its physical form) Includes: books, articles, plays, songs, art, movies, software Copyrights.
Intellectual Property A brief explanation. Intellectual Property is a name used for material, or something that is intangible. You may not be able to.
Back to the Basics The Ethical Aspect of Reverse Engineering.
APPLICATION SOFTWARE. Application Software  Application softwares are those softwares, which have been developed to solve a particular problem, to perform.
APPLICATION SOFTWARE Objectives Describe several important trends occurring in computer software. Give examples of several major types of application.
From Chapter 1 - Computers- Understanding Technology
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
K Fusion Emulator Andy Edwards David King Ashar Mahmood Bakari Smith.
COPYRIGHT LAW 2004 Columbus School of Law The Catholic University of America Prof. Fischer CLASS of April
Digital Millennium Copyright Act (DMCA) The Digital Millennium Copyright Act is a United States copyright law that was signed into law by Bill Clinton.
Legal and Ethical Issues in Computer Security Csilla Farkas
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Technology Education THE PERSONAL COMPUTER (PC) SOFTWARE PART 2.
Computer Technology Timpview High School
Brisset Benoit PMO1 - Promotion 2007 / Friendship, a big accomplished dream M & W.
Ethics Self Imposed Right and Wrong Behavior Described as:
TECH VOCAB. ETHICS The rules that we use to define behaviors as “right” or “wrong” page 6.
Bart Brida Carrie Estes INTELLECTUAL PROPERTY CHAPTER 4.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Chapter 3 Applications Software: Getting the Work Done.
Copyright and Fair Use Guidelines Presented by Misty Bellard.
Computer Ethics, Viruses, and Copyrights
Objectives Understand legal aspects of software
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Social, Legal, and Ethical Issues for Computing Technology
Copyright & Licensing.
Computer Ethics, Viruses, and Copyrights
Information Technology
Computer Ethics, Viruses, and Copyrights
Intellectual Property Rights
What are the attributes of good software?
Computer Ethics, Viruses, and Copyrights
Issues with Computer Use in the Classroom
Internet Basics and Information Literacy
Lesson 2- Ethical Use of Digital Resources Edit all slides as needed.
Overview of Computer system
Copyright, Design and Patents Act (1988)
Presentation transcript:

The Ethics of Emulation David Gale February 24 th

What is Emulation? OED2: The technique by which a computer is enabled, by means of special hardware or software, to execute programs written for a different type of computer. Commonly, “emulation” refers to emulating a video game system on a computer.

Emulated Systems on Macintosh Listing from

Why Emulate? Price Nostalgia

Why Emulate? Price Nostalgia Replace old or broken system Portability Translated games

Why Emulate? Price Nostalgia Replace old or broken system Portability Translated games Games which are no longer available on the mass market

Why not emulate? Piracy Inferior quality Inferior experience Potential viruses

LegalityLegality Backing up your own software is “fair use” and protected under copyright law. Reverse engineering to create the emulator may be legal. –DMCA appears to inhibit reverse engineering. –Sony v. Connectix allows for reverse engineering as “fair use” for “non-infringing” functionality.

EthicalityEthicality Backup purposes are ethical (and legal). Avoiding purchasing a system widely available on the market is questionable. Avoiding purchasing available games is piracy, and unethical. If a game is no longer or never was available, there is no ethical burden.