Saturday, January 25, 2020
Software Piracy From An Islamic Perspective Information Technology Essay
Software Piracy From An Islamic Perspective Information Technology Essay Software piracy is considered to be unethical as such act may hugely affect the right of ones ownership towards his/her products and piece of works. However, statistics (refer:http://www.nationmaster.com/graph/cri_sof_pir_rat-crime-software-piracy-rate) indicate that the rate of software piracy is high especially among the developing nations, in which majority of them are Muslims. In fact, this problem seems to have no ending point despite all the efforts and initiatives done either at the individual, group, national or international levels. Discuss this critical issue of software piracy in the light of Islamic point of view on ethics and ownership. Everywhere in the face of this earth, the issue of using pirated software is widely talked and discussed by people. However, do people really understand and know what is the meaning of software piracy, the copyright infringement of software (often referred to as software piracy) refers to several practices which involve the unauthorized copying of computer software. Copyright infringement of this kind is extremely common. Most countries have copyright laws which apply to software, but the degree of enforcement variesà [1]à . There are several reasons not to use pirated or pirate software. Firstly, it is illegal and there is liability on your part. Its risky. If the software is from an unauthorized source, you could be getting a program that is not fully functional. Secondly, there wont be another version of the software if there is no revenue to put back into research and development. This revenue has made the product affordable to legitimate users. Thirdly, it is totally not eth ical. Or we like to say doing the right thing when no one is looking. Ask yourself how you would feel if your lifes work went without compensation? Start now and be an ethical professional.à [2]à Software piracy refers to the act of copying different computer software without having to pay for them. This is a form of stealing intellectual property. Intellectual property and copyright fall under the same area which declared that copyright provides legal rights exclusively given for a definite periods to the creators of an intellectual work, e.g. literary works (anything in writing), artistic works (drawings, maps, plans etc), musical works, films, sound recordings, computer programs (source and object code) for sale or any other use. It is, in principle, not concerned with things that are not perceivable, such as abstract ideas, concept, and the like. Copyright protection begins when works are actually created and fixed in a tangible form. the emerging digital technology, increasing use of computers, communication technology and their convergence into an integrated information technology, have given rise to challenging legal issues for copyright and many mire are expected in t he future, the ease of distribution, altering digital information and proliferation of computer networking, raise concerns about copyright. Copyright was designed for three basic reasons: to reward creators for their original works: to encourage availability of the works to the public; and to facilitate access and use of copyrighted works by their public in certain circumstances.à [3]à As mentioned before, software piracy is illegal. Sarcastically, many who are practicing and involving in pirate software are fully aware of the legalities, though they are able to reduce continuing the practice. Some think about the only solution that works without splurging too much money on purchasing the product. Around the world, authorities are already enlisted and stated the laws regarding software piracy, these are some of them:à [4]à Counterfeit Copies Producing counterfeit copies and selling them to other consumers is a grave offense. There are different punishments in different countries but all are in agreement that making money off of someone elses intellectual property is an offense. This includes making copies of different software, such as games, video games and other software that is used for the computer. Distributing Counterfeit Copies Creating counterfeit copies and giving them away is also a form of piracy. Even if the person does not charge anything for these copies, it is considered an offense as the person is not the owner of the copyright or does not have the consent of the copyright owner to distribute the copies. This is one of the most rampant piracy practices that the anti-piracy association is trying to fight. Selling Computers with Pre-installed Pirated Software Although the item for sale here is the computer, this is considered an offense as the computer for sale is loaded with different pirated programs. This act is also known as hard disk loading. This is considered an offense because the consumer who will buy the computer does not receive the copy of the original program and the other items included with it, including the CDs or license agreements. Online Sharing Sharing of software online is prohibited. Freeware and shareware programs are the only programs that can be distributed online. Other software is not allowed to be shared with other people over the Internet. This also includes piracy music. The Internet can be used as a means of transmitting illegal software to different people around the world. This is the case for plenty of copyright software. Shareware with No License Although shareware can be legally distributed over the Internet, it becomes illegal when the license for use has already expired. This works for software that can be downloaded for a free trial. Using this software after the free trial has expired is considered software piracy. Software licensing must be acquired before these shareware programs can be shared with anyone else. Islam is supposed to be a complete way of life. A Muslim is bound by Islamic rules and hence is obliged to follow the instructions as prescribed in the Quran and Hadiths. Islam is a religion based upon the surrender to God (Allah). The very name of the religion, al-Islam in Arabic, means submission and peace, for it is in submitting to Gods will that human beings gain peace in their lives in this world and in the hereafter. Islam is considered to be a comprehensive religion and its ethical system is considered to be one of the major ethical systems. Owing to the importance of establishing an ethical system in the field of IT, especially at our present time which is witnessing an ever increasing ethical problems, several specialist organizations have prepared codes of ethics to be complied with by members of those organizations.à [5]à The main agendas which can be recognized to ethics in relation to information technology can be tied down to hacking, privacy, software piracy and IT personnel work ethics. By taking into deeper look, we begin to realize that ethics and information technology involve more issues which on the whole are just as worst. These are some issues related: Computer professionals responsibilities towards their employers and their clients; Proper documentation of software by designers and developers; Proper testing of software by designers and developers; Handover of systems to clients; Designers and developers leaving a computer project mid-stream; Providing maximum security of software to clients; Computer professionals honoring the proprietary issues relating to the algorithms, procedures and data; Computer professionals working towards accurate systems with the aim of Complete data integrity; and Computer professionals involvement in developing systems aimed at unethical ends. In defining the concept of harm that can be done by an IT professional or just normal people and civilians, harm can be defined as the undesired effects to individuals or organizations resulting from any task or system (software) used. In order to avoid the harm Allah has warned us to be honest and trustworthy through his word of wisdom which is Al-Quran in Surah 13, Ayah 119: O ye who believe! Fear Allah and be with those who are truthful. And Prophet Muhammad (saw) has said: The trader must avoid five qualities, otherwise he should not buy or sell: Usury, swearing by God that the merchandise is good, withholding the defect, commending (the commodity) when selling and belittling (it) when he is buying (Tahtheeb al-Ahkam Ch. 7).à [6]à The verses above clearly emphasize the importance of telling the truth and how God perceives those who tell the truth and how they are rewarded. The first verse encourages people to be in the group of those who are honest and only tell the truth whilst the second verse portrays the great reward of those who were truthful on earth. Suggest potential solutions to at least minimize the act of software piracy among these societies. Before we can move on to the deeper solutions, why not we discover what the real are cause the occurrence of software piracy. Causes of piracy and counterfeiting may include rising cost of original software, making them unaffordable to a large segment of the population, advances in technology (tools for reproduction of copyright product) making piracy an easy task, low starting cost for pirating, absence or lack of enforcing copyright laws, huge profits can be made easily by pirates and weak deterrent (fines and prison sentences are minimal). The literature suggests that many factors explain the software piracy phenomena. These factors are grouped into four categories: first is an economic factor; suggest that Gross Domestic Product (GDP) per capita is inversely related to software piracy level. Given the decrease in software prices, it may be that a countrys GDP has a less effect on piracy than it did some years ago. Second is ethnical factors; software piracy is assumed to be more prevalent in nations with a weak IT infrastructure since the quality of available software is lower. Thus, people often copy and work with pirated software. The problem is compounded as software revisions occur. While the need to remain competitive through upgrades is important, it is worthwhile only when affordable. Thirdly is regulatory factors; developing countries may unintentionally encourage software piracy by imposing high tariffs, hence increasing the cost of software. It is also believed that lack of penalties for buying pirated softw are are also reasons for piracy growth. And lastly social/cultural factors; these factors refer to the prevailing social and cultural attitudes shared by members of a society. Many studies have indicated that the culture factor influences a countrys software piracy rate.à [7]à Getting through with the causes, the disadvantages are seen to come along due to lack of public awareness of in third world countries. There is probably the lost revenue to the companies and countries involved, the increased prices by software companies to compensate for losses, lost jobs wherever software companies have plants, lost domestic and foreign investments, lost trust in the ability of some countries to protect intellectual property, immoral activity condemned by all religions, illegal activity leading to prosecution and increased international pressure at the economic, financial, Political level. According to Robert Hollyman, BSA president and chief executive officer, software piracy robs the global economy of hundreds of thousands of jobs and billions of dollars in wages and tax revenues.à [8]à Given the situation of software piracy in campus since it is a small community yet has quite big of potential software piracy practice. Software piracy on college campuses may be generally divided into two categories. The first occurs when the institution itself is violating copyright law. This results when installations of software programs are in excess of the terms stated in the licensing agreement or under law. For example, software that is licensed for use on a single machine is installed on many computers or on a network server, allowing unlimited access. Oftentimes, the school is unaware of the problem as a result of poor or no software management. In other instances the school simply cannot afford to buy software and chooses to risk the infringements. Students more commonly conduct the second type of piracy. In this scenario the piracy often takes place on the Internet where students trade or simply give away software programs as one would trade. If the students are using the schools network or computers to facilitate their illegal activity, the college itself may be held liable. All members of the campus community can take steps to prevent such illegal activity and minimize misuse of computer resources. It is important to promote an understanding of the law and to ensure that specific procedures and protocols are implemented to establish a foundation on which illegal activity may be prevented.à [9]à Discussing these two issues, there are five solutions offered to enable schools to be software legal: Appoint a software manager. Create and implement a computer usage policy, including software and Internet access. Conduct periodic software audits. Establish and maintain a software log of licenses and registration materials. Teach and promote awareness of software compliance. It is stated above that in the case of school, college or university software piracy where some solutions are proposed but, generally these are some more solutions and tips to prevent or lessen the software piracy. The first tip is by applying the code key For the past 5 to 7 years, software developers have devised a plan to lessen or prevent software piracy. This is by using a code key. A code key comes with the software that you buy. Before fully installing the software on your computer, you must provide the specific code key that came with the software. After providing the code key, you can run the software on your computer. The code key also locks after it has been used. This is so that the software cannot be installed on other computers after it has been installed on one. You will have to call the manufacturer of the software to be able to use the code key again. This is not good news to people who pirate software. Secondly is the introduction of open source; described as free software that anyone can download from the Internet. A lot of different software can are licensed as open source. Open source software is under the license free software license. There are also different upgrades for these open source software that can also be freely downloaded from the Internet. By using open source software, people dont need to worry about spending a lot of money for original copies of software. This will also lessen the number of people who are using pirated software as there are alternative programs that can be used and they do not have to pay fines when they are caught. Third is the hardware key; a hardware key is a device that is used for anti-piracy. This tool prevents software vendors to distribute their products or use them without authorization from the copyright owner of the software. The hardware key works when it is attached to a computer. It monitors software licensing and enforces licensing of the protected software that is detected on the computer. This tool will lessen software vendors from illegally distributing the software that they have and is a good prevention measure for piracy. And lastly is anti-piracy software; there are different types of anti-piracy software that are available for free. Anti-piracy software is used to prevent illegal duplication or illegal use of copyrighted software. There is also an anti-piracy software that prevents hackers from getting into the software and copying it without consent from the copyright owner. Some of them are also already integrated on the disks of the software that contains the program. This may also be for piracy music. The anti-piracy association is also looking for other ways to prevent software piracy. Reporting anti-piracy may prevent it from happening.à [10]à These are some of the measures that have been implemented or created to stop and prevent software piracy. With the improvement of technology, there are a lot of things people can use to bypass these piracy measures but there are always new and effective things to use against piracy. The issue of software piracy seems to remain a permanent feature of the marketplace. It is a problem that will not go away, but it can be controlled or curbed to reduce its negative effect on the companies and countries involved. There are some measures that can be taken to reduce piracy acts and the losses associated with them. Piracy is not going to be eliminated or eradicated from the world, but it sure can be curbed and reduced to its minimum activities with the cooperation of the developed and the developing countries in taking these drastic measures to make the world a better place to live.
Friday, January 17, 2020
Gems, Jewelry and Diamonds
The history says that India is known for the birthplace for the one of the strongest metals i.e.Diamonds. Initially diamonds were only mined in India and were exported around the globe and were used as a medium of exchange for the commodities until the people knew its actual worth and how much materialist things that they can buy from it. Currently, India produces 33000 carats of rough diamond and more than 800 million of rough and polished cut diamonds. Few of the Major hubs and producers of diamonds in India.Surat is known for largest market of manufacturing of diamonds in India.Mumbai is known for the wholesaler's market and where most of the trading takes place at BKC.Delhi is known for its silver jewelry and its manufacturing. There are many other states like Jaipur, Kolkata, Trichur where we can find the precious metals, synthetic diamond and light weighted jewelry respectively around the states in India. Indian Gems, Jewelry and Diamond IndustryOver the years India has been the greatest manufacturing of cut and polished diamond. The sector contributes to around 16% of the export of the country and 93% around the globe. To add more to it Gems and Jewelry has become the second largest industry in earning foreign currency and Gujarat is one of the largest manufacturers of diamonds around the globe. The Diamond Jewelry market has acquired the growth rate of 6% in India and the size of the industry is approximately Rs.6000 crore. Indian has been successful in achieving these goals in cutting and polishing business is all because of the competitive price and ready to work at a low margin. Moreover, India has developed a specialized skill in polishing large and magnificent stones with fancy cuts which again increase the chances of success. Not only this this but most of the small-scale business have introduced high end machinery from which now they can get the best product from a raw or a polish diamond. The Gold demand that the Indian market has rose from 9.13 % to 726.9 tones in 2017. As per the recent records it suggested that India has imported approximately $29 billion during the previous year. To Conclude, India has grown to become such a successful market that countries and companies are now insisting their diamonds to be manufactured in India.Industry Structure in IndiaGems ; JewelryDiamond Jewelry Precious StoneCut ; Polished Gold PearlRough Precious Metal Color Gem Stone Costume/ Fashion Synthetic Stone Market Segment The diamond market has three segments:1. Industrial Diamond: Under this there are all the natural and synthetic diamonds that are manufactured in the industry. It comprises of 25% of the total. Jewelry Diamond: All the assembled products such as the ready-made jewelry and gemstones are categorized under this section. It comprises of 15% of the total.3. Investment Diamond: it comprises of both the rough stones which are very expensive. It comprises of 60% of the total.Market OverviewEvery year 124 million carats of rough diamonds are being mined by Alrosa, BHP Billiton, De Beers, etc. The market value of these diamond is around $15 billion. Moreover, there has been a significant improvement in the growth by 31%.India has considered to be the largest exporter in gems and jewelry and to our knowledge the industry has played a very important role in Indian economy as it contributes a large part in the foreign reserves of the country. Other then, India, USA, Russia, China, Belgium, Hong Kong are few of the world's biggest dealers in the diamonds.Export of Gems and Jewelry IndustryIf we see analysis the data we can see that, the net export of the industries gems and jewelry has shown rise of 7.06 % in the annual growth rate. During the previous year the overall net exports were $35.51 billion and has reduced slightly in the current and will surely rise. Notes: * ââ¬â Data from April-February 2018, CAGR ââ¬â Compound Annual Growth Rate till FY 2017.Source: GJEPC, Media sources.Import of Gems and JewelryIndia is also of the largest importer of gems and jewelry as well. If we see in the figures the India's total rose from $11.63 billion to $42.72 billion from the years 2005 to 2012 respectively and since then it has shown a gradual set back during the next year. Again, the market has also gained strength after the fall from $42.72 million to $24 million and now covering back by $28.78 million during the previous years. Notes: * ââ¬â Data from April-February 2018, CAGR ââ¬â Compound Annual Growth Rate till FY 2017.à Source: GJEPCà Government Incentives and Strategies Developed by CompaniesThe Government has introduced the Pradhan Mantri Kaushal Kendras which will help create skill and provide labor. Moreover, it will provide vocational training to the engaged peoples who are getting training in it. The Make in India initiative will boost the exports and it will provide critical regulatory framework for the proposal Special Notified Zone(SNZs). However, it will also benefit the small-scale businesses (SMEs) that are involved with the industry. The government has proposed to cut down the tax to 25% for the micro and small-scale enterprises which was announced in the recent Union Budget. The government has permitted 100% FDI. After the booming of the ecommerce, many companies have started selling their jewelry online. Not only this but, many companies have tied up with the Amazon to sell their product online at discount. Companies also have provided buy-back option to the customer if they dislike the product but I think there are still terms and conditions to be stringent so that it will ease the procedure.Few of the Key Players in the Indian market are Tanishq, Malabar Gold ; Diamond, Gitanjali, Nirav Modi, PCJ, TBZ, Kalyan, Venus Jewels.
Thursday, January 9, 2020
Fahrenheit 451 - Censorship and Technology - Free Essay Example
Sample details Pages: 1 Words: 377 Downloads: 1 Date added: 2019/04/10 Category Literature Essay Level High school Tags: Fahrenheit 451 Essay Ray Bradbury Essay Did you like this example? Censorship and technology are some of Fahrenheit 451s most important themes. A Burning book as a form of censorship has been around for a long time. Fear of exposing people to information that is considered dangerous is associated with repressive regimes by controlling citizens access to ideas governments can control the people. Donââ¬â¢t waste time! Our writers will create an original "Fahrenheit 451 Censorship and Technology" essay for you Create order Technology is also used by the government to censor and control their citizens TV distracts people disheartening them from having their own thoughts it encourages people to connect with electronics rather than other people. Real human connection is replaced with fabricated ones like Mildreds TV family. will you turn the parlor off? he asked. That is my family (46). In Fahrenheit 451 people seem to have lost all touch with reality that they have forgotten what it means to be alive. Mrs. Phelps cries when Montag reads the poem because she hears emotion in his words. One of the points made by society in removing all literature and substitute it with tech which gave no room to think and proces the death of her second and third husbands. When Montag turned the TV off and asked Mrs. Phelps about her husband Mr. Phelps she was getting unsure of her husbands safety. he said if I get killed off, you just go right ahead and dont cry, but get married again, dont think of me. (91)In conclusion Bradburys main point is the creation of a mass culture, as technology got more progressed the world got smaller and minority voices got louder. So, a super PC culture was created to keep anyone for telling the truth that some other person could not handle. Captain Beatty says, we stand against the small tide of those who want to make everyone unhappy with conflicting theory and thought (59). But it is not only the government that is to blame. Ray Bradbury reprimands how Americans always want things to be simple and positive. Most people think with better technology comes more connected society. But Bradbury is saying that just because we have the best technology it isnt going to bring us closer to each other. Maybe technology is not the problem, but a poor solution to escape from this harsh reality of not living up to societys expectations, and the fear of failing.
Wednesday, January 1, 2020
Quiz Review Essay - 1177 Words
1. Who are the first, second, and third parties in healthcare situations? The first party is the patient himself or herself or the person, such as a parent, responsible for the patientââ¬â¢s health bill. The second party, often called providers is the physician, clinic, hospital, nursing home, or the healthcare entity rendering the care. The third party is the payer, and uninvolved insurance company or health agency that pays the physician, clinic, or other secondary party provider for the care or services rendered to the first party. 2. Compare the UCR and the CPR payment systems. The usual, customary, and reasonable (UCR) is one version of discounted fee-for-service payment method. The UCR is a type of fee-for-service payment method inâ⬠¦show more contentâ⬠¦6. How do third-party payers set per diem payment rates? The insurance companies would compare historical data. Without historical data they would consider the costs, volumes of service, patient severity of illnesses, and the patientsââ¬â¢ lengths of stay. 7. Describe the major benefits of episode-of-care reimbursement according to its advocates and the major concerns about episode-of-care reimbursement expressed by his critics. The benefits of episode of care reimbursement are the saving costs from unnecessary procedures, duplicating laboratory work, and loss reports. The concerns are denying, delaying, and or substituting diagnostic, laboratory, test and treatments for less quality procedures. 8. Why is the federal government a dominant player in the healthcare sector? The healthcare sector of the federal government covers programs for senior citizens, people with disabilities through Medicare, two thirds of the cost of joint state-federal Medicaid programs, which provides health reimbursement services for low income persons and families, and includes healthcare services for a variety of populaces including active duty and retired military personnel among others. 9. Why is the constant trend of increased national spending on healthcare a concern? Because money is a limited resource, infrastructures will have less money due toShow MoreRelatedQuiz Results - Basic Institutional Review Board (Irb) Regulations and Review Process658 Words à |à 3 PagesQuiz Results - Basic Institutional Review Board (IRB) Regulations and Review Process You correctly answered 3 of 5 and received 3 of 5 possible points. Scroll down to review the quiz questions and the explanation of the answers. Question 1 Questionà : | A subject in a clinical research trial experiences a serious, unanticipated adverse drug experience. How should the investigator proceed, with respect to the IRB, after the discovery of the adverse event occurrence? | Your answerà : | ReportRead MoreThe On The Surface Level1778 Words à |à 8 Pagesthe instructor are true for the student gamer as well. Students would be able to not only create review tools for themselves, yet they would be able to share their games with their peers and collectively learn and retain information digitally and in real time. They may also learn concepts of instructional design by disseminating what information should be relevant for their study needs and apply it to quiz game instruction. Along with substantial internet support through their website, the precedingRead MoreEssay on Microeconomics Quiz Review2103 Words à |à 9 PagesChapter 9 1. All firms, no matter what type of firm structure they are producing in, make their production decisions based on where: marginal revenue equals marginal costs. 2. According to the table below, when profits are maximized, profits are equal to: $2. 3. Many economists believe that the market for wheat in the United States is an almost perfectly competitive market. If one firm discovers a technology that makes their wheat taste better and have fewer calories than all other wheatRead MoreGlo-Bus Statistical Review Quiz 1 Essay1923 Words à |à 8 PagesGLO-BUS Statistical Review QUIZ 1 Click below link for Answer CLICK HERE http://workbank247.com/q/glo-bus-statistical-review-quiz-1-all-correct-answ/24761 1) The company maintains a production facility in a. Japan b. The United States c. China d. German e. Taiwan 2) The companyââ¬â¢s shipment of digital cameras to retailers in various foreign countries are subject to f. All these g. Export fees equal to $20 per camera and exchange rateRead MoreArmy Boards, Adp 1, Review and Quiz807 Words à |à 4 Pageschange to any subject area. The proposal will then be considered | 11. What is the purpose of abbreviations and acronyms in the profession of arms? | The purpose of abbreviations and acronyms is for ease of use in speaking and writing. | * QUIZ: Army Doctrine Publication 1-02 Operational Terms and Military Symbols 1. What is the purpose of common operational terms? a. Communicate a great deal of information with a simple word or phrase. b. Eliminate the need for a lengthy explanationRead MoreStandards for Accounting and Review Services, and CPA: Quiz2439 Words à |à 10 PagesAccounting and Review Services establish standards and procedures for which of the following engagements? a) Assisting in adjusting the books of account for a partnership. b) Reviewing interim financial data required to be filed with the SEC. c) Processing financial data for clients of other accounting firms. d) Compiling an individualââ¬â¢s personal financial statement to be used to obtain a mortgage. Answer D is correct. The SSARS apply when a CPA either compiles or reviews the financialRead MoreManaging Human Resources Quiz 4 Review Chapters 1 Thru 41463 Words à |à 6 PagesManaging Human Resources | Quiz 3 | Review: Chapters 1 thru 4 Student: There are Multiple-choice, True or False, and Short Essay questions. Note: All questions also require a brief response explaining the reason for your answer. Circle the correct multiple choice answer; or check (ïÆ'â") the correct answer for True or False statements 1. When the human resources function creates a unique capability in a firm that creates high value and differentiates the organization from its competition, human resourcesRead MoreComm 215 Syllabus Essay1466 Words à |à 6 Pagesand analytical writing while using the writing process and specific rhetorical strategies to develop position and persuasion essays and a case study analysis, and learning teams will prepare an applied research paper. The course offers exercises for review of the elements of grammar, mechanics, style, citation, and proper documentation. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: Read MoreEcon 2301 Study Guide1079 Words à |à 5 Pagesââ¬Å"Partsâ⬠as indicated by the course calendar and summarized here: - Part 1: Chapters 1-4 - Part 2: Chapters 5-9 - Part 3: Chapters 10-14 Course Evaluation / Grading System There will be a quiz at the start of each chapter and an exam at the end of each Part. You will earn four (4) scores: three exam scores and one quiz score (based upon the sum of points earned on quizzes throughout the semester). Each studentââ¬â¢s lowest score will be automatically dropped, and the remaining three (3) scores will be averagedRead MoreMonopoly and Discussion Board Posts1554 Words à |à 7 Pages * fresh green beans * gasoline * In your analysis, please make sure to explain your reasoning and relate your answers to the characteristics of the determinants of the price elasticity of demand. Guided Response: Review the discussion board posts of your classmates. Note their responses to the determinants of price elasticity of demand. Respond to at least two of your classmates. Discuss with your peers the characteristics of an inelastic versusà elastic good.
Subscribe to:
Comments (Atom)