Thursday, December 5, 2013

Computer and Society Paper

Computer and Internet works Copyright Infringement
Today, over a million copyrighted materials that are available in various computer servers, either private company owned servers or public domain servers worldwide are hacked into and materials are siphoned off by individuals, who disregard the copyright regulations and ownership laws. Whether this perpetration is based on a more advanced knowledge, skills and much advanced equipment is there to debate a range of laws, which have been designed to govern the digital materials. An example of such laws is Digital Copyright Law, which protects the owners and innovators of the digital materials against the access and illegal use without due right and permission from the owner. The effect of such illegal ownership by penetrating and stealing materials online is today felt worldwide and that is why the laws have been introduced to solve this problem. Laws alone cannot fight this kind of infringement use of technological skills has to be considered embraced by the firms and copyright owners, which would wish to increase security of their products to aid the already existing Digital Copyright Law.

The purpose of the copyright law is to encourage creativity and innovation by granting a temporary monopoly in the authors original creations. This monopoly takes in the form of six rights in areas, where the author retains in exclusive control of his work or material for a period of time, after which then the material will enter into public domain. Such rights include the right of reproduction and copying, the right to create derivative works, the right to distribution, to performance, to display and digital transmission performance. Some jurisdictions also recognize moral rights of the creator of a work, such as the right to be credited for the work and copyright is described under the umbrella term intellectual property along with patent and trade marks.

Managed Service Providers
Online Services Providers, such as companies associated with distribution of IP addresses and network services, web hosting and data storage firms can be employed to use their own or another vendors security software and devices to protect internet gateways by filtering the penetration and browsing monitoring the online visits and by ensuring that logging into such servers is done with passwords. The solutions tend to be customized for each clients unique business requirements and to use proprietary technology. They can either actively respond to intrusions or notify the authority after such intrusions occur. Mark Suri  stated that some requirements for using this safe harbor include the service providers limiting access to information as required by the web site operator not interfering with certain technologythat returns hit information to the web site operator and refraining from modifying content

Elsevier in the article Digital Copyright and the New Controversy Is the law molding technology and innovation stated that vulnerability assessments, information system audits, and information security risk evaluations will help characterize security issues, but not manage them (Elsevier). Managed service providers would manage the security for you. Although each of these approaches can be useful to an organization trying to protect itself and the copyrighted materials, all of them have some limitations, based on their context of use and that explains the reason why managed service providers would devote their approach assessment built upon security of the copyrighted information and this will have allowed them to assume responsibility for security management other their original role of selling IP Addresses and website hosting and data storage. He further notes that digital copyright laws could create perverse incentives for innovation and wonders if legislators may not require a better understanding of the innovation process when crafting IP laws (Elsevier).

Online Automated Piracy (Detection Software)
Belkhouche, Anastasia Nix and Johnette Hassel explained in Plagiarism detection in software designs why there is a need to have designed systems to counter piracy saying, online monitoring software with capability of detecting illegal distribution of copyrighted materials online will be best placed than just having laws on paper (Belkhouche, Nix and Hassel, 2004). Example of such software is Virage Automatic Copyright Infringement Detection (VACID), which has the capability to detect and report to the authority any copyrighted material or work that is circulating or being circulated online from one peer to another peer regardless of location of the peers or format. Belkhouche, Nix and Hassel added saying to days bulging interest of music, movies and other digital media content software have been designed to enable file sharing and distribution over the internet around the world. This has forced such media and digital content owners to step up technology geared to counter the rising tide of illegal copying and seeding(Belkhouche, Nix and Hassel). The detection system shall be liable in monitoring, recording, and analyzing suspicious sharing by monitoring traffic on the internet. They cited a case where preliminary experiment was done on a real case and the system successfully located 126 distributors (a.k.a. seeders) for some Cantonese pop songs within 90 minutes.

The positives and negatives of License and Copy Software
Using licensed software the vendor is in obligation to assist you in a timely manner in case of popup-bugs arising from the licensed software. Besides, upgrades would be downloaded easily without involving any extra cost. In the case of open source software, the developer is not liable in giving technological assistance. This warrants the user to dig deep into his pocket, if such popup-bugs arise or any maintenance problem is called for as explained by Michael Bloch (1999-2007) in the article Taming the Beast.  Bloch adds that, open Source Software is free, and their source codes are available for manipulation by the end user (Bloch, 2007. This means original source code developers would lose control of their original work in the sense that codes can be changed from the original code by any skilled person and end up creating a competing product making the original product lose its intended market and credits it deserved, as noted by Odin Kyle in The pros and cons of open source software (Kyle 2009).

Accountability and Liability in Computer Applications and Software Loss
We live in a world where not only business empires but also lives of ordinary people depend and are supported by computers. A catastrophe happens if computer systems run out of control. Emily Freeman, AIG e-Business Risk Solutions, vice president, Western region and executive director of consulting concurs says that even with the best data security, liability risks will never be zero (Freeman). Along with that there has been of late a number of cyber risks associated with doing business today. This has called for a rising need for vendors of such software to provide compensation clauses as a form of accountability and liability, in case of such loss. Tammy J. McInturff, an AIG e-Business Risk Solutions official, added in his publication Managing Cyber Risk that a case where there is a known breach which may lead to the loss of information stored in organizations and companies servers due to malicious attacks there should be liability on the part of the subject responsible for hosting such information and data and due compensation done to affected victims due to loss of unencrypted personal information such as name and address associated with a social security number, drivers license number or other data that could be used for identity theft (McInturff).

The need for licensing computer professionals
Computer Security Society is fighting a known common enemy- a learned skilled computer professional, who is every time mentioned as breaching the security protocols. Licensed professional engineers can be trusted to build bridges that go up according to plan and stay up. Robert Fabianin the article Should software professionals be licensed gave an analysis saying that some have proposed that same concept for software professionals - maybe licensing could be a means of indicating that they can be trusted to build software that goes up according to plan and stays up (Fabian). Because of lack of license, it is believed that most of them work leaving loops to be exploited later. Lack of license has also given forth to reckless pseudo-professionals who cost American business billions of dollars each year in lost productivity. Vetting computer professionals has become a costly nightmare for IT managers across the USA. Licensing will ensure real professionals with certification recognition like that of Engineering and Accountancy and such professionals would then be credited and honored with earnings and by the kind of  their noble work during their practice and at the same time be paid royalties as explained by Burleson Consulting,in the article, Government licenses for computer professionals

No comments:

Post a Comment