Call for Paper - January 2019 Edition
IJCA solicits original research papers for the January 2019 Edition. Last date of manuscript submission is December 20, 2018. Read More

Ethical and Legal Perspective of Software Piracy and Business Effects on the Illegal Use of Peer-to-Peer Systems Architecture

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2018
Authors:
Lemuel Magno Ventayen, Randy Joy Magno Ventayen
10.5120/ijca2018917278

Lemuel Magno Ventayen and Randy Joy Magno Ventayen. Ethical and Legal Perspective of Software Piracy and Business Effects on the Illegal Use of Peer-to-Peer Systems Architecture. International Journal of Computer Applications 179(47):30-34, June 2018. BibTeX

@article{10.5120/ijca2018917278,
	author = {Lemuel Magno Ventayen and Randy Joy Magno Ventayen},
	title = {Ethical and Legal Perspective of Software Piracy and Business Effects on the Illegal Use of Peer-to-Peer Systems Architecture},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2018},
	volume = {179},
	number = {47},
	month = {Jun},
	year = {2018},
	issn = {0975-8887},
	pages = {30-34},
	numpages = {5},
	url = {http://www.ijcaonline.org/archives/volume179/number47/29494-2018917278},
	doi = {10.5120/ijca2018917278},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

This is descriptive survey research aims to investigate the ethical and legal perspective of software piracy and use of P2P Systems architecture. It sought to answer the profile of the respondents regarding the program, age and year level of the respondents, the attitudes of the respondents regarding software piracy and the attitudes of the respondents regarding the use of Peer to Peer Systems Architecture. The respondents are also asked about the reason for using the P2P and pirate software. The result of the respondent’s shows that majority of the respondents agree that software piracy is acceptable. While most of the respondents agree that piracy is accepted, most of the respondents sometimes practice piracy because of the high cost of content and respondents does not want to pay for it. Based on the result, it is recommended that content providers should increase the security of content to avoid loss of profit..

References

  1. Stevens Le Blond, Arnaud Legout, Fabrice Le Fessant, Walid Dabbous, and Mohamed Ali Kaafar. Spying the World from your Laptop - Identifying and Pro?ling Content Providers and Big Downloaders in BitTorrent. In 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'10), San Jose, CA the United States, 2010. Usenix.
  2. Damon McCoy, Kevin Bauer, Dirk Grunwald, Tadayoshi Kohno, and Douglas Sicker. Shining light in dark places: Understanding the tor network. In In Privacy Enhancing Technologies Symposium 2008 (PETS), 2008.
  3. Christoph, R., Forcht, K., & Bilbrey, C. (1987). The development of information systems ethics: An analysis. Journal of Computer Information Systems, 28(2), 20-23.
  4. Eli Cohen and Larry Cornwell, "College Students Believe Piracy is Acceptable", CIS Educator Forum: A Quarterly Journal. 1(3) March 1989, p. 2-5.
  5. Karunaratne, S. B. (2012). The Case Against Combating BitTorrent Piracy Through Mass John Doe Copyright Infringement Lawsuits. Michigan Law Review, 283-309.
  6. BitTorrent behind Facebook and Twitter. (2015, July 11). Retrieved November 25, 2017, from http://www.labortech.net/bittorrent-behind-facebook-and-twitter/
  7. Karagiannis, T., Broido, A., Brownlee, N., Claffy, K. C., & Faloutsos, M. (2004, November). Is p2p dying or just hiding?[p2p traffic measurement]. In Global Telecommunications Conference, 2004. GLOBECOM'04. IEEE (Vol. 3, pp. 1532-1538). IEEE.
  8. The Hidden Cost Of Software Piracy In The Manufacturing Industry. (2016). Manufacturing Business Technology. Retrieved 3 May 2018, from https://www.mbtmag.com/article/2016/02/hidden-cost-software-piracy-manufacturing-industry
  9. Ellwood-Clayton, B. (2006). All we need is love-and a mobile phone: Texting in the Philippines. Cultural Space and Public Sphere in Asia, Seoul, Korea.
  10. Infographic Angela Salano, A. (2017). PH vs the World: Internet and social media penetration. ABS-CBN News. Retrieved 3 May 2018, from http://news.abs-cbn.com/focus/multimedia/infographic/10/16/17/ph-vs-the-world-internet-and-social-media-penetration
  11. Digital in 2018: World's internet users pass the 4 billion mark - We Are Social. (2018). We Are Social. Retrieved 3 May 2018, from https://wearesocial.com/blog/2018/01/global-digital-report-2018
  12. Larson, V., Short III, R. D., Munger, E. C., & Williamson, M. (2015). U.S. Patent No. 9,094,399. Washington, DC: U.S. Patent and Trademark Office.
  13. Illegal sellers of hacked Globe WiMAX modems arrested in Nueva Ecija (2018). Retrieved 3 May 2018, from https://www.globe.com.ph/press-room/illegal-sellers-of-hacked-globe-wimax
  14. An Introduction To Peer-to-peer Networks. (n.d.). Retrieved from http://www.eecg.toronto.edu/~jacobsen/mie456/slides/p2p-mie.pdf
  15. Moores, T., & Dhillon, G. (2000). Software piracy: A view from Hong Kong. Communications of the ACM, 43(12), 88-93.
  16. Asongu, S. A. (2015). Fighting software piracy in Africa: how do legal origins and IPRs protection channels matter?. Journal of the Knowledge Economy, 6(4), 682-703.
  17. Acilar, A. (2010). Demographic factors affecting freshman students' attitudes towards software piracy: An empirical study. Issues in Informing Science and Information Technology, 7(8), 321-328.
  18. Ming, T. M., Jabar, M. A., Wei, K. T., & Sidi, F. (2015, December). A preliminary study of personality traits and their influence on software piracy. In Software Engineering Conference (MySEC), 2015 9th Malaysian (pp. 252-258). IEEE.

Keywords

P2P, business ethics, legal practices