Saturday, January 14, 2012

Blog Entry #3 - Ethical Dilemma


Ethical Dilemma 4

In the case of Alice who was writing a textbook which she wishes to include in her book the material from various sources-particularly a few key diagrams that have previously been published in other book, publishers would really require significant fees to be paid to them if material from one of their book is reproduced elsewhere.
In this example, Alice should always obtain written permission from the appropriate rights holder for the reproduction of any proprietary. Now the author of the book which she wants to refer her diagram is dead. Specific companies are tracked down by her. This company currently own the rights to the books from which she wishes to reproduce diagrams from these works.
The reproduction right is perhaps the most important right granted by the Copyright Act. Under this right, no one other than the copyright owner may make any reproductions or copies of the work. The company has the right to ask significant amounts of money to be paid in relation to the reproduction of material from an old book- particularly when they know that this will not be passed on the author, or their estate. But it is very unreasonable. If we would try to think about it deeper, she have doesn’t need to pay for a huge amount to the company if it doesn’t have any approval from the author or the state to publish the same copy of material. In our own opinion, it is unethical to ask for a significant amount to a girl who actually will use the diagram of the said old books. Besides, if the Alice would pay, the author would have to benefits from what she had paid since the author of it is dead. The only person who would have the money will be the publisher.
For the figure number 2, first we have to define plagiarism. Plagiarism is using someone else's work without giving proper credit - a failure to cite adequately. Alice should pay the person who created the original work, and ask for permission to reuse the diagram. In what Alice done, it is called Paraphrase plagiarism which means changing some of the words and grammar but leaving most of the original text the same as of the diagram she uses.
The same story for software, this consideration should also apply for this product. One should not easily take another’s code for them to use the software. It is clearly that it is not permissible to do that. If you could not afford for it, don’t use it. If you want it, you buy it. But clearly, in present, a lot of illegal copies are being shared to people for free. This is unfair and should be stopped.





Ethical Dilemma 5


In our own opinion, if we are one of the personnel or employee in a company that develops websites and also had our company obtained a contract for the law enforcement agency that deals with any violence to act in line with so called “honeypot”, we would consider the following decisions: 

For all we know, Honeypots turn the tables for Hackers and computer security experts. While in the classical field of computer security, a computer should be as secure as possible, in the realm of Honeypots the security holes are opened on purpose. In other words Honeypots welcome Hacker and other threats. The purpose of a Honeypot is to detect and learn from attacks and use that information to improve security. A network administrator obtains first-hand information about the current threats on his network. Undiscovered security holes can be protected gained by the information from a Honeypot. For some our customers, they had some private information to be kept and not to shown in public and if we are bundled a contract with the law enforcement agency, We would rather choose not to view all of
the contents of the project we made for our clients since we also protect their privacy and if we find out that there are violence against the project, we will report immediately to the law enforcement to enable them to observe.
We felt encroached to our company for some reason that there was law enforcer that monitors our work. It also awkward that it is observed every time we did a work but in the other hand we are glad that there some kind of thing like that so that some who will commit violent actions can be stop or lowered since it is a monitored project. For us, the internet has a very wide to reach, wider than the real world we know that even law enforcer cannot monitored it all. We can say that if the law enforcer wants to monitored all of the chat rooms and any other website content, they will require a very large information in the web so that it can be all monitored and also a high budget system.

No comments:

Post a Comment