Using Results of Someone Else’s Intellectual Property Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

Human beings are naturally endowed with much intellectual ability. For this reason, man has been and will continue to be very creative in his endeavors. A lot has been advanced by man both in the field of technology and the physical environment. The intellect required to perfect technology cannot be touched because it requires the use of the mind. Therefore, it is a private entity of the mind best referred to as intellectual property. The physical ownership of property or tangible objects has well-structured protection by the law all over the world. However, the legislation governing intellectual property has never been thorough and well defined. Moreover, keeping track of intellectual theft is equally a glaring challenge to law enforcers today. Software products used in computers alongside other digitized materials are currently facing this violation. This is an ethics essay paper attempting to strongly oppose intellectual property theft and violations.

Ethics in Computing

The transformation in information technology has led to the emergence of new forms of violations related to computers. There is a need for ethical issues to be addressed decisively just like the concern put in the protection of tangible property. Stamatellos describes the origin of computer ethics “from the work of MIT Professor Norbert Wiener, who first foresaw…ethical consequences of information technology” (2). Ethics in this case refer to the basic rules and standards of conduct that are supposed to be upheld by all computer users in regard to intellectual property.

Several ethical issues have developed with time. Stamatellos further notes that the critical part in this violation is software (39). Computer users have access to digital machines with high copying ability. The copied materials can also be shared among several people within a short time. This has automatically led to thousands of computer users owning software that was not rightfully acquired. Even with technological advancement, users should not take the simple advantage to acquire software programs illegally. It is very similar to getting access to a physical item from an owner without incurring the right cost. There are millions of illegally copied data in circulation today. We could imagine one major repercussion it has to the original owners of these materials. It is synonymous with robbery without violence.

Consider the other side of the argument. A computer user owns both the device and data inside it. If you can reveal to your pals the costly and lovely French wristwatch you acquired legally, why should you not be proud enough to show them that DVD music you lawfully possess? Why is there some explicit fear to use your component publicly? Information ownership logistics is rather different from other forms of ownership (Stamatellos 40). It is not easy to identify a user who breaks into a computer system and unlawfully copies some files for personal use. Moreover, even after copying, the original file remains intact with no damage whatsoever. This is one argument used by those who violate copyright laws. Although the initial information or data is not damaged, the underlying issue has to do with theft. The owner of this information does not get the desired returns from his intellectual work.

A lot of debate has been surrounding the definition of private property which in this case is not tangible. How can the mental property be classified to belong to the owner alone or everyone? Are there controls that can be instituted to protect private intellectual property? How far is the use of private mental property considered a violation? These are some of the questions and concerns which may not have been sufficiently addressed in the past when dealing with intellectual property conflict.

There are several reasons why the private property should be protected at all costs. Just like any other piece of work, the producer needs to be rewarded. If this does not happen, then he or she may not be able to continue with production in the future. If the society which is supposed to uplift the creator is the same one stealing from him or her, then it will not be possible for career growth and development to take place. It is the society that can permit any single individual to pursue and excel in a career or backtrack altogether. There is no single person who can claim success in life entirely out of one’s effort. The input of society matters a lot. Our personal abilities can either be enhanced or demoted by others.

On the other hand, some believe that acquisition and ownership of what is termed as private property is the root cause of societal conflicts. To them, private property ownership criteria ought to be abolished. This is the same ideology pursued during the era of communism which resulted in multiple conflicts. The spread of communism instilled so much fear in people because it was accompanied by threats.

Intellectual property rights aim at protecting trademarks, software data, and copyrights (Stamatellos 42). These rights are rarely upheld bearing in mind that a variety of ways can be used to acquire data illegally. For instance, some users might modify, transfer or store information in a retrieval system without prior written permission to the owner. Duplication of compact discs containing music or video files amounts to an intellectual rights violation. Rogerson and Bynum observe that as society is focusing on the huge benefits accrued from information Technology, the moral aspect of this development may be forgotten (143). Upon deeper reflection, the authors assert that lack of proper morality and the “condemnation of an immoral act” has been missing in the protection of intellectual property. Most important issues on the moral aspect of communication technology do not receive headlines. As much as we use and appreciate technology, protecting its integrity and creators in this field is imperative.

Spinello and Tavani (247) also elicit a different reaction that there may be more future failure of intellectual property protection due to revolution of the cyberspace or information superhighway. The views portrayed in copyright protection might be modified due to the very existence of the internet. Plenty of what we said to be “free” information on the internet is not actually free because it actually cost an intellectual mind resource to develop it. Even with information sharing on the internet, there are still certain restrictions and quantity limits of how much can be downloaded “freely” on the net (Spinello & Tavani 248). Those who predict that we are approaching the age of free information with the internet revolution might as well be misguided. What is really there is easy access to information which must be paid for. Moreover, information accessibility in the net is limited; not everything is in cyberspace. Besides, not all data on the net is suitable and authenticated for use.

Conclusion

The ethical issues surrounding intellectual property alongside piracy of software programs, illegal copying of music and video file among others need proper redress. Society is very instrumental in rewarding the mental abilities of individuals. Unfortunately, a lack of morals in the acquisition, sharing, and distribution of useful computer data in this information age has jeopardized the industry because intellectuals are losing morale to pursue their careers. Their private property has been robbed and they cannot have further input into this noble pursuit.

Works Cited

Bynum Terrell Ward and Rogerson Simon. Computer ethics and professional responsibility. MA USA. Blackwell Publishing Ltd. 2004.Print

Spinello A. Richard and Tavani T. Herman (Eds.). Readings in cyber ethics 2nd Ed. Mississauga Canada. Jones & Bartlett Publishers. 2004. Print

Stamatellos, Giannis. Computer Ethics: A Global Perspective Athens. Athens Joanes and Bartlet publishers 2007.Print

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2021, December 11). Using Results of Someone Else's Intellectual Property. https://ivypanda.com/essays/using-results-of-someone-elses-intellectual-property/

Work Cited

"Using Results of Someone Else's Intellectual Property." IvyPanda, 11 Dec. 2021, ivypanda.com/essays/using-results-of-someone-elses-intellectual-property/.

References

IvyPanda. (2021) 'Using Results of Someone Else's Intellectual Property'. 11 December.

References

IvyPanda. 2021. "Using Results of Someone Else's Intellectual Property." December 11, 2021. https://ivypanda.com/essays/using-results-of-someone-elses-intellectual-property/.

1. IvyPanda. "Using Results of Someone Else's Intellectual Property." December 11, 2021. https://ivypanda.com/essays/using-results-of-someone-elses-intellectual-property/.


Bibliography


IvyPanda. "Using Results of Someone Else's Intellectual Property." December 11, 2021. https://ivypanda.com/essays/using-results-of-someone-elses-intellectual-property/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1