Using Results of Someone Else’s Intellectual Property Essay

Exclusively available on IvyPanda Available only on IvyPanda

Introduction

Human beings are naturally endowed with much intellectual ability. For this reason, man has been and will continue to be very creative in his endeavors. A lot has been advanced by man both in the field of technology and the physical environment. The intellect required to perfect technology cannot be touched because it requires the use of the mind. Therefore, it is a private entity of the mind best referred to as intellectual property. The physical ownership of property or tangible objects has well-structured protection by the law all over the world. However, the legislation governing intellectual property has never been thorough and well defined. Moreover, keeping track of intellectual theft is equally a glaring challenge to law enforcers today. Software products used in computers alongside other digitized materials are currently facing this violation. This is an ethics essay paper attempting to strongly oppose intellectual property theft and violations.

We will write a custom essay on your topic a custom Essay on Using Results of Someone Else’s Intellectual Property
808 writers online

Ethics in Computing

The transformation in information technology has led to the emergence of new forms of violations related to computers. There is a need for ethical issues to be addressed decisively just like the concern put in the protection of tangible property. Stamatellos describes the origin of computer ethics “from the work of MIT Professor Norbert Wiener, who first foresaw…ethical consequences of information technology” (2). Ethics in this case refer to the basic rules and standards of conduct that are supposed to be upheld by all computer users in regard to intellectual property.

Several ethical issues have developed with time. Stamatellos further notes that the critical part in this violation is software (39). Computer users have access to digital machines with high copying ability. The copied materials can also be shared among several people within a short time. This has automatically led to thousands of computer users owning software that was not rightfully acquired. Even with technological advancement, users should not take the simple advantage to acquire software programs illegally. It is very similar to getting access to a physical item from an owner without incurring the right cost. There are millions of illegally copied data in circulation today. We could imagine one major repercussion it has to the original owners of these materials. It is synonymous with robbery without violence.

Consider the other side of the argument. A computer user owns both the device and data inside it. If you can reveal to your pals the costly and lovely French wristwatch you acquired legally, why should you not be proud enough to show them that DVD music you lawfully possess? Why is there some explicit fear to use your component publicly? Information ownership logistics is rather different from other forms of ownership (Stamatellos 40). It is not easy to identify a user who breaks into a computer system and unlawfully copies some files for personal use. Moreover, even after copying, the original file remains intact with no damage whatsoever. This is one argument used by those who violate copyright laws. Although the initial information or data is not damaged, the underlying issue has to do with theft. The owner of this information does not get the desired returns from his intellectual work.

A lot of debate has been surrounding the definition of private property which in this case is not tangible. How can the mental property be classified to belong to the owner alone or everyone? Are there controls that can be instituted to protect private intellectual property? How far is the use of private mental property considered a violation? These are some of the questions and concerns which may not have been sufficiently addressed in the past when dealing with intellectual property conflict.

There are several reasons why the private property should be protected at all costs. Just like any other piece of work, the producer needs to be rewarded. If this does not happen, then he or she may not be able to continue with production in the future. If the society which is supposed to uplift the creator is the same one stealing from him or her, then it will not be possible for career growth and development to take place. It is the society that can permit any single individual to pursue and excel in a career or backtrack altogether. There is no single person who can claim success in life entirely out of one’s effort. The input of society matters a lot. Our personal abilities can either be enhanced or demoted by others.

On the other hand, some believe that acquisition and ownership of what is termed as private property is the root cause of societal conflicts. To them, private property ownership criteria ought to be abolished. This is the same ideology pursued during the era of communism which resulted in multiple conflicts. The spread of communism instilled so much fear in people because it was accompanied by threats.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Intellectual property rights aim at protecting trademarks, software data, and copyrights (Stamatellos 42). These rights are rarely upheld bearing in mind that a variety of ways can be used to acquire data illegally. For instance, some users might modify, transfer or store information in a retrieval system without prior written permission to the owner. Duplication of compact discs containing music or video files amounts to an intellectual rights violation. Rogerson and Bynum observe that as society is focusing on the huge benefits accrued from information Technology, the moral aspect of this development may be forgotten (143). Upon deeper reflection, the authors assert that lack of proper morality and the “condemnation of an immoral act” has been missing in the protection of intellectual property. Most important issues on the moral aspect of communication technology do not receive headlines. As much as we use and appreciate technology, protecting its integrity and creators in this field is imperative.

Spinello and Tavani (247) also elicit a different reaction that there may be more future failure of intellectual property protection due to revolution of the cyberspace or information superhighway. The views portrayed in copyright protection might be modified due to the very existence of the internet. Plenty of what we said to be “free” information on the internet is not actually free because it actually cost an intellectual mind resource to develop it. Even with information sharing on the internet, there are still certain restrictions and quantity limits of how much can be downloaded “freely” on the net (Spinello & Tavani 248). Those who predict that we are approaching the age of free information with the internet revolution might as well be misguided. What is really there is easy access to information which must be paid for. Moreover, information accessibility in the net is limited; not everything is in cyberspace. Besides, not all data on the net is suitable and authenticated for use.

Conclusion

The ethical issues surrounding intellectual property alongside piracy of software programs, illegal copying of music and video file among others need proper redress. Society is very instrumental in rewarding the mental abilities of individuals. Unfortunately, a lack of morals in the acquisition, sharing, and distribution of useful computer data in this information age has jeopardized the industry because intellectuals are losing morale to pursue their careers. Their private property has been robbed and they cannot have further input into this noble pursuit.

Works Cited

Bynum Terrell Ward and Rogerson Simon. Computer ethics and professional responsibility. MA USA. Blackwell Publishing Ltd. 2004.Print

Spinello A. Richard and Tavani T. Herman (Eds.). Readings in cyber ethics 2nd Ed. Mississauga Canada. Jones & Bartlett Publishers. 2004. Print

Stamatellos, Giannis. Computer Ethics: A Global Perspective Athens. Athens Joanes and Bartlet publishers 2007.Print

Print
Need an custom research paper on Using Results of Someone Else’s Intellectual Property written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2021, December 11). Using Results of Someone Else's Intellectual Property. https://ivypanda.com/essays/using-results-of-someone-elses-intellectual-property/

Work Cited

"Using Results of Someone Else's Intellectual Property." IvyPanda, 11 Dec. 2021, ivypanda.com/essays/using-results-of-someone-elses-intellectual-property/.

References

IvyPanda. (2021) 'Using Results of Someone Else's Intellectual Property'. 11 December.

References

IvyPanda. 2021. "Using Results of Someone Else's Intellectual Property." December 11, 2021. https://ivypanda.com/essays/using-results-of-someone-elses-intellectual-property/.

1. IvyPanda. "Using Results of Someone Else's Intellectual Property." December 11, 2021. https://ivypanda.com/essays/using-results-of-someone-elses-intellectual-property/.


Bibliography


IvyPanda. "Using Results of Someone Else's Intellectual Property." December 11, 2021. https://ivypanda.com/essays/using-results-of-someone-elses-intellectual-property/.

Powered by CiteTotal, the best citation generator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1