ETHC303 Full Summary

Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

Chapter 1

Computer ethics: the moral, legal, social issues involving cybertechnology


Cybertechnology: range of computers and communications devices from standalone to
networks
Cyberethics: (more accurate than computer ethics) ethics with use of computers
Ethics: study of morality

Are cyberethics issues unique?


There are two points of view
1- traditionalists 2-uniqueness

Morality: system of rules that guide human conduct. There are two types, directives (micro)for
individuals and social policies for society (macro) and the principles that evaluate the rules

Principles: standards to justify the rules

Components of a moral system:


1- grounds for justifying moral principles
1- religion
2- philosophy
3- law
2- moral principles and rules
1- principles of evaluation
2- rules of moral conduct
3- source of moral rules
1- core values

why do we engage in philosophical/ ethical analysis

1- to critically evaluate programs 2- to support a position or a claim

3- to convince someone to adopt or reject 4- provide consistencies and logic for our
a certain position beliefs

5- to engage in meaningful dialogue

What ethical theories have in common

1- they identify what it means to do the 2- they assume people have free will to
right thing make their own rational decisions
3- their goal is to contribute to the well- 4- they distinguish
being of society obligations& responsibilities vs choice
and personal preference
Goals of ethical principles:

1- beneficence: to do what is right and good


2- least harm: deals with situations where no choice is beneficial so you seek the choice
with least harm
3- respect for autonomy: should allow people to make decisions that applies for their
lives
4- justice: should make fair decisions for everyone involved

chapter 2
pov of the world:
1- selfish
2- ethical: respect others and their core values

society: people organized under a system of rules


rules: advance the good members over time
morality: society’s rule of conduct, what people do and don’t do in situations
ethics:
- examines morality and peoples behavior
- Rational
- Systematic analysis
- Answers need explanations: facts, shared value, logic
- Voluntary
- Moral choice

Workable ethical theory produces what?


Explanations that might be persuasive to a skeptical yet open mined audience

Ethical theories:
1- Subjective Relativism
Relativism: no norm of right or wrong
Subjective relativism: each person decides what’s right and wrong

The case for subjective relativism:


1. Good intelligent people can disagree on moral issues
2. Ethical debates are subjective and pointless
The case against subjective relativism:
1. Blurs the lines between what you think is right and what you want to do
2. Makes no moral distinction between the actions of different people
3. Decisions may not be reasonable
4. Not a workable theory
2- Divine Command Theory

The case for divine command theory:


1. We owe obedience to our creator
2. God is all good and all knowing
3. God is the ultimate authority

3- Ethical Egoism
The morally right action is the action that provides self with maximum long term benefit

The case for ethical egoism:


1. Practical since we always want the best for ourselves
2. The community can benefit if we put our well being first
3. Other moral principals also put self interest first

The case against ethical egoism:


1. Not true that we always want the best for ourselves
2. Social injustices can occur
3. Other moral principles are superior to principle of self interest
4. Ethical egoism is a form of division

4- Duty-based(Kantianism/Deontology)
Created by Immanuel Kant
Said that having a good will give a reason to do the right thing

1st formulation: act only from moral rules you want to be universal

“if you do it everyone should do it. its not fair to make an exception to yourself’’

Examples:

- you forgot your wallet and you’re hungry so you steal and if you approve of stealing
whether you admit it or not then what you’re doing is universalizing your action. You’re
saying everyone should steal

2nd formulation: act so you treat humanity and yourself as an end and never a
mean to an end
“Don’t use people to achieve stuff if they don’t consent to that”
“don’t manipulate people to purely use them”
The case for katanism:
1. rational
2. produces moral guidelines
3. treats people as moral equals
4. workable

the case against katanism:


1. sometimes no rule can characterize an action
2. sometimes there is no way to resolve conflict between rules
- In a conflict between a perfect duty and an imperfect duty, perfect duty prevails
- In a conflict between two perfect duties, no solution
3. katanism allows no acceptation for perfect duties

perfect vs imperfect duties:


perfect duty: duty done without exception
imperfect duty: duty done with exception

5- Act Utilitarianism
By: Jeremy Bentham and john Stuart mill

An action is good if it benefits someone and bad if it harms someone. Morality has nothing to do
with it.
Sum>0 its good
Sum <0 its bad

Utility: produce or prevent happiness from a community

The case for act utilitarianism:


1. Focuses on happiness
2. Practical
3. Comprehensive
4. Workable

The case against act utilitarianism:


1. Unclear whom to include in calculations
2. Too much work
3. Ignores our sense of duty

6- Rule Utilitarianism
We should adopt rules which if followed by everyone will increase overall happiness
Difference between act and rule utilitarianism
Act utilitarianism applies Principle of Utility to individual actions
Rule utilitarianism applies Principle of Utility to moral rules

The case for rule utilitarianism:


1. Easier to perform calculations compared to act utilitarianism
2. Not every moral decision requires performing utilitarian calculus
3. Moral rules survive exceptional situations
4. Workable

The case against rule utilitarianism:


1- All consequences must be measured on a single scale.

2- Utilitarianism ignores the problem of an unjust distribution of good consequences.


• Utilitarianism does not mean “the greatest good of the greatest number” That
requires a principle of justice

7- Contract-based (Social contract theory)


By: Thomas Hobbes

We need rules and rules create morality and rational people accept these rules for their benefit

By: Jean-jerques rousseau

In a perfect society no one is above rules

Case for Social Contract Theory


1. Framed in language of rights
2. Explains why people act in self-interest without common agreement
3. Provides clear analysis of certain citizen/government problems
4. Workable ethical theory

Case Against Social Contract Theory


1. No one signed contract
2. Some actions have multiple characterizations
3. Conflicting rights problem
4. May unjustly treat people who cannot respect contract

8- Principle of justice
By: john rawl

Each person may claim a “fully adequate” number of basic rights and liberties, so long as these
claims are consistent with everyone else having a claim to the same rights and liberties
Any social and economic inequalities must:
• Be associated with positions that everyone has a fair and equal opportunity to
achieve
• Be to the greatest benefit of the least-advantaged members of society (the
difference principle)

Comparing the workable theories:

Chapter 3
Profession: a calling that requires specialized knowledge and academic preparation

Professional code of ethics:

- states the principles and core values to the work of a particular occupational group

- promotes the values of the profession over personal, societal, and sometimes institutional

t/f
- most organizational follow a unified code of ethics
F they usually have an internal code

- Members in an organization share the same human values and social ideals
T

Benefits of professional ethics


1. Essential to profession
2. Ensures quality of treatment of people
3. Provide a guide for dealing with ethical dilemmas in the workplace
4. Not a clear set of rules but a set of statements of professional beliefs they should consider
before making a decision
5. Communicates the ethical viewpoint of the profession to others

Why code of ethics?


1. Promotes moral behavior
2. Acts as a guideline for ethical decision making
3. Enhances reputation of organization
4. Prevents negative legal effects
5. Encourages positive relations
6. Acts as a reference for moral dilemmas
7. Prevents discrimination or harassment

Function of ethic codes?


1. Inspiration
o Serves as an inspiration by identifying values and ideals that professionals should
aspire for
o Helps in ensuring public trust
2. Education
o Serve several educational functions
o Inform and educate new members about the values and standards of a profession
o Inform public policy makers, clients, users, and the general public about the
professions ideals, obligations and responsibilities
3. Guidance
o Ethical values, imperatives, standards of good practices and principles can be
helpful for computer practitioners as they expect as well standard from computing
practitioners

Function of ethics?

1. Accountability
o Can make members of professions accountable to colleges and public
2. Enforcement
o It enables organizations to encourage and enforce standards of good practice and
compliance with norms by identifying ethically unacceptable behavior
3. Tool
o Useful for decisions for computer practitioners

What are the similarities between law and ethics?

Laws: justice-based rulebook, there are consequences to crossing it


Ethics: personal honor code, leads to shame but no legal punishments
Both: are what is right and wrong

What code of ethics is not?


1. Not laws
2. Not complete ethical frameworks or algorithms
They don’t cover every case
3. Not exhaustive checklists

Format of ethics?
1. For different roles: acm
2. For different groups: imis
3. For professional relations: software engineering code of ethics
4. Most straightforward: ieee
5. For leadership: acm, bsc

The fundamental values of Australian computer society ?


1. Be honest and impartial
2. Serve the community loyally
3. Advance human welfare
4. Respect others privacy

The fundamentals for the British computer society?

1. Have regard for public health safety and environment


2. Have regard to the legitimate rights of third parties
3. Conduct your professional activities without discrimination
4. Reject bribery and inducement

Alternative list of Fundamental principles?


1. Be impartial
Personal, organizational, and public goods are equal
2. Disclose information that others need to know
3. Respect others’ rights
4. Treat others justly
5. Take responsibility of actions and inactions
6. Take responsibility for the actions of those you supervise
7. Maintain integrity
Be loyal to your employer while obeying the law and don’t ask someone to do something you
wouldn’t
8. Continually improve abilities
9. Share your knowledge expertise and values
Chapter 4

The key to successful development?


Systems analysis and design

What is the difference between a software engineer and a systems analyst?


Both are technological.
Each requires different skills.
A software engineer: design and code an application
System analyst: design and build the hardware to run the application

Ethical issues in system’s analysis and software engineering


1. Self
2. Profession
3. Society/ public
4. Colleagues
5. Client
6. Employer
7. Product
8. Profession

When is a system safe?


When a system could never produce an output that causes a catastrophe

When does non diligence occur?


When important docs don’t receive full reviews

Which cost of removing the software defect is the most expensive?


Operation

Problems faced by systems analysts and software engineers?

1. software specifications
Most errors are because of requirements shortages
Non-diligence: when important documents are not fully reviewed and failure happens when they
don't evaluate specs carefully or pay attention to staff when they voice concerns
2. Software design
Ie: user interface, designers don’t know everything about all the systems they designed for
instance the it department doesn’t know how to work on edugate without explaining

Solution: communication
3. Extreme pressure
Mea culpa:sorry for that, When a product is released with bugs

Long term impacts of mea culpa:


- Going out of business
- Staff facing civil or criminal penalties
- Bad reputation
- Loss of sales or market shares

4. Use of unauthorized software


a. Examples: open source codes, illegal sw
5. Changes in software
Sometimes changes can cause reductions in reliability so not all change is good

6. Insufficient or incompetent staff


Red lies: when representatives lie about a product to client

7. Not accepting responsibility


Sweep it under the rug: unexpected issues rise that could damage the project or company but is
ignored

Canceled vacation syndrome: when manager pressure staff to cancel plans for the projects

How to avoid such problems?


1. Using software methodology
Standardizing work enables control of the process which leads to high quality software.

Using an effective methodology protect s from legal liability since it reduces errors and follows
methods that are harder to prove
2. Quality assurance
methods within development to guarantee reliability of operation of product

While developing safety critical systems you need?


1. Strict and time consuming development
2. Thorough documentation
3. Vigilant checking and rechecking

Who are software developers working with?


1. System safety engineer, they use a logging and monitoring system to track hazards of
a project from start to finish
2. Hazard log: asses how detected hazards have been dealt with
3. Testing: to decide how much testing is needed
4. Risk analysis: consider what could go wrong and how to deal with it before so that users
are warned
5. redundancy : the software should provide multiple interchangeable softwares who do
the same thing to avoid failure and errors
6. N- programming: minimize errors by independent implementation of the user
requirements n times
Ie: different versions of software run in parallel and if outputs vary a voting algorithm is
used to determine which result to use

Multiple software are unlikely to fail at the same time under the same conditions

Do students underestimate ethics?


yes

SA or SE are required to keep?

1. Confidentiality of employee data


2. Confidentiality of corporate information

Sources of ethical guidance?


Deontological approach
The sources of rules to professional guidance?
1. Professional bodies: promotes ethics practice and conduct among members
2. IS methodology: provide a framework for SA’s. can be used to analyze ethics
It system admins: The person who is responsible for setting up and maintaining the system or
server is called the system administrator.
3. Deontological approach

The system administrator is responsible for following things:


1. User administration (setup and maintaining account)
2. Monitor system performance
3. Install software and update systems.
4. Monitor network communication
5. Setup and implement security policies including backup and recovery policies for users.
A sysadmin must have a strong grasp of computer security (e.g. firewalls and intrusion
detection systems)
6. Responsible for Password and identity management
7. Manage cloud infrastructure such as AWS(Amazon Web Services)etc.

What is so special aboutSystem Administrator’saccount?


SA and other privileged user access to confidential information
◦databases
◦usernames/passwords
◦e-mail
They have unrestricted access to the root account of the network system, so he/she can do
anything with the system.
For example, root can remove critical system files.

What is the most essential issue in system and network admins?


Ethics

Ethical issues in network and system admins?

1. Invasion of privacy
A company can make admins monitor browsing and emails and they can feel its unethical if they
don't have any clause in their contracts that allows them to do so

2. Equality in reporting
Admins use their values to decide if the infraction is worthy of report and decide which
employees will get in trouble

3. Sensitive information
They know sensitive information about the company’s business practices. So if they move to
another company they should decide if they can use that know and if they signed any contracts

4. Whistle blowing
They can come across unethical or illegal activities and have to decide to report or not

5. Compromising the security


If a client asks a system admin to cut security for money even though its recommended

6. Consultation fees
Security consultants can exploit companies fear for money

The slippery slope


The ease of doing something that doesn't seem unethical to extremely unethical

How to make use of ethical policies?


Informed consent.
People should know the rules and how the systems will operate

Code of ethics by LOPSA/The LOPSA code deals with?


1. Professionalism
2. Personal integrity
3. Privacy
4. Laws and policies
5. Communication
6. System integrity
7. Education
8. Responsibility to computing community
-
9. Social responsibility
S

10. Ethical responsibility

What should the user's code of conduct cover?


1. Under what circumstances is personal use of the organizations equipment permitted
2. What types of personal use are forbidden
3. What websites are forbidden
4. How do rules change if you're using the equipment at home
5. What are defined as harassing communications

Privileged access code of conduct should cover?


1. Acknowledge users their access comes with responsibility
2. Imitations about the work to be done under that access
3. Companies know mistakes can happen and could minimize them through
a. Backups
b. Retain software sources

What is information security affected by?


1. Technology
2. Organization
3. Employees

When should employees be security conscious?


All times

Terms:
Ethical behavior: how an individual or an organization ensures that all decisions, actions and
stakeholder’s interactions conform to the individuals organizations moral and professional
principles

Chapter 5

Why is social engineering easy?


1. You don't need technical skills for acquiring the information
2. Its easier to exploit peoples natural inclinations to trust then learning to hack
How is social engineering dangerous?
1. Possible identity theft
2. Possible data theft
3. Possible corruption of data
4. Possible unplanned system downtime
5. Possible physical security threat

Advantages of learning social engineering?


1. Prevents unauthorized access
2. Prevents possible information theft
3. Prevents possible identity theft
4. Prevents downloading malicious software
5. Preserves the integrity of information systems

Common social engineering attacks?


1. Phishing
2. Vishing (phone phishing)
3. Impersonation

Types of phishing?

1. Spear phishing: phishing one person


2. Whaling: phishing an organization

How does phishing from emails occur?


1. Email from a friend that contain a link or a download
2. Urgently ask for your help
3. Ask you to donate

How to protect yourself or organization from phishing?


1. Tearing personal documents
2. Set your social media settings to include only people you know from real life
3. Observe emails well
a. Typos
b. Unofficial looking documents
c. False urls

How to protect yourself from vishing?


1. Never answer a call from an unknown number
2. If you answer don't give personal information
3. Use caller id
4. Don't trust caller id
5. Treat vishings as if they are smishing

How does smshing happen?


They obtain data through the dark web following a data breach

How do you protect yourself from smshing?


Conduct simulated attacks

Types of impersonating attacks?


1. Delivery person
2. Tech support

Common social engineering attacks?


1. Dumpster diving or trashing
Where to find the data in dumpster diving?
1. Organizational charts contain information about people in a position of authority
2. Memos
3. Policy manuals
4. Calendar
5. System manuals
6. Technical information
7. Outdated hardware

How to avoid social engineering frauds?


1. Secure computers
2. Set spam filter to high
3. Beware of downloads
4. Delete any request for financial information or passwords
5. Slow down
6. Research the facts
7. Delete any request for help to or offers for help
/

8. Stay in control and search for a website through a web engine dont click on hyperlinks
9. Email hijacking is rampant
10. Foreign offers are fake

Terms:
Phishing: obtaining personal information such as credit card numbers through fraudulent emails
to look authentic
spear phishing: targeted attack on a specific individual
Whaling: targeting people within an organization
Phishing test: allows you to find if your team is vulnerable to attack before they happen and
take the proper measures
Vishing: phishing on the phone
Smshing: the act of using mobile text messages to lure victims into immediate action such as
downloading malware
Impersonation: pretexting another person with the goal of obtaining information or access to a
person, company, or a system
Dumpster diving: a huge amount of information collected through company dumpsters
Social engineering: manipulating people for information
Chapter 7
Cybercrime: a crime that involves computers

Spamming: sending unsolicited emails

Cyberstalking: harass someone on the internet

Cyberdefamation: slander through social media

Email bombing: sending lots of emails to overflow.

Logic bombing: code in a software to set off malicious function.

Data diddling: unauthorized altering of data and then changing it back when processing is done.

Salami attack: financial crimes. Make modifications in a single case that would go unnoticed
since they’re so small.

Trojans: keyloggers

Web jacking: taking complete control of a website for monetary of political purposes for a
ransom.

Email spoofing: forgery of email hears so that they fake the recipient of that email.
Credit card skimming small device to steal card info in a transaction.

Software piracy: stealing of legally protected software.

Identity theft: imposter gets a hold of key information and use it to impersonate.

Domain name dispute: two domains in the same name to attract people.

Sale of illegal articles: the illegal items on display for sale

Financial crime: money laundering using shell companies.

- Denial of service prevents users from using the system.

Classifications of cybercrime:
1. Individuals
1.1. Email spoofing
1.2. Spamming
1.3. Phishing
1.4. Cyberstalking
1.5. Cyber defamation
1.6. Cyber pornography
2. Property
2.1. Credit card skimming
2.2. Intellectual property crimes
2.3. Software piracy
2.4. Identity theft
2.5. Ddos attack
2.6. Hacking
2.7. Virus
2.8. Cybersquatting
2.9. Copyright infringement
2.10. Ipr violations
3. Government
3.1. Dos attack
3.2. Email bombing
3.3. Logic bombing
3.4. Data diddling
3.5. Sale of illegal articles
3.6. Cyber terrorism
3.7. Cyber warfare
3.8. Pirated software
3.9. Accessing confidential information

Examples of penalties in Saudi:


1. Fine
2. Imprisonment
3. Deprivation of rights
4. Suspension of practicing license

Is shariah the only law in Saudi?


No there are second sources.

Laws of cybercrime in Saudi:

1. Enhancement of IS
2. Protection of rights of computing
3. Protection of public interest, morals, common values
4. Protection of national economy

penalties of cybercrime:

1. Article 3: both 500lk, prison 1 year max


2. Article 4: 3 years in prison or 2 mill or both
Note: this is not enough you
3. Article 5: 4 years in prison, 3 mill or both need to know what crime
4. Article 6: 5 years in prison, 3 mill or both each article covers
5. Article 7: 10 years in prison, 5 mill or both
6. Article 8: 50% or more in damage fees

Chapter 6
Copyright term: laws guarantee copyright for an amount of time

Wipo: world intellectual property rights, a UN agency, which provides protection over digital
media

Patents: strongest protection for software since the inventor has monopoly over the use of that
invention

Plagiarism: stealing and someone’s ideas or works

Plagiarism detection systems: check submitted material against databased of electronic content
Reverse engineering: taking sw or hw apart to understand it, copy it, improve it

Complier: translator that converts statements to language machine

Software manufacturer: provides sw in machine language

Decompiler: reads machine language, produces source code

Intellectual objects: what intellectual property consists of, intangible objects that represent ones
ideas or works

Elements in a property:
1. Individual
2. Object
3. Relation to individual

Intellectual property is protected through?


Copyright, patents, trade secret laws

Features of intellectual objects:


1. Scarcity: a need doesn’t need to exist it can be products
2. Legal claim: idea claim differs from object claim.

Why protect intellectual objects?

1. Anglo-American law
Rationale is a type of natural right that should be granted to individuals since they require
thinking and work.

2. Property rights aren’t natural rights, but social constructs designed to


motivate individuals to give to society
3. Utilitarianism
Grant property rights in limited monopiles to result in financial advantages for them
4. Personality theory
Popular in Europe, creative works represent personalities of their inventors who should
determine how its spread

- hardware have patent rights and intellectual property rights thus SW’s should also have it

software issues levels:

1. macro
whether or not software should be protected by private property
2. micro
whether or not an individual can make an illegal copy of SW

ethical problems in IT companies with respect to software:

1. protecting computer is difficult since it’s not categorized under the


2. software has been treated as an expression of idea which can be protected under the law.
3. software has been treated as a process for changing internal computer which can be
protected under the law.
4. software is a series of mental streps which can’t be protected under the law.

What are the laws for intellectual property rights?

1. Copyright laws
Protects authored works such as software, art etc.
2. Patent laws
Protects inventions.
3. Trade secret law
Helps safeguard information to an organization success.

- Others can’t distribute copyrighted sw without permission from the owner

Copyright grants creators of original works the exclusive right to:


- Distribute
- Display
- Perform
- Reproduce original work in copies.
- Prepare derivative works based upon work
- Author may grant exclusive right to others

Types of work that can be copyrighted:


1. Architecture
2. Art
3. Audiovisual works
4. Choreography
5. Drama
6. Graphics
7. Literature
8. Motion pictures
9. Music
10. Dramas
11. Pictures
12. Sculptures
13. Sound recordings

Goals of patents:
1. Foster invention
2. Promote disclosure of inventions
3. Assure ideas in the public domain are free use

Results of patents:
1. Improve the economy
2. Increase the employment
3. Make lives better

Patent holders rights:


1. Can make others not use it
2. Can make others not use it if they invented the same thing independently without
knowledge of the patent holders invention

Types of patents:
1. Utility patent: granted in terms for 17 years which can be extended for 5
2. Design patent
3. Patent on plants

Lets say I kept my invention a secret then I got fussy when someone else claimed it, do I
have the legal right?
No, patents are recognized when they’re publicized
The patent claim must be:
1. A process, machine, manufacture, composition of matter, new improvement
2. Must be useful
3. Must be novel
4. Must be not obvious to a person having ordinary skill in the same field

Items cannot be patented if they are:


1. Abstract
2. Laws of nature
3. Natural phenomena

Can science stuff be patented?


No since it would inhibit further inventions

How long are the terms of protection in Saudi laws?

1. Patents:20 years
2. Plant varieties: 20 years
3. Industrial designs:10 years
4. Layout designs of circuits: 10 years

When is information considered trade secret?


If a company takes legal steps to hide it

Does trade secret laws protect all kinds of information ?


Just certain info, which helps with one companies edge

How does software become a trade secret?


Through NDAs

Is trade secret adequate for protecting software?


No since its not a uniformed law and these laws aren’t for IT

Which law in Saudi protects trade secret?


Trade secret statute

Advantages of trade secrets over patents:


1. No time limit.
2. No application filling.
3. Patents can be invalid for some time
4. No application filling fees.

Are trade secret laws universal?


no
what’s the greatest threat to trade secrets?
Employees

Issues that apply to intellectual property rights in it:


1. Plagiarism
2. Reverse engineering
3. Open source code
4. Trademark infringement
5. Cybersquatting

Examples of reverse engineering:


1. Convert an app for one vendor to another
2. Convert code to high-level design

Is reverse engineering legal?


Yes but unethical, and sw licenses forbid it

Chapter 6.2
Copy protection systems: They vary in features, and one widely used to be Software Passport
(previously known as Armadillo). These cost something, but they’ll save time, nerves, and
money in a long run. If you choose to use this kind of anti-piracy options

Demo and Full versions: Simply create separate versions of your product. Your demo version
might contain only 30% of the assets, and when people purchase the full version, you can give
them the full 100% of the elements. It’s very practical and inexpensive way to copy protect your
program.

Online Registration: If you have features that require Internet, you can use online copy
protection for your product.
Discount / Lower prices: Some people say that this might help getting rid of some pirates. The
problem with this approach is naturally that when you lower your price, you get less profits per
sale. Then the problem continues: lowering your product price doesn’t not necessarily lead to
increased sales.

Give for Free: Some people have done radical moves and are giving their product for free.
These guys might use advertising to generate income while providing their product for no cost.

Legal Action: If your product ends up hacked and into some illegal site, contact the internet
service provider and legal authorities. You should threaten the pirates if it is possible with a law
suit. As a last resort you should go for a legal action.

T or f
- Culture plays a factor in piracy.
T

Efforts in protecting copy rights:


1. Diskettes
2. Dongles
3. Protected media
4. Drm
Can we stop piracy?
No but we can prevent it

Ways to stop piracy:


1. Discounts
2. Copy protection systems
3. Demo and full versions
4. Online registration
5. Give for free
6. Keep source code
7. Legal actions

You might also like