skip to main content
article

A justification for software rights

Published:01 September 2006Publication History
Skip Abstract Section

Abstract

It has been debated whether unauthorized copying of computer software is morally justified and whether developers or software companies can own software and require users to pay for its use. Four views in favour of unauthorized copying of software can be distinguished: 'free software' (Stallman), the landlord analogy (Nissenbaum), the 'non-exclusiveness argument' (Weckert, Ladd) and 'it is justified to copy a program that we would never buy' (Weckert). Considerations regarding these issues can be retraced to the three foundations of rights: inherited rights that are already in place, agreed rights, and no rights. From the viewpoint of agreed rights, rights are based on agreement and negotiation, and, referring to the universalizability theses by Rawls and Hare, I argue that it is justified that developers or software companies 'own' their software. I discuss the economic and social effects of free SW, understood as the abolition of financial acknowledgements, suggested by Stallman. I conclude that such free (noncommercial) software would give rise to socio-political changes toward systems that are something other than liberal-based (e.g., socialism). Again, I argue that we have a reason to object to Stallman's program in the light of the universalizability theses. Nevertheless, even if one were to perceive this as a convincing goal, it is questionable whether one should make unauthorized copies on these grounds in a society that does not function on such lines: one should first seek to change the norms and practices of one's society. This is further argued to be advisable, since it is not obvious that adhering to software copyright in the general sense is unfair or irrelevant. For these reasons, we should take violation of the laws governing software copying seriously. Finally, I criticize the non-exclusiveness argument, the landlord analogy and the view that 'is it justified to copy a program that we would never buy'.

References

  1. Airaksinen, T. (1987) Moraalifilosofia, WSOY, Finland.Google ScholarGoogle Scholar
  2. Floridi, L. (1999) Information ethics: On the philosophical foundation of computer ethics. Ethics and Information Technology. 1 (1): 37--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Gattiker, U. E. & Kelley, H. (1999) Morality and computers: Attitudes and differences in moral judgements. Information Systems Research. 120 (3): 233--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Crow G. B. (1989) Defining educational policy on software usage in light of copyright law. ACM SIGCSE Bulletin, Proceedings of the twentieth SIGCSE technical symposium on Computer science education, 21 (1): 47--51. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Glass, R. S. & Wood, W. A. (1996) Situational determinants of software piracy: an equity theory perspective. Journal of Business Ethics. 15: 1189--98.Google ScholarGoogle ScholarCross RefCross Ref
  6. Gopal, R. D., Sanders L. (1998) International software piracy: Analysis of key issues and impacts. Information Systems Research. 9 (4): 380--97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Hare, R. M. (1981) Moral Thinking: Its Levels, Methods and Point. Oxford University Press, Oxford.Google ScholarGoogle Scholar
  8. Hettinger, E. C. (1989) Justifying Intellectual Property. Philosophy and Public Affairs. 18 (1): 31--52.Google ScholarGoogle Scholar
  9. Jakonen, J. (1999) Luciano Floridin Informaatioetiikka ja sen soveltaminen käytäntöön. Proceedings of The First International Computer Ethics Workshop in Finland (ICEF'99), Eriksson, I., Siponen, M. T and. Vartiainen, T. (eds.), Jyväskylä, Finland, 37--50.Google ScholarGoogle Scholar
  10. Johnson, M. B. (1988) Software Piracy: Stopping It Before It Stops You. ACM-SIGUCCS. 16: 295--9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Johnson, D. G. (2001), Computer Ethics. third edition, Prentice Hall. Upper Saddle River, NJ.Google ScholarGoogle Scholar
  12. Kuflik, A. (1995), Moral Foundations of Intellectual Property Rights. In Computers, Ethics & Social Values. Johnson, D. and Nissenbaum, H. (eds.). Prentice Hall, New Jersey, 169--180.Google ScholarGoogle Scholar
  13. Ladd, J. (1997) Ethics and the computer world: a new challenge for philosophers. ACM Computers & Society. 27 (3): 8--13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Langford, D. (1995) Practical Computer Ethics. McGraw-Hill, Guildford, Surrey, UK. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Marx, K. (1844) Ökonomisch-philosophische Manuskripte. (Economic and Philosophical Manuscripts). Leipzig Reclam 1970.Google ScholarGoogle Scholar
  16. Moor, J. H. (1995) What is Computer Ethics? In Computers, Ethics & Social Values. Johnson, D. and Nissenbaum, H. (eds.). Prentice Hall, New Jersey, 7--15.Google ScholarGoogle Scholar
  17. Rawls, J. A. (1972) A Theory of Justice. Oxford University Press, UK.Google ScholarGoogle Scholar
  18. Rife, R. C. (1994) Software piracy. Proceedings of NORTHCON '94, 364--6.Google ScholarGoogle ScholarCross RefCross Ref
  19. Samuelson, P. (1993) Computer programs and copyright's fair use doctrine. Comm. ACM. 36(9): 19--25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Severson, R. J. (1997) The Principles of Information Ethics. Armonk, NY, M. E. Sharpe. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Siponen, M. T. and Kajava, J. (1998) The Moralistic Dimensions of Unauthorised Copying of Software - Selected Issues. The Fourth International Conference on Ethical Issues of Information Technology (ETHICOMP'98), 25 to 27 March 1998. Rotterdam, Netherlands, 684--92.Google ScholarGoogle Scholar
  22. Siponen, M. T. and Vartiainen, T. (2002) Unauthorized copying of software and levels of moral development: Implications for research and practice. Information Systems Journal. 14 (4): 387--407.Google ScholarGoogle ScholarCross RefCross Ref
  23. Snapper, J. W. (1995) Intellectual Property Protection for Computer Software. In Computers, Ethics & Social Values. Johnson, D. and Nissenbaum, H. (eds.). Prentice Hall, New Jersey, 181--190.Google ScholarGoogle Scholar
  24. Stallman, R., (1995), Why software should be free. In Computers, Ethics & Social Values. Johnson, D. and Nissenbaum, H. (eds.). Prentice Hall, New Jersey, 190--200.Google ScholarGoogle Scholar
  25. Stallman, R., (1997) The GNU Manifesto. In Computers, Ethics and Society. Second Edition, Ermann, M. D., Williams, M. B. and Shauf, M. S (eds.). Oxford University Press, Oxford, 229--39. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Weckert, J. (1997) Intellectual Property Rights and Computer Software. Journal of Business Ethics. 6 (2): 101--9Google ScholarGoogle ScholarCross RefCross Ref
  27. Weckert, J., and Adeney, D. (1997) Computer and Information Ethics. Greenwood Press. Westport, CT and London. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A justification for software rights
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGCAS Computers and Society
      ACM SIGCAS Computers and Society  Volume 36, Issue 3
      Special print issue of ACM SIGCAS Computers and Society: selection of best papers 2004-2006
      September 2006
      51 pages
      ISSN:0095-2737
      DOI:10.1145/1195716
      Issue’s Table of Contents

      Copyright © 2006 Author

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 September 2006

      Check for updates

      Qualifiers

      • article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader