Results for ' software copyright'

986 found
Order:
  1.  11
    Ideas, expressions, universals, and particulars: Metaphysics in the realm of software copyright law.Thomas M. Powers - 2004 - In H. Tavani & R. Spinello (eds.), Intellectual Property Rights in a Networked World. Idea Group.
    in Intellectual Property Rights in a Networked World, eds. H. Tavani and R. Spinello, 2004.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  2. Copyright or copyleft?: An analysis of property regimes for software development.Paul B. de Laat - 2005 - Research Policy 34 (10):1511-1532.
    Two property regimes for software development may be distinguished. Within corporations, on the one hand, a Private Regime obtains which excludes all outsiders from access to a firm's software assets. It is shown how the protective instruments of secrecy and both copyright and patent have been strengthened considerably during the last two decades. On the other, a Public Regime among hackers may be distinguished, initiated by individuals, organizations or firms, in which source code is freely exchanged. It (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3.  17
    Free software and copyright enforcement: A tool for global copyright policy?Ville Oksanen & Mikko Välimäki - 2006 - Knowledge, Technology & Policy 18 (4):101-112.
    One of the paradoxes of the free software ideology is its reliance on the legal institutions it was created to object to. One could argue that Free Software Foundation is using copyright to enforce their free software licenses as aggressively as the Business Software Alliance is enforcing its clients’ copyrights. We will show that the reality is more complex and that there is a significant difference: the free software community uses primarily non-legal enforcement methods (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  48
    Software Piracy in Research: A Moral Analysis.Gary Santillanes & Ryan Marshall Felder - 2015 - Science and Engineering Ethics 21 (4):967-977.
    Researchers in virtually every discipline rely on sophisticated proprietary software for their work. However, some researchers are unable to afford the licenses and instead procure the software illegally. We discuss the prohibition of software piracy by intellectual property laws, and argue that the moral basis for the copyright law offers the possibility of cases where software piracy may be morally justified. The ethics codes that scientific institutions abide by are informed by a rule-consequentialist logic: by (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  5.  99
    Software piracy: Is it related to level of moral judgment?Jeanne M. Logsdon, Judith Kenner Thompson & Richard A. Reid - 1994 - Journal of Business Ethics 13 (11):849 - 857.
    The possible relationship between widespread unauthorized copying of microcomputer software (also known as software piracy) and level of moral judgment is examined through analysis of over 350 survey questionnaires that included the Defining Issues Test as a measure of moral development. It is hypothesized that the higher one''s level of moral judgment, the less likely that one will approve of or engage in unauthorized copying. Analysis of the data indicate a high level of tolerance toward unauthorized copying and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   31 citations  
  6.  10
    Free Software and non-exclusive individual rights.Tercio Sampaio Ferraz Junior & Juliano Souza de Albuquerque Maranhão - 2008 - Archiv für Rechts- und Sozialphilosophie 94 (2):237-252.
    Free software introduces a challenge to the classical conception of individual rights. The model of software licensing given by the General Public License generates the question whether it constitutes an exercise or a wavering of copyright. It is argued in this paper that the later alternative is entrenched in the classical concept of freedom as autonomy, which, by its turn, is reflected in a classical conception of individual rights based on the model of propriety as a dominion (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  11
    Is Copyright Property? -- The Debate in Jewish Law.David Nimmer & Neil W. Netanel - 2011 - Theoretical Inquiries in Law 12 (1):241-274.
    Is copyright a property right? Common law and civil law jurists have debated that issue for over three centuries. It remains at the heart of battles over copyright’s scope and duration today, even if its import lies principally in the rhetorical force of labeling a right as "property," not in any doctrinal consequence flowing directly from that label. In parallel to their common law and civil law counterparts, presentday rabbinic jurists engage in lively debate about whether Jewish law (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  8. Bust a Geek From “Reason Express”(24 July 2001), written by Jeff Taylor drawing on the resources of “Reason” magazine. Reprinted with permission. Software maker Adobe is moving to explain exactly why it let loose the FBI and the Digital Millennium Copyright Act (DMCA) on a Russian pro. [REVIEW]Richard Koman - 2001 - Knowledge, Technology & Policy 14 (1):6-33.
    No categories
     
    Export citation  
     
    Bookmark  
  9.  50
    Unauthorized copying of software: an empirical study of reasons for and against.Mikko T. Siponen & Tero Vartiainen - 2007 - Acm Sigcas Computers and Society 37 (1):30-43.
    Computer users copy computer software - this is well-known. However, less well-known are the reasons why some computer users choose to make unauthorized copies of computer software. Furthermore, the relationship linking the theory and the practice is unknown, i.e., how the attitudes of ordinary end-users correspond with the theoretical views of computer ethics scholars. In order to fill this gap in the literature, we investigated the moral attitudes of 249 Finnish computing students towards the unauthorized copying of computer (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  10.  43
    An Exploration of the Ideologies of Software Intellectual Property: The Impact on Ethical Decision Making.Matthew K. McGowan, Paul Stephens & Dexter Gruber - 2007 - Journal of Business Ethics 73 (4):409-424.
    This article helps to clarify and articulate the ideological, legal, and ethical attitudes regarding software as intellectual property (IP). Computer software can be viewed as IP from both ethical and legal perspectives. The size and growth of the software industry suggest that large profits are possible through the development and sale of software. The rapid growth of the open source movement, fueled by the development of the Linux operating system, suggests another model is possible. The large (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  30
    Interaction effects in software piracy.Eric Kin-wai Lau - 2007 - Business Ethics, the Environment and Responsibility 16 (1):34-47.
    The paper presents an exploratory attempt to analyse self‐reported leniency toward software piracy systematically, using an approach based on empirical factors, rather than ethical factors. The empirical factors studied were: social acceptance of software piracy; the cost of original software; urgency of the subject's need for software; availability of original software; knowledge of computer software copyright law; gender; monthly household income; and education level. It provides new insights to software companies and government (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  12.  20
    Interaction effects in software piracy.Eric Kin-wai Lau - 2007 - Business Ethics: A European Review 16 (1):34-47.
    The paper presents an exploratory attempt to analyse self‐reported leniency toward software piracy systematically, using an approach based on empirical factors, rather than ethical factors. The empirical factors studied were: (i) social acceptance of software piracy; (ii) the cost of original software; (iii) urgency of the subject's need for software; (iv) availability of original software; (v) knowledge of computer software copyright law; (vi) gender; (vii) monthly household income; and (viii) education level. It provides (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  13.  32
    A justification for software rights.Mikko Siponen - 2006 - Acm Sigcas Computers and Society 36 (3):11-20.
    It has been debated whether unauthorized copying of computer software is morally justified and whether developers or software companies can own software and require users to pay for its use. Four views in favour of unauthorized copying of software can be distinguished: 'free software', the landlord analogy, the 'non-exclusiveness argument' and 'it is justified to copy a program that we would never buy'. Considerations regarding these issues can be retraced to the three foundations of rights: (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  14.  25
    The Ethics of Innovation: p2p Software Developers and Designing Substantial Noninfringing Uses Under the Sony Doctrine.Edward Lee - 2005 - Journal of Business Ethics 62 (2):147-162.
    This essay explores the controversy over peer-to-peer (p2p) software, examining the legal and ethical dimensions of allowing software companies to develop p2p technologies. It argues that, under the Supreme Court’s ruling in the Sony betamax case, technology developers must be accorded the freedom to innovate and develop technologies that are capable of substantial noninfringing uses. This doctrine, known as the Sony doctrine, provides an important safe harbor for technological development, including p2p. The safe harbor, however, does not immunize (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  15. Ethics in information technology and software use.Vincent J. Calluzzo & Charles J. Cante - 2004 - Journal of Business Ethics 51 (3):301-312.
    The emerging concern about software piracy and illegal or unauthorized use of information technology and software has been evident in the media and open literature for the last few years. In the course of conducting their academic assignments, the authors began to compare observations from classroom experiences related to ethics in the use of software and information technology and systems. Qualitatively and anecdotally, it appeared that many if not most, students had misconceptions about what represented ethical and (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  16. Microsoft on copyright: An ethical analysis.James Wilson - unknown
    “This chapter looks at four arguments which Microsoft has used to justify the claim that illegal copying of software is wrong: software piracy is theft; software piracy violates the rights of copyright holders; software piracy is free riding; and software piracy reduces incentives to future innovation. It argues that the first argument is simply wrong, and the other three do not establish that it is in fact wrong to pirate Microsoft’s programs.
     
    Export citation  
     
    Bookmark   1 citation  
  17.  89
    Trends and patterns among online software pirates.Sameer Hinduja - 2003 - Ethics and Information Technology 5 (1):49-61.
    Computer crime on the Internet poses asignificant threat to the well-being ofbusinesses and individuals, and none are immunefrom the repercussions that can result. Onetype of this unethical and unlawful activity isonline software piracy. In this work, thesignificance of piracy as a topic for academicinquiry is first presented, followed by asummary of the conflicting stances on thisissue. Then, a review of scholarly literaturepreviously conducted in this area is given toprovide a backdrop for the current research. Univariate and bivariate findings from (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  18. Factors that Influence the Intention to Pirate Software and Media.Timothy Paul Cronan & Sulaiman Al-Rafee - 2008 - Journal of Business Ethics 78 (4):527-545.
    This study focuses on one of the newer forms of software piracy, known as digital piracy, and uses the Theory of Planned Behavior (TPB) as a framework to attempt to determine factors that influence digital piracy (the illegal copying/downloading of copyrighted software and media files). This study examines factors, which could determine an individual’s intention to pirate digital material (software, media, etc.). Past piracy behavior and moral obligation, in addition to the prevailing theories of behavior (Theory of (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   34 citations  
  19.  11
    Ethical and Legal Aspects of Computing: A Professional Perspective from Software Engineering.Gerard O'Regan - 2024 - Springer Nature Switzerland.
    This textbook presents an overview of the critically important ethical and legal issues that arise in the computing field and provides a professional perspective from software engineering. The author gained exposure to these aspects of computing while working as a software engineer at Motorola in Ireland, where he coordinated the patent programme and worked with several software suppliers. Topics and features: Presents a broad overview of ethics and the law Includes key learning topics, summaries, and review questions (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  72
    The relevance of software rights: An anthology of the divergence of sociopolitical doctrines. [REVIEW]Mikko Siponen - 2001 - AI and Society 15 (1-2):128-148.
    The relevance of different concepts of computer software (henceforth SW) rights is analysed from the viewpoint of divergent sociopolitical doctrines. The question of software rights is considered from the ontological assumptions, on one extreme, to the relevance of current practical applications of SW rights (such as copyright and patent), on the other extreme. It will be argued (from a non-descriptive/non-cognitive account) that the current expression of SW rights in Western societies (namely copyright, excluding patent) can be (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21. Winny and the Pirate Bay: A comparative analysis of P2P software usage in Japan and Sweden from a socio-cultural perspective.Kenya Murayama, Thomas Taro Lennerfors & Kiyoshi Murata - 2010 - International Review of Information Ethics 13:10.
    In this paper, we examine the ethico-legal issue of P2P file sharing and copyright infringement in two different countries - Japan and Sweden - to explore the differences in attitude and behaviour towards file sharing from a socio-cultural perspective. We adopt a comparative case study approach focusing on one Japanese case, the Winny case, and a Swedish case, the Pirate Bay case. Whereas similarities in attitudes and behaviour towards file sharing using P2P software between the two countries are (...)
     
    Export citation  
     
    Bookmark  
  22.  23
    Software engineering code of ethics and professional practice: version 4.Corporate Ieee-cs-acm Joint Task Force On Software Engineering Ethics - 1998 - Acm Sigcas Computers and Society 28 (2):29-32.
  23. Internet-Based Commons of Intellectual Resources: An Exploration of their Variety.Paul B. de Laat - 2006 - In Jacques Berleur, Markku I. Nurminen & John Impagliazzo (eds.), IFIP; Social Informatics: An Information Society for All? In Remembrance of Rob Kling Vol 223. Springer.
    During the two last decades, speeded up by the development of the Internet, several types of commons have been opened up for intellectual resources. In this article their variety is being explored as to the kind of resources and the type of regulation involved. The open source software movement initiated the phenomenon, by creating a copyright-based commons of source code that can be labelled `dynamic': allowing both use and modification of resources. Additionally, such a commons may be either (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  46
    Geography and computer ethics: An Eastern European perspective. [REVIEW]Dr Andrzej Kocikowski - 1996 - Science and Engineering Ethics 2 (2):201-210.
    Several context-specific social and political factors in Eastern and Central Europe are described — factors that must be considered while developing strategies to introduce Computer Ethics. Poland is used as a primary example. GNP per capita, the cost of hardware and software, uneven and scant distribution of computing resources, and attitudes toward work and authority are discussed. Such “geographical factors” must be taken into account as the new field of Computer Ethics develops.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  25.  34
    Returning students' right to access, choice and notice: a proposed code of ethics for instructors using Turnitin. [REVIEW]Bastiaan Vanacker - 2011 - Ethics and Information Technology 13 (4):327-338.
    This paper identifies the ethical issues associated with college instructors’ use of plagiarism detection software (PDS), specifically the Turnitin program. It addresses the pros and cons of using such software in higher education, arguing that its use is justified on the basis that it increases institutional trust, and demonstrating that two common criticisms of such software are not universally valid. An analysis of the legal issues surrounding Turnitin, however, indicates that the way it is designed and operates (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  21
    Is the party over? Innovation and music on the web.A. M. Coles, Lisa Harris & R. Davis - 2004 - Journal of Information, Communication and Ethics in Society 2 (1):21-29.
    This paper examines the current position of copyright for the music industry in the light of innovation and diffusion of technologies which enable audio file sharing amongst web users. We note that there currently appears to be conflicting assessments between the major corporations and the many small firms in Europe with regard to the business potential for online music. In particular, we show that the convergence of technologies together with the emergence of particular practices of ‘net culture’ have posed (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  27.  13
    Los bienes comunes intangibles en el capitalismo cognitivo.Álvaro Ramis Olivos - 2014 - Recerca.Revista de Pensament I Anàlisi 15:109-129.
    Este texto analizará críticamente la actual fase económica para mostrar la importancia de los bienes comunes intangibles. Sondea la tesis de un nuevo modo de producción «en ciernes», basado en la gestión colaborativa. Analiza los intangibles de acuerdo a su calidad y carácter. Compara los sistemas de patentes y derechos de propiedad intelectual que permiten su apropiación y las resistencias a su «comoditización» desde el software libre y las propuestas de flexibilización de derechos de autor. Advierte sobre el «fetichismo (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  28.  95
    Information technology, globalization and ethics.Richard De George - 2006 - Ethics and Information Technology 8 (1):29-40.
    This paper illustrates the overlap of computer ethics and business ethics by examining two issues. The first is the lack of fit between digitalized information and copyright protection. Although there are moral arguments that can be used to justify protection of intellectual property, including computer software and digitalized data, the way that copyright protection has developed often reflects vested interests rather than the considered weighing of moral considerations. As a result, with respect to downloading MP3s, among other (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  29. Applied Ontology: A Marvin Farber Conference on Law and Institutions in Society.Barry Smith & David R. Koepsell (eds.) - 1998 - Buffalo: University at Buffalo.
    The application of ontology has thus far [in 1998] been confined almost exclusively to the field of knowledge representation. Ontology has been applied, for example, in the design of medical databases and in the construction of geographical information systems. One area which is naturally suited to ontological analysis is that of the law and of social institutions in general. -/- Legal systems are composed of legal entities, such as laws, contracts, obligations, and rights. Their application yields new categories of entities (...)
     
    Export citation  
     
    Bookmark  
  30. Economic Cycles, Crises, and the Global Periphery.Leonid Grinin, Arno Tausch & Andrey Korotayev (eds.) - 2016 - Switzerland: Springer International Publishing Switzerland.
    This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifi cally the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfi lms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  31.  10
    Coding Freedom: The Ethics and Aesthetics of Hacking.E. Gabriella Coleman - 2012 - Princeton University Press.
    Who are computer hackers? What is free software? And what does the emergence of a community dedicated to the production of free and open source software--and to hacking as a technical, aesthetic, and moral project--reveal about the values of contemporary liberalism? Exploring the rise and political significance of the free and open source software movement in the United States and Europe, Coding Freedom details the ethics behind hackers' devotion to F/OSS, the social codes that guide its production, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  32.  49
    Softlifting: Exploring Determinants of Attitude.Tim Goles, Bandula Jayatilaka, Beena George, Linda Parsons, Valrie Chambers, David Taylor & Rebecca Brune - 2008 - Journal of Business Ethics 77 (4):481-499.
    Softlifting, or the illegal duplication of copyrighted software by individuals for personal use, is a serious and costly problem for software developers and distributors. Understanding the factors that determine attitude toward softlifting is important in order to ascertain what motivates individuals to engage in the behavior. We examine a number of factors, including personal moral obligation (PMO), perceived usefulness, and awareness of the laws and regulations governing software acquisition and use, along with facets of personal self-identity that (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  33.  4
    Децентрація Автентичного Авторитетного Автора.Георгій Храбров - 2023 - Вісник Харківського Національного Університету Імені В. Н. Каразіна. Серія «Філософія. Філософські Перипетії» 68:52-59.
    The article manifests and analyzes the process of decentration of the Author, which corresponds to a number of trends, such as: decentration of the subject, dividualization, decentralization of information systems, etc., which determine contemporary transformations of the Lifeworld of a human, who appears precisely as a decentralized, multilayered, split, multiple being. It is noted that the model of authorship, which was constituted according to the concept of a centered/holistic subject/individual, which, in particular, is embodied in copyright, needs to be (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  5
    An Adaptable, Open-Access Test Battery to Study the Fractionation of Executive-Functions in Diverse Populations.Gislaine A. V. Zanini, Monica C. Miranda, Hugo Cogo-Moreira, Ali Nouri, Alberto L. Fernández & Sabine Pompéia - 2021 - Frontiers in Psychology 12.
    The umbrella-term ‘executive functions’ includes various domain-general, goal-directed cognitive abilities responsible for behavioral self-regulation. The influential unity and diversity model of EF posits the existence of three correlated yet separable executive domains: inhibition, shifting and updating. These domains may be influenced by factors such as socioeconomic status and culture, possibly due to the way EF tasks are devised and to biased choice of stimuli, focusing on first-world testees. Here, we propose a FREE test battery that includes two open-access tasks for (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  2
    Information technology, globalization and ethics.Richard George - 2006 - Ethics and Information Technology 8 (1):29-40.
    This paper illustrates the overlap of computer ethics and business ethics by examining two issues. The first is the lack of fit between digitalized information and copyright protection. Although there are moral arguments that can be used to justify protection of intellectual property, including computer software and digitalized data, the way that copyright protection has developed often reflects vested interests rather than the considered weighing of moral considerations. As a result, with respect to downloading MP3s, among other (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  12
    Secondary liability in the post Napster era: Ethical observations on MGM v. Grokster.Richard A. Spinello - 2005 - Journal of Information, Communication and Ethics in Society 3 (3):121-130.
    The principal theme of this paper is secondary liability ‐ to what extent should we hold those who cooperate in wrongdoing and illicit behavior accountable? We probe this question by considering a lawsuit filed by the entertainment industry against the file‐swapping services of Grokster and StreamCast. Our focus is on the legal and moral implications of this case. We argue that the courts, which have so far ruled in favor of the defendants, have misapplied the socalled Sony precedent for two (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  37.  27
    The campaign for an ethical Internet.Jenny Shearer - 1998 - Acm Sigcas Computers and Society 28 (2):80-85.
    The fostering of an Internet societal infrastucture which is consciously ethical, is needed to curtail the new era of global irresponsibility that is at hand. The positive view advanced is contrasted with a scenario of the silencing of a moral Internet community using regulatory constraints, an extension of broadcast techniques, "brain-free" hardware, and control by multi-national corporations. This positive scenario is dependent on the evolution of a moral and responsible Internet global citizenry. The global citizen will recognise that in creating (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  38.  48
    From The Wright Brothers to Microsoft.David Lea - 2006 - Business Ethics Quarterly 16 (4):579-598.
    This paper considers the arguments that could support the proposition that intellectual property rights as applied to softwarehave a moral basis. Undeniably, ownership rights were first applied to chattels and land and so we begin by considering the moral basis of these rights. We then consider if these arguments make moral sense when they are extended to intellectual phenomenon. We identified two principal moral defenses: one based on utilitarian concerns relating to human welfare, the other appeals to issues of individual (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  6
    Ex-centric Cinema: Machinic Vision in the Powers of Ten and Electronic Cartography.Janet Harbord - 2012 - Body and Society 18 (1):99-119.
    After a century of cinema, accounts of this cultural form see it as divided between documentation and animation (the real and the magical). Yet the challenge that cinema presented in terms of a relocation of perception from the eye to the machine has become occluded. The shock of cinema in its earliest manifestations resided in the body of the spectator, no longer the site of primary perception, but dependent on an other (the camera, the projector) lacking in human qualities. This (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  40.  33
    Code as speech: A discussion of Bernstein V. USDOJ, karn V. USDOS, and junger V. Daley in light of the U.s. Supreme court's recent shift to federalism. [REVIEW]Jean Camp & K. Lewis - 2001 - Ethics and Information Technology 3 (1):21-33.
    The purpose of this paper is to address the question of whethercomputer source code is speech protected by the First Amendmentto the United States Constitution or whether it is merelyfunctional, a ``machine'', designed to fulfill a set task andtherefore bereft of protection. The answer to this question is acomplex one. Unlike all other forms of ``speech'' computer sourcecode holds a unique place in the law: it can be copyrighted, likea book and it can be patented like a machine or process.Case (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  41. Software is an abstract artifact.Nurbay Irmak - 2012 - Grazer Philosophische Studien 86 (1):55-72.
    Software is a ubiquitous artifact, yet not much has been done to understand its ontological nature. There are a few accounts offered so far about the nature of software. I argue that none of those accounts give a plausible picture of the nature of software. I draw attention to the striking similarities between software and musical works. These similarities motivate to look more closely on the discussions regarding the nature of the musical works. With the lessons (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   26 citations  
  42.  5
    Push: software design and the cultural politics of music production.Mike D'Errico - 2022 - New York: Oxford University Press.
    Push: Software Design and the Cultural Politics of Music Production shows how changes in the design of music software in the first decades of the twenty-first century shaped the production techniques and performance practices of artists working across media, from hip-hop and electronic dance music to video games and mobile apps. Emerging alongside developments in digital music distribution such as peer-to-peer file sharing and the MP3 format, digital audio workstations like FL Studio and Ableton Live introduced design affordances (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  43.  67
    Software Intensive Science.John Symons & Jack Horner - 2014 - Philosophy and Technology 27 (3):461-477.
    This paper argues that the difference between contemporary software intensive scientific practice and more traditional non-software intensive varieties results from the characteristically high conditionality of software. We explain why the path complexity of programs with high conditionality imposes limits on standard error correction techniques and why this matters. While it is possible, in general, to characterize the error distribution in inquiry that does not involve high conditionality, we cannot characterize the error distribution in inquiry that depends on (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  44.  15
    Free and Open Source Software in developing contexts.Gianluca Miscione & Kevin Johnston - 2010 - Journal of Information, Communication and Ethics in Society 8 (1):42-56.
    PurposeOriginating in the USA and Northern Europe, Free and Open Source Software (FOSS) found on the internet its fertile environment. In more recent years, FOSS is becoming an increasingly important element in strategies for development and implementation of information and communication technologies also in developing countries. Mainstream research on FOSS has catered to the underlying principles or freedom, open organizational forms, and on its economical aspects. The purpose of this paper is to shed new light on the actual consequences (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  45. Social Software.Rohit Parikh - 2002 - Synthese 132 (3):187-211.
    We suggest that the issue of constructing andverifying social procedures, which we suggestively call socialsoftware, be pursued as systematically as computer software is pursued by computer scientists. Certain complications do arise withsocial software which do not arise with computer software, but thesimilarities are nonetheless strong, and tools already exist which wouldenable us to start work on this important project. We give a variety ofsuggestive examples and indicate some theoretical work which alreadyexists.
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   25 citations  
  46.  8
    Il software del linguaggio.Raffaele Simone - 2020 - Milano: Raffaello Cortina editore.
  47.  5
    Being Nice to Software Animals and Babies.Anders Sandberg - 2014-08-11 - In Russell Blackford & Damien Broderick (eds.), Intelligence Unbound. Wiley. pp. 279–297.
    A brain emulation would be a one‐to‐one simulation where every causal process in the brain is represented, behaving in the same way as the original. Opponents of animal testing often argue that much of it is unnecessary and could be replaced with simulations. Personal identity is going to be a major issue with brain emulations, both because of the transition from an original unproblematic single human identity to successor identity/identities that might or might not be the same, and because (...) minds can potentially have multiple realizability. The process might produce distressed minds that have rights yet have an existence not worth living, or that lack the capacity to form or express their wishes. Emulations will experience and behave on a timescale set by the speed of their software. Brain emulations would not be self‐contained, and their survival would depend upon hardware over which they might not have any control. (shrink)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  48.  32
    Free software, economic 'realities', and information justice.S. Chopra & S. Dexter - 2009 - Acm Sigcas Computers and Society 39 (3):12-26.
    Free and open source software is taking an increasingly significant role in our software infrastructure. Yet many questions still exist about whether a software economy based on FOSS would be viable. We argue that contemporary trends definitively demonstrate this viability. Claiming that an economy must be evaluated as much by the ends it brings about as by its size or vigor, we draw on widely accepted notions of redistributive justice to show the ethical superiority of a (...) economy based on FOSS. (shrink)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  49.  3
    Software Blueprints: Lightweight Uses of Logic in Conceptual Modelling.David S. Robertson & Jaume Agustí - 1999 - Addison-Wesley Professional.
    Conceptual models are descriptions of our ideas about a problem, used to shape the implementation of a solution to it. Everyone who builds complex information systems uses such models - be they requirements analysts, knowledge modellers or software designers - but understanding of the pragmatics of model design tends to be informal and parochial. Lightweight uses of logic can add precision without destroying the intuitions we use to interpret our descriptions. Computing with logic allows us to make use of (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  66
    A software agent model of consciousness.Stan Franklin & Art Graesser - 1999 - Consciousness and Cognition 8 (3):285-301.
    Baars (1988, 1997) has proposed a psychological theory of consciousness, called global workspace theory. The present study describes a software agent implementation of that theory, called ''Conscious'' Mattie (CMattie). CMattie operates in a clerical domain from within a UNIX operating system, sending messages and interpreting messages in natural language that organize seminars at a university. CMattie fleshes out global workspace theory with a detailed computational model that integrates contemporary architectures in cognitive science and artificial intelligence. Baars (1997) lists the (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   12 citations  
1 — 50 / 986