Intellectual Property Issues
Intellectual Property Issues
Issues
RUEL G. GRAFIA
Presenter
topics
Plagiarism
Reverse Engineering
Open Source Code
Competitive Intelligence
Cybersquatting
Source: Reynolds G.W. (2014). Ethics in Information Technology. 5edition. Cengage Learning
Definition of Plagiarism
Plagiarism is the act of stealing someones ideas
or words and passing them off as ones own
(Reynolds, 2014, p.234).
TO "PLAGIARIZED means
Legal Aspects
Plagiarism is not the same as copyright infringement.
False claims of authorship may constitute plagiarism
regardless of whether the material is protected by
copyright.
Copyright infringement is a violation of the rights of a
copyright holder
Plagiarism, in contrast, is concerned with the
unearned increment to the plagiarizing author's
reputation that is achieved through false claims of
authorship.
www.ithenticate.com
www.turnitin.com
www.safeassign.com
www.plagiarism.com
www.canexus.com/eve
Reverse Engineering
Is the process of breaking something down in order
to understand it, build a copy of it, or improve it.
Reverse engineering was originally applied to
computer hardware but is now commonly applied to
software.
Source: Reynolds G.W. (2014). Ethics in Information Technology. 5edition. Cengage Learning
Why do it?
Discover Trade Secrets
Find Vulnerabilities
Academic Research
Patch Binary and Alter Behaviour
Pure Curiosity
Analyse Protocols
Circumvent [Copy] Protection
Tools for RE
Debugger (Dynamic code analysis)
Disassembler (Static code analysis)
Hex Editor
PE Analyzer
Resource Editor and more...
RE issues
Using RE techniques to reveal a competitors
program code
then, used to develop a new program that either
duplicates the original or interfaces
The courts have ruled in favour of using reverse
engineering to enable interoperability
Software license agreements increasingly forbid
reverse engineering, as well as restrictions in the
DMCA
RE issues
RE might be considered unethical
because it enables access to
information that another organization
may have copyrighted or classified as a
trade secret.
RE advantage
USES OF COMPETITIVE
INTELLIGENCE:
Learning
Without proper management safeguards, the
process of gathering competitive intelligence can
cross over to industrial espionage and dirty tricks.
Competitive intelligence analysts must avoid
unethical or illegal actions such as lying,
misrepresentation, theft, bribery or eavesdropping
with illegal devices.
CYBERSQUATTING
What Is Cybersquatting?
Cybersquatting is registering, selling or using a
domain name with the intent of profiting from the
goodwill of someone else's trademark.
Also know as domain squatting
What is cybersquatter?
A cybersquatter is someone who has registered
another's name or trademark as a domain name
with the prospect of selling it to the rightful
owner.
It's a form of legalised blackmail.
They steal your name and use it to damage your
business or reputation.
Recognizing Cybersquatting
THANK YOU