Computer Science
CSCI 415 University of North Texas Ethics Law and Cybersecurity Essay

CSCI 415

University of North Texas

CSCI

Question Description

I need support with this Computer Science question so I can learn better.

  1. (a) Has protection for proprietary software gone too far, as some critics suggest? (b) If not, why? (c) If so, what are the implications for innovation and competition in the computer industry? (d) How can we achieve an appropriate balance between those who hold legal rights to proprietary information and ordinary users who wish to access, share, and communicate that information? Defend your answer. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (knowledge)
  1. Back in chapter 5 privacy advocates argue for greater control of personal information by individuals, while many in the commercial sector argue for access to that information. It appears that these positions have reversed now in chapter 8—entrepreneurs argue for control of the flow of information on the Internet, while ordinary users argue for access to that information. (a) Is there an irony, perhaps even an inconsistency, here? (b) Can this inconsistency be resolved in a logically coherent manner? (c) Explain how. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)
  1. (a) What is meant by “information commons”? (b) How is this commons disappearing in the cyberage? (c) Mr. Boyle’s has suggested that a political movement, similar to the environmental movement in the 1970s, is needed to save the commons. Does his suggestion merit further consideration? Explain. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension)

Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Attached.

Introduction

A. Topic/focus of the essay
B. Thesis Statement

Body

First paragraph description

A. Summary of first piece of supporting evidence/information
B. Summary of second piece of supporting evidence/information

Second paragraph description

A. Summary of first piece of supporting evidence/information
B. Summary of second piece of supporting evidence/information

Third paragraph description

A. Summary of first piece of supporting evidence/information
B. Summary of second piece of supporting evidence/information

Conclusion

A. Restatement of thesis
B. Concluding remarks


Running Head: ETHICS, LAW AND CYBERSECURITY

Ethics, Law and Cybersecurity
Student’s Name
Instructor’s Name
Institutional Affiliation
Date

ETHICS, LAW AND CYBERSECURITY

2

Question A
The protection for propriety software has gone way too far in quite number ways. The
first aspect of the protection was the creation of licensing which has made the whole process
quite a challenge to afford. There are cost of licensing which are extremely high and the
developers are not in a position to afford. The critics have also discussed the issues of cost
when touching the extreme measures of the protection process. The high cost makes the
innovation relatively challenging as well as making the competition significantly stiff. The
excessive reliance on the developer is the other problem that has come as a result of the
extreme protection measures (Rappaport, 2018). The clients have to depend so much on the
developers for the updates, support and even the fixing of any problems that may come up in
the process.
In the process of trying to protecting the propriety software, the systems have been
made more vulnerable. A clear proof of this opinion is the case of open-source software
which is typically patched to address security threats faster than proprietary programs, simply
due to the source codes availability in the public domain. Based on the fact that many people
are watching out for any cases of weaknesses, it is quite easier to identify the potential
threats. This is contrary to the propriety software...

TutorLeal (21658)
Rice University

Anonymous
Thanks for the help.

Anonymous
Outstanding. Studypool always delivers quality work.

Anonymous
Tutor was very helpful and took the time to explain concepts to me. Very responsive, managed to get replies within the hour.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Similar Questions
Related Tags