- Term Papers, Book Reports, Research Papers and College Essays

Computing Ethics and Cyber Law

Essay by   •  February 25, 2011  •  Research Paper  •  5,391 Words (22 Pages)  •  2,290 Views

Essay Preview: Computing Ethics and Cyber Law

Report this essay
Page 1 of 22

1.0 Introduction


Information Technology (IT) is gradually becoming one of the hottest topics globally regardless of which age group you are in. Due to the fact that IT enables us to be more efficient and effective, the demand for technology multiplies yearly. Therefore, there is a rapid growth in the technology industry globally, especially the software industry.

For the past few years, Malaysia has been slowly in the Information Technology area. Malaysians are more IT literate and the awareness towards technology usage has increased. The high demand towards technology encouraged the country to open up more technological industries. For instant, due to the demands and needs of the users, a small Scottish software company designed software where it allowed users to safely share and communicate in a secure and safe environment. Without any marketing, the company manages to show a sign of growth through word of mouth. Meanwhile, this led to the escalating software piracy record. Thus, software piracy is about to overshadow the Malaysia’s reputation. The Malaysia government is trying their level best to fight against this crime for years.

(Small Scottish Software Company shows early sign of growth, 2006, Retrieved on 29 November 2006, from

Based on a research regarding “Piracy Rate in Asia Pacific”, Malaysia obtained an average piracy rate, which is 61%. Compared to last year’s research, the piracy rate went down by 2%. The study was done due to examine the effort being devoted to fight the crime as well as to clearly define the term “piracy” throughout the whole world. As piracy might be an obstacle for the development of a country if it is not carefully handled, it is important for Malaysia to understand that a legal system plays an important role in fighting against piracy. However, sometimes it puzzled us on how software piracy is defined and measured as the term is used in various ways. Hence, we will be defining the term “piracy” in the following page.

2.0 Definition


The growth of software piracy is inevitable, as the developing countries in Asia become more industrialized; there is a growth in the usage of computers in home and working environment. For the reason that the number of users increase, the possibility of the piracy rate to increase became higher. However, in Malaysia, the definition of “software piracy” is ambiguity. As a result, it contributed to a higher piracy rate in Malaysia. In the following, we will be defining the term “software piracy”.

Software piracy is portrait as unauthorized use of software by Encarta in the World English Dictionary (North American edition). The act of software piracy includes illegal duplication of copyrighted software or the installation of copyrighted software on more computers than authorized under terms of the software license agreement.

In contrast with Encarta in the World English Dictionary’s definition, Princeton defines software piracy as plagiarism which is “taking someone’s words or ideas as if they were your own”. Another form of piracy is the illegal copy or use of goods that are protected by intellectual property law, such as copying software, music, films and even fashion designs.

Although there are many forms of definition regarding software piracy, they are all closely related to the common term which is “piracy”. From the above definition it is clear that piracy is considered an illegal act, which is stealing goods or intellectual property. It is considered as act of crime, regardless of whether the act is carried by force or through electronic media. As a result, all of them are liable to the punishment provided for the offence.

3.0 Application of Cyber Law


Cyber law encompasses cyber crime, electronic commerce, and freedom of expression, intellectual property rights and privacy rights. Cyber crime involves activities like credit card fraud, unauthorized access to computer systems, child pornography, software piracy and cyber stalking. Thus, cyber law is needed in political and legal matters related to the Internet and other communication technology.

(Osiur Rahman, Mahabubur Rahman & Nour Mohammad, 2004, Law & Our Rights, Retrieved on November 10, 2006 from

3.1 Comparison between Malaysian Cyber Law and European Cyber Law

Malaysian Cyber Law

(Computer Crime Act 1997) European Cyber Law

(Computer Misuse Act 1990)

Similarity Provide for offences relating to the misuse of the computers Provide for offences relating to the misuse of the computers


Of Cyber Law (We choose only 2 implementation to discuss) • Conduct raid operation.

• Immediate ban towards the sales of CDs in open places (focusing on physical object piracy) • Conduct raid operation.

• Quarantine unauthorized website. (focusing on online piracy)

Difference • Acts not specific.

• Focus more towards piracy awareness as solution.

• The lack of effective intellectual property law (High corruption rate) • Acts are specific.

• Focus more towards people’s mental model as a solution.

• Effective intellectual property law.

Table 1.0 вЂ" Comparison between Malaysia and European Country

3.1.1 The Similarity between Malaysian Cyber Law and European



Download as:   txt (35.6 Kb)   pdf (347.3 Kb)   docx (23.2 Kb)  
Continue for 21 more pages »
Only available on