CE6xx
CE6xx
Age
Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh
City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam [email protected]
The Sixth Commandment of the Ten Commandments of Computer Ethics, “Thou shalt not copy or use
proprietary software without paying for it (or without permission)”, emphasizes the ethical and legal responsi-
bilities in software usage [ ]. In Vietnam’s growing digital economy, adhering to this principle is crucial for
protecting intellectual property and fostering innovation. Software piracy reduces developers’ income, stifles
creativity, and impedes technological advancement. This paper explores the effects of unauthorized software
use, highlights cases like Tran Lap vs. Zing MP3, and discusses measures to prevent piracy. Vietnam addresses
software piracy through legal mechanisms, such as the Law on Intellectual Property and Cybersecurity Law,
which impose penalties for unauthorized copying and distribution, promoting responsible digital practices and
protecting creators’ rights [ ]. Compliance with these laws helps avoid legal issues and fosters a culture of
respect for intellectual property.
Software Piracy Unauthorized copying harms developers’ earnings and impedes innovation. In 2019, Viet-
namese authorities seized pirated software and arrested those involved in large-scale distribution [ ].
Case Study In 2014, musician Tran Lap sued VNG Corporation, owner of Zing MP3, for distributing his song
“Duong den ngay vinh quang” without permission. He sought 150 million VND in damages. The case was
settled out of court, resulting in Zing MP3 ceasing unauthorized distribution and compensating Tran Lap.
This case highlights the financial and reputational consequences of violating intellectual property rights [
].
Preventative measures include using Digital Rights Management (DRM) to restrict unauthorized copying,
implementing cybersecurity measures like encryption and anti-piracy tools, and conducting educational cam-
paigns to raise awareness about the ethical and legal consequences of software piracy [ ]. Additionally, legal
enforcement is critical to ensure adherence to intellectual property laws, with severe consequences for offenders,
including fines and imprisonment.
References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and analyze their
content to determine the most suitable references. Use the corresponding numbers to fill in the [ ] in the essay
above, ensuring that each citation is relevant and aligns accurately with the context of the essay.
[1] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Computers & Security,
vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber security extends
beyond protecting information resources to safeguarding other assets, including individuals who may be targets
or unwitting participants in cyber attacks. This broader scope introduces ethical responsibilities, emphasizing the
societal duty to protect vulnerable groups, such as children. Addressing these risks is crucial to ensure digital
technologies promote ethical progress rather than exploitation.
[2] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that in the digital
era, where technology revolutionizes knowledge sharing, control over creativity is increasingly concentrated in the
hands of Big Media. This dominance undermines free markets, free speech, and the tradition of free culture that
2 ID: CE601
fosters innovation. Lessig argues for safeguarding intellectual property and preserving an open digital ecosystem
to protect our freedom to create, build, and imagine.
[3] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and privacy protection”,
Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more than 87 mil-
lion users to Cambridge Analytica, it is now imperative that comprehensive privacy policy laws be developed.
Technologists, researchers, and innovators should meaningfully contribute to the development of these policies.
[4] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM Transactions
on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to sensitive
information. This article proposes an economic model to optimize security investments by assessing information
vulnerabilities and potential losses. It suggests prioritizing midrange vulnerabilities for cost-effective protection
and allocating a fraction of expected losses to maximize resource efficiency in mitigating these risks.
[5] M. Akbanov, V. G. Vassilakis, and M. D. Logothetis, “WannaCry ransomware: Analysis of infection,
persistence, recovery prevention and propagation mechanisms”, Journal of Telecommunications and Information
Technology, no. 1, pp. 113–124, 2019.
,→ In recent years, we have been experiencing fast proliferation of different types of ransomware targeting
home users, companies and even critical telecommunications infrastructure elements. Modern day ransomware
relies on sophisticated infection, persistence and recovery prevention mechanisms. Some recent examples that re-
ceived significant attention include WannaCry, Petya and BadRabbit. To design and develop appropriate defense
mechanisms, it is important to understand the characteristics and the behavior of different types of ransomware.
[6] E. K. Clemons, R. V. Waran, S. Hermes, M. Schreieck, and H. Krcmar, “Computing and Social Welfare:
Minimizing societal harm from digital transformation while preserving the benefits of innovation in online
businesses”, Electronic Markets, vol. 32, no. 2, pp. 417–436, 2022.
,→ Social Welfare Computing is an emerging discipline that seeks to direct technology to cause minimum
societal disruption, and in particular seeks to minimize the harm caused directly by technology itself. Often the
companies that create significant value for their users obtain new sources of wealth and power, which inevitably
lead to new forms of abuse of power and new forms of societal disruption. Societal disruption in turn requires
social adaptation, including new regulations to influence the behavior of firms and to define and to protect the
rights of individuals in the changed society. Social Welfare Computing seeks to guide social adaptation, combining
insights from disciplines as varied as anthropology, business strategy, economics, strategic planning, and law.
[7] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous
to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to
pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics
Institute has played and then leads into the need for a set of standards to guide and instruct people in the
ethical use of computers. Among these commandments is the principle of respecting intellectual property, which
emphasizes avoiding unauthorized use or copying of proprietary software. This is where the ‘Ten Commandments
for Computer Ethics’ was first presented and has since been used by hundreds of schools and corporations.
[8] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous to
1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to pursue
a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics Institute
has played and then leads into the need for a set of standards to guide and instruct people in the ethical use
of computers. Among these commandments is the principle of avoiding harm to others through the misuse of
The Sixth Commandment of Computer Ethics - ID: CE601 3
technology. This is where the ‘Ten Commandments for Computer Ethics’ was first presented and has since been
used by hundreds of schools and corporations.
[9] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of Law and
Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus on legal frame-
works and enforcement challenges. It highlights significant cases that illustrate the financial and reputational
risks of copyright infringement. The paper discusses how these cases have shaped public awareness and policy
adjustments in the evolving digital landscape.
[10] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute, vol. 27, 2006.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous to
1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to pursue
a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics Institute
has played and then, leads into the need for a set of standards to guide and instruct people in the ethical use of
computers. Barquin calls for the use of the ‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of schools and
corporations. The ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that:
"Thou shalt think about the social consequences of the program you are writing or the system you are designing".
This commandment emphasizes the responsibility of developers and designers to consider the broader impact of
their creations.
[11] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strategies and
challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user access and actions,
crucial in today’s networked environment. They allow file owners to maintain control even after distribution,
aiding in piracy prevention and protecting sensitive enterprise documents. DRM operates at various levels,
including application (e.g., Apple iTunes), operating systems (e.g., Microsoft RMS), and hardware (e.g., DVD
CSS). However, current DRM systems often lack interoperability, fail to meet all customer requirements, or
aren’t fully secure. This paper reviews the current DRM landscape, evaluating their strengths and weaknesses,
analyzing legal and technical requirements, and assessing three specific DRM systems against these criteria.
[12] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress and chal-
lenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in copyright and
intellectual property rights protection. It highlights the interplay between national and international regulations,
focusing on measures to address unauthorized distribution and safeguard creators’ rights. The article emphasizes
the importance of adapting legal frameworks to the demands of the digital era.
[13] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and removing vul-
nerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than stronger protec-
tions. Overemphasis on national security overlooks individual needs, weakening global systems. The 2014 Sony
Pictures hack exemplifies the consequences, causing significant financial losses and leaking sensitive data. A bal-
anced cyber-security policy must address these vulnerabilities while protecting privacy and data, ensuring ethical
handling of information to prevent similar incidents.
[14] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Vietnam”, Science
and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in Vietnam and
mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified Theory of Acceptance and
Use of Technology (UTAUT), the study explores psychological, moral, and technological dimensions of piracy.
Key findings include the role of perceived behavioral control and risk perception. The paper also references
instances where enforcement actions were necessary to address large-scale piracy issues in the country.
4 ID: CE601
[15] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal of Computer
and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.
,→ The rise of Internet connectivity has triggered a surge in cyberattacks, with malware exploiting vulner-
abilities or leveraging emerging technologies. Beyond traditional methods, new attack patterns are emerging in
areas like social media, cloud computing, smartphones, and critical infrastructure. These attacks exploit unique
traits such as data centralization in the cloud, the pervasive use of mobile devices, and the interconnectivity of
critical systems, presenting unprecedented challenges.
Protecting Software Rights: Ethical Responsibilities in the Digital
Age
Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh
City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam [email protected]
The Sixth Commandment of the Ten Commandments of Computer Ethics, “Thou shalt not copy or use
proprietary software without paying for it (or without permission)”, emphasizes the ethical and legal responsi-
bilities in software usage [ ]. In Vietnam’s growing digital economy, adhering to this principle is crucial for
protecting intellectual property and fostering innovation. Software piracy reduces developers’ income, stifles
creativity, and impedes technological advancement. This paper explores the effects of unauthorized software
use, highlights cases like Tran Lap vs. Zing MP3, and discusses measures to prevent piracy. Vietnam addresses
software piracy through legal mechanisms, such as the Law on Intellectual Property and Cybersecurity Law,
which impose penalties for unauthorized copying and distribution, promoting responsible digital practices and
protecting creators’ rights [ ]. Compliance with these laws helps avoid legal issues and fosters a culture of
respect for intellectual property.
Software Piracy Unauthorized copying harms developers’ earnings and impedes innovation. In 2019, Viet-
namese authorities seized pirated software and arrested those involved in large-scale distribution [ ].
Case Study In 2014, musician Tran Lap sued VNG Corporation, owner of Zing MP3, for distributing his song
“Duong den ngay vinh quang” without permission. He sought 150 million VND in damages. The case was
settled out of court, resulting in Zing MP3 ceasing unauthorized distribution and compensating Tran Lap.
This case highlights the financial and reputational consequences of violating intellectual property rights [
].
Preventative measures include using Digital Rights Management (DRM) to restrict unauthorized copying,
implementing cybersecurity measures like encryption and anti-piracy tools, and conducting educational cam-
paigns to raise awareness about the ethical and legal consequences of software piracy [ ]. Additionally, legal
enforcement is critical to ensure adherence to intellectual property laws, with severe consequences for offenders,
including fines and imprisonment.
References
TO
. DO. Based on the titles and abstracts of the references provided below, carefully read and analyze their
content to determine the most suitable references. Use the corresponding numbers to fill in the [ ] in the essay
above, ensuring that each citation is relevant and aligns accurately with the context of the essay.
[1] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous to
1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to pursue
a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics Institute
has played and then leads into the need for a set of standards to guide and instruct people in the ethical use
of computers. Among these commandments is the principle of avoiding harm to others through the misuse of
technology. This is where the ‘Ten Commandments for Computer Ethics’ was first presented and has since been
used by hundreds of schools and corporations.
[2] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and defence”, in
Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin, Germany, 2012, pp.
1–17.
2 ID: CE602
,→ The growing data volume from Space demands advanced tools and methodologies for effective management.
Automated systems utilizing artificial intelligence and botnets are critical for anomaly detection and operational
integrity. The risks of internal exploitation, as highlighted by the 2009 Google trade secret theft, underscore the
importance of safeguarding proprietary technologies. By integrating DevSecOps and cloud-based solutions, these
systems ensure secure and efficient data handling for scientific, commercial, and exploratory missions.
[3] N. P. Nguyen, H. M. Nguyen, H.-L. La, T. T. T. Thi, N. H. Duong, T. S. Le, D. L. N. Le, and N. Thoai,
“AI-based traffic counting: A Case Study in Vietnam”, in Proceedings of the 2022 International Conference
on Advanced Computational and Analytical Methods (ACOMPA), Ho Chi Minh City, Vietnam, Oct. 2022, pp.
34–39.
,→ Ho Chi Minh City, particularly Vietnamese cities in general, is so busy and crowded since tremendous
numbers of motorbikes move on roads. Ho Chi Minh City leaders have encountered several challenges in fully
understanding and effectively dealing with problems of urban traffic for the past few decades. If successful, it
will make a positive impact on urban aesthetics and helps reduce traffic accidents. Software-based solutions are
proper and dramatically necessary, currently. The paper mainly concentrates on traffic counting problems during
the outbreak of the Covid-19 pandemic from June 2021.
[4] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that in the digital
era, where technology revolutionizes knowledge sharing, control over creativity is increasingly concentrated in the
hands of Big Media. This dominance undermines free markets, free speech, and the tradition of free culture that
fosters innovation. Lessig argues for safeguarding intellectual property and preserving an open digital ecosystem
to protect our freedom to create, build, and imagine.
[5] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strategies and
challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user access and actions,
crucial in today’s networked environment. They allow file owners to maintain control even after distribution,
aiding in piracy prevention and protecting sensitive enterprise documents. DRM operates at various levels,
including application (e.g., Apple iTunes), operating systems (e.g., Microsoft RMS), and hardware (e.g., DVD
CSS). However, current DRM systems often lack interoperability, fail to meet all customer requirements, or
aren’t fully secure. This paper reviews the current DRM landscape, evaluating their strengths and weaknesses,
analyzing legal and technical requirements, and assessing three specific DRM systems against these criteria.
[6] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Computers & Security,
vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber security extends
beyond protecting information resources to safeguarding other assets, including individuals who may be targets
or unwitting participants in cyber attacks. This broader scope introduces ethical responsibilities, emphasizing the
societal duty to protect vulnerable groups, such as children. Addressing these risks is crucial to ensure digital
technologies promote ethical progress rather than exploitation.
[7] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of Law and
Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus on legal frame-
works and enforcement challenges. It highlights significant cases that illustrate the financial and reputational
risks of copyright infringement. The paper discusses how these cases have shaped public awareness and policy
adjustments in the evolving digital landscape.
[8] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal of Computer
and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.
,→ The rise of Internet connectivity has triggered a surge in cyberattacks, with malware exploiting vulner-
abilities or leveraging emerging technologies. Beyond traditional methods, new attack patterns are emerging in
areas like social media, cloud computing, smartphones, and critical infrastructure. These attacks exploit unique
The Sixth Commandment of Computer Ethics - ID: CE602 3
traits such as data centralization in the cloud, the pervasive use of mobile devices, and the interconnectivity of
critical systems, presenting unprecedented challenges.
[9] W. Sun, O. Nasraoui, and P. Shafto, “Evolution and impact of bias in human and machine learning
algorithm interaction”, PLOS ONE, vol. 15, no. 8, p. e0235502, 2020.
,→ Recently, algorithms have been receiving data from the general population in the form of labeling, anno-
tations, etc. The result is that algorithms are subject to bias that is born from ingesting unchecked information,
such as biased samples and biased labels. Furthermore, people and algorithms are increasingly engaged in inter-
active processes wherein neither the human nor the algorithms receive unbiased data. Algorithms can also make
biased predictions, leading to what is now known as algorithmic bias. On the other hand, human’s reaction to
the output of machine learning methods with algorithmic bias worsen the situations by making decision based
on biased information, which will probably be consumed by algorithms later. Some recent research has focused
on the ethical and moral implication of machine learning algorithmic bias on society. However, most researchs
so far treated algorithmic bias as a static factor, which fails to capture the dynamic and iterative properties of
bias. We argue that algorithmic bias interacts with humans in an iterative manner. Based on statistical analyses
of the results of several controlled experiments, we found that the three different iterated bias modes, as well
as initial training data class imbalance and human action, do affect the models learned by machine learning
algorithms. We also found that iterated filter bias, which is prominent in personalized user interfaces, can lead
to more inequality in estimated relevance and to a limited human ability to discover relevant data.
[10] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous
to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to
pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics
Institute has played and then leads into the need for a set of standards to guide and instruct people in the
ethical use of computers. Among these commandments is the principle of respecting intellectual property, which
emphasizes avoiding unauthorized use or copying of proprietary software. This is where the ‘Ten Commandments
for Computer Ethics’ was first presented and has since been used by hundreds of schools and corporations.
[11] E. K. Clemons, R. V. Waran, S. Hermes, M. Schreieck, and H. Krcmar, “Computing and Social Welfare:
Minimizing societal harm from digital transformation while preserving the benefits of innovation in online
businesses”, Electronic Markets, vol. 32, no. 2, pp. 417–436, 2022.
,→ Social Welfare Computing is an emerging discipline that seeks to direct technology to cause minimum
societal disruption, and in particular seeks to minimize the harm caused directly by technology itself. Often the
companies that create significant value for their users obtain new sources of wealth and power, which inevitably
lead to new forms of abuse of power and new forms of societal disruption. Societal disruption in turn requires
social adaptation, including new regulations to influence the behavior of firms and to define and to protect the
rights of individuals in the changed society. Social Welfare Computing seeks to guide social adaptation, combining
insights from disciplines as varied as anthropology, business strategy, economics, strategic planning, and law.
[12] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and removing vul-
nerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than stronger protec-
tions. Overemphasis on national security overlooks individual needs, weakening global systems. The 2014 Sony
Pictures hack exemplifies the consequences, causing significant financial losses and leaking sensitive data. A bal-
anced cyber-security policy must address these vulnerabilities while protecting privacy and data, ensuring ethical
handling of information to prevent similar incidents.
[13] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and privacy protection”,
Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more than 87 mil-
lion users to Cambridge Analytica, it is now imperative that comprehensive privacy policy laws be developed.
Technologists, researchers, and innovators should meaningfully contribute to the development of these policies.
4 ID: CE602
[14] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress and chal-
lenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in copyright and
intellectual property rights protection. It highlights the interplay between national and international regulations,
focusing on measures to address unauthorized distribution and safeguard creators’ rights. The article emphasizes
the importance of adapting legal frameworks to the demands of the digital era.
[15] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Vietnam”, Science
and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in Vietnam and
mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified Theory of Acceptance and
Use of Technology (UTAUT), the study explores psychological, moral, and technological dimensions of piracy.
Key findings include the role of perceived behavioral control and risk perception. The paper also references
instances where enforcement actions were necessary to address large-scale piracy issues in the country.
Protecting Software Rights: Ethical Responsibilities in the Digital
Age
Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh
City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam [email protected]
The Sixth Commandment of the Ten Commandments of Computer Ethics, “Thou shalt not copy or use
proprietary software without paying for it (or without permission)”, emphasizes the ethical and legal responsi-
bilities in software usage [ ]. In Vietnam’s growing digital economy, adhering to this principle is crucial for
protecting intellectual property and fostering innovation. Software piracy reduces developers’ income, stifles
creativity, and impedes technological advancement. This paper explores the effects of unauthorized software
use, highlights cases like Tran Lap vs. Zing MP3, and discusses measures to prevent piracy. Vietnam addresses
software piracy through legal mechanisms, such as the Law on Intellectual Property and Cybersecurity Law,
which impose penalties for unauthorized copying and distribution, promoting responsible digital practices and
protecting creators’ rights [ ]. Compliance with these laws helps avoid legal issues and fosters a culture of
respect for intellectual property.
Software Piracy Unauthorized copying harms developers’ earnings and impedes innovation. In 2019, Viet-
namese authorities seized pirated software and arrested those involved in large-scale distribution [ ].
Case Study In 2014, musician Tran Lap sued VNG Corporation, owner of Zing MP3, for distributing his song
“Duong den ngay vinh quang” without permission. He sought 150 million VND in damages. The case was
settled out of court, resulting in Zing MP3 ceasing unauthorized distribution and compensating Tran Lap.
This case highlights the financial and reputational consequences of violating intellectual property rights [
].
Preventative measures include using Digital Rights Management (DRM) to restrict unauthorized copying,
implementing cybersecurity measures like encryption and anti-piracy tools, and conducting educational cam-
paigns to raise awareness about the ethical and legal consequences of software piracy [ ]. Additionally, legal
enforcement is critical to ensure adherence to intellectual property laws, with severe consequences for offenders,
including fines and imprisonment.
References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and analyze their
content to determine the most suitable references. Use the corresponding numbers to fill in the [ ] in the essay
above, ensuring that each citation is relevant and aligns accurately with the context of the essay.
[1] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress and chal-
lenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in copyright and
intellectual property rights protection. It highlights the interplay between national and international regulations,
focusing on measures to address unauthorized distribution and safeguard creators’ rights. The article emphasizes
the importance of adapting legal frameworks to the demands of the digital era.
[2] M. Akbanov, V. G. Vassilakis, and M. D. Logothetis, “WannaCry ransomware: Analysis of infection,
persistence, recovery prevention and propagation mechanisms”, Journal of Telecommunications and Information
Technology, no. 1, pp. 113–124, 2019.
,→ In recent years, we have been experiencing fast proliferation of different types of ransomware targeting
home users, companies and even critical telecommunications infrastructure elements. Modern day ransomware
2 ID: CE603
relies on sophisticated infection, persistence and recovery prevention mechanisms. Some recent examples that re-
ceived significant attention include WannaCry, Petya and BadRabbit. To design and develop appropriate defense
mechanisms, it is important to understand the characteristics and the behavior of different types of ransomware.
[3] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute, vol. 27, 2006.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous to
1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to pursue
a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics Institute
has played and then, leads into the need for a set of standards to guide and instruct people in the ethical use of
computers. Barquin calls for the use of the ‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of schools and
corporations. The ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that:
"Thou shalt think about the social consequences of the program you are writing or the system you are designing".
This commandment emphasizes the responsibility of developers and designers to consider the broader impact of
their creations.
[4] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and privacy protection”,
Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more than 87 mil-
lion users to Cambridge Analytica, it is now imperative that comprehensive privacy policy laws be developed.
Technologists, researchers, and innovators should meaningfully contribute to the development of these policies.
[5] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Vietnam”, Science
and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in Vietnam and
mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified Theory of Acceptance and
Use of Technology (UTAUT), the study explores psychological, moral, and technological dimensions of piracy.
Key findings include the role of perceived behavioral control and risk perception. The paper also references
instances where enforcement actions were necessary to address large-scale piracy issues in the country.
[6] P. W. Singer and A. Friedman, Cybersecurity: What Everyone Needs to Know. New York: Oxford
University Press, 2014.
,→ Dependence on computers has profoundly impacted human society, especially in warfare, where the U.S.
military is highly reliant on advanced systems. The rise of cyberwarfare is exemplified by incidents like Stuxnet
and Chinese cyberattacks aimed at stealing U.S. government data. In this book, Peter W. Singer and Allan
Friedman examine the evolution of military cybernetics, the challenges of defending cyberspace, and recent
security developments. The book explores modern conflict dynamics and offers strategies for individuals and
governments to protect themselves.
[7] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that in the digital
era, where technology revolutionizes knowledge sharing, control over creativity is increasingly concentrated in the
hands of Big Media. This dominance undermines free markets, free speech, and the tradition of free culture that
fosters innovation. Lessig argues for safeguarding intellectual property and preserving an open digital ecosystem
to protect our freedom to create, build, and imagine.
[8] H. T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing,
4th ed. Hoboken, NJ, USA: Wiley, 2013.
,→ This book introduces readers to a broad range of ethical and social issues within the field of cyberethics,
including those that directly impact professionals in computer and information technology (IT). Among the
topics explored are moral responsibilities, the prevention of harm through responsible computing, and the broader
societal implications of unethical behavior in the digital realm. It offers strategies to address these challenges,
promoting a deeper understanding of ethical computing practices.
The Sixth Commandment of Computer Ethics - ID: CE603 3
[9] R. A. Spinello, Cyberethics: Morality and Law in Cyberspace, 6th ed. Burlington, MA, USA: Jones &
Bartlett Learning, 2017.
,→ Cyberethics: Morality and Law in Cyberspace provides a comprehensive and up-to-date exploration of the
internet’s impact on society, addressing ethical challenges such as information privacy, cybersecurity, and digital
misconduct. By analyzing case studies of data breaches, “fake news", and online fraud, the book emphasizes the
moral responsibilities of internet users and policymakers. The author proposes that the intersection of technology,
law, and public policy offers pathways to mitigate harm and create a safer cyberspace, fostering ethical practices
in the digital age.
[10] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of Law and
Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus on legal frame-
works and enforcement challenges. It highlights significant cases that illustrate the financial and reputational
risks of copyright infringement. The paper discusses how these cases have shaped public awareness and policy
adjustments in the evolving digital landscape.
[11] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous
to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to
pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics
Institute has played and then leads into the need for a set of standards to guide and instruct people in the
ethical use of computers. Among these commandments is the principle of respecting intellectual property, which
emphasizes avoiding unauthorized use or copying of proprietary software. This is where the ‘Ten Commandments
for Computer Ethics’ was first presented and has since been used by hundreds of schools and corporations.
[12] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Professional
(CISSP) Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including threats like
ransomware and their impact on organizations. It delves into security assessment, risk management, and network
protection strategies to prevent data loss and mitigate cyber threats. The authors integrate real-world scenarios
to illustrate the consequences of cyberattacks and the importance of implementing robust cybersecurity measures.
[13] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM Transactions
on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to sensitive
information. This article proposes an economic model to optimize security investments by assessing information
vulnerabilities and potential losses. It suggests prioritizing midrange vulnerabilities for cost-effective protection
and allocating a fraction of expected losses to maximize resource efficiency in mitigating these risks.
[14] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strategies and
challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user access and actions,
crucial in today’s networked environment. They allow file owners to maintain control even after distribution,
aiding in piracy prevention and protecting sensitive enterprise documents. DRM operates at various levels,
including application (e.g., Apple iTunes), operating systems (e.g., Microsoft RMS), and hardware (e.g., DVD
CSS). However, current DRM systems often lack interoperability, fail to meet all customer requirements, or
aren’t fully secure. This paper reviews the current DRM landscape, evaluating their strengths and weaknesses,
analyzing legal and technical requirements, and assessing three specific DRM systems against these criteria.
[15] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-driven cybersecurity: An overview, security intelligence
modeling and research directions”, SN Computer Science, vol. 2, no. 3, p. 173, 2021.
,→ Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or Industry
4.0), which can be used for the protection of Internet-connected systems from cyber threats, attacks, damage, or
4 ID: CE603
unauthorized access. To intelligently solve today’s various cybersecurity issues, popular AI techniques involving
machine learning and deep learning methods, the concept of natural language processing, knowledge represen-
tation and reasoning, as well as the concept of knowledge or rule-based expert systems modeling can be used.
Protecting Software Rights: Ethical Responsibilities in the Digital
Age
Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh
City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam [email protected]
The Sixth Commandment of the Ten Commandments of Computer Ethics, “Thou shalt not copy or use
proprietary software without paying for it (or without permission)”, emphasizes the ethical and legal responsi-
bilities in software usage [ ]. In Vietnam’s growing digital economy, adhering to this principle is crucial for
protecting intellectual property and fostering innovation. Software piracy reduces developers’ income, stifles
creativity, and impedes technological advancement. This paper explores the effects of unauthorized software
use, highlights cases like Tran Lap vs. Zing MP3, and discusses measures to prevent piracy. Vietnam addresses
software piracy through legal mechanisms, such as the Law on Intellectual Property and Cybersecurity Law,
which impose penalties for unauthorized copying and distribution, promoting responsible digital practices and
protecting creators’ rights [ ]. Compliance with these laws helps avoid legal issues and fosters a culture of
respect for intellectual property.
Software Piracy Unauthorized copying harms developers’ earnings and impedes innovation. In 2019, Viet-
namese authorities seized pirated software and arrested those involved in large-scale distribution [ ].
Case Study In 2014, musician Tran Lap sued VNG Corporation, owner of Zing MP3, for distributing his song
“Duong den ngay vinh quang” without permission. He sought 150 million VND in damages. The case was
settled out of court, resulting in Zing MP3 ceasing unauthorized distribution and compensating Tran Lap.
This case highlights the financial and reputational consequences of violating intellectual property rights [
].
Preventative measures include using Digital Rights Management (DRM) to restrict unauthorized copying,
implementing cybersecurity measures like encryption and anti-piracy tools, and conducting educational cam-
paigns to raise awareness about the ethical and legal consequences of software piracy [ ]. Additionally, legal
enforcement is critical to ensure adherence to intellectual property laws, with severe consequences for offenders,
including fines and imprisonment.
References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and analyze their
content to determine the most suitable references. Use the corresponding numbers to fill in the [ ] in the essay
above, ensuring that each citation is relevant and aligns accurately with the context of the essay.
[1] N. P. Nguyen, H. M. Nguyen, H.-L. La, T. T. T. Thi, N. H. Duong, T. S. Le, D. L. N. Le, and N. Thoai,
“AI-based traffic counting: A Case Study in Vietnam”, in Proceedings of the 2022 International Conference
on Advanced Computational and Analytical Methods (ACOMPA), Ho Chi Minh City, Vietnam, Oct. 2022, pp.
34–39.
,→ Ho Chi Minh City, particularly Vietnamese cities in general, is so busy and crowded since tremendous
numbers of motorbikes move on roads. Ho Chi Minh City leaders have encountered several challenges in fully
understanding and effectively dealing with problems of urban traffic for the past few decades. If successful, it
will make a positive impact on urban aesthetics and helps reduce traffic accidents. Software-based solutions are
proper and dramatically necessary, currently. The paper mainly concentrates on traffic counting problems during
the outbreak of the Covid-19 pandemic from June 2021.
2 ID: CE604
[2] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages on social
networking sites: customer service or privacy infringement?”, International Journal of Electronic Commerce,
vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively intervene with
observed consumer messages. Despite intentions to enhance customer satisfaction by extending customer service,
sometimes these interventions are received negatively by consumers. We draw on privacy regulation theory to
theorize how proactive customer service interventions with consumer messages on social network sites may
evoke feelings of privacy infringement. To practitioners, our findings demonstrate that feelings of privacy are
an element to consider when handling consumer messages on social media, but also that privacy concerns may
be overcome if an intervention is perceived as useful enough.
[3] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strategies and
challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user access and actions,
crucial in today’s networked environment. They allow file owners to maintain control even after distribution,
aiding in piracy prevention and protecting sensitive enterprise documents. DRM operates at various levels,
including application (e.g., Apple iTunes), operating systems (e.g., Microsoft RMS), and hardware (e.g., DVD
CSS). However, current DRM systems often lack interoperability, fail to meet all customer requirements, or
aren’t fully secure. This paper reviews the current DRM landscape, evaluating their strengths and weaknesses,
analyzing legal and technical requirements, and assessing three specific DRM systems against these criteria.
[4] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and removing vulner-
abilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than stronger protec-
tions. Overemphasis on national security overlooks individual needs, weakening global systems. The 2014 Sony
Pictures hack exemplifies the consequences, causing significant financial losses and leaking sensitive data. A bal-
anced cyber-security policy must address these vulnerabilities while protecting privacy and data, ensuring ethical
handling of information to prevent similar incidents.
[5] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous
to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to
pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics
Institute has played and then leads into the need for a set of standards to guide and instruct people in the
ethical use of computers. Among these commandments is the principle of respecting intellectual property, which
emphasizes avoiding unauthorized use or copying of proprietary software. This is where the ‘Ten Commandments
for Computer Ethics’ was first presented and has since been used by hundreds of schools and corporations.
[6] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress and chal-
lenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in copyright and
intellectual property rights protection. It highlights the interplay between national and international regulations,
focusing on measures to address unauthorized distribution and safeguard creators’ rights. The article emphasizes
the importance of adapting legal frameworks to the demands of the digital era.
[7] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and defence”, in
Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin, Germany, 2012, pp.
1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective management.
Automated systems utilizing artificial intelligence and botnets are critical for anomaly detection and operational
integrity. The risks of internal exploitation, as highlighted by the 2009 Google trade secret theft, underscore the
importance of safeguarding proprietary technologies. By integrating DevSecOps and cloud-based solutions, these
systems ensure secure and efficient data handling for scientific, commercial, and exploratory missions.
The Sixth Commandment of Computer Ethics - ID: CE604 3
[8] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Vietnam”, Science
and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in Vietnam and
mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified Theory of Acceptance and
Use of Technology (UTAUT), the study explores psychological, moral, and technological dimensions of piracy.
Key findings include the role of perceived behavioral control and risk perception. The paper also references
instances where enforcement actions were necessary to address large-scale piracy issues in the country.
[9] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Professional (CISSP)
Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including threats like
ransomware and their impact on organizations. It delves into security assessment, risk management, and network
protection strategies to prevent data loss and mitigate cyber threats. The authors integrate real-world scenarios
to illustrate the consequences of cyberattacks and the importance of implementing robust cybersecurity measures.
[10] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute, vol. 27, 2006.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous to
1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to pursue
a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics Institute
has played and then, leads into the need for a set of standards to guide and instruct people in the ethical use of
computers. Barquin calls for the use of the ‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of schools and
corporations. The ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that:
"Thou shalt think about the social consequences of the program you are writing or the system you are designing".
This commandment emphasizes the responsibility of developers and designers to consider the broader impact of
their creations.
[11] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of Law and
Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus on legal frame-
works and enforcement challenges. It highlights significant cases that illustrate the financial and reputational
risks of copyright infringement. The paper discusses how these cases have shaped public awareness and policy
adjustments in the evolving digital landscape.
[12] H. T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing,
4th ed. Hoboken, NJ, USA: Wiley, 2013.
,→ This book introduces readers to a broad range of ethical and social issues within the field of cyberethics,
including those that directly impact professionals in computer and information technology (IT). Among the
topics explored are moral responsibilities, the prevention of harm through responsible computing, and the broader
societal implications of unethical behavior in the digital realm. It offers strategies to address these challenges,
promoting a deeper understanding of ethical computing practices.
[13] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal of Computer
and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.
,→ The rise of Internet connectivity has triggered a surge in cyberattacks, with malware exploiting vulner-
abilities or leveraging emerging technologies. Beyond traditional methods, new attack patterns are emerging in
areas like social media, cloud computing, smartphones, and critical infrastructure. These attacks exploit unique
traits such as data centralization in the cloud, the pervasive use of mobile devices, and the interconnectivity of
critical systems, presenting unprecedented challenges.
[14] E. K. Clemons, R. V. Waran, S. Hermes, M. Schreieck, and H. Krcmar, “Computing and Social Welfare:
Minimizing societal harm from digital transformation while preserving the benefits of innovation in online
businesses”, Electronic Markets, vol. 32, no. 2, pp. 417–436, 2022.
4 ID: CE604
,→ Social Welfare Computing is an emerging discipline that seeks to direct technology to cause minimum
societal disruption, and in particular seeks to minimize the harm caused directly by technology itself. Often the
companies that create significant value for their users obtain new sources of wealth and power, which inevitably
lead to new forms of abuse of power and new forms of societal disruption. Societal disruption in turn requires
social adaptation, including new regulations to influence the behavior of firms and to define and to protect the
rights of individuals in the changed society. Social Welfare Computing seeks to guide social adaptation, combining
insights from disciplines as varied as anthropology, business strategy, economics, strategic planning, and law.
[15] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous to
1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to pursue
a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics Institute
has played and then leads into the need for a set of standards to guide and instruct people in the ethical use
of computers. Among these commandments is the principle of avoiding harm to others through the misuse of
technology. This is where the ‘Ten Commandments for Computer Ethics’ was first presented and has since been
used by hundreds of schools and corporations.
Protecting Software Rights: Ethical Responsibilities in the Digital
Age
Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh
City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam [email protected]
The Sixth Commandment of the Ten Commandments of Computer Ethics, “Thou shalt not copy or use
proprietary software without paying for it (or without permission)”, emphasizes the ethical and legal responsi-
bilities in software usage [ ]. In Vietnam’s growing digital economy, adhering to this principle is crucial for
protecting intellectual property and fostering innovation. Software piracy reduces developers’ income, stifles
creativity, and impedes technological advancement. This paper explores the effects of unauthorized software
use, highlights cases like Tran Lap vs. Zing MP3, and discusses measures to prevent piracy. Vietnam addresses
software piracy through legal mechanisms, such as the Law on Intellectual Property and Cybersecurity Law,
which impose penalties for unauthorized copying and distribution, promoting responsible digital practices and
protecting creators’ rights [ ]. Compliance with these laws helps avoid legal issues and fosters a culture of
respect for intellectual property.
Software Piracy Unauthorized copying harms developers’ earnings and impedes innovation. In 2019, Viet-
namese authorities seized pirated software and arrested those involved in large-scale distribution [ ].
Case Study In 2014, musician Tran Lap sued VNG Corporation, owner of Zing MP3, for distributing his song
“Duong den ngay vinh quang” without permission. He sought 150 million VND in damages. The case was
settled out of court, resulting in Zing MP3 ceasing unauthorized distribution and compensating Tran Lap.
This case highlights the financial and reputational consequences of violating intellectual property rights [
].
Preventative measures include using Digital Rights Management (DRM) to restrict unauthorized copying,
implementing cybersecurity measures like encryption and anti-piracy tools, and conducting educational cam-
paigns to raise awareness about the ethical and legal consequences of software piracy [ ]. Additionally, legal
enforcement is critical to ensure adherence to intellectual property laws, with severe consequences for offenders,
including fines and imprisonment.
References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and analyze their
content to determine the most suitable references. Use the corresponding numbers to fill in the [ ] in the essay
above, ensuring that each citation is relevant and aligns accurately with the context of the essay.
[1] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and privacy protection”,
Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more than 87 mil-
lion users to Cambridge Analytica, it is now imperative that comprehensive privacy policy laws be developed.
Technologists, researchers, and innovators should meaningfully contribute to the development of these policies.
[2] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Vietnam”, Science
and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in Vietnam and
mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified Theory of Acceptance and
Use of Technology (UTAUT), the study explores psychological, moral, and technological dimensions of piracy.
2 ID: CE605
Key findings include the role of perceived behavioral control and risk perception. The paper also references
instances where enforcement actions were necessary to address large-scale piracy issues in the country.
[3] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages on social
networking sites: customer service or privacy infringement?”, International Journal of Electronic Commerce,
vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively intervene with
observed consumer messages. Despite intentions to enhance customer satisfaction by extending customer service,
sometimes these interventions are received negatively by consumers. We draw on privacy regulation theory to
theorize how proactive customer service interventions with consumer messages on social network sites may
evoke feelings of privacy infringement. To practitioners, our findings demonstrate that feelings of privacy are
an element to consider when handling consumer messages on social media, but also that privacy concerns may
be overcome if an intervention is perceived as useful enough.
[4] H. T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing,
4th ed. Hoboken, NJ, USA: Wiley, 2013.
,→ This book introduces readers to a broad range of ethical and social issues within the field of cyberethics,
including those that directly impact professionals in computer and information technology (IT). Among the
topics explored are moral responsibilities, the prevention of harm through responsible computing, and the broader
societal implications of unethical behavior in the digital realm. It offers strategies to address these challenges,
promoting a deeper understanding of ethical computing practices.
[5] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous
to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to
pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics
Institute has played and then leads into the need for a set of standards to guide and instruct people in the
ethical use of computers. Among these commandments is the principle of respecting intellectual property, which
emphasizes avoiding unauthorized use or copying of proprietary software. This is where the ‘Ten Commandments
for Computer Ethics’ was first presented and has since been used by hundreds of schools and corporations.
[6] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strategies and
challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user access and actions,
crucial in today’s networked environment. They allow file owners to maintain control even after distribution,
aiding in piracy prevention and protecting sensitive enterprise documents. DRM operates at various levels,
including application (e.g., Apple iTunes), operating systems (e.g., Microsoft RMS), and hardware (e.g., DVD
CSS). However, current DRM systems often lack interoperability, fail to meet all customer requirements, or
aren’t fully secure. This paper reviews the current DRM landscape, evaluating their strengths and weaknesses,
analyzing legal and technical requirements, and assessing three specific DRM systems against these criteria.
[7] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress and chal-
lenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in copyright and
intellectual property rights protection. It highlights the interplay between national and international regulations,
focusing on measures to address unauthorized distribution and safeguard creators’ rights. The article emphasizes
the importance of adapting legal frameworks to the demands of the digital era.
[8] W. Sun, O. Nasraoui, and P. Shafto, “Evolution and impact of bias in human and machine learning
algorithm interaction”, PLOS ONE, vol. 15, no. 8, p. e0235502, 2020.
,→ Recently, algorithms have been receiving data from the general population in the form of labeling, anno-
tations, etc. The result is that algorithms are subject to bias that is born from ingesting unchecked information,
such as biased samples and biased labels. Furthermore, people and algorithms are increasingly engaged in inter-
active processes wherein neither the human nor the algorithms receive unbiased data. Algorithms can also make
The Sixth Commandment of Computer Ethics - ID: CE605 3
biased predictions, leading to what is now known as algorithmic bias. On the other hand, human’s reaction to
the output of machine learning methods with algorithmic bias worsen the situations by making decision based
on biased information, which will probably be consumed by algorithms later. Some recent research has focused
on the ethical and moral implication of machine learning algorithmic bias on society. However, most researchs
so far treated algorithmic bias as a static factor, which fails to capture the dynamic and iterative properties of
bias. We argue that algorithmic bias interacts with humans in an iterative manner. Based on statistical analyses
of the results of several controlled experiments, we found that the three different iterated bias modes, as well
as initial training data class imbalance and human action, do affect the models learned by machine learning
algorithms. We also found that iterated filter bias, which is prominent in personalized user interfaces, can lead
to more inequality in estimated relevance and to a limited human ability to discover relevant data.
[9] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of Law and
Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus on legal frame-
works and enforcement challenges. It highlights significant cases that illustrate the financial and reputational
risks of copyright infringement. The paper discusses how these cases have shaped public awareness and policy
adjustments in the evolving digital landscape.
[10] E. K. Clemons, R. V. Waran, S. Hermes, M. Schreieck, and H. Krcmar, “Computing and Social Welfare:
Minimizing societal harm from digital transformation while preserving the benefits of innovation in online
businesses”, Electronic Markets, vol. 32, no. 2, pp. 417–436, 2022.
,→ Social Welfare Computing is an emerging discipline that seeks to direct technology to cause minimum
societal disruption, and in particular seeks to minimize the harm caused directly by technology itself. Often the
companies that create significant value for their users obtain new sources of wealth and power, which inevitably
lead to new forms of abuse of power and new forms of societal disruption. Societal disruption in turn requires
social adaptation, including new regulations to influence the behavior of firms and to define and to protect the
rights of individuals in the changed society. Social Welfare Computing seeks to guide social adaptation, combining
insights from disciplines as varied as anthropology, business strategy, economics, strategic planning, and law.
[11] P. W. Singer and A. Friedman, Cybersecurity: What Everyone Needs to Know. New York: Oxford
University Press, 2014.
,→ Dependence on computers has profoundly impacted human society, especially in warfare, where the U.S.
military is highly reliant on advanced systems. The rise of cyberwarfare is exemplified by incidents like Stuxnet
and Chinese cyberattacks aimed at stealing U.S. government data. In this book, Peter W. Singer and Allan
Friedman examine the evolution of military cybernetics, the challenges of defending cyberspace, and recent
security developments. The book explores modern conflict dynamics and offers strategies for individuals and
governments to protect themselves.
[12] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that in the digital
era, where technology revolutionizes knowledge sharing, control over creativity is increasingly concentrated in the
hands of Big Media. This dominance undermines free markets, free speech, and the tradition of free culture that
fosters innovation. Lessig argues for safeguarding intellectual property and preserving an open digital ecosystem
to protect our freedom to create, build, and imagine.
[13] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-driven cybersecurity: An overview, security intelligence
modeling and research directions”, SN Computer Science, vol. 2, no. 3, p. 173, 2021.
,→ Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or Industry
4.0), which can be used for the protection of Internet-connected systems from cyber threats, attacks, damage, or
unauthorized access. To intelligently solve today’s various cybersecurity issues, popular AI techniques involving
machine learning and deep learning methods, the concept of natural language processing, knowledge represen-
tation and reasoning, as well as the concept of knowledge or rule-based expert systems modeling can be used.
4 ID: CE605
[14] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM Transactions
on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to sensitive
information. This article proposes an economic model to optimize security investments by assessing information
vulnerabilities and potential losses. It suggests prioritizing midrange vulnerabilities for cost-effective protection
and allocating a fraction of expected losses to maximize resource efficiency in mitigating these risks.
[15] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and defence”,
in Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin, Germany, 2012, pp.
1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective management.
Automated systems utilizing artificial intelligence and botnets are critical for anomaly detection and operational
integrity. The risks of internal exploitation, as highlighted by the 2009 Google trade secret theft, underscore the
importance of safeguarding proprietary technologies. By integrating DevSecOps and cloud-based solutions, these
systems ensure secure and efficient data handling for scientific, commercial, and exploratory missions.
Protecting Software Rights: Ethical Responsibilities in the Digital
Age
Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh
City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam [email protected]
The Sixth Commandment of the Ten Commandments of Computer Ethics, “Thou shalt not copy or use
proprietary software without paying for it (or without permission)”, emphasizes the ethical and legal responsi-
bilities in software usage [ ]. In Vietnam’s growing digital economy, adhering to this principle is crucial for
protecting intellectual property and fostering innovation. Software piracy reduces developers’ income, stifles
creativity, and impedes technological advancement. This paper explores the effects of unauthorized software
use, highlights cases like Tran Lap vs. Zing MP3, and discusses measures to prevent piracy. Vietnam addresses
software piracy through legal mechanisms, such as the Law on Intellectual Property and Cybersecurity Law,
which impose penalties for unauthorized copying and distribution, promoting responsible digital practices and
protecting creators’ rights [ ]. Compliance with these laws helps avoid legal issues and fosters a culture of
respect for intellectual property.
Software Piracy Unauthorized copying harms developers’ earnings and impedes innovation. In 2019, Viet-
namese authorities seized pirated software and arrested those involved in large-scale distribution [ ].
Case Study In 2014, musician Tran Lap sued VNG Corporation, owner of Zing MP3, for distributing his song
“Duong den ngay vinh quang” without permission. He sought 150 million VND in damages. The case was
settled out of court, resulting in Zing MP3 ceasing unauthorized distribution and compensating Tran Lap.
This case highlights the financial and reputational consequences of violating intellectual property rights [
].
Preventative measures include using Digital Rights Management (DRM) to restrict unauthorized copying,
implementing cybersecurity measures like encryption and anti-piracy tools, and conducting educational cam-
paigns to raise awareness about the ethical and legal consequences of software piracy [ ]. Additionally, legal
enforcement is critical to ensure adherence to intellectual property laws, with severe consequences for offenders,
including fines and imprisonment.
References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and analyze their
content to determine the most suitable references. Use the corresponding numbers to fill in the [ ] in the essay
above, ensuring that each citation is relevant and aligns accurately with the context of the essay.
[1] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages on social
networking sites: customer service or privacy infringement?”, International Journal of Electronic Commerce,
vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively intervene with
observed consumer messages. Despite intentions to enhance customer satisfaction by extending customer service,
sometimes these interventions are received negatively by consumers. We draw on privacy regulation theory to
theorize how proactive customer service interventions with consumer messages on social network sites may
evoke feelings of privacy infringement. To practitioners, our findings demonstrate that feelings of privacy are
an element to consider when handling consumer messages on social media, but also that privacy concerns may
be overcome if an intervention is perceived as useful enough.
2 ID: CE606
[3] R. A. Spinello, Cyberethics: Morality and Law in Cyberspace, 6th ed. Burlington, MA, USA: Jones &
Bartlett Learning, 2017.
,→ Cyberethics: Morality and Law in Cyberspace provides a comprehensive and up-to-date exploration of the
internet’s impact on society, addressing ethical challenges such as information privacy, cybersecurity, and digital
misconduct. By analyzing case studies of data breaches, “fake news", and online fraud, the book emphasizes the
moral responsibilities of internet users and policymakers. The author proposes that the intersection of technology,
law, and public policy offers pathways to mitigate harm and create a safer cyberspace, fostering ethical practices
in the digital age.
[4] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that in the digital
era, where technology revolutionizes knowledge sharing, control over creativity is increasingly concentrated in the
hands of Big Media. This dominance undermines free markets, free speech, and the tradition of free culture that
fosters innovation. Lessig argues for safeguarding intellectual property and preserving an open digital ecosystem
to protect our freedom to create, build, and imagine.
[5] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous
to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to
pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics
Institute has played and then leads into the need for a set of standards to guide and instruct people in the
ethical use of computers. Among these commandments is the principle of respecting intellectual property, which
emphasizes avoiding unauthorized use or copying of proprietary software. This is where the ‘Ten Commandments
for Computer Ethics’ was first presented and has since been used by hundreds of schools and corporations.
[6] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal of Computer
and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.
,→ The rise of Internet connectivity has triggered a surge in cyberattacks, with malware exploiting vulner-
abilities or leveraging emerging technologies. Beyond traditional methods, new attack patterns are emerging in
areas like social media, cloud computing, smartphones, and critical infrastructure. These attacks exploit unique
traits such as data centralization in the cloud, the pervasive use of mobile devices, and the interconnectivity of
critical systems, presenting unprecedented challenges.
[7] W. Sun, O. Nasraoui, and P. Shafto, “Evolution and impact of bias in human and machine learning
algorithm interaction”, PLOS ONE, vol. 15, no. 8, p. e0235502, 2020.
,→ Recently, algorithms have been receiving data from the general population in the form of labeling, anno-
tations, etc. The result is that algorithms are subject to bias that is born from ingesting unchecked information,
such as biased samples and biased labels. Furthermore, people and algorithms are increasingly engaged in inter-
active processes wherein neither the human nor the algorithms receive unbiased data. Algorithms can also make
biased predictions, leading to what is now known as algorithmic bias. On the other hand, human’s reaction to
the output of machine learning methods with algorithmic bias worsen the situations by making decision based
on biased information, which will probably be consumed by algorithms later. Some recent research has focused
on the ethical and moral implication of machine learning algorithmic bias on society. However, most researchs
The Sixth Commandment of Computer Ethics - ID: CE606 3
so far treated algorithmic bias as a static factor, which fails to capture the dynamic and iterative properties of
bias. We argue that algorithmic bias interacts with humans in an iterative manner. Based on statistical analyses
of the results of several controlled experiments, we found that the three different iterated bias modes, as well
as initial training data class imbalance and human action, do affect the models learned by machine learning
algorithms. We also found that iterated filter bias, which is prominent in personalized user interfaces, can lead
to more inequality in estimated relevance and to a limited human ability to discover relevant data.
[8] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strategies and
challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user access and actions,
crucial in today’s networked environment. They allow file owners to maintain control even after distribution,
aiding in piracy prevention and protecting sensitive enterprise documents. DRM operates at various levels,
including application (e.g., Apple iTunes), operating systems (e.g., Microsoft RMS), and hardware (e.g., DVD
CSS). However, current DRM systems often lack interoperability, fail to meet all customer requirements, or
aren’t fully secure. This paper reviews the current DRM landscape, evaluating their strengths and weaknesses,
analyzing legal and technical requirements, and assessing three specific DRM systems against these criteria.
[9] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-driven cybersecurity: An overview, security intelligence
modeling and research directions”, SN Computer Science, vol. 2, no. 3, p. 173, 2021.
,→ Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or Industry
4.0), which can be used for the protection of Internet-connected systems from cyber threats, attacks, damage, or
unauthorized access. To intelligently solve today’s various cybersecurity issues, popular AI techniques involving
machine learning and deep learning methods, the concept of natural language processing, knowledge represen-
tation and reasoning, as well as the concept of knowledge or rule-based expert systems modeling can be used.
[10] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Computers & Secu-
rity, vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber security extends
beyond protecting information resources to safeguarding other assets, including individuals who may be targets
or unwitting participants in cyber attacks. This broader scope introduces ethical responsibilities, emphasizing the
societal duty to protect vulnerable groups, such as children. Addressing these risks is crucial to ensure digital
technologies promote ethical progress rather than exploitation.
[11] S. J. Harrington, “The effect of codes of ethics and personal denial of responsibility on computer abuse
judgments and intentions”, MIS Quarterly, vol. 20, no. 3, pp. 257–278, 1996.
,→ This research examines the impact of ethical codes on the judgments and intentions of information
systems (IS) employees regarding computer abuse, including deceptive practices like phishing and other harmful
behaviors. The study highlights how ethical codes can clarify individual responsibilities and reduce rationalizations
for unethical actions. It also explores the psychological trait of responsibility denial, showing its significant role
in influencing decisions related to computer misuse.
[12] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute, vol. 27, 2006.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous to
1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to pursue
a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics Institute
has played and then, leads into the need for a set of standards to guide and instruct people in the ethical use of
computers. Barquin calls for the use of the ‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of schools and
corporations. The ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that:
"Thou shalt think about the social consequences of the program you are writing or the system you are designing".
This commandment emphasizes the responsibility of developers and designers to consider the broader impact of
their creations.
4 ID: CE606
[13] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Vietnam”, Science
and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in Vietnam and
mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified Theory of Acceptance and
Use of Technology (UTAUT), the study explores psychological, moral, and technological dimensions of piracy.
Key findings include the role of perceived behavioral control and risk perception. The paper also references
instances where enforcement actions were necessary to address large-scale piracy issues in the country.
[14] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of Law and
Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus on legal frame-
works and enforcement challenges. It highlights significant cases that illustrate the financial and reputational
risks of copyright infringement. The paper discusses how these cases have shaped public awareness and policy
adjustments in the evolving digital landscape.
[15] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress and chal-
lenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in copyright and
intellectual property rights protection. It highlights the interplay between national and international regulations,
focusing on measures to address unauthorized distribution and safeguard creators’ rights. The article emphasizes
the importance of adapting legal frameworks to the demands of the digital era.
Protecting Software Rights: Ethical Responsibilities in the Digital
Age
Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh
City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam [email protected]
The Sixth Commandment of the Ten Commandments of Computer Ethics, “Thou shalt not copy or use
proprietary software without paying for it (or without permission)”, emphasizes the ethical and legal responsi-
bilities in software usage [ ]. In Vietnam’s growing digital economy, adhering to this principle is crucial for
protecting intellectual property and fostering innovation. Software piracy reduces developers’ income, stifles
creativity, and impedes technological advancement. This paper explores the effects of unauthorized software
use, highlights cases like Tran Lap vs. Zing MP3, and discusses measures to prevent piracy. Vietnam addresses
software piracy through legal mechanisms, such as the Law on Intellectual Property and Cybersecurity Law,
which impose penalties for unauthorized copying and distribution, promoting responsible digital practices and
protecting creators’ rights [ ]. Compliance with these laws helps avoid legal issues and fosters a culture of
respect for intellectual property.
Software Piracy Unauthorized copying harms developers’ earnings and impedes innovation. In 2019, Viet-
namese authorities seized pirated software and arrested those involved in large-scale distribution [ ].
Case Study In 2014, musician Tran Lap sued VNG Corporation, owner of Zing MP3, for distributing his song
“Duong den ngay vinh quang” without permission. He sought 150 million VND in damages. The case was
settled out of court, resulting in Zing MP3 ceasing unauthorized distribution and compensating Tran Lap.
This case highlights the financial and reputational consequences of violating intellectual property rights [
].
Preventative measures include using Digital Rights Management (DRM) to restrict unauthorized copying,
implementing cybersecurity measures like encryption and anti-piracy tools, and conducting educational cam-
paigns to raise awareness about the ethical and legal consequences of software piracy [ ]. Additionally, legal
enforcement is critical to ensure adherence to intellectual property laws, with severe consequences for offenders,
including fines and imprisonment.
References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and analyze their
content to determine the most suitable references. Use the corresponding numbers to fill in the [ ] in the essay
above, ensuring that each citation is relevant and aligns accurately with the context of the essay.
[1] E. K. Clemons, R. V. Waran, S. Hermes, M. Schreieck, and H. Krcmar, “Computing and Social Welfare:
Minimizing societal harm from digital transformation while preserving the benefits of innovation in online
businesses”, Electronic Markets, vol. 32, no. 2, pp. 417–436, 2022.
,→ Social Welfare Computing is an emerging discipline that seeks to direct technology to cause minimum
societal disruption, and in particular seeks to minimize the harm caused directly by technology itself. Often the
companies that create significant value for their users obtain new sources of wealth and power, which inevitably
lead to new forms of abuse of power and new forms of societal disruption. Societal disruption in turn requires
social adaptation, including new regulations to influence the behavior of firms and to define and to protect the
rights of individuals in the changed society. Social Welfare Computing seeks to guide social adaptation, combining
insights from disciplines as varied as anthropology, business strategy, economics, strategic planning, and law.
[2] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute, vol. 27, 2006.
2 ID: CE607
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous to
1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to pursue
a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics Institute
has played and then, leads into the need for a set of standards to guide and instruct people in the ethical use of
computers. Barquin calls for the use of the ‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of schools and
corporations. The ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that:
"Thou shalt think about the social consequences of the program you are writing or the system you are designing".
This commandment emphasizes the responsibility of developers and designers to consider the broader impact of
their creations.
[3] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and defence”, in
Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin, Germany, 2012, pp.
1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective management.
Automated systems utilizing artificial intelligence and botnets are critical for anomaly detection and operational
integrity. The risks of internal exploitation, as highlighted by the 2009 Google trade secret theft, underscore the
importance of safeguarding proprietary technologies. By integrating DevSecOps and cloud-based solutions, these
systems ensure secure and efficient data handling for scientific, commercial, and exploratory missions.
[4] S. J. Harrington, “The effect of codes of ethics and personal denial of responsibility on computer abuse
judgments and intentions”, MIS Quarterly, vol. 20, no. 3, pp. 257–278, 1996.
,→ This research examines the impact of ethical codes on the judgments and intentions of information
systems (IS) employees regarding computer abuse, including deceptive practices like phishing and other harmful
behaviors. The study highlights how ethical codes can clarify individual responsibilities and reduce rationalizations
for unethical actions. It also explores the psychological trait of responsibility denial, showing its significant role
in influencing decisions related to computer misuse.
[5] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal of Computer
and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.
,→ The rise of Internet connectivity has triggered a surge in cyberattacks, with malware exploiting vulner-
abilities or leveraging emerging technologies. Beyond traditional methods, new attack patterns are emerging in
areas like social media, cloud computing, smartphones, and critical infrastructure. These attacks exploit unique
traits such as data centralization in the cloud, the pervasive use of mobile devices, and the interconnectivity of
critical systems, presenting unprecedented challenges.
[6] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Vietnam”, Science
and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in Vietnam and
mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified Theory of Acceptance and
Use of Technology (UTAUT), the study explores psychological, moral, and technological dimensions of piracy.
Key findings include the role of perceived behavioral control and risk perception. The paper also references
instances where enforcement actions were necessary to address large-scale piracy issues in the country.
[7] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and removing vulner-
abilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than stronger protec-
tions. Overemphasis on national security overlooks individual needs, weakening global systems. The 2014 Sony
Pictures hack exemplifies the consequences, causing significant financial losses and leaking sensitive data. A bal-
anced cyber-security policy must address these vulnerabilities while protecting privacy and data, ensuring ethical
handling of information to prevent similar incidents.
[8] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer Ethics Institute,
Washington, DC, USA, 1992.
The Sixth Commandment of Computer Ethics - ID: CE607 3
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous
to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to
pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics
Institute has played and then leads into the need for a set of standards to guide and instruct people in the
ethical use of computers. Among these commandments is the principle of respecting intellectual property, which
emphasizes avoiding unauthorized use or copying of proprietary software. This is where the ‘Ten Commandments
for Computer Ethics’ was first presented and has since been used by hundreds of schools and corporations.
[9] W. Sun, O. Nasraoui, and P. Shafto, “Evolution and impact of bias in human and machine learning
algorithm interaction”, PLOS ONE, vol. 15, no. 8, p. e0235502, 2020.
,→ Recently, algorithms have been receiving data from the general population in the form of labeling, anno-
tations, etc. The result is that algorithms are subject to bias that is born from ingesting unchecked information,
such as biased samples and biased labels. Furthermore, people and algorithms are increasingly engaged in inter-
active processes wherein neither the human nor the algorithms receive unbiased data. Algorithms can also make
biased predictions, leading to what is now known as algorithmic bias. On the other hand, human’s reaction to
the output of machine learning methods with algorithmic bias worsen the situations by making decision based
on biased information, which will probably be consumed by algorithms later. Some recent research has focused
on the ethical and moral implication of machine learning algorithmic bias on society. However, most researchs
so far treated algorithmic bias as a static factor, which fails to capture the dynamic and iterative properties of
bias. We argue that algorithmic bias interacts with humans in an iterative manner. Based on statistical analyses
of the results of several controlled experiments, we found that the three different iterated bias modes, as well
as initial training data class imbalance and human action, do affect the models learned by machine learning
algorithms. We also found that iterated filter bias, which is prominent in personalized user interfaces, can lead
to more inequality in estimated relevance and to a limited human ability to discover relevant data.
[10] R. A. Spinello, Cyberethics: Morality and Law in Cyberspace, 6th ed. Burlington, MA, USA: Jones &
Bartlett Learning, 2017.
,→ Cyberethics: Morality and Law in Cyberspace provides a comprehensive and up-to-date exploration of the
internet’s impact on society, addressing ethical challenges such as information privacy, cybersecurity, and digital
misconduct. By analyzing case studies of data breaches, “fake news", and online fraud, the book emphasizes the
moral responsibilities of internet users and policymakers. The author proposes that the intersection of technology,
law, and public policy offers pathways to mitigate harm and create a safer cyberspace, fostering ethical practices
in the digital age.
[11] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strategies and
challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user access and actions,
crucial in today’s networked environment. They allow file owners to maintain control even after distribution,
aiding in piracy prevention and protecting sensitive enterprise documents. DRM operates at various levels,
including application (e.g., Apple iTunes), operating systems (e.g., Microsoft RMS), and hardware (e.g., DVD
CSS). However, current DRM systems often lack interoperability, fail to meet all customer requirements, or
aren’t fully secure. This paper reviews the current DRM landscape, evaluating their strengths and weaknesses,
analyzing legal and technical requirements, and assessing three specific DRM systems against these criteria.
[12] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress and chal-
lenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in copyright and
intellectual property rights protection. It highlights the interplay between national and international regulations,
focusing on measures to address unauthorized distribution and safeguard creators’ rights. The article emphasizes
the importance of adapting legal frameworks to the demands of the digital era.
[13] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of Law and
Society, vol. 5, no. 2, pp. 200–215, 2019.
4 ID: CE607
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus on legal frame-
works and enforcement challenges. It highlights significant cases that illustrate the financial and reputational
risks of copyright infringement. The paper discusses how these cases have shaped public awareness and policy
adjustments in the evolving digital landscape.
[14] P. W. Singer and A. Friedman, Cybersecurity: What Everyone Needs to Know. New York: Oxford
University Press, 2014.
,→ Dependence on computers has profoundly impacted human society, especially in warfare, where the U.S.
military is highly reliant on advanced systems. The rise of cyberwarfare is exemplified by incidents like Stuxnet
and Chinese cyberattacks aimed at stealing U.S. government data. In this book, Peter W. Singer and Allan
Friedman examine the evolution of military cybernetics, the challenges of defending cyberspace, and recent
security developments. The book explores modern conflict dynamics and offers strategies for individuals and
governments to protect themselves.
[15] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that in the digital
era, where technology revolutionizes knowledge sharing, control over creativity is increasingly concentrated in the
hands of Big Media. This dominance undermines free markets, free speech, and the tradition of free culture that
fosters innovation. Lessig argues for safeguarding intellectual property and preserving an open digital ecosystem
to protect our freedom to create, build, and imagine.
Protecting Software Rights: Ethical Responsibilities in the Digital
Age
Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh
City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam [email protected]
The Sixth Commandment of the Ten Commandments of Computer Ethics, “Thou shalt not copy or use
proprietary software without paying for it (or without permission)”, emphasizes the ethical and legal responsi-
bilities in software usage [ ]. In Vietnam’s growing digital economy, adhering to this principle is crucial for
protecting intellectual property and fostering innovation. Software piracy reduces developers’ income, stifles
creativity, and impedes technological advancement. This paper explores the effects of unauthorized software
use, highlights cases like Tran Lap vs. Zing MP3, and discusses measures to prevent piracy. Vietnam addresses
software piracy through legal mechanisms, such as the Law on Intellectual Property and Cybersecurity Law,
which impose penalties for unauthorized copying and distribution, promoting responsible digital practices and
protecting creators’ rights [ ]. Compliance with these laws helps avoid legal issues and fosters a culture of
respect for intellectual property.
Software Piracy Unauthorized copying harms developers’ earnings and impedes innovation. In 2019, Viet-
namese authorities seized pirated software and arrested those involved in large-scale distribution [ ].
Case Study In 2014, musician Tran Lap sued VNG Corporation, owner of Zing MP3, for distributing his song
“Duong den ngay vinh quang” without permission. He sought 150 million VND in damages. The case was
settled out of court, resulting in Zing MP3 ceasing unauthorized distribution and compensating Tran Lap.
This case highlights the financial and reputational consequences of violating intellectual property rights [
].
Preventative measures include using Digital Rights Management (DRM) to restrict unauthorized copying,
implementing cybersecurity measures like encryption and anti-piracy tools, and conducting educational cam-
paigns to raise awareness about the ethical and legal consequences of software piracy [ ]. Additionally, legal
enforcement is critical to ensure adherence to intellectual property laws, with severe consequences for offenders,
including fines and imprisonment.
References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and analyze their
content to determine the most suitable references. Use the corresponding numbers to fill in the [ ] in the essay
above, ensuring that each citation is relevant and aligns accurately with the context of the essay.
[1] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-driven cybersecurity: An overview, security intelligence
modeling and research directions”, SN Computer Science, vol. 2, no. 3, p. 173, 2021.
,→ Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or Industry
4.0), which can be used for the protection of Internet-connected systems from cyber threats, attacks, damage, or
unauthorized access. To intelligently solve today’s various cybersecurity issues, popular AI techniques involving
machine learning and deep learning methods, the concept of natural language processing, knowledge represen-
tation and reasoning, as well as the concept of knowledge or rule-based expert systems modeling can be used.
[2] W. Sun, O. Nasraoui, and P. Shafto, “Evolution and impact of bias in human and machine learning
algorithm interaction”, PLOS ONE, vol. 15, no. 8, p. e0235502, 2020.
2 ID: CE608
,→ Recently, algorithms have been receiving data from the general population in the form of labeling, anno-
tations, etc. The result is that algorithms are subject to bias that is born from ingesting unchecked information,
such as biased samples and biased labels. Furthermore, people and algorithms are increasingly engaged in inter-
active processes wherein neither the human nor the algorithms receive unbiased data. Algorithms can also make
biased predictions, leading to what is now known as algorithmic bias. On the other hand, human’s reaction to
the output of machine learning methods with algorithmic bias worsen the situations by making decision based
on biased information, which will probably be consumed by algorithms later. Some recent research has focused
on the ethical and moral implication of machine learning algorithmic bias on society. However, most researchs
so far treated algorithmic bias as a static factor, which fails to capture the dynamic and iterative properties of
bias. We argue that algorithmic bias interacts with humans in an iterative manner. Based on statistical analyses
of the results of several controlled experiments, we found that the three different iterated bias modes, as well
as initial training data class imbalance and human action, do affect the models learned by machine learning
algorithms. We also found that iterated filter bias, which is prominent in personalized user interfaces, can lead
to more inequality in estimated relevance and to a limited human ability to discover relevant data.
[3] N. P. Nguyen, H. M. Nguyen, H.-L. La, T. T. T. Thi, N. H. Duong, T. S. Le, D. L. N. Le, and N. Thoai,
“AI-based traffic counting: A Case Study in Vietnam”, in Proceedings of the 2022 International Conference
on Advanced Computational and Analytical Methods (ACOMPA), Ho Chi Minh City, Vietnam, Oct. 2022, pp.
34–39.
,→ Ho Chi Minh City, particularly Vietnamese cities in general, is so busy and crowded since tremendous
numbers of motorbikes move on roads. Ho Chi Minh City leaders have encountered several challenges in fully
understanding and effectively dealing with problems of urban traffic for the past few decades. If successful, it
will make a positive impact on urban aesthetics and helps reduce traffic accidents. Software-based solutions are
proper and dramatically necessary, currently. The paper mainly concentrates on traffic counting problems during
the outbreak of the Covid-19 pandemic from June 2021.
[4] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress and chal-
lenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in copyright and
intellectual property rights protection. It highlights the interplay between national and international regulations,
focusing on measures to address unauthorized distribution and safeguard creators’ rights. The article emphasizes
the importance of adapting legal frameworks to the demands of the digital era.
[5] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM Transactions
on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to sensitive
information. This article proposes an economic model to optimize security investments by assessing information
vulnerabilities and potential losses. It suggests prioritizing midrange vulnerabilities for cost-effective protection
and allocating a fraction of expected losses to maximize resource efficiency in mitigating these risks.
[6] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous
to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to
pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics
Institute has played and then leads into the need for a set of standards to guide and instruct people in the
ethical use of computers. Among these commandments is the principle of respecting intellectual property, which
emphasizes avoiding unauthorized use or copying of proprietary software. This is where the ‘Ten Commandments
for Computer Ethics’ was first presented and has since been used by hundreds of schools and corporations.
[7] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that in the digital
era, where technology revolutionizes knowledge sharing, control over creativity is increasingly concentrated in the
hands of Big Media. This dominance undermines free markets, free speech, and the tradition of free culture that
The Sixth Commandment of Computer Ethics - ID: CE608 3
fosters innovation. Lessig argues for safeguarding intellectual property and preserving an open digital ecosystem
to protect our freedom to create, build, and imagine.
[8] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and defence”, in
Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin, Germany, 2012, pp.
1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective management.
Automated systems utilizing artificial intelligence and botnets are critical for anomaly detection and operational
integrity. The risks of internal exploitation, as highlighted by the 2009 Google trade secret theft, underscore the
importance of safeguarding proprietary technologies. By integrating DevSecOps and cloud-based solutions, these
systems ensure secure and efficient data handling for scientific, commercial, and exploratory missions.
[9] P. W. Singer and A. Friedman, Cybersecurity: What Everyone Needs to Know. New York: Oxford
University Press, 2014.
,→ Dependence on computers has profoundly impacted human society, especially in warfare, where the U.S.
military is highly reliant on advanced systems. The rise of cyberwarfare is exemplified by incidents like Stuxnet
and Chinese cyberattacks aimed at stealing U.S. government data. In this book, Peter W. Singer and Allan
Friedman examine the evolution of military cybernetics, the challenges of defending cyberspace, and recent
security developments. The book explores modern conflict dynamics and offers strategies for individuals and
governments to protect themselves.
[10] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of Law and
Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus on legal frame-
works and enforcement challenges. It highlights significant cases that illustrate the financial and reputational
risks of copyright infringement. The paper discusses how these cases have shaped public awareness and policy
adjustments in the evolving digital landscape.
[11] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and privacy protection”,
Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more than 87 mil-
lion users to Cambridge Analytica, it is now imperative that comprehensive privacy policy laws be developed.
Technologists, researchers, and innovators should meaningfully contribute to the development of these policies.
[12] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages on social
networking sites: customer service or privacy infringement?”, International Journal of Electronic Commerce,
vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively intervene with
observed consumer messages. Despite intentions to enhance customer satisfaction by extending customer service,
sometimes these interventions are received negatively by consumers. We draw on privacy regulation theory to
theorize how proactive customer service interventions with consumer messages on social network sites may
evoke feelings of privacy infringement. To practitioners, our findings demonstrate that feelings of privacy are
an element to consider when handling consumer messages on social media, but also that privacy concerns may
be overcome if an intervention is perceived as useful enough.
[13] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and removing vul-
nerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than stronger protec-
tions. Overemphasis on national security overlooks individual needs, weakening global systems. The 2014 Sony
Pictures hack exemplifies the consequences, causing significant financial losses and leaking sensitive data. A bal-
anced cyber-security policy must address these vulnerabilities while protecting privacy and data, ensuring ethical
handling of information to prevent similar incidents.
[14] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strategies and
challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
4 ID: CE608
,→ Digital Rights Management (DRM) systems provide a secure framework to control user access and actions,
crucial in today’s networked environment. They allow file owners to maintain control even after distribution,
aiding in piracy prevention and protecting sensitive enterprise documents. DRM operates at various levels,
including application (e.g., Apple iTunes), operating systems (e.g., Microsoft RMS), and hardware (e.g., DVD
CSS). However, current DRM systems often lack interoperability, fail to meet all customer requirements, or
aren’t fully secure. This paper reviews the current DRM landscape, evaluating their strengths and weaknesses,
analyzing legal and technical requirements, and assessing three specific DRM systems against these criteria.
[15] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Vietnam”, Science
and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in Vietnam and
mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified Theory of Acceptance and
Use of Technology (UTAUT), the study explores psychological, moral, and technological dimensions of piracy.
Key findings include the role of perceived behavioral control and risk perception. The paper also references
instances where enforcement actions were necessary to address large-scale piracy issues in the country.
Protecting Software Rights: Ethical Responsibilities in the Digital
Age
Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh
City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam [email protected]
The Sixth Commandment of the Ten Commandments of Computer Ethics, “Thou shalt not copy or use
proprietary software without paying for it (or without permission)”, emphasizes the ethical and legal responsi-
bilities in software usage [ ]. In Vietnam’s growing digital economy, adhering to this principle is crucial for
protecting intellectual property and fostering innovation. Software piracy reduces developers’ income, stifles
creativity, and impedes technological advancement. This paper explores the effects of unauthorized software
use, highlights cases like Tran Lap vs. Zing MP3, and discusses measures to prevent piracy. Vietnam addresses
software piracy through legal mechanisms, such as the Law on Intellectual Property and Cybersecurity Law,
which impose penalties for unauthorized copying and distribution, promoting responsible digital practices and
protecting creators’ rights [ ]. Compliance with these laws helps avoid legal issues and fosters a culture of
respect for intellectual property.
Software Piracy Unauthorized copying harms developers’ earnings and impedes innovation. In 2019, Viet-
namese authorities seized pirated software and arrested those involved in large-scale distribution [ ].
Case Study In 2014, musician Tran Lap sued VNG Corporation, owner of Zing MP3, for distributing his song
“Duong den ngay vinh quang” without permission. He sought 150 million VND in damages. The case was
settled out of court, resulting in Zing MP3 ceasing unauthorized distribution and compensating Tran Lap.
This case highlights the financial and reputational consequences of violating intellectual property rights [
].
Preventative measures include using Digital Rights Management (DRM) to restrict unauthorized copying,
implementing cybersecurity measures like encryption and anti-piracy tools, and conducting educational cam-
paigns to raise awareness about the ethical and legal consequences of software piracy [ ]. Additionally, legal
enforcement is critical to ensure adherence to intellectual property laws, with severe consequences for offenders,
including fines and imprisonment.
References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and analyze their
content to determine the most suitable references. Use the corresponding numbers to fill in the [ ] in the essay
above, ensuring that each citation is relevant and aligns accurately with the context of the essay.
[1] H. T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing,
4th ed. Hoboken, NJ, USA: Wiley, 2013.
,→ This book introduces readers to a broad range of ethical and social issues within the field of cyberethics,
including those that directly impact professionals in computer and information technology (IT). Among the
topics explored are moral responsibilities, the prevention of harm through responsible computing, and the broader
societal implications of unethical behavior in the digital realm. It offers strategies to address these challenges,
promoting a deeper understanding of ethical computing practices.
[2] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal of Computer
and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.
,→ The rise of Internet connectivity has triggered a surge in cyberattacks, with malware exploiting vulner-
abilities or leveraging emerging technologies. Beyond traditional methods, new attack patterns are emerging in
2 ID: CE609
areas like social media, cloud computing, smartphones, and critical infrastructure. These attacks exploit unique
traits such as data centralization in the cloud, the pervasive use of mobile devices, and the interconnectivity of
critical systems, presenting unprecedented challenges.
[3] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress and chal-
lenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in copyright and
intellectual property rights protection. It highlights the interplay between national and international regulations,
focusing on measures to address unauthorized distribution and safeguard creators’ rights. The article emphasizes
the importance of adapting legal frameworks to the demands of the digital era.
[4] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Vietnam”, Science
and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in Vietnam and
mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified Theory of Acceptance and
Use of Technology (UTAUT), the study explores psychological, moral, and technological dimensions of piracy.
Key findings include the role of perceived behavioral control and risk perception. The paper also references
instances where enforcement actions were necessary to address large-scale piracy issues in the country.
[5] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages on social
networking sites: customer service or privacy infringement?”, International Journal of Electronic Commerce,
vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively intervene with
observed consumer messages. Despite intentions to enhance customer satisfaction by extending customer service,
sometimes these interventions are received negatively by consumers. We draw on privacy regulation theory to
theorize how proactive customer service interventions with consumer messages on social network sites may
evoke feelings of privacy infringement. To practitioners, our findings demonstrate that feelings of privacy are
an element to consider when handling consumer messages on social media, but also that privacy concerns may
be overcome if an intervention is perceived as useful enough.
[6] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strategies and
challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user access and actions,
crucial in today’s networked environment. They allow file owners to maintain control even after distribution,
aiding in piracy prevention and protecting sensitive enterprise documents. DRM operates at various levels,
including application (e.g., Apple iTunes), operating systems (e.g., Microsoft RMS), and hardware (e.g., DVD
CSS). However, current DRM systems often lack interoperability, fail to meet all customer requirements, or
aren’t fully secure. This paper reviews the current DRM landscape, evaluating their strengths and weaknesses,
analyzing legal and technical requirements, and assessing three specific DRM systems against these criteria.
[7] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and removing vulner-
abilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than stronger protec-
tions. Overemphasis on national security overlooks individual needs, weakening global systems. The 2014 Sony
Pictures hack exemplifies the consequences, causing significant financial losses and leaking sensitive data. A bal-
anced cyber-security policy must address these vulnerabilities while protecting privacy and data, ensuring ethical
handling of information to prevent similar incidents.
[8] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Professional (CISSP)
Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including threats like
ransomware and their impact on organizations. It delves into security assessment, risk management, and network
protection strategies to prevent data loss and mitigate cyber threats. The authors integrate real-world scenarios
to illustrate the consequences of cyberattacks and the importance of implementing robust cybersecurity measures.
The Sixth Commandment of Computer Ethics - ID: CE609 3
[9] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and defence”, in
Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin, Germany, 2012, pp.
1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective management.
Automated systems utilizing artificial intelligence and botnets are critical for anomaly detection and operational
integrity. The risks of internal exploitation, as highlighted by the 2009 Google trade secret theft, underscore the
importance of safeguarding proprietary technologies. By integrating DevSecOps and cloud-based solutions, these
systems ensure secure and efficient data handling for scientific, commercial, and exploratory missions.
[10] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM Transactions
on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to sensitive
information. This article proposes an economic model to optimize security investments by assessing information
vulnerabilities and potential losses. It suggests prioritizing midrange vulnerabilities for cost-effective protection
and allocating a fraction of expected losses to maximize resource efficiency in mitigating these risks.
[11] P. W. Singer and A. Friedman, Cybersecurity: What Everyone Needs to Know. New York: Oxford
University Press, 2014.
,→ Dependence on computers has profoundly impacted human society, especially in warfare, where the U.S.
military is highly reliant on advanced systems. The rise of cyberwarfare is exemplified by incidents like Stuxnet
and Chinese cyberattacks aimed at stealing U.S. government data. In this book, Peter W. Singer and Allan
Friedman examine the evolution of military cybernetics, the challenges of defending cyberspace, and recent
security developments. The book explores modern conflict dynamics and offers strategies for individuals and
governments to protect themselves.
[12] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous
to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to
pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics
Institute has played and then leads into the need for a set of standards to guide and instruct people in the
ethical use of computers. Among these commandments is the principle of respecting intellectual property, which
emphasizes avoiding unauthorized use or copying of proprietary software. This is where the ‘Ten Commandments
for Computer Ethics’ was first presented and has since been used by hundreds of schools and corporations.
[13] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of Law and
Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus on legal frame-
works and enforcement challenges. It highlights significant cases that illustrate the financial and reputational
risks of copyright infringement. The paper discusses how these cases have shaped public awareness and policy
adjustments in the evolving digital landscape.
[14] S. J. Harrington, “The effect of codes of ethics and personal denial of responsibility on computer abuse
judgments and intentions”, MIS Quarterly, vol. 20, no. 3, pp. 257–278, 1996.
,→ This research examines the impact of ethical codes on the judgments and intentions of information
systems (IS) employees regarding computer abuse, including deceptive practices like phishing and other harmful
behaviors. The study highlights how ethical codes can clarify individual responsibilities and reduce rationalizations
for unethical actions. It also explores the psychological trait of responsibility denial, showing its significant role
in influencing decisions related to computer misuse.
[15] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-driven cybersecurity: An overview, security intelligence
modeling and research directions”, SN Computer Science, vol. 2, no. 3, p. 173, 2021.
,→ Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or Industry
4.0), which can be used for the protection of Internet-connected systems from cyber threats, attacks, damage, or
4 ID: CE609
unauthorized access. To intelligently solve today’s various cybersecurity issues, popular AI techniques involving
machine learning and deep learning methods, the concept of natural language processing, knowledge represen-
tation and reasoning, as well as the concept of knowledge or rule-based expert systems modeling can be used.
Protecting Software Rights: Ethical Responsibilities in the Digital
Age
Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh
City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam [email protected]
The Sixth Commandment of the Ten Commandments of Computer Ethics, “Thou shalt not copy or use
proprietary software without paying for it (or without permission)”, emphasizes the ethical and legal responsi-
bilities in software usage [ ]. In Vietnam’s growing digital economy, adhering to this principle is crucial for
protecting intellectual property and fostering innovation. Software piracy reduces developers’ income, stifles
creativity, and impedes technological advancement. This paper explores the effects of unauthorized software
use, highlights cases like Tran Lap vs. Zing MP3, and discusses measures to prevent piracy. Vietnam addresses
software piracy through legal mechanisms, such as the Law on Intellectual Property and Cybersecurity Law,
which impose penalties for unauthorized copying and distribution, promoting responsible digital practices and
protecting creators’ rights [ ]. Compliance with these laws helps avoid legal issues and fosters a culture of
respect for intellectual property.
Software Piracy Unauthorized copying harms developers’ earnings and impedes innovation. In 2019, Viet-
namese authorities seized pirated software and arrested those involved in large-scale distribution [ ].
Case Study In 2014, musician Tran Lap sued VNG Corporation, owner of Zing MP3, for distributing his song
“Duong den ngay vinh quang” without permission. He sought 150 million VND in damages. The case was
settled out of court, resulting in Zing MP3 ceasing unauthorized distribution and compensating Tran Lap.
This case highlights the financial and reputational consequences of violating intellectual property rights [
].
Preventative measures include using Digital Rights Management (DRM) to restrict unauthorized copying,
implementing cybersecurity measures like encryption and anti-piracy tools, and conducting educational cam-
paigns to raise awareness about the ethical and legal consequences of software piracy [ ]. Additionally, legal
enforcement is critical to ensure adherence to intellectual property laws, with severe consequences for offenders,
including fines and imprisonment.
References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and analyze their
content to determine the most suitable references. Use the corresponding numbers to fill in the [ ] in the essay
above, ensuring that each citation is relevant and aligns accurately with the context of the essay.
[1] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of Law and
Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus on legal frame-
works and enforcement challenges. It highlights significant cases that illustrate the financial and reputational
risks of copyright infringement. The paper discusses how these cases have shaped public awareness and policy
adjustments in the evolving digital landscape.
[2] W. Sun, O. Nasraoui, and P. Shafto, “Evolution and impact of bias in human and machine learning
algorithm interaction”, PLOS ONE, vol. 15, no. 8, p. e0235502, 2020.
,→ Recently, algorithms have been receiving data from the general population in the form of labeling, anno-
tations, etc. The result is that algorithms are subject to bias that is born from ingesting unchecked information,
2 ID: CE610
such as biased samples and biased labels. Furthermore, people and algorithms are increasingly engaged in inter-
active processes wherein neither the human nor the algorithms receive unbiased data. Algorithms can also make
biased predictions, leading to what is now known as algorithmic bias. On the other hand, human’s reaction to
the output of machine learning methods with algorithmic bias worsen the situations by making decision based
on biased information, which will probably be consumed by algorithms later. Some recent research has focused
on the ethical and moral implication of machine learning algorithmic bias on society. However, most researchs
so far treated algorithmic bias as a static factor, which fails to capture the dynamic and iterative properties of
bias. We argue that algorithmic bias interacts with humans in an iterative manner. Based on statistical analyses
of the results of several controlled experiments, we found that the three different iterated bias modes, as well
as initial training data class imbalance and human action, do affect the models learned by machine learning
algorithms. We also found that iterated filter bias, which is prominent in personalized user interfaces, can lead
to more inequality in estimated relevance and to a limited human ability to discover relevant data.
[3] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages on social
networking sites: customer service or privacy infringement?”, International Journal of Electronic Commerce,
vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively intervene with
observed consumer messages. Despite intentions to enhance customer satisfaction by extending customer service,
sometimes these interventions are received negatively by consumers. We draw on privacy regulation theory to
theorize how proactive customer service interventions with consumer messages on social network sites may
evoke feelings of privacy infringement. To practitioners, our findings demonstrate that feelings of privacy are
an element to consider when handling consumer messages on social media, but also that privacy concerns may
be overcome if an intervention is perceived as useful enough.
[4] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strategies and
challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user access and actions,
crucial in today’s networked environment. They allow file owners to maintain control even after distribution,
aiding in piracy prevention and protecting sensitive enterprise documents. DRM operates at various levels,
including application (e.g., Apple iTunes), operating systems (e.g., Microsoft RMS), and hardware (e.g., DVD
CSS). However, current DRM systems often lack interoperability, fail to meet all customer requirements, or
aren’t fully secure. This paper reviews the current DRM landscape, evaluating their strengths and weaknesses,
analyzing legal and technical requirements, and assessing three specific DRM systems against these criteria.
[5] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and defence”, in
Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin, Germany, 2012, pp.
1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective management.
Automated systems utilizing artificial intelligence and botnets are critical for anomaly detection and operational
integrity. The risks of internal exploitation, as highlighted by the 2009 Google trade secret theft, underscore the
importance of safeguarding proprietary technologies. By integrating DevSecOps and cloud-based solutions, these
systems ensure secure and efficient data handling for scientific, commercial, and exploratory missions.
[6] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-driven cybersecurity: An overview, security intelligence
modeling and research directions”, SN Computer Science, vol. 2, no. 3, p. 173, 2021.
,→ Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or Industry
4.0), which can be used for the protection of Internet-connected systems from cyber threats, attacks, damage, or
unauthorized access. To intelligently solve today’s various cybersecurity issues, popular AI techniques involving
machine learning and deep learning methods, the concept of natural language processing, knowledge represen-
tation and reasoning, as well as the concept of knowledge or rule-based expert systems modeling can be used.
[7] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute, vol. 27, 2006.
The Sixth Commandment of Computer Ethics - ID: CE610 3
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous to
1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to pursue
a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics Institute
has played and then, leads into the need for a set of standards to guide and instruct people in the ethical use of
computers. Barquin calls for the use of the ‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of schools and
corporations. The ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that:
"Thou shalt think about the social consequences of the program you are writing or the system you are designing".
This commandment emphasizes the responsibility of developers and designers to consider the broader impact of
their creations.
[8] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Vietnam”, Science
and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in Vietnam and
mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified Theory of Acceptance and
Use of Technology (UTAUT), the study explores psychological, moral, and technological dimensions of piracy.
Key findings include the role of perceived behavioral control and risk perception. The paper also references
instances where enforcement actions were necessary to address large-scale piracy issues in the country.
[9] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous
to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to
pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics
Institute has played and then leads into the need for a set of standards to guide and instruct people in the
ethical use of computers. Among these commandments is the principle of respecting intellectual property, which
emphasizes avoiding unauthorized use or copying of proprietary software. This is where the ‘Ten Commandments
for Computer Ethics’ was first presented and has since been used by hundreds of schools and corporations.
[10] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress and chal-
lenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in copyright and
intellectual property rights protection. It highlights the interplay between national and international regulations,
focusing on measures to address unauthorized distribution and safeguard creators’ rights. The article emphasizes
the importance of adapting legal frameworks to the demands of the digital era.
[11] H. T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing,
4th ed. Hoboken, NJ, USA: Wiley, 2013.
,→ This book introduces readers to a broad range of ethical and social issues within the field of cyberethics,
including those that directly impact professionals in computer and information technology (IT). Among the
topics explored are moral responsibilities, the prevention of harm through responsible computing, and the broader
societal implications of unethical behavior in the digital realm. It offers strategies to address these challenges,
promoting a deeper understanding of ethical computing practices.
[12] S. J. Harrington, “The effect of codes of ethics and personal denial of responsibility on computer abuse
judgments and intentions”, MIS Quarterly, vol. 20, no. 3, pp. 257–278, 1996.
,→ This research examines the impact of ethical codes on the judgments and intentions of information
systems (IS) employees regarding computer abuse, including deceptive practices like phishing and other harmful
behaviors. The study highlights how ethical codes can clarify individual responsibilities and reduce rationalizations
for unethical actions. It also explores the psychological trait of responsibility denial, showing its significant role
in influencing decisions related to computer misuse.
[13] N. P. Nguyen, H. M. Nguyen, H.-L. La, T. T. T. Thi, N. H. Duong, T. S. Le, D. L. N. Le, and N. Thoai,
“AI-based traffic counting: A Case Study in Vietnam”, in Proceedings of the 2022 International Conference on
4 ID: CE610
Advanced Computational and Analytical Methods (ACOMPA), Ho Chi Minh City, Vietnam, Oct. 2022, pp.
34–39.
,→ Ho Chi Minh City, particularly Vietnamese cities in general, is so busy and crowded since tremendous
numbers of motorbikes move on roads. Ho Chi Minh City leaders have encountered several challenges in fully
understanding and effectively dealing with problems of urban traffic for the past few decades. If successful, it
will make a positive impact on urban aesthetics and helps reduce traffic accidents. Software-based solutions are
proper and dramatically necessary, currently. The paper mainly concentrates on traffic counting problems during
the outbreak of the Covid-19 pandemic from June 2021.
[14] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Professional
(CISSP) Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including threats like
ransomware and their impact on organizations. It delves into security assessment, risk management, and network
protection strategies to prevent data loss and mitigate cyber threats. The authors integrate real-world scenarios
to illustrate the consequences of cyberattacks and the importance of implementing robust cybersecurity measures.
[15] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous to
1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to pursue
a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics Institute
has played and then leads into the need for a set of standards to guide and instruct people in the ethical use
of computers. Among these commandments is the principle of avoiding harm to others through the misuse of
technology. This is where the ‘Ten Commandments for Computer Ethics’ was first presented and has since been
used by hundreds of schools and corporations.
Protecting Software Rights: Ethical Responsibilities in the Digital
Age
Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh
City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam [email protected]
The Sixth Commandment of the Ten Commandments of Computer Ethics, “Thou shalt not copy or use
proprietary software without paying for it (or without permission)”, emphasizes the ethical and legal responsi-
bilities in software usage [ ]. In Vietnam’s growing digital economy, adhering to this principle is crucial for
protecting intellectual property and fostering innovation. Software piracy reduces developers’ income, stifles
creativity, and impedes technological advancement. This paper explores the effects of unauthorized software
use, highlights cases like Tran Lap vs. Zing MP3, and discusses measures to prevent piracy. Vietnam addresses
software piracy through legal mechanisms, such as the Law on Intellectual Property and Cybersecurity Law,
which impose penalties for unauthorized copying and distribution, promoting responsible digital practices and
protecting creators’ rights [ ]. Compliance with these laws helps avoid legal issues and fosters a culture of
respect for intellectual property.
Software Piracy Unauthorized copying harms developers’ earnings and impedes innovation. In 2019, Viet-
namese authorities seized pirated software and arrested those involved in large-scale distribution [ ].
Case Study In 2014, musician Tran Lap sued VNG Corporation, owner of Zing MP3, for distributing his song
“Duong den ngay vinh quang” without permission. He sought 150 million VND in damages. The case was
settled out of court, resulting in Zing MP3 ceasing unauthorized distribution and compensating Tran Lap.
This case highlights the financial and reputational consequences of violating intellectual property rights [
].
Preventative measures include using Digital Rights Management (DRM) to restrict unauthorized copying,
implementing cybersecurity measures like encryption and anti-piracy tools, and conducting educational cam-
paigns to raise awareness about the ethical and legal consequences of software piracy [ ]. Additionally, legal
enforcement is critical to ensure adherence to intellectual property laws, with severe consequences for offenders,
including fines and imprisonment.
References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and analyze their
content to determine the most suitable references. Use the corresponding numbers to fill in the [ ] in the essay
above, ensuring that each citation is relevant and aligns accurately with the context of the essay.
[1] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Vietnam”, Science
and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in Vietnam and
mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified Theory of Acceptance and
Use of Technology (UTAUT), the study explores psychological, moral, and technological dimensions of piracy.
Key findings include the role of perceived behavioral control and risk perception. The paper also references
instances where enforcement actions were necessary to address large-scale piracy issues in the country.
[2] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous
to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to
2 ID: CE611
pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics
Institute has played and then leads into the need for a set of standards to guide and instruct people in the
ethical use of computers. Among these commandments is the principle of respecting intellectual property, which
emphasizes avoiding unauthorized use or copying of proprietary software. This is where the ‘Ten Commandments
for Computer Ethics’ was first presented and has since been used by hundreds of schools and corporations.
[3] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and privacy protection”,
Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more than 87 mil-
lion users to Cambridge Analytica, it is now imperative that comprehensive privacy policy laws be developed.
Technologists, researchers, and innovators should meaningfully contribute to the development of these policies.
[4] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and defence”, in
Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin, Germany, 2012, pp.
1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective management.
Automated systems utilizing artificial intelligence and botnets are critical for anomaly detection and operational
integrity. The risks of internal exploitation, as highlighted by the 2009 Google trade secret theft, underscore the
importance of safeguarding proprietary technologies. By integrating DevSecOps and cloud-based solutions, these
systems ensure secure and efficient data handling for scientific, commercial, and exploratory missions.
[5] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strategies and
challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user access and actions,
crucial in today’s networked environment. They allow file owners to maintain control even after distribution,
aiding in piracy prevention and protecting sensitive enterprise documents. DRM operates at various levels,
including application (e.g., Apple iTunes), operating systems (e.g., Microsoft RMS), and hardware (e.g., DVD
CSS). However, current DRM systems often lack interoperability, fail to meet all customer requirements, or
aren’t fully secure. This paper reviews the current DRM landscape, evaluating their strengths and weaknesses,
analyzing legal and technical requirements, and assessing three specific DRM systems against these criteria.
[6] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and removing vulner-
abilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than stronger protec-
tions. Overemphasis on national security overlooks individual needs, weakening global systems. The 2014 Sony
Pictures hack exemplifies the consequences, causing significant financial losses and leaking sensitive data. A bal-
anced cyber-security policy must address these vulnerabilities while protecting privacy and data, ensuring ethical
handling of information to prevent similar incidents.
[7] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages on social
networking sites: customer service or privacy infringement?”, International Journal of Electronic Commerce,
vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively intervene with
observed consumer messages. Despite intentions to enhance customer satisfaction by extending customer service,
sometimes these interventions are received negatively by consumers. We draw on privacy regulation theory to
theorize how proactive customer service interventions with consumer messages on social network sites may
evoke feelings of privacy infringement. To practitioners, our findings demonstrate that feelings of privacy are
an element to consider when handling consumer messages on social media, but also that privacy concerns may
be overcome if an intervention is perceived as useful enough.
[8] N. P. Nguyen, H. M. Nguyen, H.-L. La, T. T. T. Thi, N. H. Duong, T. S. Le, D. L. N. Le, and N. Thoai,
“AI-based traffic counting: A Case Study in Vietnam”, in Proceedings of the 2022 International Conference
on Advanced Computational and Analytical Methods (ACOMPA), Ho Chi Minh City, Vietnam, Oct. 2022, pp.
34–39.
The Sixth Commandment of Computer Ethics - ID: CE611 3
,→ Ho Chi Minh City, particularly Vietnamese cities in general, is so busy and crowded since tremendous
numbers of motorbikes move on roads. Ho Chi Minh City leaders have encountered several challenges in fully
understanding and effectively dealing with problems of urban traffic for the past few decades. If successful, it
will make a positive impact on urban aesthetics and helps reduce traffic accidents. Software-based solutions are
proper and dramatically necessary, currently. The paper mainly concentrates on traffic counting problems during
the outbreak of the Covid-19 pandemic from June 2021.
[9] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-driven cybersecurity: An overview, security intelligence
modeling and research directions”, SN Computer Science, vol. 2, no. 3, p. 173, 2021.
,→ Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or Industry
4.0), which can be used for the protection of Internet-connected systems from cyber threats, attacks, damage, or
unauthorized access. To intelligently solve today’s various cybersecurity issues, popular AI techniques involving
machine learning and deep learning methods, the concept of natural language processing, knowledge represen-
tation and reasoning, as well as the concept of knowledge or rule-based expert systems modeling can be used.
[10] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress and chal-
lenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in copyright and
intellectual property rights protection. It highlights the interplay between national and international regulations,
focusing on measures to address unauthorized distribution and safeguard creators’ rights. The article emphasizes
the importance of adapting legal frameworks to the demands of the digital era.
[11] W. Sun, O. Nasraoui, and P. Shafto, “Evolution and impact of bias in human and machine learning
algorithm interaction”, PLOS ONE, vol. 15, no. 8, p. e0235502, 2020.
,→ Recently, algorithms have been receiving data from the general population in the form of labeling, anno-
tations, etc. The result is that algorithms are subject to bias that is born from ingesting unchecked information,
such as biased samples and biased labels. Furthermore, people and algorithms are increasingly engaged in inter-
active processes wherein neither the human nor the algorithms receive unbiased data. Algorithms can also make
biased predictions, leading to what is now known as algorithmic bias. On the other hand, human’s reaction to
the output of machine learning methods with algorithmic bias worsen the situations by making decision based
on biased information, which will probably be consumed by algorithms later. Some recent research has focused
on the ethical and moral implication of machine learning algorithmic bias on society. However, most researchs
so far treated algorithmic bias as a static factor, which fails to capture the dynamic and iterative properties of
bias. We argue that algorithmic bias interacts with humans in an iterative manner. Based on statistical analyses
of the results of several controlled experiments, we found that the three different iterated bias modes, as well
as initial training data class imbalance and human action, do affect the models learned by machine learning
algorithms. We also found that iterated filter bias, which is prominent in personalized user interfaces, can lead
to more inequality in estimated relevance and to a limited human ability to discover relevant data.
[12] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal of Computer
and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.
,→ The rise of Internet connectivity has triggered a surge in cyberattacks, with malware exploiting vulner-
abilities or leveraging emerging technologies. Beyond traditional methods, new attack patterns are emerging in
areas like social media, cloud computing, smartphones, and critical infrastructure. These attacks exploit unique
traits such as data centralization in the cloud, the pervasive use of mobile devices, and the interconnectivity of
critical systems, presenting unprecedented challenges.
[13] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of Law and
Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus on legal frame-
works and enforcement challenges. It highlights significant cases that illustrate the financial and reputational
risks of copyright infringement. The paper discusses how these cases have shaped public awareness and policy
adjustments in the evolving digital landscape.
4 ID: CE611
[14] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM Transactions
on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to sensitive
information. This article proposes an economic model to optimize security investments by assessing information
vulnerabilities and potential losses. It suggests prioritizing midrange vulnerabilities for cost-effective protection
and allocating a fraction of expected losses to maximize resource efficiency in mitigating these risks.
[15] R. A. Spinello, Cyberethics: Morality and Law in Cyberspace, 6th ed. Burlington, MA, USA: Jones &
Bartlett Learning, 2017.
,→ Cyberethics: Morality and Law in Cyberspace provides a comprehensive and up-to-date exploration of the
internet’s impact on society, addressing ethical challenges such as information privacy, cybersecurity, and digital
misconduct. By analyzing case studies of data breaches, “fake news", and online fraud, the book emphasizes the
moral responsibilities of internet users and policymakers. The author proposes that the intersection of technology,
law, and public policy offers pathways to mitigate harm and create a safer cyberspace, fostering ethical practices
in the digital age.
Protecting Software Rights: Ethical Responsibilities in the Digital
Age
Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh
City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam [email protected]
The Sixth Commandment of the Ten Commandments of Computer Ethics, “Thou shalt not copy or use
proprietary software without paying for it (or without permission)”, emphasizes the ethical and legal responsi-
bilities in software usage [ ]. In Vietnam’s growing digital economy, adhering to this principle is crucial for
protecting intellectual property and fostering innovation. Software piracy reduces developers’ income, stifles
creativity, and impedes technological advancement. This paper explores the effects of unauthorized software
use, highlights cases like Tran Lap vs. Zing MP3, and discusses measures to prevent piracy. Vietnam addresses
software piracy through legal mechanisms, such as the Law on Intellectual Property and Cybersecurity Law,
which impose penalties for unauthorized copying and distribution, promoting responsible digital practices and
protecting creators’ rights [ ]. Compliance with these laws helps avoid legal issues and fosters a culture of
respect for intellectual property.
Software Piracy Unauthorized copying harms developers’ earnings and impedes innovation. In 2019, Viet-
namese authorities seized pirated software and arrested those involved in large-scale distribution [ ].
Case Study In 2014, musician Tran Lap sued VNG Corporation, owner of Zing MP3, for distributing his song
“Duong den ngay vinh quang” without permission. He sought 150 million VND in damages. The case was
settled out of court, resulting in Zing MP3 ceasing unauthorized distribution and compensating Tran Lap.
This case highlights the financial and reputational consequences of violating intellectual property rights [
].
Preventative measures include using Digital Rights Management (DRM) to restrict unauthorized copying,
implementing cybersecurity measures like encryption and anti-piracy tools, and conducting educational cam-
paigns to raise awareness about the ethical and legal consequences of software piracy [ ]. Additionally, legal
enforcement is critical to ensure adherence to intellectual property laws, with severe consequences for offenders,
including fines and imprisonment.
References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and analyze their
content to determine the most suitable references. Use the corresponding numbers to fill in the [ ] in the essay
above, ensuring that each citation is relevant and aligns accurately with the context of the essay.
[1] S. J. Harrington, “The effect of codes of ethics and personal denial of responsibility on computer abuse
judgments and intentions”, MIS Quarterly, vol. 20, no. 3, pp. 257–278, 1996.
,→ This research examines the impact of ethical codes on the judgments and intentions of information
systems (IS) employees regarding computer abuse, including deceptive practices like phishing and other harmful
behaviors. The study highlights how ethical codes can clarify individual responsibilities and reduce rationalizations
for unethical actions. It also explores the psychological trait of responsibility denial, showing its significant role
in influencing decisions related to computer misuse.
[2] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Vietnam”, Science
and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in Vietnam and
mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified Theory of Acceptance and
2 ID: CE612
Use of Technology (UTAUT), the study explores psychological, moral, and technological dimensions of piracy.
Key findings include the role of perceived behavioral control and risk perception. The paper also references
instances where enforcement actions were necessary to address large-scale piracy issues in the country.
[3] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous to
1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to pursue
a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics Institute
has played and then leads into the need for a set of standards to guide and instruct people in the ethical use
of computers. Among these commandments is the principle of avoiding harm to others through the misuse of
technology. This is where the ‘Ten Commandments for Computer Ethics’ was first presented and has since been
used by hundreds of schools and corporations.
[4] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages on social
networking sites: customer service or privacy infringement?”, International Journal of Electronic Commerce,
vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively intervene with
observed consumer messages. Despite intentions to enhance customer satisfaction by extending customer service,
sometimes these interventions are received negatively by consumers. We draw on privacy regulation theory to
theorize how proactive customer service interventions with consumer messages on social network sites may
evoke feelings of privacy infringement. To practitioners, our findings demonstrate that feelings of privacy are
an element to consider when handling consumer messages on social media, but also that privacy concerns may
be overcome if an intervention is perceived as useful enough.
[5] W. Sun, O. Nasraoui, and P. Shafto, “Evolution and impact of bias in human and machine learning
algorithm interaction”, PLOS ONE, vol. 15, no. 8, p. e0235502, 2020.
,→ Recently, algorithms have been receiving data from the general population in the form of labeling, anno-
tations, etc. The result is that algorithms are subject to bias that is born from ingesting unchecked information,
such as biased samples and biased labels. Furthermore, people and algorithms are increasingly engaged in inter-
active processes wherein neither the human nor the algorithms receive unbiased data. Algorithms can also make
biased predictions, leading to what is now known as algorithmic bias. On the other hand, human’s reaction to
the output of machine learning methods with algorithmic bias worsen the situations by making decision based
on biased information, which will probably be consumed by algorithms later. Some recent research has focused
on the ethical and moral implication of machine learning algorithmic bias on society. However, most researchs
so far treated algorithmic bias as a static factor, which fails to capture the dynamic and iterative properties of
bias. We argue that algorithmic bias interacts with humans in an iterative manner. Based on statistical analyses
of the results of several controlled experiments, we found that the three different iterated bias modes, as well
as initial training data class imbalance and human action, do affect the models learned by machine learning
algorithms. We also found that iterated filter bias, which is prominent in personalized user interfaces, can lead
to more inequality in estimated relevance and to a limited human ability to discover relevant data.
[6] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of Law and
Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus on legal frame-
works and enforcement challenges. It highlights significant cases that illustrate the financial and reputational
risks of copyright infringement. The paper discusses how these cases have shaped public awareness and policy
adjustments in the evolving digital landscape.
[7] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM Transactions
on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to sensitive
information. This article proposes an economic model to optimize security investments by assessing information
The Sixth Commandment of Computer Ethics - ID: CE612 3
vulnerabilities and potential losses. It suggests prioritizing midrange vulnerabilities for cost-effective protection
and allocating a fraction of expected losses to maximize resource efficiency in mitigating these risks.
[8] M. Akbanov, V. G. Vassilakis, and M. D. Logothetis, “WannaCry ransomware: Analysis of infection,
persistence, recovery prevention and propagation mechanisms”, Journal of Telecommunications and Information
Technology, no. 1, pp. 113–124, 2019.
,→ In recent years, we have been experiencing fast proliferation of different types of ransomware targeting
home users, companies and even critical telecommunications infrastructure elements. Modern day ransomware
relies on sophisticated infection, persistence and recovery prevention mechanisms. Some recent examples that re-
ceived significant attention include WannaCry, Petya and BadRabbit. To design and develop appropriate defense
mechanisms, it is important to understand the characteristics and the behavior of different types of ransomware.
[9] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute, vol. 27, 2006.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous to
1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to pursue
a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics Institute
has played and then, leads into the need for a set of standards to guide and instruct people in the ethical use of
computers. Barquin calls for the use of the ‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of schools and
corporations. The ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that:
"Thou shalt think about the social consequences of the program you are writing or the system you are designing".
This commandment emphasizes the responsibility of developers and designers to consider the broader impact of
their creations.
[10] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and privacy protection”,
Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more than 87 mil-
lion users to Cambridge Analytica, it is now imperative that comprehensive privacy policy laws be developed.
Technologists, researchers, and innovators should meaningfully contribute to the development of these policies.
[11] E. K. Clemons, R. V. Waran, S. Hermes, M. Schreieck, and H. Krcmar, “Computing and Social Welfare:
Minimizing societal harm from digital transformation while preserving the benefits of innovation in online
businesses”, Electronic Markets, vol. 32, no. 2, pp. 417–436, 2022.
,→ Social Welfare Computing is an emerging discipline that seeks to direct technology to cause minimum
societal disruption, and in particular seeks to minimize the harm caused directly by technology itself. Often the
companies that create significant value for their users obtain new sources of wealth and power, which inevitably
lead to new forms of abuse of power and new forms of societal disruption. Societal disruption in turn requires
social adaptation, including new regulations to influence the behavior of firms and to define and to protect the
rights of individuals in the changed society. Social Welfare Computing seeks to guide social adaptation, combining
insights from disciplines as varied as anthropology, business strategy, economics, strategic planning, and law.
[12] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strategies and
challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user access and actions,
crucial in today’s networked environment. They allow file owners to maintain control even after distribution,
aiding in piracy prevention and protecting sensitive enterprise documents. DRM operates at various levels,
including application (e.g., Apple iTunes), operating systems (e.g., Microsoft RMS), and hardware (e.g., DVD
CSS). However, current DRM systems often lack interoperability, fail to meet all customer requirements, or
aren’t fully secure. This paper reviews the current DRM landscape, evaluating their strengths and weaknesses,
analyzing legal and technical requirements, and assessing three specific DRM systems against these criteria.
[13] R. A. Spinello, Cyberethics: Morality and Law in Cyberspace, 6th ed. Burlington, MA, USA: Jones &
Bartlett Learning, 2017.
4 ID: CE612
,→ Cyberethics: Morality and Law in Cyberspace provides a comprehensive and up-to-date exploration of the
internet’s impact on society, addressing ethical challenges such as information privacy, cybersecurity, and digital
misconduct. By analyzing case studies of data breaches, “fake news", and online fraud, the book emphasizes the
moral responsibilities of internet users and policymakers. The author proposes that the intersection of technology,
law, and public policy offers pathways to mitigate harm and create a safer cyberspace, fostering ethical practices
in the digital age.
[14] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress and chal-
lenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in copyright and
intellectual property rights protection. It highlights the interplay between national and international regulations,
focusing on measures to address unauthorized distribution and safeguard creators’ rights. The article emphasizes
the importance of adapting legal frameworks to the demands of the digital era.
[15] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous
to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to
pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics
Institute has played and then leads into the need for a set of standards to guide and instruct people in the
ethical use of computers. Among these commandments is the principle of respecting intellectual property, which
emphasizes avoiding unauthorized use or copying of proprietary software. This is where the ‘Ten Commandments
for Computer Ethics’ was first presented and has since been used by hundreds of schools and corporations.
Protecting Software Rights: Ethical Responsibilities in the Digital
Age
Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh
City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam [email protected]
The Sixth Commandment of the Ten Commandments of Computer Ethics, “Thou shalt not copy or use
proprietary software without paying for it (or without permission)”, emphasizes the ethical and legal responsi-
bilities in software usage [ ]. In Vietnam’s growing digital economy, adhering to this principle is crucial for
protecting intellectual property and fostering innovation. Software piracy reduces developers’ income, stifles
creativity, and impedes technological advancement. This paper explores the effects of unauthorized software
use, highlights cases like Tran Lap vs. Zing MP3, and discusses measures to prevent piracy. Vietnam addresses
software piracy through legal mechanisms, such as the Law on Intellectual Property and Cybersecurity Law,
which impose penalties for unauthorized copying and distribution, promoting responsible digital practices and
protecting creators’ rights [ ]. Compliance with these laws helps avoid legal issues and fosters a culture of
respect for intellectual property.
Software Piracy Unauthorized copying harms developers’ earnings and impedes innovation. In 2019, Viet-
namese authorities seized pirated software and arrested those involved in large-scale distribution [ ].
Case Study In 2014, musician Tran Lap sued VNG Corporation, owner of Zing MP3, for distributing his song
“Duong den ngay vinh quang” without permission. He sought 150 million VND in damages. The case was
settled out of court, resulting in Zing MP3 ceasing unauthorized distribution and compensating Tran Lap.
This case highlights the financial and reputational consequences of violating intellectual property rights [
].
Preventative measures include using Digital Rights Management (DRM) to restrict unauthorized copying,
implementing cybersecurity measures like encryption and anti-piracy tools, and conducting educational cam-
paigns to raise awareness about the ethical and legal consequences of software piracy [ ]. Additionally, legal
enforcement is critical to ensure adherence to intellectual property laws, with severe consequences for offenders,
including fines and imprisonment.
References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and analyze their
content to determine the most suitable references. Use the corresponding numbers to fill in the [ ] in the essay
above, ensuring that each citation is relevant and aligns accurately with the context of the essay.
[1] W. Sun, O. Nasraoui, and P. Shafto, “Evolution and impact of bias in human and machine learning
algorithm interaction”, PLOS ONE, vol. 15, no. 8, p. e0235502, 2020.
,→ Recently, algorithms have been receiving data from the general population in the form of labeling, anno-
tations, etc. The result is that algorithms are subject to bias that is born from ingesting unchecked information,
such as biased samples and biased labels. Furthermore, people and algorithms are increasingly engaged in inter-
active processes wherein neither the human nor the algorithms receive unbiased data. Algorithms can also make
biased predictions, leading to what is now known as algorithmic bias. On the other hand, human’s reaction to
the output of machine learning methods with algorithmic bias worsen the situations by making decision based
on biased information, which will probably be consumed by algorithms later. Some recent research has focused
on the ethical and moral implication of machine learning algorithmic bias on society. However, most researchs
so far treated algorithmic bias as a static factor, which fails to capture the dynamic and iterative properties of
2 ID: CE613
bias. We argue that algorithmic bias interacts with humans in an iterative manner. Based on statistical analyses
of the results of several controlled experiments, we found that the three different iterated bias modes, as well
as initial training data class imbalance and human action, do affect the models learned by machine learning
algorithms. We also found that iterated filter bias, which is prominent in personalized user interfaces, can lead
to more inequality in estimated relevance and to a limited human ability to discover relevant data.
[2] H. T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing,
4th ed. Hoboken, NJ, USA: Wiley, 2013.
,→ This book introduces readers to a broad range of ethical and social issues within the field of cyberethics,
including those that directly impact professionals in computer and information technology (IT). Among the
topics explored are moral responsibilities, the prevention of harm through responsible computing, and the broader
societal implications of unethical behavior in the digital realm. It offers strategies to address these challenges,
promoting a deeper understanding of ethical computing practices.
[3] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress and chal-
lenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in copyright and
intellectual property rights protection. It highlights the interplay between national and international regulations,
focusing on measures to address unauthorized distribution and safeguard creators’ rights. The article emphasizes
the importance of adapting legal frameworks to the demands of the digital era.
[4] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and privacy protection”,
Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more than 87 mil-
lion users to Cambridge Analytica, it is now imperative that comprehensive privacy policy laws be developed.
Technologists, researchers, and innovators should meaningfully contribute to the development of these policies.
[5] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages on social
networking sites: customer service or privacy infringement?”, International Journal of Electronic Commerce,
vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively intervene with
observed consumer messages. Despite intentions to enhance customer satisfaction by extending customer service,
sometimes these interventions are received negatively by consumers. We draw on privacy regulation theory to
theorize how proactive customer service interventions with consumer messages on social network sites may
evoke feelings of privacy infringement. To practitioners, our findings demonstrate that feelings of privacy are
an element to consider when handling consumer messages on social media, but also that privacy concerns may
be overcome if an intervention is perceived as useful enough.
[6] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Professional (CISSP)
Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including threats like
ransomware and their impact on organizations. It delves into security assessment, risk management, and network
protection strategies to prevent data loss and mitigate cyber threats. The authors integrate real-world scenarios
to illustrate the consequences of cyberattacks and the importance of implementing robust cybersecurity measures.
[7] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strategies and
challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user access and actions,
crucial in today’s networked environment. They allow file owners to maintain control even after distribution,
aiding in piracy prevention and protecting sensitive enterprise documents. DRM operates at various levels,
including application (e.g., Apple iTunes), operating systems (e.g., Microsoft RMS), and hardware (e.g., DVD
CSS). However, current DRM systems often lack interoperability, fail to meet all customer requirements, or
aren’t fully secure. This paper reviews the current DRM landscape, evaluating their strengths and weaknesses,
analyzing legal and technical requirements, and assessing three specific DRM systems against these criteria.
The Sixth Commandment of Computer Ethics - ID: CE613 3
[8] S. J. Harrington, “The effect of codes of ethics and personal denial of responsibility on computer abuse
judgments and intentions”, MIS Quarterly, vol. 20, no. 3, pp. 257–278, 1996.
,→ This research examines the impact of ethical codes on the judgments and intentions of information
systems (IS) employees regarding computer abuse, including deceptive practices like phishing and other harmful
behaviors. The study highlights how ethical codes can clarify individual responsibilities and reduce rationalizations
for unethical actions. It also explores the psychological trait of responsibility denial, showing its significant role
in influencing decisions related to computer misuse.
[9] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Vietnam”, Science
and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in Vietnam and
mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified Theory of Acceptance and
Use of Technology (UTAUT), the study explores psychological, moral, and technological dimensions of piracy.
Key findings include the role of perceived behavioral control and risk perception. The paper also references
instances where enforcement actions were necessary to address large-scale piracy issues in the country.
[10] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and removing vul-
nerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than stronger protec-
tions. Overemphasis on national security overlooks individual needs, weakening global systems. The 2014 Sony
Pictures hack exemplifies the consequences, causing significant financial losses and leaking sensitive data. A bal-
anced cyber-security policy must address these vulnerabilities while protecting privacy and data, ensuring ethical
handling of information to prevent similar incidents.
[11] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that in the digital
era, where technology revolutionizes knowledge sharing, control over creativity is increasingly concentrated in the
hands of Big Media. This dominance undermines free markets, free speech, and the tradition of free culture that
fosters innovation. Lessig argues for safeguarding intellectual property and preserving an open digital ecosystem
to protect our freedom to create, build, and imagine.
[12] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-driven cybersecurity: An overview, security intelligence
modeling and research directions”, SN Computer Science, vol. 2, no. 3, p. 173, 2021.
,→ Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or Industry
4.0), which can be used for the protection of Internet-connected systems from cyber threats, attacks, damage, or
unauthorized access. To intelligently solve today’s various cybersecurity issues, popular AI techniques involving
machine learning and deep learning methods, the concept of natural language processing, knowledge represen-
tation and reasoning, as well as the concept of knowledge or rule-based expert systems modeling can be used.
[13] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of Law and
Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus on legal frame-
works and enforcement challenges. It highlights significant cases that illustrate the financial and reputational
risks of copyright infringement. The paper discusses how these cases have shaped public awareness and policy
adjustments in the evolving digital landscape.
[14] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous
to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to
pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics
Institute has played and then leads into the need for a set of standards to guide and instruct people in the
ethical use of computers. Among these commandments is the principle of respecting intellectual property, which
4 ID: CE613
emphasizes avoiding unauthorized use or copying of proprietary software. This is where the ‘Ten Commandments
for Computer Ethics’ was first presented and has since been used by hundreds of schools and corporations.
[15] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous to
1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to pursue
a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics Institute
has played and then leads into the need for a set of standards to guide and instruct people in the ethical use
of computers. Among these commandments is the principle of avoiding harm to others through the misuse of
technology. This is where the ‘Ten Commandments for Computer Ethics’ was first presented and has since been
used by hundreds of schools and corporations.
Protecting Software Rights: Ethical Responsibilities in the Digital
Age
Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh
City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam [email protected]
The Sixth Commandment of the Ten Commandments of Computer Ethics, “Thou shalt not copy or use
proprietary software without paying for it (or without permission)”, emphasizes the ethical and legal responsi-
bilities in software usage [ ]. In Vietnam’s growing digital economy, adhering to this principle is crucial for
protecting intellectual property and fostering innovation. Software piracy reduces developers’ income, stifles
creativity, and impedes technological advancement. This paper explores the effects of unauthorized software
use, highlights cases like Tran Lap vs. Zing MP3, and discusses measures to prevent piracy. Vietnam addresses
software piracy through legal mechanisms, such as the Law on Intellectual Property and Cybersecurity Law,
which impose penalties for unauthorized copying and distribution, promoting responsible digital practices and
protecting creators’ rights [ ]. Compliance with these laws helps avoid legal issues and fosters a culture of
respect for intellectual property.
Software Piracy Unauthorized copying harms developers’ earnings and impedes innovation. In 2019, Viet-
namese authorities seized pirated software and arrested those involved in large-scale distribution [ ].
Case Study In 2014, musician Tran Lap sued VNG Corporation, owner of Zing MP3, for distributing his song
“Duong den ngay vinh quang” without permission. He sought 150 million VND in damages. The case was
settled out of court, resulting in Zing MP3 ceasing unauthorized distribution and compensating Tran Lap.
This case highlights the financial and reputational consequences of violating intellectual property rights [
].
Preventative measures include using Digital Rights Management (DRM) to restrict unauthorized copying,
implementing cybersecurity measures like encryption and anti-piracy tools, and conducting educational cam-
paigns to raise awareness about the ethical and legal consequences of software piracy [ ]. Additionally, legal
enforcement is critical to ensure adherence to intellectual property laws, with severe consequences for offenders,
including fines and imprisonment.
References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and analyze their
content to determine the most suitable references. Use the corresponding numbers to fill in the [ ] in the essay
above, ensuring that each citation is relevant and aligns accurately with the context of the essay.
[1] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Professional (CISSP)
Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including threats like
ransomware and their impact on organizations. It delves into security assessment, risk management, and network
protection strategies to prevent data loss and mitigate cyber threats. The authors integrate real-world scenarios
to illustrate the consequences of cyberattacks and the importance of implementing robust cybersecurity measures.
[2] H. T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing,
4th ed. Hoboken, NJ, USA: Wiley, 2013.
,→ This book introduces readers to a broad range of ethical and social issues within the field of cyberethics,
including those that directly impact professionals in computer and information technology (IT). Among the
2 ID: CE614
topics explored are moral responsibilities, the prevention of harm through responsible computing, and the broader
societal implications of unethical behavior in the digital realm. It offers strategies to address these challenges,
promoting a deeper understanding of ethical computing practices.
[3] E. K. Clemons, R. V. Waran, S. Hermes, M. Schreieck, and H. Krcmar, “Computing and Social Welfare:
Minimizing societal harm from digital transformation while preserving the benefits of innovation in online
businesses”, Electronic Markets, vol. 32, no. 2, pp. 417–436, 2022.
,→ Social Welfare Computing is an emerging discipline that seeks to direct technology to cause minimum
societal disruption, and in particular seeks to minimize the harm caused directly by technology itself. Often the
companies that create significant value for their users obtain new sources of wealth and power, which inevitably
lead to new forms of abuse of power and new forms of societal disruption. Societal disruption in turn requires
social adaptation, including new regulations to influence the behavior of firms and to define and to protect the
rights of individuals in the changed society. Social Welfare Computing seeks to guide social adaptation, combining
insights from disciplines as varied as anthropology, business strategy, economics, strategic planning, and law.
[4] S. J. Harrington, “The effect of codes of ethics and personal denial of responsibility on computer abuse
judgments and intentions”, MIS Quarterly, vol. 20, no. 3, pp. 257–278, 1996.
,→ This research examines the impact of ethical codes on the judgments and intentions of information
systems (IS) employees regarding computer abuse, including deceptive practices like phishing and other harmful
behaviors. The study highlights how ethical codes can clarify individual responsibilities and reduce rationalizations
for unethical actions. It also explores the psychological trait of responsibility denial, showing its significant role
in influencing decisions related to computer misuse.
[5] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and privacy protection”,
Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more than 87 mil-
lion users to Cambridge Analytica, it is now imperative that comprehensive privacy policy laws be developed.
Technologists, researchers, and innovators should meaningfully contribute to the development of these policies.
[6] R. A. Spinello, Cyberethics: Morality and Law in Cyberspace, 6th ed. Burlington, MA, USA: Jones &
Bartlett Learning, 2017.
,→ Cyberethics: Morality and Law in Cyberspace provides a comprehensive and up-to-date exploration of the
internet’s impact on society, addressing ethical challenges such as information privacy, cybersecurity, and digital
misconduct. By analyzing case studies of data breaches, “fake news", and online fraud, the book emphasizes the
moral responsibilities of internet users and policymakers. The author proposes that the intersection of technology,
law, and public policy offers pathways to mitigate harm and create a safer cyberspace, fostering ethical practices
in the digital age.
[7] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages on social
networking sites: customer service or privacy infringement?”, International Journal of Electronic Commerce,
vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively intervene with
observed consumer messages. Despite intentions to enhance customer satisfaction by extending customer service,
sometimes these interventions are received negatively by consumers. We draw on privacy regulation theory to
theorize how proactive customer service interventions with consumer messages on social network sites may
evoke feelings of privacy infringement. To practitioners, our findings demonstrate that feelings of privacy are
an element to consider when handling consumer messages on social media, but also that privacy concerns may
be overcome if an intervention is perceived as useful enough.
[8] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strategies and
challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user access and actions,
crucial in today’s networked environment. They allow file owners to maintain control even after distribution,
aiding in piracy prevention and protecting sensitive enterprise documents. DRM operates at various levels,
The Sixth Commandment of Computer Ethics - ID: CE614 3
including application (e.g., Apple iTunes), operating systems (e.g., Microsoft RMS), and hardware (e.g., DVD
CSS). However, current DRM systems often lack interoperability, fail to meet all customer requirements, or
aren’t fully secure. This paper reviews the current DRM landscape, evaluating their strengths and weaknesses,
analyzing legal and technical requirements, and assessing three specific DRM systems against these criteria.
[9] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress and chal-
lenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in copyright and
intellectual property rights protection. It highlights the interplay between national and international regulations,
focusing on measures to address unauthorized distribution and safeguard creators’ rights. The article emphasizes
the importance of adapting legal frameworks to the demands of the digital era.
[10] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Vietnam”, Science
and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in Vietnam and
mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified Theory of Acceptance and
Use of Technology (UTAUT), the study explores psychological, moral, and technological dimensions of piracy.
Key findings include the role of perceived behavioral control and risk perception. The paper also references
instances where enforcement actions were necessary to address large-scale piracy issues in the country.
[11] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute, vol. 27, 2006.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous to
1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to pursue
a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics Institute
has played and then, leads into the need for a set of standards to guide and instruct people in the ethical use of
computers. Barquin calls for the use of the ‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of schools and
corporations. The ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that:
"Thou shalt think about the social consequences of the program you are writing or the system you are designing".
This commandment emphasizes the responsibility of developers and designers to consider the broader impact of
their creations.
[12] N. P. Nguyen, H. M. Nguyen, H.-L. La, T. T. T. Thi, N. H. Duong, T. S. Le, D. L. N. Le, and N. Thoai,
“AI-based traffic counting: A Case Study in Vietnam”, in Proceedings of the 2022 International Conference on
Advanced Computational and Analytical Methods (ACOMPA), Ho Chi Minh City, Vietnam, Oct. 2022, pp.
34–39.
,→ Ho Chi Minh City, particularly Vietnamese cities in general, is so busy and crowded since tremendous
numbers of motorbikes move on roads. Ho Chi Minh City leaders have encountered several challenges in fully
understanding and effectively dealing with problems of urban traffic for the past few decades. If successful, it
will make a positive impact on urban aesthetics and helps reduce traffic accidents. Software-based solutions are
proper and dramatically necessary, currently. The paper mainly concentrates on traffic counting problems during
the outbreak of the Covid-19 pandemic from June 2021.
[13] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and removing vul-
nerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than stronger protec-
tions. Overemphasis on national security overlooks individual needs, weakening global systems. The 2014 Sony
Pictures hack exemplifies the consequences, causing significant financial losses and leaking sensitive data. A bal-
anced cyber-security policy must address these vulnerabilities while protecting privacy and data, ensuring ethical
handling of information to prevent similar incidents.
[14] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous
to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to
4 ID: CE614
pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics
Institute has played and then leads into the need for a set of standards to guide and instruct people in the
ethical use of computers. Among these commandments is the principle of respecting intellectual property, which
emphasizes avoiding unauthorized use or copying of proprietary software. This is where the ‘Ten Commandments
for Computer Ethics’ was first presented and has since been used by hundreds of schools and corporations.
[15] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of Law and
Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus on legal frame-
works and enforcement challenges. It highlights significant cases that illustrate the financial and reputational
risks of copyright infringement. The paper discusses how these cases have shaped public awareness and policy
adjustments in the evolving digital landscape.
Protecting Software Rights: Ethical Responsibilities in the Digital
Age
Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh
City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam [email protected]
The Sixth Commandment of the Ten Commandments of Computer Ethics, “Thou shalt not copy or use
proprietary software without paying for it (or without permission)”, emphasizes the ethical and legal responsi-
bilities in software usage [ ]. In Vietnam’s growing digital economy, adhering to this principle is crucial for
protecting intellectual property and fostering innovation. Software piracy reduces developers’ income, stifles
creativity, and impedes technological advancement. This paper explores the effects of unauthorized software
use, highlights cases like Tran Lap vs. Zing MP3, and discusses measures to prevent piracy. Vietnam addresses
software piracy through legal mechanisms, such as the Law on Intellectual Property and Cybersecurity Law,
which impose penalties for unauthorized copying and distribution, promoting responsible digital practices and
protecting creators’ rights [ ]. Compliance with these laws helps avoid legal issues and fosters a culture of
respect for intellectual property.
Software Piracy Unauthorized copying harms developers’ earnings and impedes innovation. In 2019, Viet-
namese authorities seized pirated software and arrested those involved in large-scale distribution [ ].
Case Study In 2014, musician Tran Lap sued VNG Corporation, owner of Zing MP3, for distributing his song
“Duong den ngay vinh quang” without permission. He sought 150 million VND in damages. The case was
settled out of court, resulting in Zing MP3 ceasing unauthorized distribution and compensating Tran Lap.
This case highlights the financial and reputational consequences of violating intellectual property rights [
].
Preventative measures include using Digital Rights Management (DRM) to restrict unauthorized copying,
implementing cybersecurity measures like encryption and anti-piracy tools, and conducting educational cam-
paigns to raise awareness about the ethical and legal consequences of software piracy [ ]. Additionally, legal
enforcement is critical to ensure adherence to intellectual property laws, with severe consequences for offenders,
including fines and imprisonment.
References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and analyze their
content to determine the most suitable references. Use the corresponding numbers to fill in the [ ] in the essay
above, ensuring that each citation is relevant and aligns accurately with the context of the essay.
[1] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and removing vulner-
abilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than stronger protec-
tions. Overemphasis on national security overlooks individual needs, weakening global systems. The 2014 Sony
Pictures hack exemplifies the consequences, causing significant financial losses and leaking sensitive data. A bal-
anced cyber-security policy must address these vulnerabilities while protecting privacy and data, ensuring ethical
handling of information to prevent similar incidents.
[2] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Vietnam”, Science
and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in Vietnam and
mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified Theory of Acceptance and
2 ID: CE615
Use of Technology (UTAUT), the study explores psychological, moral, and technological dimensions of piracy.
Key findings include the role of perceived behavioral control and risk perception. The paper also references
instances where enforcement actions were necessary to address large-scale piracy issues in the country.
[3] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal of Computer
and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.
,→ The rise of Internet connectivity has triggered a surge in cyberattacks, with malware exploiting vulner-
abilities or leveraging emerging technologies. Beyond traditional methods, new attack patterns are emerging in
areas like social media, cloud computing, smartphones, and critical infrastructure. These attacks exploit unique
traits such as data centralization in the cloud, the pervasive use of mobile devices, and the interconnectivity of
critical systems, presenting unprecedented challenges.
[4] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of Law and
Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus on legal frame-
works and enforcement challenges. It highlights significant cases that illustrate the financial and reputational
risks of copyright infringement. The paper discusses how these cases have shaped public awareness and policy
adjustments in the evolving digital landscape.
[5] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous
to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to
pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics
Institute has played and then leads into the need for a set of standards to guide and instruct people in the
ethical use of computers. Among these commandments is the principle of respecting intellectual property, which
emphasizes avoiding unauthorized use or copying of proprietary software. This is where the ‘Ten Commandments
for Computer Ethics’ was first presented and has since been used by hundreds of schools and corporations.
[6] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress and chal-
lenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in copyright and
intellectual property rights protection. It highlights the interplay between national and international regulations,
focusing on measures to address unauthorized distribution and safeguard creators’ rights. The article emphasizes
the importance of adapting legal frameworks to the demands of the digital era.
[7] S. J. Harrington, “The effect of codes of ethics and personal denial of responsibility on computer abuse
judgments and intentions”, MIS Quarterly, vol. 20, no. 3, pp. 257–278, 1996.
,→ This research examines the impact of ethical codes on the judgments and intentions of information
systems (IS) employees regarding computer abuse, including deceptive practices like phishing and other harmful
behaviors. The study highlights how ethical codes can clarify individual responsibilities and reduce rationalizations
for unethical actions. It also explores the psychological trait of responsibility denial, showing its significant role
in influencing decisions related to computer misuse.
[8] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strategies and
challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user access and actions,
crucial in today’s networked environment. They allow file owners to maintain control even after distribution,
aiding in piracy prevention and protecting sensitive enterprise documents. DRM operates at various levels,
including application (e.g., Apple iTunes), operating systems (e.g., Microsoft RMS), and hardware (e.g., DVD
CSS). However, current DRM systems often lack interoperability, fail to meet all customer requirements, or
aren’t fully secure. This paper reviews the current DRM landscape, evaluating their strengths and weaknesses,
analyzing legal and technical requirements, and assessing three specific DRM systems against these criteria.
[9] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer Ethics Institute,
Washington, DC, USA, 1992.
The Sixth Commandment of Computer Ethics - ID: CE615 3
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous to
1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to pursue
a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics Institute
has played and then leads into the need for a set of standards to guide and instruct people in the ethical use
of computers. Among these commandments is the principle of avoiding harm to others through the misuse of
technology. This is where the ‘Ten Commandments for Computer Ethics’ was first presented and has since been
used by hundreds of schools and corporations.
[10] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that in the digital
era, where technology revolutionizes knowledge sharing, control over creativity is increasingly concentrated in the
hands of Big Media. This dominance undermines free markets, free speech, and the tradition of free culture that
fosters innovation. Lessig argues for safeguarding intellectual property and preserving an open digital ecosystem
to protect our freedom to create, build, and imagine.
[11] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and defence”,
in Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin, Germany, 2012, pp.
1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective management.
Automated systems utilizing artificial intelligence and botnets are critical for anomaly detection and operational
integrity. The risks of internal exploitation, as highlighted by the 2009 Google trade secret theft, underscore the
importance of safeguarding proprietary technologies. By integrating DevSecOps and cloud-based solutions, these
systems ensure secure and efficient data handling for scientific, commercial, and exploratory missions.
[12] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM Transactions
on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to sensitive
information. This article proposes an economic model to optimize security investments by assessing information
vulnerabilities and potential losses. It suggests prioritizing midrange vulnerabilities for cost-effective protection
and allocating a fraction of expected losses to maximize resource efficiency in mitigating these risks.
[13] R. A. Spinello, Cyberethics: Morality and Law in Cyberspace, 6th ed. Burlington, MA, USA: Jones &
Bartlett Learning, 2017.
,→ Cyberethics: Morality and Law in Cyberspace provides a comprehensive and up-to-date exploration of the
internet’s impact on society, addressing ethical challenges such as information privacy, cybersecurity, and digital
misconduct. By analyzing case studies of data breaches, “fake news", and online fraud, the book emphasizes the
moral responsibilities of internet users and policymakers. The author proposes that the intersection of technology,
law, and public policy offers pathways to mitigate harm and create a safer cyberspace, fostering ethical practices
in the digital age.
[14] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute, vol. 27, 2006.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous to
1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to pursue
a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics Institute
has played and then, leads into the need for a set of standards to guide and instruct people in the ethical use of
computers. Barquin calls for the use of the ‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of schools and
corporations. The ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that:
"Thou shalt think about the social consequences of the program you are writing or the system you are designing".
This commandment emphasizes the responsibility of developers and designers to consider the broader impact of
their creations.
[15] M. Akbanov, V. G. Vassilakis, and M. D. Logothetis, “WannaCry ransomware: Analysis of infection,
persistence, recovery prevention and propagation mechanisms”, Journal of Telecommunications and Information
Technology, no. 1, pp. 113–124, 2019.
4 ID: CE615
,→ In recent years, we have been experiencing fast proliferation of different types of ransomware targeting
home users, companies and even critical telecommunications infrastructure elements. Modern day ransomware
relies on sophisticated infection, persistence and recovery prevention mechanisms. Some recent examples that re-
ceived significant attention include WannaCry, Petya and BadRabbit. To design and develop appropriate defense
mechanisms, it is important to understand the characteristics and the behavior of different types of ransomware.
Protecting Software Rights: Ethical Responsibilities in the Digital
Age
Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh
City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam [email protected]
The Sixth Commandment of the Ten Commandments of Computer Ethics, “Thou shalt not copy or use
proprietary software without paying for it (or without permission)”, emphasizes the ethical and legal responsi-
bilities in software usage [ ]. In Vietnam’s growing digital economy, adhering to this principle is crucial for
protecting intellectual property and fostering innovation. Software piracy reduces developers’ income, stifles
creativity, and impedes technological advancement. This paper explores the effects of unauthorized software
use, highlights cases like Tran Lap vs. Zing MP3, and discusses measures to prevent piracy. Vietnam addresses
software piracy through legal mechanisms, such as the Law on Intellectual Property and Cybersecurity Law,
which impose penalties for unauthorized copying and distribution, promoting responsible digital practices and
protecting creators’ rights [ ]. Compliance with these laws helps avoid legal issues and fosters a culture of
respect for intellectual property.
Software Piracy Unauthorized copying harms developers’ earnings and impedes innovation. In 2019, Viet-
namese authorities seized pirated software and arrested those involved in large-scale distribution [ ].
Case Study In 2014, musician Tran Lap sued VNG Corporation, owner of Zing MP3, for distributing his song
“Duong den ngay vinh quang” without permission. He sought 150 million VND in damages. The case was
settled out of court, resulting in Zing MP3 ceasing unauthorized distribution and compensating Tran Lap.
This case highlights the financial and reputational consequences of violating intellectual property rights [
].
Preventative measures include using Digital Rights Management (DRM) to restrict unauthorized copying,
implementing cybersecurity measures like encryption and anti-piracy tools, and conducting educational cam-
paigns to raise awareness about the ethical and legal consequences of software piracy [ ]. Additionally, legal
enforcement is critical to ensure adherence to intellectual property laws, with severe consequences for offenders,
including fines and imprisonment.
References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and analyze their
content to determine the most suitable references. Use the corresponding numbers to fill in the [ ] in the essay
above, ensuring that each citation is relevant and aligns accurately with the context of the essay.
[1] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Computers & Security,
vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber security extends
beyond protecting information resources to safeguarding other assets, including individuals who may be targets
or unwitting participants in cyber attacks. This broader scope introduces ethical responsibilities, emphasizing the
societal duty to protect vulnerable groups, such as children. Addressing these risks is crucial to ensure digital
technologies promote ethical progress rather than exploitation.
[2] E. K. Clemons, R. V. Waran, S. Hermes, M. Schreieck, and H. Krcmar, “Computing and Social Welfare:
Minimizing societal harm from digital transformation while preserving the benefits of innovation in online
businesses”, Electronic Markets, vol. 32, no. 2, pp. 417–436, 2022.
2 ID: CE616
,→ Social Welfare Computing is an emerging discipline that seeks to direct technology to cause minimum
societal disruption, and in particular seeks to minimize the harm caused directly by technology itself. Often the
companies that create significant value for their users obtain new sources of wealth and power, which inevitably
lead to new forms of abuse of power and new forms of societal disruption. Societal disruption in turn requires
social adaptation, including new regulations to influence the behavior of firms and to define and to protect the
rights of individuals in the changed society. Social Welfare Computing seeks to guide social adaptation, combining
insights from disciplines as varied as anthropology, business strategy, economics, strategic planning, and law.
[3] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and removing vulner-
abilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than stronger protec-
tions. Overemphasis on national security overlooks individual needs, weakening global systems. The 2014 Sony
Pictures hack exemplifies the consequences, causing significant financial losses and leaking sensitive data. A bal-
anced cyber-security policy must address these vulnerabilities while protecting privacy and data, ensuring ethical
handling of information to prevent similar incidents.
[4] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress and chal-
lenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in copyright and
intellectual property rights protection. It highlights the interplay between national and international regulations,
focusing on measures to address unauthorized distribution and safeguard creators’ rights. The article emphasizes
the importance of adapting legal frameworks to the demands of the digital era.
[5] W. Sun, O. Nasraoui, and P. Shafto, “Evolution and impact of bias in human and machine learning
algorithm interaction”, PLOS ONE, vol. 15, no. 8, p. e0235502, 2020.
,→ Recently, algorithms have been receiving data from the general population in the form of labeling, anno-
tations, etc. The result is that algorithms are subject to bias that is born from ingesting unchecked information,
such as biased samples and biased labels. Furthermore, people and algorithms are increasingly engaged in inter-
active processes wherein neither the human nor the algorithms receive unbiased data. Algorithms can also make
biased predictions, leading to what is now known as algorithmic bias. On the other hand, human’s reaction to
the output of machine learning methods with algorithmic bias worsen the situations by making decision based
on biased information, which will probably be consumed by algorithms later. Some recent research has focused
on the ethical and moral implication of machine learning algorithmic bias on society. However, most researchs
so far treated algorithmic bias as a static factor, which fails to capture the dynamic and iterative properties of
bias. We argue that algorithmic bias interacts with humans in an iterative manner. Based on statistical analyses
of the results of several controlled experiments, we found that the three different iterated bias modes, as well
as initial training data class imbalance and human action, do affect the models learned by machine learning
algorithms. We also found that iterated filter bias, which is prominent in personalized user interfaces, can lead
to more inequality in estimated relevance and to a limited human ability to discover relevant data.
[6] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM Transactions
on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to sensitive
information. This article proposes an economic model to optimize security investments by assessing information
vulnerabilities and potential losses. It suggests prioritizing midrange vulnerabilities for cost-effective protection
and allocating a fraction of expected losses to maximize resource efficiency in mitigating these risks.
[7] P. W. Singer and A. Friedman, Cybersecurity: What Everyone Needs to Know. New York: Oxford
University Press, 2014.
,→ Dependence on computers has profoundly impacted human society, especially in warfare, where the U.S.
military is highly reliant on advanced systems. The rise of cyberwarfare is exemplified by incidents like Stuxnet
and Chinese cyberattacks aimed at stealing U.S. government data. In this book, Peter W. Singer and Allan
Friedman examine the evolution of military cybernetics, the challenges of defending cyberspace, and recent
The Sixth Commandment of Computer Ethics - ID: CE616 3
security developments. The book explores modern conflict dynamics and offers strategies for individuals and
governments to protect themselves.
[8] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous
to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to
pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics
Institute has played and then leads into the need for a set of standards to guide and instruct people in the
ethical use of computers. Among these commandments is the principle of respecting intellectual property, which
emphasizes avoiding unauthorized use or copying of proprietary software. This is where the ‘Ten Commandments
for Computer Ethics’ was first presented and has since been used by hundreds of schools and corporations.
[9] H. T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing,
4th ed. Hoboken, NJ, USA: Wiley, 2013.
,→ This book introduces readers to a broad range of ethical and social issues within the field of cyberethics,
including those that directly impact professionals in computer and information technology (IT). Among the
topics explored are moral responsibilities, the prevention of harm through responsible computing, and the broader
societal implications of unethical behavior in the digital realm. It offers strategies to address these challenges,
promoting a deeper understanding of ethical computing practices.
[10] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-driven cybersecurity: An overview, security intelligence
modeling and research directions”, SN Computer Science, vol. 2, no. 3, p. 173, 2021.
,→ Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or Industry
4.0), which can be used for the protection of Internet-connected systems from cyber threats, attacks, damage, or
unauthorized access. To intelligently solve today’s various cybersecurity issues, popular AI techniques involving
machine learning and deep learning methods, the concept of natural language processing, knowledge represen-
tation and reasoning, as well as the concept of knowledge or rule-based expert systems modeling can be used.
[11] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of Law and
Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus on legal frame-
works and enforcement challenges. It highlights significant cases that illustrate the financial and reputational
risks of copyright infringement. The paper discusses how these cases have shaped public awareness and policy
adjustments in the evolving digital landscape.
[12] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Vietnam”, Science
and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in Vietnam and
mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified Theory of Acceptance and
Use of Technology (UTAUT), the study explores psychological, moral, and technological dimensions of piracy.
Key findings include the role of perceived behavioral control and risk perception. The paper also references
instances where enforcement actions were necessary to address large-scale piracy issues in the country.
[13] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute, vol. 27, 2006.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous to
1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to pursue
a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics Institute
has played and then, leads into the need for a set of standards to guide and instruct people in the ethical use of
computers. Barquin calls for the use of the ‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of schools and
corporations. The ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that:
"Thou shalt think about the social consequences of the program you are writing or the system you are designing".
4 ID: CE616
This commandment emphasizes the responsibility of developers and designers to consider the broader impact of
their creations.
[14] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages on social
networking sites: customer service or privacy infringement?”, International Journal of Electronic Commerce,
vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively intervene with
observed consumer messages. Despite intentions to enhance customer satisfaction by extending customer service,
sometimes these interventions are received negatively by consumers. We draw on privacy regulation theory to
theorize how proactive customer service interventions with consumer messages on social network sites may
evoke feelings of privacy infringement. To practitioners, our findings demonstrate that feelings of privacy are
an element to consider when handling consumer messages on social media, but also that privacy concerns may
be overcome if an intervention is perceived as useful enough.
[15] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strategies and
challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user access and actions,
crucial in today’s networked environment. They allow file owners to maintain control even after distribution,
aiding in piracy prevention and protecting sensitive enterprise documents. DRM operates at various levels,
including application (e.g., Apple iTunes), operating systems (e.g., Microsoft RMS), and hardware (e.g., DVD
CSS). However, current DRM systems often lack interoperability, fail to meet all customer requirements, or
aren’t fully secure. This paper reviews the current DRM landscape, evaluating their strengths and weaknesses,
analyzing legal and technical requirements, and assessing three specific DRM systems against these criteria.
Protecting Software Rights: Ethical Responsibilities in the Digital
Age
Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh
City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam [email protected]
The Sixth Commandment of the Ten Commandments of Computer Ethics, “Thou shalt not copy or use
proprietary software without paying for it (or without permission)”, emphasizes the ethical and legal responsi-
bilities in software usage [ ]. In Vietnam’s growing digital economy, adhering to this principle is crucial for
protecting intellectual property and fostering innovation. Software piracy reduces developers’ income, stifles
creativity, and impedes technological advancement. This paper explores the effects of unauthorized software
use, highlights cases like Tran Lap vs. Zing MP3, and discusses measures to prevent piracy. Vietnam addresses
software piracy through legal mechanisms, such as the Law on Intellectual Property and Cybersecurity Law,
which impose penalties for unauthorized copying and distribution, promoting responsible digital practices and
protecting creators’ rights [ ]. Compliance with these laws helps avoid legal issues and fosters a culture of
respect for intellectual property.
Software Piracy Unauthorized copying harms developers’ earnings and impedes innovation. In 2019, Viet-
namese authorities seized pirated software and arrested those involved in large-scale distribution [ ].
Case Study In 2014, musician Tran Lap sued VNG Corporation, owner of Zing MP3, for distributing his song
“Duong den ngay vinh quang” without permission. He sought 150 million VND in damages. The case was
settled out of court, resulting in Zing MP3 ceasing unauthorized distribution and compensating Tran Lap.
This case highlights the financial and reputational consequences of violating intellectual property rights [
].
Preventative measures include using Digital Rights Management (DRM) to restrict unauthorized copying,
implementing cybersecurity measures like encryption and anti-piracy tools, and conducting educational cam-
paigns to raise awareness about the ethical and legal consequences of software piracy [ ]. Additionally, legal
enforcement is critical to ensure adherence to intellectual property laws, with severe consequences for offenders,
including fines and imprisonment.
References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and analyze their
content to determine the most suitable references. Use the corresponding numbers to fill in the [ ] in the essay
above, ensuring that each citation is relevant and aligns accurately with the context of the essay.
[1] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM Transactions
on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to sensitive
information. This article proposes an economic model to optimize security investments by assessing information
vulnerabilities and potential losses. It suggests prioritizing midrange vulnerabilities for cost-effective protection
and allocating a fraction of expected losses to maximize resource efficiency in mitigating these risks.
[2] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous
to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to
pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics
2 ID: CE617
Institute has played and then leads into the need for a set of standards to guide and instruct people in the
ethical use of computers. Among these commandments is the principle of respecting intellectual property, which
emphasizes avoiding unauthorized use or copying of proprietary software. This is where the ‘Ten Commandments
for Computer Ethics’ was first presented and has since been used by hundreds of schools and corporations.
[3] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Vietnam”, Science
and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in Vietnam and
mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified Theory of Acceptance and
Use of Technology (UTAUT), the study explores psychological, moral, and technological dimensions of piracy.
Key findings include the role of perceived behavioral control and risk perception. The paper also references
instances where enforcement actions were necessary to address large-scale piracy issues in the country.
[4] S. J. Harrington, “The effect of codes of ethics and personal denial of responsibility on computer abuse
judgments and intentions”, MIS Quarterly, vol. 20, no. 3, pp. 257–278, 1996.
,→ This research examines the impact of ethical codes on the judgments and intentions of information
systems (IS) employees regarding computer abuse, including deceptive practices like phishing and other harmful
behaviors. The study highlights how ethical codes can clarify individual responsibilities and reduce rationalizations
for unethical actions. It also explores the psychological trait of responsibility denial, showing its significant role
in influencing decisions related to computer misuse.
[5] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of Law and
Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus on legal frame-
works and enforcement challenges. It highlights significant cases that illustrate the financial and reputational
risks of copyright infringement. The paper discusses how these cases have shaped public awareness and policy
adjustments in the evolving digital landscape.
[6] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strategies and
challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user access and actions,
crucial in today’s networked environment. They allow file owners to maintain control even after distribution,
aiding in piracy prevention and protecting sensitive enterprise documents. DRM operates at various levels,
including application (e.g., Apple iTunes), operating systems (e.g., Microsoft RMS), and hardware (e.g., DVD
CSS). However, current DRM systems often lack interoperability, fail to meet all customer requirements, or
aren’t fully secure. This paper reviews the current DRM landscape, evaluating their strengths and weaknesses,
analyzing legal and technical requirements, and assessing three specific DRM systems against these criteria.
[7] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal of Computer
and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.
,→ The rise of Internet connectivity has triggered a surge in cyberattacks, with malware exploiting vulner-
abilities or leveraging emerging technologies. Beyond traditional methods, new attack patterns are emerging in
areas like social media, cloud computing, smartphones, and critical infrastructure. These attacks exploit unique
traits such as data centralization in the cloud, the pervasive use of mobile devices, and the interconnectivity of
critical systems, presenting unprecedented challenges.
[8] H. T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing,
4th ed. Hoboken, NJ, USA: Wiley, 2013.
,→ This book introduces readers to a broad range of ethical and social issues within the field of cyberethics,
including those that directly impact professionals in computer and information technology (IT). Among the
topics explored are moral responsibilities, the prevention of harm through responsible computing, and the broader
societal implications of unethical behavior in the digital realm. It offers strategies to address these challenges,
promoting a deeper understanding of ethical computing practices.
[9] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress and chal-
lenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
The Sixth Commandment of Computer Ethics - ID: CE617 3
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in copyright and
intellectual property rights protection. It highlights the interplay between national and international regulations,
focusing on measures to address unauthorized distribution and safeguard creators’ rights. The article emphasizes
the importance of adapting legal frameworks to the demands of the digital era.
[10] N. P. Nguyen, H. M. Nguyen, H.-L. La, T. T. T. Thi, N. H. Duong, T. S. Le, D. L. N. Le, and N. Thoai,
“AI-based traffic counting: A Case Study in Vietnam”, in Proceedings of the 2022 International Conference on
Advanced Computational and Analytical Methods (ACOMPA), Ho Chi Minh City, Vietnam, Oct. 2022, pp.
34–39.
,→ Ho Chi Minh City, particularly Vietnamese cities in general, is so busy and crowded since tremendous
numbers of motorbikes move on roads. Ho Chi Minh City leaders have encountered several challenges in fully
understanding and effectively dealing with problems of urban traffic for the past few decades. If successful, it
will make a positive impact on urban aesthetics and helps reduce traffic accidents. Software-based solutions are
proper and dramatically necessary, currently. The paper mainly concentrates on traffic counting problems during
the outbreak of the Covid-19 pandemic from June 2021.
[11] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-driven cybersecurity: An overview, security intelligence
modeling and research directions”, SN Computer Science, vol. 2, no. 3, p. 173, 2021.
,→ Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or Industry
4.0), which can be used for the protection of Internet-connected systems from cyber threats, attacks, damage, or
unauthorized access. To intelligently solve today’s various cybersecurity issues, popular AI techniques involving
machine learning and deep learning methods, the concept of natural language processing, knowledge represen-
tation and reasoning, as well as the concept of knowledge or rule-based expert systems modeling can be used.
[12] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that in the digital
era, where technology revolutionizes knowledge sharing, control over creativity is increasingly concentrated in the
hands of Big Media. This dominance undermines free markets, free speech, and the tradition of free culture that
fosters innovation. Lessig argues for safeguarding intellectual property and preserving an open digital ecosystem
to protect our freedom to create, build, and imagine.
[13] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and privacy protection”,
Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more than 87 mil-
lion users to Cambridge Analytica, it is now imperative that comprehensive privacy policy laws be developed.
Technologists, researchers, and innovators should meaningfully contribute to the development of these policies.
[14] E. K. Clemons, R. V. Waran, S. Hermes, M. Schreieck, and H. Krcmar, “Computing and Social Welfare:
Minimizing societal harm from digital transformation while preserving the benefits of innovation in online
businesses”, Electronic Markets, vol. 32, no. 2, pp. 417–436, 2022.
,→ Social Welfare Computing is an emerging discipline that seeks to direct technology to cause minimum
societal disruption, and in particular seeks to minimize the harm caused directly by technology itself. Often the
companies that create significant value for their users obtain new sources of wealth and power, which inevitably
lead to new forms of abuse of power and new forms of societal disruption. Societal disruption in turn requires
social adaptation, including new regulations to influence the behavior of firms and to define and to protect the
rights of individuals in the changed society. Social Welfare Computing seeks to guide social adaptation, combining
insights from disciplines as varied as anthropology, business strategy, economics, strategic planning, and law.
[15] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous to
1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to pursue
a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics Institute
4 ID: CE617
has played and then leads into the need for a set of standards to guide and instruct people in the ethical use
of computers. Among these commandments is the principle of avoiding harm to others through the misuse of
technology. This is where the ‘Ten Commandments for Computer Ethics’ was first presented and has since been
used by hundreds of schools and corporations.
Protecting Software Rights: Ethical Responsibilities in the Digital
Age
Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh
City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam [email protected]
The Sixth Commandment of the Ten Commandments of Computer Ethics, “Thou shalt not copy or use
proprietary software without paying for it (or without permission)”, emphasizes the ethical and legal responsi-
bilities in software usage [ ]. In Vietnam’s growing digital economy, adhering to this principle is crucial for
protecting intellectual property and fostering innovation. Software piracy reduces developers’ income, stifles
creativity, and impedes technological advancement. This paper explores the effects of unauthorized software
use, highlights cases like Tran Lap vs. Zing MP3, and discusses measures to prevent piracy. Vietnam addresses
software piracy through legal mechanisms, such as the Law on Intellectual Property and Cybersecurity Law,
which impose penalties for unauthorized copying and distribution, promoting responsible digital practices and
protecting creators’ rights [ ]. Compliance with these laws helps avoid legal issues and fosters a culture of
respect for intellectual property.
Software Piracy Unauthorized copying harms developers’ earnings and impedes innovation. In 2019, Viet-
namese authorities seized pirated software and arrested those involved in large-scale distribution [ ].
Case Study In 2014, musician Tran Lap sued VNG Corporation, owner of Zing MP3, for distributing his song
“Duong den ngay vinh quang” without permission. He sought 150 million VND in damages. The case was
settled out of court, resulting in Zing MP3 ceasing unauthorized distribution and compensating Tran Lap.
This case highlights the financial and reputational consequences of violating intellectual property rights [
].
Preventative measures include using Digital Rights Management (DRM) to restrict unauthorized copying,
implementing cybersecurity measures like encryption and anti-piracy tools, and conducting educational cam-
paigns to raise awareness about the ethical and legal consequences of software piracy [ ]. Additionally, legal
enforcement is critical to ensure adherence to intellectual property laws, with severe consequences for offenders,
including fines and imprisonment.
References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and analyze their
content to determine the most suitable references. Use the corresponding numbers to fill in the [ ] in the essay
above, ensuring that each citation is relevant and aligns accurately with the context of the essay.
[1] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous
to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to
pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics
Institute has played and then leads into the need for a set of standards to guide and instruct people in the
ethical use of computers. Among these commandments is the principle of respecting intellectual property, which
emphasizes avoiding unauthorized use or copying of proprietary software. This is where the ‘Ten Commandments
for Computer Ethics’ was first presented and has since been used by hundreds of schools and corporations.
[2] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Computers & Security,
vol. 38, pp. 97–102, 2013.
2 ID: CE618
,→ Cyber security and information security are closely related but distinct concepts. Cyber security extends
beyond protecting information resources to safeguarding other assets, including individuals who may be targets
or unwitting participants in cyber attacks. This broader scope introduces ethical responsibilities, emphasizing the
societal duty to protect vulnerable groups, such as children. Addressing these risks is crucial to ensure digital
technologies promote ethical progress rather than exploitation.
[3] S. J. Harrington, “The effect of codes of ethics and personal denial of responsibility on computer abuse
judgments and intentions”, MIS Quarterly, vol. 20, no. 3, pp. 257–278, 1996.
,→ This research examines the impact of ethical codes on the judgments and intentions of information
systems (IS) employees regarding computer abuse, including deceptive practices like phishing and other harmful
behaviors. The study highlights how ethical codes can clarify individual responsibilities and reduce rationalizations
for unethical actions. It also explores the psychological trait of responsibility denial, showing its significant role
in influencing decisions related to computer misuse.
[4] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress and chal-
lenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in copyright and
intellectual property rights protection. It highlights the interplay between national and international regulations,
focusing on measures to address unauthorized distribution and safeguard creators’ rights. The article emphasizes
the importance of adapting legal frameworks to the demands of the digital era.
[5] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages on social
networking sites: customer service or privacy infringement?”, International Journal of Electronic Commerce,
vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively intervene with
observed consumer messages. Despite intentions to enhance customer satisfaction by extending customer service,
sometimes these interventions are received negatively by consumers. We draw on privacy regulation theory to
theorize how proactive customer service interventions with consumer messages on social network sites may
evoke feelings of privacy infringement. To practitioners, our findings demonstrate that feelings of privacy are
an element to consider when handling consumer messages on social media, but also that privacy concerns may
be overcome if an intervention is perceived as useful enough.
[6] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of Law and
Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus on legal frame-
works and enforcement challenges. It highlights significant cases that illustrate the financial and reputational
risks of copyright infringement. The paper discusses how these cases have shaped public awareness and policy
adjustments in the evolving digital landscape.
[7] W. Sun, O. Nasraoui, and P. Shafto, “Evolution and impact of bias in human and machine learning
algorithm interaction”, PLOS ONE, vol. 15, no. 8, p. e0235502, 2020.
,→ Recently, algorithms have been receiving data from the general population in the form of labeling, anno-
tations, etc. The result is that algorithms are subject to bias that is born from ingesting unchecked information,
such as biased samples and biased labels. Furthermore, people and algorithms are increasingly engaged in inter-
active processes wherein neither the human nor the algorithms receive unbiased data. Algorithms can also make
biased predictions, leading to what is now known as algorithmic bias. On the other hand, human’s reaction to
the output of machine learning methods with algorithmic bias worsen the situations by making decision based
on biased information, which will probably be consumed by algorithms later. Some recent research has focused
on the ethical and moral implication of machine learning algorithmic bias on society. However, most researchs
so far treated algorithmic bias as a static factor, which fails to capture the dynamic and iterative properties of
bias. We argue that algorithmic bias interacts with humans in an iterative manner. Based on statistical analyses
of the results of several controlled experiments, we found that the three different iterated bias modes, as well
as initial training data class imbalance and human action, do affect the models learned by machine learning
The Sixth Commandment of Computer Ethics - ID: CE618 3
algorithms. We also found that iterated filter bias, which is prominent in personalized user interfaces, can lead
to more inequality in estimated relevance and to a limited human ability to discover relevant data.
[8] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that in the digital
era, where technology revolutionizes knowledge sharing, control over creativity is increasingly concentrated in the
hands of Big Media. This dominance undermines free markets, free speech, and the tradition of free culture that
fosters innovation. Lessig argues for safeguarding intellectual property and preserving an open digital ecosystem
to protect our freedom to create, build, and imagine.
[9] H. T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing,
4th ed. Hoboken, NJ, USA: Wiley, 2013.
,→ This book introduces readers to a broad range of ethical and social issues within the field of cyberethics,
including those that directly impact professionals in computer and information technology (IT). Among the
topics explored are moral responsibilities, the prevention of harm through responsible computing, and the broader
societal implications of unethical behavior in the digital realm. It offers strategies to address these challenges,
promoting a deeper understanding of ethical computing practices.
[10] P. W. Singer and A. Friedman, Cybersecurity: What Everyone Needs to Know. New York: Oxford
University Press, 2014.
,→ Dependence on computers has profoundly impacted human society, especially in warfare, where the U.S.
military is highly reliant on advanced systems. The rise of cyberwarfare is exemplified by incidents like Stuxnet
and Chinese cyberattacks aimed at stealing U.S. government data. In this book, Peter W. Singer and Allan
Friedman examine the evolution of military cybernetics, the challenges of defending cyberspace, and recent
security developments. The book explores modern conflict dynamics and offers strategies for individuals and
governments to protect themselves.
[11] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and privacy protection”,
Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more than 87 mil-
lion users to Cambridge Analytica, it is now imperative that comprehensive privacy policy laws be developed.
Technologists, researchers, and innovators should meaningfully contribute to the development of these policies.
[12] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strategies and
challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user access and actions,
crucial in today’s networked environment. They allow file owners to maintain control even after distribution,
aiding in piracy prevention and protecting sensitive enterprise documents. DRM operates at various levels,
including application (e.g., Apple iTunes), operating systems (e.g., Microsoft RMS), and hardware (e.g., DVD
CSS). However, current DRM systems often lack interoperability, fail to meet all customer requirements, or
aren’t fully secure. This paper reviews the current DRM landscape, evaluating their strengths and weaknesses,
analyzing legal and technical requirements, and assessing three specific DRM systems against these criteria.
[13] N. P. Nguyen, H. M. Nguyen, H.-L. La, T. T. T. Thi, N. H. Duong, T. S. Le, D. L. N. Le, and N. Thoai,
“AI-based traffic counting: A Case Study in Vietnam”, in Proceedings of the 2022 International Conference on
Advanced Computational and Analytical Methods (ACOMPA), Ho Chi Minh City, Vietnam, Oct. 2022, pp.
34–39.
,→ Ho Chi Minh City, particularly Vietnamese cities in general, is so busy and crowded since tremendous
numbers of motorbikes move on roads. Ho Chi Minh City leaders have encountered several challenges in fully
understanding and effectively dealing with problems of urban traffic for the past few decades. If successful, it
will make a positive impact on urban aesthetics and helps reduce traffic accidents. Software-based solutions are
proper and dramatically necessary, currently. The paper mainly concentrates on traffic counting problems during
the outbreak of the Covid-19 pandemic from June 2021.
[14] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer Ethics Institute,
Washington, DC, USA, 1992.
4 ID: CE618
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous to
1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to pursue
a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics Institute
has played and then leads into the need for a set of standards to guide and instruct people in the ethical use
of computers. Among these commandments is the principle of avoiding harm to others through the misuse of
technology. This is where the ‘Ten Commandments for Computer Ethics’ was first presented and has since been
used by hundreds of schools and corporations.
[15] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Vietnam”, Science
and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in Vietnam and
mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified Theory of Acceptance and
Use of Technology (UTAUT), the study explores psychological, moral, and technological dimensions of piracy.
Key findings include the role of perceived behavioral control and risk perception. The paper also references
instances where enforcement actions were necessary to address large-scale piracy issues in the country.
Protecting Software Rights: Ethical Responsibilities in the Digital
Age
Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh
City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam [email protected]
The Sixth Commandment of the Ten Commandments of Computer Ethics, “Thou shalt not copy or use
proprietary software without paying for it (or without permission)”, emphasizes the ethical and legal responsi-
bilities in software usage [ ]. In Vietnam’s growing digital economy, adhering to this principle is crucial for
protecting intellectual property and fostering innovation. Software piracy reduces developers’ income, stifles
creativity, and impedes technological advancement. This paper explores the effects of unauthorized software
use, highlights cases like Tran Lap vs. Zing MP3, and discusses measures to prevent piracy. Vietnam addresses
software piracy through legal mechanisms, such as the Law on Intellectual Property and Cybersecurity Law,
which impose penalties for unauthorized copying and distribution, promoting responsible digital practices and
protecting creators’ rights [ ]. Compliance with these laws helps avoid legal issues and fosters a culture of
respect for intellectual property.
Software Piracy Unauthorized copying harms developers’ earnings and impedes innovation. In 2019, Viet-
namese authorities seized pirated software and arrested those involved in large-scale distribution [ ].
Case Study In 2014, musician Tran Lap sued VNG Corporation, owner of Zing MP3, for distributing his song
“Duong den ngay vinh quang” without permission. He sought 150 million VND in damages. The case was
settled out of court, resulting in Zing MP3 ceasing unauthorized distribution and compensating Tran Lap.
This case highlights the financial and reputational consequences of violating intellectual property rights [
].
Preventative measures include using Digital Rights Management (DRM) to restrict unauthorized copying,
implementing cybersecurity measures like encryption and anti-piracy tools, and conducting educational cam-
paigns to raise awareness about the ethical and legal consequences of software piracy [ ]. Additionally, legal
enforcement is critical to ensure adherence to intellectual property laws, with severe consequences for offenders,
including fines and imprisonment.
References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and analyze their
content to determine the most suitable references. Use the corresponding numbers to fill in the [ ] in the essay
above, ensuring that each citation is relevant and aligns accurately with the context of the essay.
[1] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress and chal-
lenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in copyright and
intellectual property rights protection. It highlights the interplay between national and international regulations,
focusing on measures to address unauthorized distribution and safeguard creators’ rights. The article emphasizes
the importance of adapting legal frameworks to the demands of the digital era.
[2] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Professional (CISSP)
Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including threats like
ransomware and their impact on organizations. It delves into security assessment, risk management, and network
protection strategies to prevent data loss and mitigate cyber threats. The authors integrate real-world scenarios
2 ID: CE619
to illustrate the consequences of cyberattacks and the importance of implementing robust cybersecurity measures.
[3] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages on social
networking sites: customer service or privacy infringement?”, International Journal of Electronic Commerce,
vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively intervene with
observed consumer messages. Despite intentions to enhance customer satisfaction by extending customer service,
sometimes these interventions are received negatively by consumers. We draw on privacy regulation theory to
theorize how proactive customer service interventions with consumer messages on social network sites may
evoke feelings of privacy infringement. To practitioners, our findings demonstrate that feelings of privacy are
an element to consider when handling consumer messages on social media, but also that privacy concerns may
be overcome if an intervention is perceived as useful enough.
[4] P. W. Singer and A. Friedman, Cybersecurity: What Everyone Needs to Know. New York: Oxford
University Press, 2014.
,→ Dependence on computers has profoundly impacted human society, especially in warfare, where the U.S.
military is highly reliant on advanced systems. The rise of cyberwarfare is exemplified by incidents like Stuxnet
and Chinese cyberattacks aimed at stealing U.S. government data. In this book, Peter W. Singer and Allan
Friedman examine the evolution of military cybernetics, the challenges of defending cyberspace, and recent
security developments. The book explores modern conflict dynamics and offers strategies for individuals and
governments to protect themselves.
[5] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and privacy protection”,
Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more than 87 mil-
lion users to Cambridge Analytica, it is now imperative that comprehensive privacy policy laws be developed.
Technologists, researchers, and innovators should meaningfully contribute to the development of these policies.
[6] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strategies and
challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user access and actions,
crucial in today’s networked environment. They allow file owners to maintain control even after distribution,
aiding in piracy prevention and protecting sensitive enterprise documents. DRM operates at various levels,
including application (e.g., Apple iTunes), operating systems (e.g., Microsoft RMS), and hardware (e.g., DVD
CSS). However, current DRM systems often lack interoperability, fail to meet all customer requirements, or
aren’t fully secure. This paper reviews the current DRM landscape, evaluating their strengths and weaknesses,
analyzing legal and technical requirements, and assessing three specific DRM systems against these criteria.
[7] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and removing vulner-
abilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than stronger protec-
tions. Overemphasis on national security overlooks individual needs, weakening global systems. The 2014 Sony
Pictures hack exemplifies the consequences, causing significant financial losses and leaking sensitive data. A bal-
anced cyber-security policy must address these vulnerabilities while protecting privacy and data, ensuring ethical
handling of information to prevent similar incidents.
[8] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Computers & Security,
vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber security extends
beyond protecting information resources to safeguarding other assets, including individuals who may be targets
or unwitting participants in cyber attacks. This broader scope introduces ethical responsibilities, emphasizing the
societal duty to protect vulnerable groups, such as children. Addressing these risks is crucial to ensure digital
technologies promote ethical progress rather than exploitation.
The Sixth Commandment of Computer Ethics - ID: CE619 3
[9] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous
to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to
pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics
Institute has played and then leads into the need for a set of standards to guide and instruct people in the
ethical use of computers. Among these commandments is the principle of respecting intellectual property, which
emphasizes avoiding unauthorized use or copying of proprietary software. This is where the ‘Ten Commandments
for Computer Ethics’ was first presented and has since been used by hundreds of schools and corporations.
[10] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Vietnam”, Science
and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in Vietnam and
mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified Theory of Acceptance and
Use of Technology (UTAUT), the study explores psychological, moral, and technological dimensions of piracy.
Key findings include the role of perceived behavioral control and risk perception. The paper also references
instances where enforcement actions were necessary to address large-scale piracy issues in the country.
[11] R. A. Spinello, Cyberethics: Morality and Law in Cyberspace, 6th ed. Burlington, MA, USA: Jones &
Bartlett Learning, 2017.
,→ Cyberethics: Morality and Law in Cyberspace provides a comprehensive and up-to-date exploration of the
internet’s impact on society, addressing ethical challenges such as information privacy, cybersecurity, and digital
misconduct. By analyzing case studies of data breaches, “fake news", and online fraud, the book emphasizes the
moral responsibilities of internet users and policymakers. The author proposes that the intersection of technology,
law, and public policy offers pathways to mitigate harm and create a safer cyberspace, fostering ethical practices
in the digital age.
[12] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-driven cybersecurity: An overview, security intelligence
modeling and research directions”, SN Computer Science, vol. 2, no. 3, p. 173, 2021.
,→ Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or Industry
4.0), which can be used for the protection of Internet-connected systems from cyber threats, attacks, damage, or
unauthorized access. To intelligently solve today’s various cybersecurity issues, popular AI techniques involving
machine learning and deep learning methods, the concept of natural language processing, knowledge represen-
tation and reasoning, as well as the concept of knowledge or rule-based expert systems modeling can be used.
[13] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute, vol. 27, 2006.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous to
1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to pursue
a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics Institute
has played and then, leads into the need for a set of standards to guide and instruct people in the ethical use of
computers. Barquin calls for the use of the ‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of schools and
corporations. The ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that:
"Thou shalt think about the social consequences of the program you are writing or the system you are designing".
This commandment emphasizes the responsibility of developers and designers to consider the broader impact of
their creations.
[14] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal of Computer
and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.
,→ The rise of Internet connectivity has triggered a surge in cyberattacks, with malware exploiting vulner-
abilities or leveraging emerging technologies. Beyond traditional methods, new attack patterns are emerging in
areas like social media, cloud computing, smartphones, and critical infrastructure. These attacks exploit unique
4 ID: CE619
traits such as data centralization in the cloud, the pervasive use of mobile devices, and the interconnectivity of
critical systems, presenting unprecedented challenges.
[15] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of Law and
Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus on legal frame-
works and enforcement challenges. It highlights significant cases that illustrate the financial and reputational
risks of copyright infringement. The paper discusses how these cases have shaped public awareness and policy
adjustments in the evolving digital landscape.
Protecting Software Rights: Ethical Responsibilities in the Digital
Age
Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT), Ho Chi Minh
City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam [email protected]
The Sixth Commandment of the Ten Commandments of Computer Ethics, “Thou shalt not copy or use
proprietary software without paying for it (or without permission)”, emphasizes the ethical and legal responsi-
bilities in software usage [ ]. In Vietnam’s growing digital economy, adhering to this principle is crucial for
protecting intellectual property and fostering innovation. Software piracy reduces developers’ income, stifles
creativity, and impedes technological advancement. This paper explores the effects of unauthorized software
use, highlights cases like Tran Lap vs. Zing MP3, and discusses measures to prevent piracy. Vietnam addresses
software piracy through legal mechanisms, such as the Law on Intellectual Property and Cybersecurity Law,
which impose penalties for unauthorized copying and distribution, promoting responsible digital practices and
protecting creators’ rights [ ]. Compliance with these laws helps avoid legal issues and fosters a culture of
respect for intellectual property.
Software Piracy Unauthorized copying harms developers’ earnings and impedes innovation. In 2019, Viet-
namese authorities seized pirated software and arrested those involved in large-scale distribution [ ].
Case Study In 2014, musician Tran Lap sued VNG Corporation, owner of Zing MP3, for distributing his song
“Duong den ngay vinh quang” without permission. He sought 150 million VND in damages. The case was
settled out of court, resulting in Zing MP3 ceasing unauthorized distribution and compensating Tran Lap.
This case highlights the financial and reputational consequences of violating intellectual property rights [
].
Preventative measures include using Digital Rights Management (DRM) to restrict unauthorized copying,
implementing cybersecurity measures like encryption and anti-piracy tools, and conducting educational cam-
paigns to raise awareness about the ethical and legal consequences of software piracy [ ]. Additionally, legal
enforcement is critical to ensure adherence to intellectual property laws, with severe consequences for offenders,
including fines and imprisonment.
References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and analyze their
content to determine the most suitable references. Use the corresponding numbers to fill in the [ ] in the essay
above, ensuring that each citation is relevant and aligns accurately with the context of the essay.
[1] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous
to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to
pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics
Institute has played and then leads into the need for a set of standards to guide and instruct people in the
ethical use of computers. Among these commandments is the principle of respecting intellectual property, which
emphasizes avoiding unauthorized use or copying of proprietary software. This is where the ‘Ten Commandments
for Computer Ethics’ was first presented and has since been used by hundreds of schools and corporations.
[2] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and removing vulner-
abilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
2 ID: CE620
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than stronger protec-
tions. Overemphasis on national security overlooks individual needs, weakening global systems. The 2014 Sony
Pictures hack exemplifies the consequences, causing significant financial losses and leaking sensitive data. A bal-
anced cyber-security policy must address these vulnerabilities while protecting privacy and data, ensuring ethical
handling of information to prevent similar incidents.
[3] H. T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing,
4th ed. Hoboken, NJ, USA: Wiley, 2013.
,→ This book introduces readers to a broad range of ethical and social issues within the field of cyberethics,
including those that directly impact professionals in computer and information technology (IT). Among the
topics explored are moral responsibilities, the prevention of harm through responsible computing, and the broader
societal implications of unethical behavior in the digital realm. It offers strategies to address these challenges,
promoting a deeper understanding of ethical computing practices.
[4] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of Law and
Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus on legal frame-
works and enforcement challenges. It highlights significant cases that illustrate the financial and reputational
risks of copyright infringement. The paper discusses how these cases have shaped public awareness and policy
adjustments in the evolving digital landscape.
[5] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and defence”, in
Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin, Germany, 2012, pp.
1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective management.
Automated systems utilizing artificial intelligence and botnets are critical for anomaly detection and operational
integrity. The risks of internal exploitation, as highlighted by the 2009 Google trade secret theft, underscore the
importance of safeguarding proprietary technologies. By integrating DevSecOps and cloud-based solutions, these
systems ensure secure and efficient data handling for scientific, commercial, and exploratory missions.
[6] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Computers & Security,
vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber security extends
beyond protecting information resources to safeguarding other assets, including individuals who may be targets
or unwitting participants in cyber attacks. This broader scope introduces ethical responsibilities, emphasizing the
societal duty to protect vulnerable groups, such as children. Addressing these risks is crucial to ensure digital
technologies promote ethical progress rather than exploitation.
[7] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strategies and
challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user access and actions,
crucial in today’s networked environment. They allow file owners to maintain control even after distribution,
aiding in piracy prevention and protecting sensitive enterprise documents. DRM operates at various levels,
including application (e.g., Apple iTunes), operating systems (e.g., Microsoft RMS), and hardware (e.g., DVD
CSS). However, current DRM systems often lack interoperability, fail to meet all customer requirements, or
aren’t fully secure. This paper reviews the current DRM landscape, evaluating their strengths and weaknesses,
analyzing legal and technical requirements, and assessing three specific DRM systems against these criteria.
[8] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal of Computer
and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.
,→ The rise of Internet connectivity has triggered a surge in cyberattacks, with malware exploiting vulner-
abilities or leveraging emerging technologies. Beyond traditional methods, new attack patterns are emerging in
areas like social media, cloud computing, smartphones, and critical infrastructure. These attacks exploit unique
traits such as data centralization in the cloud, the pervasive use of mobile devices, and the interconnectivity of
critical systems, presenting unprecedented challenges.
The Sixth Commandment of Computer Ethics - ID: CE620 3
[9] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages on social
networking sites: customer service or privacy infringement?”, International Journal of Electronic Commerce,
vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively intervene with
observed consumer messages. Despite intentions to enhance customer satisfaction by extending customer service,
sometimes these interventions are received negatively by consumers. We draw on privacy regulation theory to
theorize how proactive customer service interventions with consumer messages on social network sites may
evoke feelings of privacy infringement. To practitioners, our findings demonstrate that feelings of privacy are
an element to consider when handling consumer messages on social media, but also that privacy concerns may
be overcome if an intervention is perceived as useful enough.
[10] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer Ethics Institute,
Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences previous to
1992 and reaches the conclusion “that the time is ripe to enter into a normative phase as we attempt to pursue
a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the role the Computer Ethics Institute
has played and then leads into the need for a set of standards to guide and instruct people in the ethical use
of computers. Among these commandments is the principle of avoiding harm to others through the misuse of
technology. This is where the ‘Ten Commandments for Computer Ethics’ was first presented and has since been
used by hundreds of schools and corporations.
[11] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress and chal-
lenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in copyright and
intellectual property rights protection. It highlights the interplay between national and international regulations,
focusing on measures to address unauthorized distribution and safeguard creators’ rights. The article emphasizes
the importance of adapting legal frameworks to the demands of the digital era.
[12] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Professional
(CISSP) Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including threats like
ransomware and their impact on organizations. It delves into security assessment, risk management, and network
protection strategies to prevent data loss and mitigate cyber threats. The authors integrate real-world scenarios
to illustrate the consequences of cyberattacks and the importance of implementing robust cybersecurity measures.
[13] P. W. Singer and A. Friedman, Cybersecurity: What Everyone Needs to Know. New York: Oxford
University Press, 2014.
,→ Dependence on computers has profoundly impacted human society, especially in warfare, where the U.S.
military is highly reliant on advanced systems. The rise of cyberwarfare is exemplified by incidents like Stuxnet
and Chinese cyberattacks aimed at stealing U.S. government data. In this book, Peter W. Singer and Allan
Friedman examine the evolution of military cybernetics, the challenges of defending cyberspace, and recent
security developments. The book explores modern conflict dynamics and offers strategies for individuals and
governments to protect themselves.
[14] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Vietnam”, Science
and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in Vietnam and
mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified Theory of Acceptance and
Use of Technology (UTAUT), the study explores psychological, moral, and technological dimensions of piracy.
Key findings include the role of perceived behavioral control and risk perception. The paper also references
instances where enforcement actions were necessary to address large-scale piracy issues in the country.
[15] S. J. Harrington, “The effect of codes of ethics and personal denial of responsibility on computer abuse
judgments and intentions”, MIS Quarterly, vol. 20, no. 3, pp. 257–278, 1996.
4 ID: CE620
,→ This research examines the impact of ethical codes on the judgments and intentions of information
systems (IS) employees regarding computer abuse, including deceptive practices like phishing and other harmful
behaviors. The study highlights how ethical codes can clarify individual responsibilities and reduce rationalizations
for unethical actions. It also explores the psychological trait of responsibility denial, showing its significant role
in influencing decisions related to computer misuse.