1. Trang chủ
  2. » Ngoại Ngữ

Student Digital Piracy In The Florida State University System-an

208 6 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Student Digital Piracy In The Florida State University System: An Exploratory Study On Its Infrastructural Effects
Tác giả Jeffrey Reiss
Người hướng dẫn Rosa Cintrón
Trường học University of Central Florida
Chuyên ngành Educational Leadership
Thể loại Doctoral Dissertation
Năm xuất bản 2010
Thành phố Orlando
Định dạng
Số trang 208
Dung lượng 1,25 MB

Cấu trúc

  • CHAPTER 1: PROBLEM AND RESEARCH DESIGN (13)
  • CHAPTER 2: LITERATURE REVIEW (27)
  • CHAPTER 3: METHODOLOGY (118)
  • CHAPTER 4: DATA ANALYSIS AND FINDINGS (132)
  • CHAPTER 5: DISCUSSION, CONCLUSION, AND RECOMMENDATIONS (157)

Nội dung

PROBLEM AND RESEARCH DESIGN

Since the rise of the Internet, controlling copyright infringement has become increasingly challenging Historically rare, instances of infringement surged with the introduction of technologies like photocopiers, VCRs, and especially the Internet, making it easier to commit and harder to monitor (Liebowitz, 2006) According to Nolo (2009), the legal definition of copyright infringement highlights the complexities surrounding this issue.

Unauthorized use of copyrighted works, beyond the scope of fair use, includes actions such as plagiarism or incorporating parts of a photograph into a CD-ROM Copyright owners have the right to file a lawsuit to halt such infringements and seek damages, provided they have registered their copyright with the U.S Copyright Office.

Fair use serves as a significant exception in copyright law, allowing certain uses that might otherwise infringe on copyright This includes scenarios such as a professor recording a television program for classroom use, which qualifies as fair use However, if the professor were to present the same program at a non-educational event, it would not be protected under fair use.

2 environment, the showing would constitute a copyright infringement because it was no longer being used for an educational purpose (Chiang & Assane, 2007)

The rise of the Internet has significantly increased the ease of copyright infringement and piracy, making it more challenging to regulate In response, companies have implemented measures to combat these issues, utilizing technologies like CD-Keys for software to verify authenticity and Digital Restrictions to protect their intellectual property.

Digital Rights Management (DRM) is implemented to regulate user interactions with media Research by Chiang and Assane (2002) revealed that college students constitute a significant portion of copyright infringers, largely due to their financial constraints and proficiency with Peer-to-Peer (P2P) software This combination of technical skills and motivation to access pirated media poses challenges for campus networks.

The implementation of copyright prevention measures, including Digital Rights Management (DRM) and network software for monitoring peer-to-peer (P2P) usage, has garnered attention from organizations like the Common Solutions Group (2008), highlighting the ongoing efforts to address copyright issues in the digital landscape.

Technology professionals at universities are increasingly questioning the effectiveness of relying solely on monitoring to address student downloading habits The Common Solutions Group emphasizes that approaches like Digital Rights Management (DRM) and monitoring are just initial steps in a broader strategy needed to improve students' computer ethics.

The 2009 Joel Tenenbaum case, involving a student accused of illegally downloading 30 songs, highlights the challenges of enforcing copyright laws Defended by Harvard Law Professor Charles Nesson, Tenenbaum's initial fair use argument was rejected by the judge Despite being aware of the lawsuit, Tenenbaum continued his illegal downloading, ultimately admitting guilt and facing a hefty fine of $675,000 This case underscores the importance of addressing computer ethics to prevent similar incidents in the future (Anderson, 2009a; Sheffner, 2009a, 2009b).

Problem Statement The majority of people who have engaged in modern-day acts of copyright infringement and digital piracy have been students in colleges and universities

The Recording Industry Association of America (RIAA) has exerted pressure on educational institutions to monitor file sharing activities, a trend that intensified with the 2008 reauthorization of the Higher Education Act of 1965 This legislative update included specific mandates for postsecondary institutions regarding the oversight of file sharing practices.

The amended Higher Education Act of 2008 mandates annual disclosures to students about the potential civil and criminal liabilities associated with unauthorized distribution of copyrighted materials, including peer-to-peer file sharing While many universities have adopted these policies, not all have implemented software to block the transmission of copyrighted content Although the amendment lacks enforcement actions for non-compliance as of 2010, institutions without copyright infringement policies and monitoring systems may face significant risks, particularly regarding funding (Worona, 2008).

The Higher Education Act mandates that all institutions must implement specific software on their campus networks, leading to significant financial and resource challenges Implementation costs can reach at least $500,000 annually for some universities, as noted by Green (2008), diverting funds that could otherwise support new degree programs Additionally, the complexity of implementation varies based on the size and structure of the campus network, complicating compliance efforts further.

To complicate matters further, all of the available software has at least one flaw which could either permit a crafty student to circumvent the protection, or it may be filtered

5 to the point where legitimate use of the resource is either impeded or prevented (Electronic Frontier Foundation, 2006; Worona, 2008)

In response to the 2008 revision of the Higher Education Act of 1965, colleges and universities were required to enhance their efforts in preventing students from accessing copyrighted material online This legislation necessitated the acquisition of expensive software solutions, prompting this study to explore more cost-effective alternatives that would also respect student rights.

This study investigates the perspectives of university IT professionals on the rising issue of digital piracy among college students It aims to identify amicable alternatives to prevent copyright infringement that can support both student needs and the financial stability of postsecondary institutions amid the challenging economic landscape of the 21st century Additionally, the research highlights the implications of the 2008 revision of the Higher Education Act, which mandates compliance with copyright infringement prevention clauses for institutions receiving federal funding, emphasizing the potential loss of vital financial resources for non-compliance.

6 research also aimed to heighten the awareness of the issue of student piracy on campus and the multiple facets the topic truly entails

The significance of the study highlights the pressure on post-secondary institutions from the RIAA and federal policies, particularly since 2008, to implement monitoring software to prevent illegal media transfers via P2P networks and dorm servers While larger universities like the University of Florida had already adopted such measures, smaller colleges faced new mandates without immediate penalties for non-compliance However, future interpretations of the rules may lead to the loss of federal funding for institutions that fail to implement these measures, posing a challenge for financially struggling schools Moreover, the effectiveness of costly software solutions is undermined if students find ways to bypass them, resulting in potential waste of resources and the need for frequent updates due to the rapid advancement of technology.

P2P blocking software addresses only part of the piracy issue, as institutions also restrict dorm servers, limiting students' personal freedoms While P2P technology has numerous legal applications, its growth is hindered by the focus on illegal usage Historically, many successful search engines like Yahoo! and Google originated from dorm servers, and by blocking these resources, institutions risk stifling future Internet innovations to appease private interests Therefore, universities should consider solutions beyond software and legal measures to combat digital piracy while preserving student freedoms.

LITERATURE REVIEW

This literature review examines the multifaceted issue of student piracy, beginning with a historical overview of copyright law and piracy It then analyzes various methodologies for identifying student piracy, followed by an exploration of technological and policy measures aimed at combating this issue and their effectiveness Finally, the review discusses ethical solutions, providing an overview of ethical theories and the challenges they face in the digital landscape.

Copyrights and copyright infringement have deep historical roots, tracing back to medieval times as a response to the advent of the printing press The concept first emerged in Renaissance Italy, where exclusive licenses were granted to individuals for the printing and selling of books for a specified duration, establishing the foundation for modern copyright laws.

Copyrights originally granted publishers exclusive rights to publish specific books for a designated period, focusing on protecting their interests rather than those of authors This historical approach was necessary because many popular works were in the public domain In the United States, the Constitution empowered Congress to establish exclusive rights for individuals' creations and discoveries, laying the foundation for modern copyright law.

In the United States, individuals are granted exclusive publishing rights for 14 years for new works and 21 years for pre-existing works, aiming to foster creativity and innovation while ensuring that creators can benefit from their inventions (Sun & Baez).

Copyright protection is automatically granted to any work upon completion, but only those with registered copyright can claim damages for infringement To achieve registered copyright under U.S law, a work must be an "original work of authorship" fixed in a tangible form, meaning it must exist in a physical medium rather than just as an idea Copyright exclusivity initially lasted 14 years, but for works created after 1978, it extends for the life of the authors plus 70 years For "for hire" or anonymous works, the copyright lasts for 95 years from publication or 120 years from creation, whichever is shorter Overall, copyrighted material remains exclusive to the author throughout their lifetime and has evolved significantly in the United States.

17 exclusively publish for a set period of time to the right to exclusively publish one’s material for the remainder of one’s life

In a university context, copyright ownership can be ambiguous, as materials created by university employees typically belong to the institution rather than the individual Non-academic employees retain ownership of their work only if specified in their contract Conversely, students who create materials independently within the university setting maintain ownership of their work (Sun & Baez, 2009).

Until 1891, foreign works were not granted any copyright protection in the United States, highlighting significant gaps in the protection of international intellectual property Although U.S works have always enjoyed copyright protection, the lack of safeguards for foreign creations necessitated reform to ensure equitable treatment in the realm of copyright law.

1992) Hence, the United States was once a hotbed of piracy of a different type

In the late 19th century, the United States faced challenges in recognizing foreign copyrights due to economic constraints and a lack of global recognition for American authors The government refrained from intervening in the protection of foreign works, as it could not afford the associated fees However, in 1891, the U.S began to acknowledge foreign copyrights, following the principles established by the Berne Convention of 1886, which marked the inception of the first international copyright treaty.

The International Copyright Act of 1891 and the Chace Act offered limited copyright protection, requiring foreign works to meet specific conditions such as notice, registration, deposit, and a manufacturing clause that mandated the use of American materials This manufacturing requirement rendered the protection of foreign copyrights largely ineffective until its removal in the 1976 copyright reform, highlighting the Chace Act's shortcomings in providing meaningful copyright safeguards.

In 1955, the United States played a key role in establishing the Universal Copyright Convention, providing an alternative pathway for American works to gain international protection This was achieved through simultaneous releases in the U.S and in countries adhering to the Berne Convention, like Canada.

The Universal Copyright Convention did not initially protect American works, leading to a notable case in Thailand where the concurrent release method was disregarded, highlighting the perceived hypocrisy of the United States This prompted the U.S to ratify the Berne Convention into its copyright law (Nimmer, 1992) Given that it took nearly 200 years for the U.S to effectively address foreign copyright issues, it raises questions about the timeline for adequately managing digital copyrights.

The Fair Use Clause is often seen as a crucial exception in copyright law, permitting individuals to utilize original material without facing legal consequences According to the Copyright Act, fair use is determined by evaluating four specific factors.

When considering the legality of copying, several factors must be evaluated: the purpose and character of the use, including whether it is for commercial or nonprofit educational purposes; the nature of the original work; the quantity and significance of the portion copied in relation to the entire copyrighted work; and the impact of the copying on the potential market value of the original work.

Fair use is influenced by several factors, including the publication status of the material, its use in educational contexts, and the extent of verbatim usage (Edgar, 2003) While digital works permit personal backups, lending a CD to a friend under the pretense of creating a "backup" copy constitutes infringement and piracy.

Klein, Lerner, and Murphy (2002) examined the significance of fair use in a digital landscape, particularly highlighted during the Napster trial, where the company sought to defend illegal file sharing by invoking fair use This case raised questions about the concept of sampling, as users often sample songs prior to buying an entire album.

METHODOLOGY

The study design builds upon prior research

Examining the perspectives of IT professionals at universities can offer valuable insights into the issue of digital piracy Their direct involvement in the implementation, maintenance, and management of campus networks makes their views on digital piracy and the strategies to combat it crucial for a deeper understanding of this problem.

This study employed a quantitative methodology using a survey to gather descriptive statistics, administered via a secure personal server to prevent third-party interference The survey's webpage was custom-designed to ensure accurate completion, incorporating various validation safeguards The survey items were developed based on issues identified in the literature review and an automated morality framework that examines whether monitoring software can emulate human ethical behavior (Stahl, 2004) The collected data were analyzed using SPSS software to derive results that address the research questions.

The study focused on the IT department’s security officers across the 11 Florida State University System (SUS) institutions, each of whom included at least one administrator well-versed in copyright infringement detection software Given that these IT departments are tasked with the deployment and maintenance of such monitoring tools, they represent an ideal demographic for assessing the effectiveness of copyright monitoring software.

The role of the Chief Security Officer (CSO) or Information Security Officer in universities has gained significant importance in the digital age, focusing on establishing security policies and safeguarding campus networks Their responsibilities encompass incident management, policy development, forensics, risk assessment, and collaboration with law enforcement agencies A notable example is the University of Central Florida’s three-strike policy for P2P usage, which these officers are tasked with developing and enforcing to ensure compliance and enhance campus security.

Furthermore, the information security officer also possessed the authority to monitor the network to ensure that all users followed campus policy and disconnect or restrict access to offending users

Due to the limited number of information security officers within the Florida State University System, the study utilized a census approach, encompassing the entire population for a representative analysis of this specific system, though not reflective of all universities nationwide The study included 10 sample points instead of 11, as two institutions shared the same Internet connection Additionally, the researcher mandated a 100% response rate to the survey to adequately address the small population size.

This study introduces an original survey instrument, as it is the first of its kind in exploring automated morality within computer software The research is grounded in the theory of automated morality, which posits that software can act as a moral agent capable of making ethical decisions Stahl (2004) defines a moral agent as software that can successfully pass the Moral Turing Test, indicating its ability to be perceived as a moral entity by an independent observer Ultimately, the trust that information security officers place in monitoring software is indicative of its role as a moral agent and directly correlates with the software's overall effectiveness.

Information security officers have the authority to monitor campus networks and enforce policies they helped create (Goodyear et al 2009) The Common Solutions Group (2008) evaluated three programs designed to detect data transfers involving copyrighted material Given the impracticality of manual network scanning, utilizing automated programs for this purpose is a sensible solution However, the Common Solutions Group's analysis focused on the identified infringements and the flexibility in adjusting the scanning criteria.

The software is designed to restrict access to identified devices, a key responsibility of the information security officer This raises the question of whether the software can make ethical decisions like a human officer when addressing network violations To explore this, a web-based questionnaire (Appendix A) was developed, as it offers superior presentation and data collection compared to traditional survey methods.

Dillman (2000) highlighted potential issues with web surveys related to technology and computer access; however, these challenges did not affect the study, as the participants were from a tech-savvy profession To enhance compatibility and security, the questionnaire was hand-coded and hosted on a private server.

110 method, the questionnaire results were available as soon as the respondent completed the survey

The questions on the instrument consisted of a total of 36 items Of the 36, there were five yes/no items (3, 5, 6, 34, and 35), five multiple-choice items (1, 4, 30,

The survey included a total of 31 items, comprising three numerical fill-in responses (2, 8, 33), two free-response items (7, 36), and 20 items rated on a five-point Likert scale Items 1 and 35 required fill-in responses based on previous answers, while item 2 was omitted if respondents indicated "no monitoring software." Additionally, items 7 and 35 were not answered if respondents replied "no" to items 6 and 34, respectively All Likert scale items were positively phrased, eliminating the need for special coding, and included a "not applicable" option for respondents to indicate when an item did not pertain to them.

The 36-item survey was structured into four sections, beginning with respondents logging in through email-provided credentials The first section focused on the policy aspects of copyright monitoring software, specifically the Higher Education Act of 2008 The second section, the most extensive, addressed challenges in implementing monitoring software, including issues like cost, staffing and training needs, software acceptance, and effectiveness Finally, the third section examined alternatives to monitoring software, considering ethical concerns, alternative programs, and the potential for stricter standards.

Likert scale questions The final section inquired about demographics As Dillman

According to a study conducted in 2000, it is recommended to place demographic information at the end of a questionnaire Additionally, the demographics section included a comment box, allowing respondents to share their thoughts and contribute further insights to the study.

To effectively utilize any instrument, it is essential to assess both its reliability and validity Validity measures how well independent variables correspond to their dependent variables, particularly in questionnaires, where it indicates the correlation of selected questions to their broader sections A higher correlation signifies greater validity (Thurstone, 1931) If validity is low, it may necessitate regrouping or rewording the survey questions Once the questionnaire's validity is established, the subsequent step is to confirm its reliability.

Reliability refers to the consistency of an instrument's measurements Even if an instrument is initially valid, inconsistencies can arise over time, particularly when the population it measures changes or when it is applied to a different group (Thurstone, 1931).

DATA ANALYSIS AND FINDINGS

1 What steps, policies, and measures have the 11 institutions that comprise Florida’s State University System (SUS) taken to prevent copyright infringement as defined by Section 487 of the 2008 Higher Education Act?

The study focused on two key variables: Implemented Policy and Other Policy It examined the current policies in place at each SUS institution, with the Implemented Policy variable further categorized into four sub-variables, as detailed in Table 2.

Note : n for all variables is 10

The sub-variable program serves as an indicator variable for the monitoring program utilized by various institutions, as outlined by the Common Solutions Group (2008) Among these institutions, two employ cGrid/ICARUS, one uses BlueCoat Systems, while the others do not utilize any software Additionally, one of the cGrid institutions has incorporated Copysense for student housing management Notably, both cGrid users began implementing their software in 2004.

2007, while the institution running BlueCoat started in 2006 The sub-variable HEA Impact discussed how large of an impact implementing the changes mandated by the

2008 revision of the Higher Education Act would have on institutions This sub-

The study examined the impact of adding monitoring software on network operations, specifically through the sub-variable Ease of Altering Out of ten institutions surveyed, only one believed that the policy change would significantly affect the network, while another indicated that the software implementation would greatly influence network functionality Notably, these responses came from different institutions.

The second variable, Other Policy, explored other policies that involve blocking non-P2P connections Table 3 shows the results of the two sub-variables Table 3

Note : n for all variables is 10

The first sub-variable, Utilize non-P2P, aimed to assess whether the same monitoring software was employed beyond just blocking P2P traffic Out of the 10 institutions surveyed, only two utilized monitoring software in this manner Other bans were also examined to see if additional policies were in place.

123 bans such as disallowing servers in student dorm rooms had been implemented Of the institutions, eight utilized such bans Reasons included security issues, preventing piracy, and controlling network load

Table 4 outlines the various policy structures for addressing P2P violations among institutions Six institutions implemented an active "strike" policy, immediately disconnecting students upon detection of P2P connections In contrast, two institutions adopted a passive approach, only responding to reported violations such as DMCA notices Additionally, one institution mandated the installation of software that monitored P2P activity on students' computers While the policies of one institution remain unclear, they likely align with the passive response strategy.

2 What are the challenges of implementing the mandates stated in Section

487 of the 2008 Higher Education Act that require the introduction and implementation of tracking software?

The article investigates the challenges that IT departments anticipate encountering during the implementation of monitoring software Utilizing a 5-point Likert scale, the study assesses various factors, with responses ranging from 1 (Strongly Disagree) to 5 (Strongly Agree) The combined scale for the cost variable ranges from 2 to 10, highlighting the financial considerations associated with this software deployment.

The study utilized a combined scale ranging from 3 to 15 for the variables of Training, Ease, and Acceptance Staff was measured through a single question, and the five variables were analyzed in relation to demographic factors, including Gender, Degree Earned, and participation in professional development.

The selected demographics for this analysis include organization and length in position, as these factors are most likely to reveal significant differences among various demographic groups Notably, the salary demographic features three individuals within the $70,000-$89,000 range, alongside seven others in different salary brackets.

$90,000-$109,000 group The salary group was dropped because there was little variance across each of the possible groups

Table 5 presents results that are generally centered around the midpoint of each variable's scale, with Acceptance notably higher at an average of 9.90 The confidence intervals for all variables range from two to four points, indicating a relatively close clustering of the data.

Variable Mean SD SE Lower Bound Upper Bound

Note : n = 10 for Acceptance n = 9 for all other variables

The analysis of the data reveals that, without demographic breakdowns, most results fall near the midpoint of each variable's scale, with Acceptance slightly exceeding average at 9.90 Additionally, the confidence intervals for all variables range from two to four points, indicating a relatively close clustering of results.

Table 6 shows the five variables split by Gender

Variable Mean SD Mean SD

Note : n = 7 for males and n = 3 for females n = 6 for males on all variables but

In a comparative analysis, males scored higher on average in Training, Ease, and Acceptance, while females excelled in Costs and Staff Notably, Ease and Acceptance exhibited the most significant disparities, exceeding two points Furthermore, the standard deviations for Training (s = 753) and Acceptance (s = 787) among males were the lowest, indicating a more consistent response pattern.

Table 7 highlights the variations in responses among individuals with different degree types, specifically Bachelor’s and Master’s degrees While the average responses across these groups were relatively consistent, the responses from Master’s degree holders exhibited less variability.

The analysis reveals that individuals with Bachelor’s degrees exhibit a greater variability in Training (s = 500 for Bachelor’s, s = 2.191 for Master’s) and Acceptance (s = 957 for Bachelor’s, s = 2.251 for Master’s) In contrast, those holding Master’s degrees show less variability in Costs, with a standard deviation of s = 2.449 for Bachelor’s compared to s = 707 for Master’s.

Challenge Statistics by Degree Earned

Variable Mean SD Mean SD

Note : n = 4 for Bachelor's and n = 6 for Master's n = 5 for Master's on all variables but Acceptance

Table 8 shows that being a participant in a professional organization had little effect when compared to non-participants

Challenge Statistics by Professional Organization

Variable Mean SD Mean SD

Note : n = 7 for participants and n = 3 for non-participants n = 2 for non- participants on all variables but Acceptance

Table 9 shows very little difference between the variables in the two experience groups other than the variable Ease which was rated 2.50 points higher in the 10-15 Years group

Challenge Statistics by Length in Position

Variable Mean SD Mean SD

Note : n = 5 for 3-6 years and n = 5 for 10-15 years n = 4 for 10-15 years on all variables but Acceptance

The frequencies of the sub-variables that comprise the five main variables are detailed in the following section, accompanied by figures and a narrative discussion to illustrate the results of the analyses.

A survey revealed that three respondents felt the pricing of monitoring software was inadequate, while another three were uncertain about its appropriateness Additionally, only three out of ten participants believed they had sufficient funding to acquire monitoring software currently.

Figure 1 Frequency for Costs Sub-Variables

DISCUSSION, CONCLUSION, AND RECOMMENDATIONS

This chapter discusses the results of the data analysis from Chapter 4 in relation to the literature review and summarizes the key findings It also addresses the implications for practice, policy, and future research before concluding the chapter.

Discussion This section further explores the results of the data analysis presented in

Chapter 4 The discussion has been organized around the three research questions which guided the study

This research question aimed to assess the impact of new policy changes on the 11 institutions within the Florida State University System Among these institutions, only two employed the software outlined by the Common Solutions Group (2008), with one of them using two different programs in separate areas The cGrid software is designed to alert IT professionals about rogue network connections instead of automatically disconnecting them upon detection.

BlueCoat Systems which is a packet monitoring software similar to cGrid (Nyiri,

2004) Although the majority of the institutions did not utilize content monitoring

There are 146 software packages similar to Copysense that institutions may use, although they often do not categorize them as "content monitoring software." Interestingly, one institution mentioned during the study that they do not monitor their students.

The researcher found that the revision of the Higher Education Act had a predictable impact on institutions If an institution had an existing plan, changes would only be necessary if the system ceased to operate effectively Additionally, most institutions had structured their networks to minimize disruptions from any modifications Therefore, it can be inferred that universities within the SUS were adequately prepared for the revisions.

Server-banning policies were examined to understand how institutions addressed non-P2P piracy One institution implemented a ban on student servers to mitigate the risk of external network attacks, as poorly secured servers could serve as vulnerable points for hackers, leading to significant damage Another institution restricted server use specifically in student housing for similar security concerns, allowing students to operate servers elsewhere on campus, potentially with oversight from network professionals These findings align with Joachim's (2004) research, which noted that many institutions prohibited servers despite the fact that companies like Yahoo and Google originated from such setups.

The growth of the Internet since the inception of Yahoo and Google has led to an increase in the number of student-run dorm servers, currently totaling 147 This expansion has amplified challenges related to network security and network load, making them more significant concerns than in the past.

Six institutions employ active monitoring strategies to secure their networks by locking down computers upon detecting P2P connections or other harmful activities, implementing a "strike" system that escalates with repeated offenses This approach aligns with common practices outlined in existing literature (University of Central Florida, 2009; Michigan State University, 2009) In contrast, two institutions adopt passive monitoring, responding only to DMCA notifications or similar alerts, effectively placing students on an honor system with a single strike policy for violations Additionally, one institution implements a hybrid policy that requires students to accept a software key, which monitors P2P activities before granting network access; connections are locked if violations occur until the offending software is removed, thereby alleviating some responsibilities from IT staff.

The second research question aimed to identify the challenges associated with implementing and maintaining monitoring software, utilizing 13 items categorized into five variables Most items were measured on a Likert scale, resulting in a combined scale where costs and staff levels were around the midpoint, while three other variables slightly exceeded it Analysis across four demographics—gender, highest degree, professional organization membership, and length in position—showed minimal deviation in the combined scales, with the notable exception of the Ease variable, which indicated that individuals with longer tenure found the software easier to use compared to newer employees This discrepancy may stem from IT personnel having encountered less user-friendly programs earlier in their careers, and the small sample size likely influenced these results.

“N/A” for the majority of the questions that applied to this section

Analysis of the survey data reveals that most respondents found monitoring software to be neither affordable nor easily purchasable, aligning with previous warnings regarding its cost.

Worona (2008) raised concerns about the escalating costs of monitoring software amid the current economic conditions While most Florida universities already have some monitoring systems established, their dwindling budgets may pose challenges for future upgrades and replacements.

Maintaining a well-trained staff represents a significant financial burden for organizations While the software is considered user-friendly, new employees still need training to effectively operate it Additionally, despite the software's one-time purchase cost, investing in staff is a long-term commitment Many respondents indicated that their teams were insufficiently sized, with only two to three individuals available to utilize the software effectively.

While the software's cost poses a challenge, its reliability presents a separate concern Many respondents reported experiencing false positives during monitoring, indicating situations where conditions are mistakenly identified as true This issue significantly impacts the software's overall value and effectiveness As highlighted in the theoretical framework, an increase in erroneous or missed detections correlates with a decrease in the software's reliability and worth (Wallach et al., 2008).

Contrary to what the Common Solutions Group (2008) and the EFF (2006) believe, some campus networks can detect masquerading data This implies that the software,

150 while functional, may not be the most reliable tool available to the IT department, and it may take time to develop a suitable replacement

According to Wallach et al (2008), trust in software is a crucial aspect of software ethics The study examined how the Acceptance variable influences perceptions of monitoring software, revealing that IT professionals often view it as burdensome rather than beneficial A significant consensus among respondents indicated that encrypted connections pose ongoing challenges in combating piracy, aligning with earlier warnings from researchers and organizations such as the EFF (2006) and Nyiri (2004).

IT directors acknowledge that software monitoring is an effective tool against digital piracy, yet they generally believe that software should not make final decisions As noted by Friedman and Kahn (1992) and Stahl (2004), computers can only emulate ethical behavior, and this emulation depends on the quality of programming Consequently, it can be inferred that such programs lack the maturity to make independent decisions without IT professional intervention While these findings may seem contradictory, they highlight the level of trust IT professionals place in these systems Despite the software's effectiveness in performing its tasks, it has not demonstrated sufficient reliability to be granted full control over networks, aligning with the insights from the Common Solutions Group (2008) on the evolution of piracy prevention software.

The third research question assessed the effectiveness of alternative methods to current procedures for addressing ethical issues in the classroom This included enhancing ethics education, offering legal alternatives to illegal downloads, and evaluating existing legal actions like DMCA notices and student disciplinary measures The variables were measured through questionnaires, yielding above-average scores, which suggests potential for additional interventions beyond mere monitoring Analysis of the data by factors such as gender, degree, professional organization membership, and tenure revealed minimal differences, indicating that these factors had little impact on the results.

Ngày đăng: 20/10/2022, 16:06

w