With an open source program, anybody can create for the program, giving it a much bigger foundation for designers and gives them a greater sense of proprietorship as they can change whatever they like (Sacks, 2015).
In a Proprietary source, designers only have limited capabilities to alter or make any modifications from what the first designers had set in place, however, having full control gives them a chance to alter the look feel and even elements of the product giving it significantly more conceivable outcomes. In the Case with Apple and the FBI, Apple was taken to court over a locked phone. The FBI tried to force Apple to develop a program that would go against their security protocols to unlock the phone of a terrorist. Apple refused to do so stating that it would open a backdoor and allow for anyone to breach the security of their phones (Cava, Johnson & Swartz, 2016).
…show more content…
References:
Johnson, Jon Swartz, K., Cava, M. D., & Swartz, J. (2016, March 29). FBI hacks into terrorist's iPhone without Apple. Retrieved September 26, 2016, from http://www.usatoday.com/story/news/nation/2016/03/28/apple-justice-department-farook/82354040/
Sacks, M. (2015). Competition Between Open Source and Proprietary Software: Strategies for Survival. Journal Of Management Information Systems, 32(3), 268-295.
The backdoor it too dangerous to be created and could fall into the wrong hands.
The dispute between Apple and the FBI has been one of the controversial topics since the shooting in San Bernardino. The FBI wanted Apple to help “unlock” the iPhone; however, Tim Cook, an Apple CEO, refused to provide the assistance. Mr. Cook was right about doing so because of two reasons: customers’ important information must be protected, and the FBI’s order is a dangerous precedent.
(2) Reliability: since the open source is distributed peer review software and often developed through collaborative that makes it to be more reliability. Also, there are many open source software that have proven to be both reliable and potent over Internet such as DNS, Apache and languages such as HTML and Perl. (3) Good business: open source software gets closest to what the user need because of competition between vendors to involved to make better capability and quality each time to meet the user needs. Thus, that would also help to drive a high return investment for investors on another economic
On December 2, 2015, Rizwan Farook and Tashfeen Malik walked into a federal building and killed 14 people and injured 22. The couple fled in an SUV and later got into a shootout with police officers and was killed in their vehicle. I don’t want to take away anything from the victims of this horrible tragedy, but this set the stage for the huge battle between a tech giant in Apple and the Federal Bureau of Investigation (FBI). During the FBI investigation, it was discovered that the male suspect Rizwan Farook had in his possession a locked IPhone-5C running the iOS 7 operating system. The FBI quickly discovered that this phone would be very difficult to unlock, so they decided to turn to Apple for help in solving this issue.
The recent case Apple vs. FBI has raised controversy over the priorities placed on national security and personal privacy. The controversy stems from Apple’s denial of access to an iPhone involved in the orchestrating an act of terrorism. On December second, 2015, a couple in San Bernardino, California, massacred fourteen people and seriously injured twenty-two others in a terrorist attack. One perpetrator, Syed Farook, worked for the county health department and possessed a county-owned Apple iPhone 5C, which may have stored some of his recent online activity. This data could provide information surrounding the terrorist’s affiliations, motives, or background. The phone was encrypted through Apple’s operating system and the FBI has been unable to unlock the device. A court order, requested by U.S. judge Sheri Pym ruled that Apple must provide a decryption program that would grant the FBI access to the phone. Apple
On February 16, 2016, a United States judge working in the District Court of Los Angeles ordered the technology company Apple to help the FBI break into a work phone previously owned by one of the San Bernardino shooters. Apple was expected to assist in bypassing a feature of the iPhone that deletes its contents after a certain number of password tries. This would allow the FBI to enter an infinite number of passcodes, eventually cracking the iPhone. However, Apple denied this request, and appealed the initial hearing. Apple said that doing what the FBI asked would not only go against it’s First, Fourth, and Fifth Amendment rights but, also, would endanger privacy of iPhone users everywhere. Apple is right in standing up to the FBI on this
After Farook and Malik were killed following their crimes, an intense legal battle broke out between the Federal Bureau of Investigation (FBI) and Apple. The FBI wanted the technology giant to unlock Farook’s iPhone, believing that it might contain vital information related to why he and his wife committed the act of major terrorism. Apple refused, realizing that doing so would violate the safety and privacy of their millions of customers. The situation only got more serious when a federal magistrate ordered Apple to unlock the iPhone. Interestingly, there were many cases to similar to this in the past, but none achieved near as much notoriety as this had at its climax. Part of that is because it also involves terrorism; many hope that it also
While Apple’s debate is important, the data on the San Bernardino terrorist’s iPhone may contain pertinent information identifying other terrorists and malicious plots, thus making access to the information a matter of national security. The hunt for terrorist information began with the attack on the Twin Towers which marked the beginning of the American “War on Terror,” as described by President George W. Bush in 2001. In an effort to neutralize the numerous threats to the well-being of Americans, the government employed certain surveillance techniques that, according to the NSA head General Keith B. Alexander in 2013, have helped prevent “potential terrorist events over 50 times since 9/11 including at least 10 homeland-based threats” (Savage). In order to save at least ten lives, the NSA had to collect information from the American people and the San
The main problem Darrel addresses throughout the article is whether or not apple should engineer software for the FBI to allow them to unlock the iPhone used by the terrorists responsible for the San Bernardino attack. He then brings up the fact that “the FBI cannot mandate that apple create a backdoor to override the iPhone’s encryption features without creating a dangerous precedent that could cast a long shadow over the future of how we use our phones and internet for the years to come.” The problem with the FBI asking apple for this is a much larger one than people may think. Darrel uses logos, pathos, and ethos, throughout the article to help persuade and inform his audience that what is happening is a big ordeal. He then goes into detail supporting his thesis by explaining the many problems that could possibly arise.
The case of Apple Vs FBI is basically the FBI trying to have Apple change their operating system (OS) in their phones so they can be encrypted if they need to be. Currently, Apple phones are set up to protect against hacking. The FBI wants to gain this access so they can stop a terrorist from being able to use mobile technology as means of harm and to gain knowledge of what the attack could be.
In today’s society, technology has become one of the most used and most sought after developments of the millennium. In a recent case the FBI petitioned for Apple to unlock the phone of Syed Farook, the man responsible for shooting and killing 14 people in San Bernardino, California. The FBI believed Apple should create a new software that would not erase the data from iPhones after ten failed attempts to unlock the phone. Apple replied that they had a responsibility and an obligation to protect the privacy of their customers. Supporters of Apple 's response have argued, creating a new software was not a wise decision. In the past, government agencies have been known for their abuse of power. Had Apple chosen to create a master key for this particular case, there would be no limit to government invasion of privacy. In the end Apple could have potentially lost costumers by changing the protection of their cellular products. The issue has already been raised that creating software to access one locked device could potentially open the door for hackers to invade millions of other people’s devices. I agree that Apple should not create a new software to unlock the phone because once a master lock is created there are no limitations to who or how the coding can be used.
Free software is free, users can change code, and source code is available to anyone.
John Hopkins researchers poke a hole in Apple’s encryption was the article Grant and I both found most persuading to write an ethical analysis on. This article was published by Ellen Nakashima on March 21 by The Washington Post. Grant and I both agreed that creating a backdoor for the FBI is not a
The recent case between the FBI and Apple brought a worldwide ethical dilemma into the public eye, and it could have detrimental effects to the entire tech industry. The FBI wanted Apple to create backdoor access to encrypted data on one of San Bernardino shooter’s iPhones, and Apple refused just as many other large tech companies such as Amazon and Microsoft are doing nowadays. This situation creates the ethical dilemma of whether the government should have complete access to all encrypted data, and how consumers will react knowing their private data is not actually private.
The company on the forefront of this issue is Apple. After the tragic events in San Bernardino, CA on December 2, 2015, the United States FBI located an iPhone 5C belonging to one of the terrorists. The FBI, however, was unable to access the phone and formally requested Apple to unlock the device to facilitate the search for information about the killers. Apple swiftly refused and after several weeks of back and forth, the FBI filed a case against Apple (Nakashima April 2016). This case