Question? Call Us  +1 (817) 546-4770

IMT4130 : Cybercrime

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

IMT4130 : Cybercrime

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

IMT4130 : Cybercrime

0 Download4 Pages / 785 Words

Course Code: IMT4130
University: Norwegian University Of Science And Technology is not sponsored or endorsed by this college or university

Country: Norway

1. Predict the long-term use of both open source and proprietary software models and explain which software model has more legal implications/issues than the other.2. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Open Source Software
Open source software is emerging as the most sensational discovery in the Information Technology arena and the internet has modified itself into a remarkable place where there is constant debate as to which is better-open source software or proprietary software (Pereira et al., 2018). With the huge success of open source software, it is safe to conclude that it has changed the dimension of how internet is perceived, thereby making its journey into mainstream software arena. Open Source software can be defined as a method of distribution of software which is permitted under a licensing agreement (Söderberg at al., 2015). Under the open source agreement, the source code is allowed to be shared as well as viewed. This viewing or modification is done by both users as well as organizations. Some rights and modifications are also part of the open source software framework, like free distribution rights, any access to the source code mentioned, the right to distribute as well as the permission to modify (Zhu at al., 2014). Though there exists a right to modify, the right is limited to that and there is no permission to modify the software against any person, field or specific group (Rost et al., 2016).  
Proprietary Software
The proprietary software is not similar to open source software as the former is used for the purpose of machine programming which is only allowed under the supervision of a trusted copyright holder wherein advantages can be reaped (Silva et al., 2014). This software is used for the purpose of utilizing the already existing equipment which is created by any individual for repute or skill into a completely new equipment so that brand new programming can be made. Proprietary software works on the principle of secrecy, that is, the source code is kept a mystery. There is a level of exclusivity that is maintained in case of proprietary software (Cadariu et al., 2015).
Though there are many opinions as to which is better between the two options, it is better to make a cogent choice by evaluating the pros and cons of the two software types. Both the types have their advantages and disadvantages, as follows:

Cost: Open Source Software is free and Proprietary software is expensive (Tervonen, 2014).
Innovation: There is larger scope for innovation in case of open source in contrast to proprietary software where the clients do not have the permission to alter or adjust the source code (Osmani et al., 2017).
Usability:The usability in case of open source is not friendly and does not cater to the amateurs, whereas the proprietary caters to the viewers who are much more focused and their manuals are supplied for the clients (Pinto et al., 2018). 
Availability: Open Source is freely available but in case of proprietary software, there is a need for updating both the software as well as the hardware (Nguyen, 2017).

By evaluating the above comparisons and by checking the business trend, it is clear to state that many organizations have started to use open source software and therefore it can be concluded that open source software is gaining an edge over proprietary software.
Cadariu, M., Bouwers, E., Visser, J., & van Deursen, A. (2015, March). Tracking known security vulnerabilities in proprietary software systems. In Software Analysis, Evolution and Reengineering (SANER), 2015 IEEE 22nd International Conference on (pp. 516-519). IEEE.
Nguyen-Duc, A. (2017). The impact of software complexity on cost and quality-A comparative analysis between Open source and proprietary software. arXiv preprint arXiv:1712.00675.
Osmani, F., Hettiwatte, M., Kshirsagar, S., Senadheera, S., & Zhang, H. C. (2017). Development of an environmental Life-Cycle Assessment (LCA) protocol for flexible pavements that integrates life-cycle components to a proprietary software. In Pavement Life-Cycle Assessment (pp. 41-50). CRC Press.
Pereira, F., Lou, B., Pritchett, B., Ritter, S., Gershman, S., Kanwisher, N., … & Sudarsky, S. (2018). open-source software. Nature, 9, 963.
Pinto, G., Steinmacher, I., Dias, L. F., & Gerosa, M. (2018). On the challenges of open-sourcing proprietary software projects. Empirical Software Engineering, 1-27.
Röst, H. L., Sachsenberg, T., Aiche, S., Bielow, C., Weisser, H., Aicheler, F., … & Liang, X. (2016). OpenMS: a flexible open-source software platform for mass spectrometry data analysis. Nature methods, 13(9), 741.
Silva, V., Crowley, H., Pagani, M., Monelli, D., & Pinho, R. (2014). Development of the OpenQuake engine, the Global Earthquake Model’s open-source software for seismic risk assessment. Natural Hazards, 72(3), 1409-1427.
Söderberg, J. (2015). Hacking capitalism: The free and open source software movement. Routledge.
Tervonen, T. (2014). JSMAA: open source software for SMAA computations. International Journal of Systems Science, 45(1), 69-81.
Zhu, Y., Qiu, P., & Ji, Y. (2014). TCGA-assembler: open-source software for retrieving and processing TCGA data. Nature methods, 11(6), 599.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.


Yes, alert me for offers and important updates


Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 4 pages


*The content must not be available online or in our existing Database to qualify as

Cite This Work
To export a reference to this article please select a referencing stye below:


My Assignment Help. (2021). Cybercrime. Retrieved from

“Cybercrime.” My Assignment Help, 2021,

My Assignment Help (2021) Cybercrime [Online]. Available from:[Accessed 18 December 2021].

My Assignment Help. ‘Cybercrime’ (My Assignment Help, 2021) accessed 18 December 2021.

My Assignment Help. Cybercrime [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from:

.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}


Thank you for your interest
The respective sample has been mail to your register email id


$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1

Account created successfully!
We have sent login details on your registered email.



Receive all the necessary assistance for writing a research paper from You can rely on our experts and let go of all your concerns regarding writing this specific academic paper. They always use the correct research paper outline to prepare the copy. We will help you in every step of the writing process, including finding appropriate research paper topics. You can also use the materials provided by us as an easy guide to learning how to write a research paper. Thus, with our guidance, you will be able to write excellent research papers and get high scores.

Latest Management Samples

div#loaddata .card img {max-width: 100%;

MPM755 Building Success In Commerce
Download :
0 | Pages :

Course Code: MPM755
University: Deakin University is not sponsored or endorsed by this college or university

Country: Australia

The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…

SNM660 Evidence Based Practice
Download :
0 | Pages :

Course Code: SNM660
University: The University Of Sheffield is not sponsored or endorsed by this college or university

Country: United Kingdom

Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :

Course Code: BSBHRM513
University: Tafe NSW is not sponsored or endorsed by this college or university

Country: Australia

Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :

Course Code: MKT2031
University: University Of Northampton is not sponsored or endorsed by this college or university

Country: United Kingdom

Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :

Course Code: MN506
University: Melbourne Institute Of Technology is not sponsored or endorsed by this college or university

Country: Australia

An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 


Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog

PROJ6016 Employer Based Project

Free Samples PROJ6016 Employer Based Project .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} PROJ6016 Employer

Read More »

PPMP20009 Marking Rubric

Free Samples PPMP20009 Marking Rubric .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} PPMP20009 Marking Rubric

Read More »