Computer Crime Research Center


Problems of Software Market in Ukraine

Date: January 27, 2004
Source: Computer Crime Research Center
By: Andrey Belousov

... distribution of copies, opportunity of modification and free distribution as well as original software, and modified under the same conditions (obligatory for GPL, but not for BSD, Public Domain and other types of Open Source licenses).

Thousands of programmers and small companies develop Open Software all over the world, their products are available for any modification and further sale or non-commercial distribution.

Thus Open Software (Open Source, open, free software) is high-quality and public alternative to closed commercial soft. It is necessary to give such alternatives to Ukrainians before introducing severe sanctions on unlicensed commercial software use.

International precedents are important in case of Open Source distribution. India and China, in order to save money and time, began to use open source soft for developing homeland products. Freeware is accessibility of the source and shifting expenses to support services, customers pay not for licenses but for support. China, being in such situation, more than one year ago declared transition to software on freeware Linux operating system in all state authorities. France, Germany and Russia follow such measures too. Actions of these countries are absolutely clear in all respects – starting from national security, ending with free and public access to information by all groups and categories of citizens.

Dependence from foreign software manufacturers, according to experts, is extremely economically unprofitable, it will never allow to organize sound information security system. The only way to integrate in world information space and not to become dependent on foreign software giants is to start introducing homeland software solutions.

[1] Y. Radchenko, War with own shadow: how Ukrainian government “fights” “intellectual pirates” -
[2] V. Kalyatin, Intellectual property (Exclusive rights), Moscow: “Norma”, 2000, p.187.

Add comment  Email to a Friend

Copyright © 2001-2024 Computer Crime Research Center
CCRC logo