Software Piracy Protection System - SMH Amiri

সর্বশেষ লিখাসমূহ

Software Piracy Protection System

 Introduction:

The goal of developing this project is to prevent software piracy and improve protection and security measures for software. Piracy is one of the biggest threats in the industry. Hackers use malware and malicious code to gain access to software products/systems, thus, putting at stake the entire security infrastructure of a company. As a result, it is pivotal to incorporate the necessary measures and protection systems to uphold the integrity of data as well as the copyright rights of software products.

The software piracy protection system helps keep piracy threats at bay. Users must first register for using a software product and then purchase the software via online payment. Once the payment is complete, users can download the software and the serial key for the same. The software reads the ID of your machine (PC/laptop) and generates a unique user ID by using an algorithm. The user can now log in via the user ID by providing the serial key.

The key is encrypted and is different for each machine, which makes it highly secure. After the serial key is entered, the software, too, will generate a key via encryption and match it with the serial key of the user for authentication. If the keys match, the user can access the software product, and if it doesn’t match, the software remains locked.

Summary of Progress:

a. Schedule analysis:

In project management, the project schedule is a document that, if properly prepared, is usable for planning, execution, monitoring/controlling, and communicating the delivery of the scope to the stakeholders. The main purpose of project scheduling is to represent the plan to deliver the project scope over time. A project schedule, in its simplest form, could be a chart of work elements with associated schedule dates of when work elements and milestones (usually the completion of a deliverable) are planned to occur. In addition to guiding the work, the project schedule is used to communicate to all stakeholders when certain work elements and project events are expected to be accomplished. The project schedule is also the tool that links the project elements of work to the resources needed to accomplish that work.

 

At a minimum, the project schedule should include the following components:

                                                       i.            All activities

                                                     ii.            A planned start date for the project

                                                  iii.            Planned start dates for each activity

                                                   iv.            Planned finish dates for each activity

                                                     v.            Planned finish date for the project

                                                   vi.            Resource assignments

                                                vii.            Calendar based

                                             viii.            Activity durations

                                                   ix.            The "flow" (sequence) of the various activities

                                                     x.            The relationships of activities

                                                   xi.            An identified critical path(s)

                                                xii.            Total and free float

b. Budget Analysis:

The project budget is a financial plan for all project expenditures (cost). Success in project budget management depends on, amongst other things, the creation of a comprehensive, consistent, and reliable project budget. Some people want to use the term "accurate" in the above definition. But, the word "accurate" has no place in the project management world. Reliable and consistent are the terms that should be used. By definition, the project budget cannot be accurate as it is an estimate. Normal ranges of project budget variability depend on the project, the organization, the type of business, and many other factors, but usually falls within +/- 10%.

Based on the work above, we now have a budget for:

                                           i.            Individual Activities

                                         ii.            Work Packages

                                      iii.            Deliverables

                                       iv.            The Total Project

This level of detail allows a project manager (PM) to evaluate the budget performance of the project from the top down or from the bottom up. If a work package is running over or is in danger of overrunning the budget, the project manager can drill down until he/she finds the problem or potential problem. The drill down can be by the PM or in conjunction with the assigned team member.

Earned Value Method 

One other very powerful tool that helps in the analysis of project budget performance is the Earned Value Method (EVM). EVM can assist you in evaluating project budget performance (what are you accomplishing for the funds you are expending) and in calculating a Cost Performance Index (CPI), which is a representation of the effectiveness of your spending. EVM can calculate a Cost Variance (CV), which is the difference between the value of the work completed and the amount of funds expended to accomplish that work. This will tell you the magnitude of the over- or under-run or if you are on budget. EVM can be applied down to the work element level if the appropriate level of detail exists.

Variance Analysis 

Variance analysis is another tool to help the PM understand why work elements are over- or under budget. The Cost Management Plan probably sets thresholds for overruns (say 10%), a different threshold for under runs (say 15%), to trigger your attention. Understanding why work elements are overrunning will assist the PM to develop solutions (action plans) to bring the project back within acceptable ranges. Understanding why work elements are significantly under budget assist the PM in feeding this information forward to new project budget development.

Regardless of experience, care, or execution effort, project budget variances will occur. This is just a fact of the project world. While they cannot all be eliminated, they can be reduced for future projects. Some (not many) projects will finish very close to the budget. More projects will finish within acceptable ranges (+/-10%). Others (we hope not many) will finish well outside the acceptable range (>10% over or under). Using the techniques outlined here will reduce the number of projects in this category and reduce the size of the overruns.

 

c. Scope Analysis:

Scope refers to the detailed set of deliverables or features of a project. These deliverables are derived from a project’s requirements Project Scope as the “The work that needs to be accomplished to deliver a product, service, or result with the specified features and functions.”

Following are the three processes of Project Scope Management:

Planning

The planning process is when an attempt is made to capture and define the work that needs to be done. 

Controlling

The controlling and monitoring processes focus on documenting tracking, scope creep, tracking, and disapproving/approving project changes.

Closing

In the final process, the closing includes an audit of the project deliverables and an assessment of the outcomes against the original plan.

 

d. Process Analysis:

Process analysis, in project management, is all about following the steps that are outlined in process improvement plan. It is used to identify the necessary improvements needed in the project plan. This type of analysis looks into the problems experienced and other non-value-added activities that are identified during the process operation.

This particular project management tool is used to look at different processes and determine what can be done to make them better and more effective. Unlike quality audit, the process analysis looks at the process improvement from both the technical and organizational standpoint. It examines three different things:

·        Problems that are experienced while conducting a particular project

·        Problems experienced while conducting the work of the project

·        Ineffective activities that are identified during the operation

This particular tool is often mistaken for quality audit which is basically seeing whether the team is following the defined process. The process analysis also includes root cause analysis and other techniques necessary to identify a particular problem. It also involves discovering the underlying causes that can lead to problems so that preventive actions can be developed.

e. Gant Chart Progress Chart:

         

January

February

March

April

Analysis

 

 

 

 

Design

 

 

 

 

Development

 

 

 

 

Testing

 

 

 

 

Implementation

 

 

 

 

Maintenance

 

 

 

 

 

Activity Analysis

a. Tasks Completed since last report

Project status reports are taken repeatedly, throughout every phase of the project’s execution, as a means to maintain your schedule and keep everyone on the same page. The status report for a project will generally include the following:

                               i.            The work that’s been completed:

                             ii.            The plan for what will follow:

                          iii.            The summary of the project budget and schedule:

                           iv.            A list of action items:

                             v.            Any issues and risks, and what’s being done about them:

The true value of a project status report lies beyond its use as a communication channel. It also provides a documented history of the project. This gives you historical data, so the next time you’re planning a similar project, you can avoid any missteps or bottlenecks.

Because project status reports cover so many topics, historically, they were time-consuming to create. Fortunately, modern project management software like ProjectManager.com expedites the all-important reporting process. Try out our automated project reports, and simplify your project reporting.

b. Current Tasks and deliverables

“Code and fix” development is not so much a deliberate strategy as a result of schedule pressure on software developers. Without much of a design in the way, programmers immediately begin producing code. At some point, testing begins (often late in the development cycle), and the unavoidable bugs must then be fixed before the product can be shipped. Programming without a planned-out design is also known as cowboy coding.

c. Short term future tasks and deliverables

There is a distinction between project and product deliverables. Project deliverables are such outputs as the project plans, project reports and even meeting minutes. Product deliverables, on the other hand, could be hardware, software, mobile applications, contracts, or even test assessment results.

The deliverables that clients and stakeholders expect at the end of the project are the product or service, of course, but there is also paperwork, as noted. These documents, when completed, are deliverables that clients and stakeholders need in order to evaluate the progress or completion of the project.

This paperwork can include:

                               i.            Signed contracts

                             ii.            Finalized expense reports

Other types of project reports which show how work is proceeding versus project plan estimations

Deliverables can vary according to the project’s specifications and the stakeholders’ requirements. But all clients and stakeholders want deliverables that thoroughly wrap up the project at its closure and measure performance against expectations throughout the project.

 

Previous Problem and Issues

Problem-1: An unestablished project environment is always a common challenge in terms of its impact on project delivery. If the environment is not available, then there is no way you can proceed with your project on time and under budget.

Solution: To ensure efficient project development, test and pre-production environments should be made available during the development, testing, and user acceptance testing (UAT) phases. Invest in a solid IT infrastructure upfront to create a better software development environment.

 

Problem-2: A major reason for the complexity of software projects is the constant changing of requirements. Not surprisingly, 33% of the respondents of the Stack Overflow Developer Survey consider building products with unspecific requirements, as their biggest challenge. Requirements gathering is a lot more than a handful of business consultants coming up with their ideal product – it is understanding fully what a project will deliver.

Solution: To ensure that the product outcomes align with expectations and requirements, a solid process and line of communication need to be established. Remember the following best practices.

·        Define and agree on the scope of the project

·        Don’t assume end-user needs and requirements

·        Communicate the needs and expectations between the development and ideation teams

·        Involve users from the start of existing product refurbishment

·        Consider UX from the start of new product development

·        Create a clear, concise and thorough requirements document and confirm your understanding of the requirements

·        Create a prototype to confirm and/or refine final agreed-upon requirements

Problem-3: Not reviewing code, or suppressing errors are just a means that developers use to save time and meet deadlines.

Solution: Following a formal quality assurance process is imperative for a successful launch. If you witness developers trying to cut corners in the development process, discourage it immediately. Encourage them to use the best code development practices to meet the requirements sooner and more efficiently.

 

New Problem and Issues

 

Problem-1: Product designs are under constant influence from stakeholders, the development organization, and other internal and external factors. Managing these influences is essential for maximizing the quality of systems and their related influence on future business opportunities. The increase of easily accessible, simple applications has resulted in user expectations growing exponentially.

Solution: Make sure you streamline your design and offer a consistent experience across devices, operating systems, and form factors.

Problem-2There are thousands of different technologies, systems, and applications available for businesses. Integrating third-party or other custom applications, such as your ERP systems, website, or inventory management database adds substantial complexity to your project. And the bigger challenge with integration is that they remain hidden throughout the development process, and surface only at the end, leading to extra costs, delays, lowered quality, and sometimes even failure of the project.

Solution: To conform your software solution to the external constraints of other systems, you should:

·        Get a clear understanding of end-user requirements

·        Implement an enterprise-wide framework for the platform structure of the application

·        Discover and research new technologies

·        Design and develop new solutions

·        Test and evaluate ideas to ensure optimum integration

·        Pay extra attention to research and development, testing, and prototyping.

·        Test, test, and test again before deploying the solution

 

Financial Analysis

Most of the people in universities are using pirated software. Statistics of the present study shows that 67.3% of people do use pirated software. The activation of the software is done by using fake (illegal) cracks and other activation methods. The fake key is used as an alternate for showing the software is original, while in the actual original software, it is allowed only to those users who purchased the license of the software. Using fake keys is the piracy of software is a serious crime. According to the statistics of the study, the activation by online payment is too low, which is 7.3%. Buying CD/DVD from the market is still less (38.2%) compared to activation by cracking the software (54.5%). The online payment facility in educational institutions shows that 81.8% of the participants do not have to buy the software online and pay for it, while only 18.2% have the facility to buy the software online. The rates of the total number of pirated software were identified to be much higher from the survey. According to the survey, 49.1% of each participant uses more than six pirated software. Other participants are not exempted from piracy but differ only in a smaller number of pirated software, and their ratio is 18.2% for (4–6) number of pirated software and 32.7% for (1–3) number of pirated software. The study shows that the existing piracy is too high and the majority of people use pirated software. About 80% of participants think that people do piracy. Figure 2 shows the details of a different aspect of the existing level of piracy.

High software cost is one of the reasons behind software piracy. From the survey statistics, about 70% of participants consider it because of the price, while another reason is lack of awareness that has statistics of 23.6%. Software piracy ratio can be reduced by lower software cost, as in survey its statistics are high (54.5%) as compared to other alternative increasing awareness (30.9%) and easy payment methods (14.5%). Piracy of software saves money and prices of paid software as most of the participants (72.7%) say that piracy saves a significant amount of money for them because software prices are high. From statistics, the software is expensive for 85.5% of the survey members, while others consider it normal (10.9%) or cheap (4.6%). The economic factor of software was studied and the study shows that economy is an incentive for purchasing pirated software. 52.7% of participants agreed, while others did not know (30.9%) or disagreed (16.4%).

Unfamiliarity and unavailability of online purchasing is a factor of the survey in which most of the people (67.8%) are not able to buy software directly from the Internet because they do not have an online buying facility. The participants were not in favor of software piracy. Only 32.7% of the participants are on the other side. The participants receive fake software registration notifications not too often (50.9%), while only 25.5% of participants receive notifications very often and 23.6% do not receive them at all. Receiving warnings and notifications also has a psychological bad effect on the participants. They do not like at all the warning they receive for doing piracy. A total of 61.8% of participants feel bad after this, while 29.1% do not care. Still, some of them feel happy to receive it.

Finding fake/pirated software activation codes and licenses on the Internet is easy and statistics do not differ significantly (54.5%). In contrast, 45.5% of participants find it easy to find activation codes on the Internet. The difference is not significant enough and we cannot say that activation codes can easily be found on the Internet based on the higher percentage of responses (54.5%). Also, registration of software from the Internet is the easiest way (70.9%) for people are compared to other alternatives. The low probability of getting caught during piracy is medium for 49.1% of participants, while 41.8% of the participants’ probability of being caught is low. Poor implementation of software policy has been studied and the execution of software policy needs to be implemented in the academic institutions. 90.9% of the respondent agreed to have a software policy to be implemented in academic institutions. Figure 6 shows software piracy and its causes from user perspectives.

Figure 1: Software piracy and its causes

 Attachment

The proposed study was conducted to identify the impact of software piracy in educational institutions. The first step of the study is to find the current level of piracy, its awareness, and the reasons behind why people are doing piracy. This paper addresses the following research questions which are based on a study of the literature and market:

(a) Is the software piracy rate high in academia?

(b) Are people aware of the software piracy issue?

(c) Why do people commit piracy and what are the main reasons behind this issue?

(d) What could be the possible solutions to reduce software piracy in academic institutions?

Level of Piracy

piracy is too high and the majority of people use pirated software. About 80% of participants think that people do piracy.

Figure 2: Level of Piracy

 

Representation of Different Part Piracy Area

Representation of different groups of variables in the area from the current research perspectives. These variables include the use of pirated software, activation by online payment, buying CD/DVD, cracking the software, online facility to buy the software, piracy of more than 6 software products, piracy of 4–6 pieces of software, piracy of 1–3 software, participants doing piracy, importance of piracy, aware of the demerits of piracy, knowledge about the penalties of piracy, different functionalities, participant preferring to use the software, participants not attending any seminar on piracy, caught/warned, participants not caring about warning, sharing software not considered a good act, and participants being aware of the side effects. These variables were taken as important considerations of the proposed research.

Figure 3: Representation of Different part Piracy Area

Awareness about software piracy

The awareness of software piracy is analyzed through the questionnaire. Piracy of software is an important issue for participants to be stopped. The survey statistics show that only 1% does not give importance to piracy. 

Figure 4: Awareness about software piracy

Piracy protection set on a software

 

Figure 5: Software Piracy Awareness in Educational Institutions

 

Main Reason for Issues behind Software Piracy and Awareness

 

We have identified some of the reasons behind software piracy. These are discussed in detail in the following subsections.

(i) Unsuitable payment methods for software purchasing:

One of the reasons behind software piracy is the unavailability of online payment methods for people. Credit card or other ways are not widely being used by student(s) and all the faculty members for online transactions which forces them to use another way of registering or getting registered software.

(ii) Basic knowledge about software piracy:

The people have only basic knowledge about software piracy which is not enough. The people do not know the penalties for software piracy and therefore, it seems like a normal act, although it is a crime too.

(iii) Conduction of seminar/workshops:

One of the reasons for the lack of awareness includes less or lack of awareness program about software piracy. Not enough seminars or workshops have been conducted to spread awareness about software piracy. As a result, they do not know the penalties that can be given to the person doing piracy.

(iv) Poor implementation of HEC software policies by academic institutions:

The people use pirated software inside academic institutions, although the HEC provides facilities of free access for some important software products.

(v) High software cost:

The main and key reason is software cost. People have to get paid a significant amount of money while getting pirated software to save much of it. As a result, along with some knowledge and awareness, the people do piracy.

 

 

Conclusion

Software theft and piracy are rapidly ever-increasing problems of the present-day software industry. Software piracy is the illegal copy and use of software in a way other than that is officially documented by exclusive rights of the developer in the form of an individual or organization as described in the relevant sale agreement (license). Owing to the evolution in software development and Internet, software piracy has become a main concern for many software companies. Software companies are confronted with extremely high losses due to the piracy of software. Pirates achieve a lot of money by doing business with pirated software. General end-users of the software are not aware of this serious crime and of the legal consequences of breaking the law. Even most of the time, end-users and consumers think that it is none of their concern and not an important issue for them. Although, in reality, if an organization is working with pirated software, there is a risk of failure of the software, and it might put their organization at risk as pirated software does not receive any support from the development organization. This ultimately puts the consumer organization in huge financial loss. Due to these reasons, software piracy has turned out to be a major concern, more emergent due to the extravagant development of the software industry and the availability of software(s) on the Internet. In this paper, we analyzed and identified the ratio of software piracy, awareness regarding piracy, and the policy of the licensed software provided. Based on the results of the study, some suggestions are proposed by which the level of piracy can be reduced.

 


 

References

1. System Analysis and Design Methods, Sixeth Edition by Bentley and Dittman

2. System Analysis & Design, 4th Edition. By J.W.Satzinger, R.B.Jackson, Shephen D. Burd, Thomson,

3. Modern System Analysis & Design by Jeffre A. Hoffer, Joey F. George and Joseeph S. Balacich

4. https://nevonprojects.com/piracy-protection/

5. https://link.springer.com/chapter/10.1007/978-1-4020-8741-7_45

6. https://www.ijariit.com/manuscripts/v3i1/V3I1-1261.pdf

7. https://www.ripublication.com/irph/ijict_spl/14_ijictv3n8spl.pdf

8. https://patents.google.com/patent/US8510861

9.https://www.researchgate.net/publication/265615556_Design_and_Implementation_of_a_Software_Protection_System_Against_Software_Piracy_by_using_cryptographic

10. https://www.marx.com/en/software-protection

11. https://ieeexplore.ieee.org/document/1524097

12. https://cpl.thalesgroup.com/software-monetization/how-to-prevent-software-piracy