skip to main content
10.1145/2889160.2889220acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

A guided tour of the legal implications of software cloning

Published:14 May 2016Publication History

ABSTRACT

Software Cloning is the typical example where an interdisciplinary approach may bring additional elements into the community's discussion. In fact, little research has been done in its analysis from an Intellectual Propriety Rights (IPRs) perspective, even if it is a widely studied aspect of software engineering. An interdisciplinary approach is crucial to better understand the legal implications of software in the IPR context. Interestingly, the academic community of software and systems deals much more with such IPR issues than courts themselves. In this paper, we analyze some recent legal decisions in using software clones from a software engineering perspective. In particular, we survey the behavior of some major courts about cloning issues. As a major outcome of our research, it seems that legal fora do not have major concerns regarding copyright infringements in software cloning. The major contribution of this work is a case by case analysis of more than one hundred judgments by the US courts and the European Court of Justice. We compare the US and European courts case laws and discuss the impact of a recent European ruling. The US and EU contexts are quite different, since in the US software is patentable while in the EU it is not. Hence, European courts look more permissive regarding cloning, since "principles," or "ideas," are not copyrightable by themselves.

References

  1. Baker, B.: On finding duplication and near-duplication in large software systems. Proceedings of the 2nd Working Conference on Reverse Engineering (WCRE 95), Toronto, Ontario, Canada, 86--95 (1995) Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bergstra, J., Klint P.: About "trivial" software patents: The IsNot case. Science of Computer Programming. 64, 264--285 (2006) Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ciancarini, P., Favini G. P.: Detecting clones in game-playing software. Entertainment Computing. 1, 9--15 (2009)Google ScholarGoogle ScholarCross RefCross Ref
  4. Ciancarini, P., Russo D., Sillitti, A., Succi, G.: Reverse Engineering: a European IPR perspective. 31st ACM Symposium On Applied Computing (SAC 2016). Pisa, Italy (2016).Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Di Penta, M, German, D. M., Guéhéneuc, Y., Antoniol, G.: An exploratory study of the evolution of software licensing. Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 145--154, (2010) Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. German, D. M., Hassan, A. E.: License integration patterns: Adressing license mismatches in component-based development. Proceedings of the 31st International Conference on Software Engineering, 188--198 (2009) Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Gross, H. G., Melideo, M., Sillitti. A.: Self Certification and Trust in Component Procurement. Journal of Science of Computer Programming, Elsevier, 56, 141--156 (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Hylton, K., N.: Antitrust Law and Economics. Edward Elgar Publishing Lim. (2010)Google ScholarGoogle ScholarCross RefCross Ref
  9. Horspool, M., Humphreys M.: European Union Law. Oxford University Press (2012)Google ScholarGoogle ScholarCross RefCross Ref
  10. Johnson, J. H.: Substring matching for clone detection and change tracking. Proceedings of the 10th International Conference on Software Maintenance, Victoria, British Columbia, Canada, 120--126 (1994) Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Kapser, C. J., Godfrey M. W.: "Cloning considered harmful" considered harmful: patterns of cloning in software. Empirical Software Engineering, 13, (6), 645--692, (2008) Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Kapser, C. J., Godfrey M. W.: Supporting the analysis of clones in software systems: a case study. Journal of Software Maintenance and Evolution: Research and Practice. 18, (2), 61--82 (2006) Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Kim, M., Bergman, L., Lau, T., Notkin, D.: An Ethnographic study of copy and paste programming practices in OOPL. Proceedings of 3rd International ACM-IEEE Symposium on Empirical Software Engineering (ISESE 04), Redondo Beach, CA, USA, 83--92 (2004) Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Koschke, R.: Frontiers of software clone management. Proceedings of Frontiers of Software Maintenance (FoSM'08), Beijing, China, 119--128 (2008)Google ScholarGoogle ScholarCross RefCross Ref
  15. Lavoie, T., Eilers-Smith, M., Merlo, E.: Challenging cloning related problems with GPU-based algorithms. Proceedings of 4th International Workshop on Software Clones, Cape Town, SA, 25--32 (2010) Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Mc Nutt, P., A.: Law, Economics and Antitrust: Towards a New Perspective. Edward Elgar Publishing Lim. (2005)Google ScholarGoogle Scholar
  17. Monden, A., Nakae, D., Kamiya, T., Sato, S., Matsumoto, K: Software quality analysis by code clones in industrial legacy software. Proceedings of 8th IEEE International Symposium on Software Metrics (METRICS 02), Ottawa, Canada, 87--94 (2002) Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Petrinja, E., Sillitti, A., Succi, G.: Comparing OpenBRR, QSOS, and OMM Assessment Models. 6th International Conference on Open Source Systems (OSS 2010), Notre Dame, IN, USA (2010)Google ScholarGoogle ScholarCross RefCross Ref
  19. Predonzani P., Sillitti, A., Vernazza, T.: Components and Data-Flow Applied to the Integration of Web Services. The 27th Annual Conference of the IEEE Industrial Electronics Society (IECON?01), Denver, CO, USA, 29 November - 2 December (2001)Google ScholarGoogle ScholarCross RefCross Ref
  20. Rattan, D., Bathia, R. Singh, M.: Software clone detection: A systematic review. Information and Software Technology. 55, 1165--1199 (2013)Google ScholarGoogle ScholarCross RefCross Ref
  21. Remencius, T., Sillitti, A., Succi, G.: Assessment of software developed by a third-party: A case study and comparison: Information Sciences, Elsevier, Vol. 328, 237--249 (2016) Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Rieger, M., Ducasse, S., Lanza, M.: Insights into System - Wide Code Duplication. WCRE, Delft University of Technology. 100--109 (2004) Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Riis, S.: What makes a chess program original? Revisiting the Rybka case. Entertainment Computing. 5:3, 189--204 (2014)Google ScholarGoogle ScholarCross RefCross Ref
  24. Roy, C. K., Cordy, J. R.: A Survey on Software Clone Detection Research. Queen's School of Computing Tech. Report 2007-541, Kingston, 115 (2007)Google ScholarGoogle Scholar
  25. Runeson, P., Höst, M.: Guidelines for conducting and reporting case study research in software engineering Empirical software engineering. 14 (2), 131--164 (2009) Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Succi, G., Succi G, Ronchetti M.: Legal Issue Regarding Software Use and Reuse within the European Union Legislation. Journal of Computing and Information Technology. 4:3, 179--186 (1996)Google ScholarGoogle Scholar
  27. van den Herik H. J., Plaat A., Levy D., Dimov D.: Plagiarism in game programming competitions. Entertainment Computing. 5:3, 173--187 (2014)Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A guided tour of the legal implications of software cloning

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      ICSE '16: Proceedings of the 38th International Conference on Software Engineering Companion
      May 2016
      946 pages
      ISBN:9781450342056
      DOI:10.1145/2889160

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 May 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate276of1,856submissions,15%

      Upcoming Conference

      ICSE 2025

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader