Piracy in cyber space: consumer complicity, pirates and enterprise enforcement
نویسندگان
چکیده
This article presents an overview of the growth of internet piracy in the global marketplace. The ethical perceptions (or lack of) of the younger generation is addressed, in terms of their willingness to consume counterfeit goods on the web. Firms face the task of educating the consumer that downloading music, software, movies and the like, without compensation, is unethical. This awareness is critical for decreasing the demand for counterfeit goods in the virtual marketplace, where a consumer can exhibit a rogue behaviour with a limited fear of prosecution. We address the pyramid of internet piracy, which encompasses sophisticated suppliers/facilitators, such as the Warez group. Recent sting operations, such as Operation Buccaneer, are also depicted to highlight successful tactical manoeuvres of enforcement agencies. An overview of the Digital Millennium Copyright Act and the No Electronic Theft Act is included to debate the controversy surrounding this legislation. A discussion of enterprise enforcement mechanisms and novel anti-piracy technology for cyberspace is provided to reveal some of the tools used to fight the pirates, such as innovations in digital watermarking and NEC’s recently announced video content identification technology. Enterprise information systems and its interdependence on the internet are also demanding new technologies that enable internet investigators to rapidly search, verify and potentially remove pirated content using web services. The quality of service of web services designed to efficiently detect pirated content is a growing consideration for new anti-piracy technology.
منابع مشابه
Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions
W study the question of whether a software vendor should allow users of unlicensed (pirated) copies of a software product to apply security patches. We present a joint model of network software security and software piracy and contrast two policies that a software vendor can enforce: (i) restriction of security patches only to legitimate users or (ii) provision of access to security patches to ...
متن کاملAn Empirical Examination of Global Software Piracy: Implications for Segmented Pricing and Public Policy
Goizueta Business School, Emory University, Atlanta GA 30322 Abstract Our research reconciles analytical and empirical approaches to piracy and through a panel of 53 countries over a period of 11 years, we empirically show that piracy is indeed a two-stage behavior as suggested by extant analytical models. Global piracy has two non-monetary cost components; moral costs that are representative o...
متن کاملThe Somali Piracy Problem: A Global Puzzle Necessitating A Global Solution
Over the past few years, piracy has exploded off the coast of Somalia. The Somali pirates congregate on a mother ship and then divide into smaller groups that sail out on tiny skiffs. Using potent weapons like AK-47’s and hand-propelled grenades, the Somali pirates then attack civilian ships carrying cargo through the Gulf of Aden, toward South Africa or Asia. Once they have overtaken the victi...
متن کاملAn Empirical Examination of Global Software Piracy: Pricing and Policy Implications
Policy Implications Ramnath K. Chellappa [email protected] Yuanyuan Chen [email protected] Sriram Venkataraman [email protected] Goizueta Business School, Emory University, Atlanta GA 30322 Abstract Piracy threatens the very existence of the global software industry, and there is relatively little understanding of the impact of so called benefits of piracy, and the efficacy of legal strategi...
متن کاملPirates of the Copyright and Cyberspace: Issues Involved
Not very long ago, fearsome pirates roamed the seas, looting and plundering the merchant ships and creating havoc, before they slowly vanished from the scene with the advancement of technology. Now, the world has seen the revival of pirates in a much more sophisticated, advanced and threatening form, owing to the same technological advancements. Yes, the reference being made here point towards ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Enterprise IS
دوره 5 شماره
صفحات -
تاریخ انتشار 2011