395 research outputs found

    “Robin Hook”: The developmental effects of Somali piracy

    Get PDF
    Copyright @ 2011 Brunel UniversityNaval counter-piracy measures off Somalia have failed to change the incentives for pirates, raising calls for land-based approaches that may involve replacing piracy as a source of income. This paper evaluates the effects of piracy on the Somali economy to establish which (domestic) groups benefit from ransom monies. Given the paucity of economic data on Somalia, we evaluate province-level market data, nightlight emissions and high resolution satellite imagery. We show that significant amounts of ransom monies are spent within Somalia. The impacts appear to be spread widely, benefiting the working poor and pastoralists and offsetting the food price shock of 2008 in the pirate provinces. Pirates appear to invest their money principally in the main cities of Garowe and Bosasso rather than in the backward coastal communities

    The Use of Text Analytics to Investigate Concepts in Intra- and Inter-disciplinary Software Piracy Research

    Get PDF
    IS research has linked collaborators from diverse domains. IS research requires selecting and addressing an appropriate intradisciplinary or interdisciplinary scope. Identifying gaps in the current literature and deciding when and how collaborations among different disciplines may be fruitful poses challenges. We propose a process to analyze a corpus of documents from any topic, to identify potential collaboration areas. A text analytics process is used to find areas of commonality and exclusivity among questions addressed in existing IS work by analyzing abstracts in papers from multiple disciplines studying \u27software piracy.\u27 We use term-term co-occurrence to find all the terms used in close proximity to the topic. We identify which terms are most prominent in each discipline, show quantitatively how these usages coincide or diverge across disciplines, measure the overlap between pairs of disciplines, and identify clusters of terms shared among disciplines. Specific findings from this case of software piracy are presented

    The Use of Text Analytics to Investigate Concepts in Intra- and Inter-disciplinary Software Piracy Research Inter-disciplinary Software Piracy Research

    Get PDF
    IS research has linked collaborators from diverse domains. IS research requires selecting and addressing an appropriate intradisciplinary or interdisciplinary scope. Identifying gaps in the current literature and deciding when and how collaborations among different disciplines may be fruitful poses challenges. We propose a process to analyze a corpus of documents from any topic, to identify potential collaboration areas. A text analytics process is used to find areas of commonality and exclusivity among questions addressed in existing IS work by analyzing abstracts in papers from multiple disciplines studying \u27software piracy.\u27 We use term-term co-occurrence to find all the terms used in close proximity to the topic. We identify which terms are most prominent in each discipline, show quantitatively how these usages coincide or diverge across disciplines, measure the overlap between pairs of disciplines, and identify clusters of terms shared among disciplines. Specific findings from this case of software piracy are presented

    "Robin Hook": The Developmental Effects of Somali Piracy

    Get PDF
    Naval counter-piracy measures off Somalia have failed to change the incentives for pirates, raising calls for land-based approaches that may involve replacing piracy as a source of income. This paper evaluates the effects of piracy on the Somali economy to establish which (domestic) groups benefit from ransom monies. Given the paucity of economic data on Somalia, we evaluate province-level market data, nightlight emissions and high resolution satellite imagery. We show that significant amounts of ransom monies are spent within Somalia. The impacts appear to be spread widely, benefiting the working poor and pastoralists and offsetting the food price shock of 2008 in the pirate provinces. Pirates appear to invest their money principally in the main cities of Garowe and Bosasso rather than in the backward coastal communities.Somalia, piracy, cash transfers, economic development, remote sensing, satellite imaging

    2006 Annual Report of the Graduate School of Engineering and Management, Air Force Institute of Technology

    Get PDF
    The Graduate School\u27s Annual Report highlights research focus areas, new academic programs, faculty accomplishments and news, and provides top-level sponsor-funded research data and information

    Music Lockers: Getting Lost in a Cloud of Infringement

    Get PDF

    A Theoretical Relationship Between Guardianship and Techniques of Neutralization: A Qualitative Analysis of Digital Piracy

    Get PDF
    This research is a qualitative analysis of digital piracy at the height of Napster in 1999. The findings support the notion that technology has given rise to several new techniques of neutralization. In some cases these techniques are completely new and in others they are 21st century updates to traditional techniques. Furthermore, this research uses forum posts from USENET to determine that guardianship as created by Cohen and Felson\u27s Routine Activities Theory is uniquely connected to neutralization based on two unique guardianship qualities, authority and capacity

    The Law and Politics of Ransomware

    Get PDF
    What do Lady Gaga, the Royal Zoological Society of Scotland, the city of Valdez in Alaska, and the court system of the Brazilian state of Rio Grande do Sul all have in common? They have all been victims of ransomware attacks, which are growing both in number and severity. In 2016, hackers perpetrated roughly four thousand ransomware attacks a day worldwide, a figure which was already alarming. By 2020, however, ransomware attacks reached a staggering number, between 20,000 and 30,000 per day in the United States alone. That is a ransomware attack every eleven seconds, each of which cost victims on average nineteen days of network downtime and a payout of over 230,000.In2021globalcostsassociatedwithransomwarerecoveryexceeded230,000. In 2021 global costs associated with ransomware recovery exceeded 20 billion.This Article offers an account of the regulatory challenges associated with ransomware prevention. Situated within the broader literature on underenforcement, the Article explores the core causes for the limited criminalization, prosecution, and international cooperation that have exacerbated this wicked cybersecurity problem. In particular, the Article examines the forensic, managerial, jurisdictional, informational, and resource allocation challenges that have plagued the fight against digital extortions in the global commons.To address these challenges, the Article makes the case for the international criminalization of ransomware. Relying on existing international regimes––namely, the 1979 Hostage Taking Convention, the 2000 Convention Against Transnational Crime, and the customary prohibition against the harboring of terrorists––the Article makes the claim that most ransomware attacks are already criminalized under existing international law. In fact, the Article draws on historical analysis to portray the criminalization of ransomware as a “fourth generation” in the outlawry of Hostis Humani Generis (enemies of mankind).The Article demonstrates the various opportunities that could arise from treating ransomware gangs as international criminals subject to universal jurisdiction. The Article focuses on three immediate consequences that could arise from such international criminalization: (1) Expanding policies for naming and shaming harboring states, (2) Authorizing extraterritorial cyber enforcement and prosecution, and (3) Advancing strategies for strengthening cybersecurity at home

    Let It Go? A Comparative Analysis of Copyright Law and Enforcement in the United States of America and China, 15 J. Marshall Rev. Intell. Prop. L. 584 (2016)

    Get PDF
    Cheap, knockoff designer items have flooded the streets of China for years. These products infringe on the copyrights of the manufacturers but are rarely enforced. China has attempted to revise their copyright laws to offer more protection to copyright owners, but this has not yet occurred. This comment examines two recent occurrences of copyrighted works in the United States of America being infringed upon in China. This comment examines the how a court or tribunal would rule applying American copyright law and Chinese Copyright law, while also examining the possible remedies that could result. This comment also proposes possible solutions to increase copyright protection for American works overseas

    News – European Union

    Get PDF
    • 

    corecore