7,052 research outputs found

    The Impact of Technical Copy Protection and Internet Services Usage on Software Piracy

    Get PDF
    Software piracy has recently gained enormous attention, not only in the context of P2P-networks. As one countermeasure against software piracy, publishers have been implementing Digital Rights Management systems such as technical copy protection measures into their software products. This paper examines the impact of different technical copy protection measures and Internet services usage on software piracy using data from an internationally organized online survey. The results show that technical protection measures fail to achieve their protection goals, as none of the studied protection measures completely avoids piracy. A higher level of copy protection does not always make a legal software installation more likely. In contrast, a low level of protection does not necessarily lead to intense illegal copying. P2P- and Chat-networks compromise the security of technical copy protections as they provide access to cracked software copies, fostering software piracy. Based on our results, we discuss the impact of our findings on the publishers\u27 anti-piracy strategy from an economic point of view and present possible security improvements for hardware- and software-based copy protections

    Limitation of Sales Warranties as an Alternative to Intellectual Property Rights: An Empirical Analysis of IPhone Warranties’ Deterrent Impact on Consumers

    Get PDF
    Apple\u27s success with the Apple iPhone has brought with it certain problems. Its success has engendered a community that has attempted to circumvent Apple\u27s exclusive service agreement with AT&T. Unfortunately for Apple (and similarly situated manufacturers), intellectual property law allows consumers to alter their products so as to circumvent relationships that manufacturers may have with others. The patent and copyright law first sale doctrine allows consumers to manipulate a product after it is purchased. As a result, manufacturers are increasingly turning to alternatives to intellectual property to secure control over the device after the sale. One such alternative is the exclusion of warranty under Article 2 of the Uniform Commercial Code. This iBrief considers whether limitation of warranties have the deterrence effect manufacturers desire. Said differently, it considers whether manufacturers can use warranty limitations to prevent consumers from using their products in an unauthorized manner. The iBrief presents a behavioral model based on the Triandis model of planned behavior and enhances the model by accounting for likely and unlikely benefits and detriments. The model suggests that participants weigh the probability and magnitude of the detriment against the probability and magnitude of the beneficial impact when making the decision to engage in technological piracy. This model, considered with other empirical evidence, suggests that Apple\u27s warranty could be a stronger deterrent for consumers than civil liability. The iBrief concludes that manufacturers can better protect their post-sale expectation of profits by raising consumer awareness of their warranty\u27s quality and by raising awareness of the consequences for using the product in a way that is outside the terms of the consumers\u27 authorized use

    Emulation is the most sincere form of flattery : retro videogames, rom distribution and copyright

    Get PDF
    The Internet has made it possible for amateur game creators to collaborate on projects irrespective of geographical location. The success of projects such as Minecraft, and even CounterStrike, demonstrates that ‘indie’ developers can create entertainment products just as popular and successful as mainstream developers with huge budgets. However, many individuals instead are more interested in the old than the new – reliving past experiences through the playing of old videogames that are no longer commercially sold. Through the creation of emulators, and the ripping of ROM images (data that allows for the playing of an emulated videogame, such as Super Mario Bros. on the Super Nintendo), games with nostalgic value can be easily distributed, played and replayed. In addition, this allows for the preservation of legacy content that may otherwise be consigned to the ‘dustbin of history’. However, irrespective of the effort and ingenuity that goes into the creation of emulation software, and the effort involved in ripping ROM data to make old games playable, are these pursuits entirely legal? The purpose of this paper is to consider the compatibility of such projects with pre-existing norms of intellectual property law, comparing and contrasting the approaches of US and EU IP regimes in their handling of emulators and ROMS. The paper will analyse the issue under pre-existing legislation and with regard to relevant case law, seeking to draw conclusions on whether the existing regimes in copyright law are compatible and satisfactorily balance the right of videogame publishers to seek fair remuneration for their work with the desire by enthusiasts to preserve and relive a form of creative culture

    Music Piracy and the Audio Home Recording Act

    Get PDF
    In spite of the guidance provided by the Audio Home Recording Act (AHRA) of 1992, music companies are once again at odds with consumer electronics manufacturers. This time around, the dispute is over certain information technology products that enable consumers to copy digital music and transfer them to different formats, or exchange them over the Internet. This article will discuss anti-piracy measures being taken by digital content owners and the United States legislature to combat piracy and evaluate them in light of the AHRA

    Protecting U.S. Intellectual Property Rights and the Challenges of Digital Piracy

    Get PDF
    According to U.S. industry and government officials, intellectual property rights (IPR) infringement has reached critical levels in the United States as well as abroad. The speed and ease with which the duplication of products protected by IPR can occur has created an urgent need for industries and governments alike to address the protection of IPR in order to keep markets open to trade in the affected goods. Copyrighted products such as software, movies, music and video recordings, and other media products have been particularly affected by inadequate IPR protection. New tools, such as writable compact discs (CDs) and, of course, the Internet have made duplication not only effortless and low-cost, but anonymous as well. This paper discusses the merits of IPR protection and its importance to the U.S. economy. It then provides background on various technical, legal, and trade policy methods that have been employed to control the infringement of IPR domestically and internationally. This is followed by an analysis of current and future challenges facing U.S. industry with regard to IPR protection, particularly the challenges presented by the Internet and digital piracy.Research and Development/Tech Change/Emerging Technologies,

    Digital piracy : theory

    Get PDF
    This article reviews recent theoretical contributions on digital piracy. It starts by elaborating on the reasons for intellectual property protection, by reporting a few facts about copyright protection, and by examining reasons to become a digital pirate. Next, it provides an exploration of the consequences of digital piracy, using a base model and several extensions (with consumer sampling, network effects, and indirect appropriation). A closer look at market-structure implications of end-user piracy is then taken. After a brief review of commercial piracy, additional legal and private responses to end-user piracy are considered. Finally, a quick look at emerging new business models is taken.information good, piracy, copyright, IP protection, internet, peer-to-peer, software, music

    Digital Piracy: Theory

    Get PDF
    This article reviews recent theoretical contributions on digital piracy. It starts by elaborating on the reasons for intellectual property protection, by reporting a few facts about copyright protection, and by examining reasons to become a digital pirate. Next, it provides an exploration of the consequences of digital piracy, using a base model and several extensions (with consumer sampling, network effects, and indirect appropriation). A closer look at market-structure implications of end-user piracy is then taken. After a brief review of commercial piracy, additional legal and private responses to end-user piracy are considered. Finally, a quick look at emerging new business models is taken.information good, piracy, copyright, IP protection, internet, peer-to-peer, software, music

    Piracy of Digital Products: A Critical Review of the Economics Literature

    Get PDF
    Digital products have the property that they can be copied almost costlessly. This makes them candidates for non-commercial copying by final consumers. Because the copy of a copy typically does not deteriorate in quality, copying products can become a wide-spread phenomenon – this can be illustrated by the surge of file-sharing networks. In this paper we provide a critical overview of the literature that addresses the economic consequences of end-user copying. We conclude that some models with network effects are well-suited for the analysis of software copying while other models incorporating the feature that copies provide information about the originals may be useful for the analysis of digital music copying.information good, piracy, copyright, internet, peer-to-peer, software, music
    • 

    corecore