22,487 research outputs found

    Community Self Help

    Get PDF
    This paper advocates controlling crime through a greater emphasis on precautions taken not by individuals, but by communities. The dominant battles in the literature today posit two central competing models of crime control. In one, the standard policing model, the government is responsible for the variety of acts that are necessary to deter and prosecute criminal acts. In the other, private self-help, public law enforcement is largely supplanted by providing incentives to individuals to self-protect against crime. There are any number of nuances and complications in each of these competing stories, but the literature buys into this binary matrix

    Dynamic analysis of an institutional conflict within the music industry

    Get PDF
    Peer-to-peer technology has made massive music piracy possible, which, in turn, has arguably had a significant economic impact on the recording industry. Record labels have responded to online piracy with litigation and are also considering self-help measures. It is currently not obvious whether or not these counter-piracy strategies will ultimately stifle online file sharing in the long term. With this paper we attempt to add to our understanding of the conflict within the institution that is the commercial music industry. We conduct an institutional analysis of the industry in transition and extend the traditional pattern modeling methodology with a formal resource-based model of a representative online music network. The model accounts for complex causal interactions between resources, private provision of common goods, free riding and membership dynamics. The numerical implementation of the model is the basis of a decision support system, which is used in a series of computer experiments that emulate anti-piracy scenarios. We show that a peer-to-peer system may be quite resilient to outside disturbances. The experiments also demonstrate that policies rank differently in their effectiveness based on a selected yardstick.Peer-to-peer (P2P) networks; Online File Sharing; Copyright; Simulation

    Stakeholders’ forum general report

    Get PDF

    Panel II: Public Appropriation of Private Rights: Pursuing Internet Copyright Violators

    Get PDF
    It seems to me that the story of music on the Internet over the past five or six years is the story of two fantasies colliding. The first fantasy is that information wants to be free, that with the Internet we can throwaway all the bottles and just have the wine and the free flow of data, which apparently was generated from somewhere and then circulated forever. So, there was that fantasy, that we would not need copyright anymore because everything would be available to everyone. The other fantasy is the record companies\u27 fantasy of perfect control, that there would be some way to control every use, every copy, of music that was digital

    Buggy Whips and Broadcast Flags: The Need for a New Politics of Expression

    Get PDF
    In response to growing fears from the entertainment industry over online file-sharing of valuable content, the Federal Communications Commission ( FCC ) enacted sweeping regulations over the production of electronic devices in the name of protecting digital television broadcasts. Although the FCC\u27s broadcast flag regulation was struck down on jurisdictional grounds, Hollywood has not given up the push for strict control. If Hollywood successfully acquires broadcast flag protection there could be far-reaching implications for innovation and development of new digital technologies. While content providers have important reasons to protect copyrighted material, there is too much at stake to merely acquiesce to their demands in the name of piracy prevention

    Digital Architecture as Crime Control

    Get PDF
    This paper explains how theories of realspace architecture inform the prevention of computer crime. Despite the prevalence of the metaphor, architects in realspace and cyberspace have not talked to one another. There is a dearth of literature about digital architecture and crime altogether, and the realspace architectural literature on crime prevention is often far too soft for many software engineers. This paper will suggest the broad brushstrokes of potential design solutions to cybercrime, and in the course of so doing, will pose severe criticisms of the White House\u27s recent proposals on cybersecurity. The paper begins by introducing four concepts of realspace crime prevention through architecture. Design should: (1) create opportunities for natural surveillance, meaning its visibility and susceptibility to monitoring by residents, neighbors, and bystanders; (2) instill a sense of territoriality so that residents develop proprietary attitudes and outsiders feel deterred from entering a private space; (3) build communities and avoid social isolation; and (4) protect targets of crime. There are digital analogues to each goal. Natural-surveillance principles suggest new virtues of open-source platforms, such as Linux, and territoriality outlines a strong case for moving away from digital anonymity towards psuedonymity. The goal of building communities will similarly expose some new advantages for the original, and now eroding, end-to-end design of the Internet. An understanding of architecture and target prevention will illuminate why firewalls at end points will more effectively guarantee security than will attempts to bundle security into the architecture of the Net. And, in total, these architectural lessons will help us chart an alternative course to the federal government\u27s tepid approach to computer crime. By leaving the bulk of crime prevention to market forces, the government will encourage private barricades to develop - the equivalent of digital gated communities - with terrible consequences for the Net in general and interconnectivity in particular
    • …
    corecore