5,769 research outputs found

    Filtering, Piracy Surveillance and Disobedience

    Get PDF
    There has always been a cyclical relationship between the prevention of piracy and the protection of civil liberties. While civil liberties advocates previously warned about the aggressive nature of copyright protection initiatives, more recently, a number of major players in the music industry have eventually ceded to less direct forms of control over consumer behavior. As more aggressive forms of consumer control, like litigation, have receded, we have also seen a rise in more passive forms of consumer surveillance. Moreover, even as technology has developed more perfect means for filtering and surveillance over online piracy, a number of major players have opted in favor of “tolerated use,” a term coined by Professor Tim Wu to denote the allowance of uses that may be otherwise infringing, but that are allowed to exist for public use and enjoyment. Thus, while the eventual specter of copyright enforcement and monitoring remains a pervasive digital reality, the market may fuel a broad degree of consumer freedom through the toleration or taxation of certain kinds of activities. This Article is meant largely to address and to evaluate these shifts by drawing attention to the unique confluence of these two important moments: the growth of tolerated uses, coupled with an increasing trend towards more passive forms of piracy surveillance in light of the balance between copyright enforcement and civil liberties. The content industries may draw upon a broad definition of disobedience in their campaigns to educate the public about copyright law, but the market’s allowance of DRM-free content suggests an altogether different definition. The divide in turn between copyright enforcement and civil liberties results in a perfect storm of uncertainty, suggesting the development of an even further division between the role of the law and the role of the marketplace in copyright enforcement and innovation, respectively

    The Profiles of Software Pirates among Tertiary Institutions in Singapore

    Get PDF
    The study seeks to examine the perception of software piracy as well as to discover its underlying factors among Singapore’s three university communities. Some five hundred responses were gathered from students and staff. By means of cluster analysis and factor analysis, the results identify three clusters of pirate profiles as influenced by factors such as attitudes towards software publishers, general acceptance, convenience, and ethics. The decision tree method links each pirate profile to demographic and computer-related variables. It shows that while age is negatively related to software piracy, computer experience and computer usage demonstrates an ambiguous relationship to software piracy respectively. Further, the undergraduate students tend to be pirates more often than university employees, and the Malays tend to be less frequent pirates as compared to other races. It is hoped that the study will help the relevant policy makers to develop better strategies to protect and to enforce the intellectual property rights among the universities as well as in an increasingly knowledge-based economy such as Singapore.Software Piracy; Software Policy; Protection and Enforcement of Intellectual Property Rights; Cluster Analysis; Factor Analysis.

    Video game preservation in the UK: a survey of records management practices

    Get PDF
    Video games are a cultural phenomenon; a medium like no other that has become one of the largest entertainment sectors in the world. While the UK boasts an enviable games development heritage, it risks losing a major part of its cultural output through an inability to preserve the games that are created by the country’s independent games developers. The issues go deeper than bit rot and other problems that affect all digital media; loss of context, copyright and legal issues, and the throwaway culture of the ‘next’ game all hinder the ability of fans and academics to preserve video games and make them accessible in the future. This study looked at the current attitudes towards preservation in the UK’s independent (‘indie’) video games industry by examining current record-keeping practices and analysing the views of games developers. The results show that there is an interest in preserving games, and possibly a desire to do so, but issues of piracy and cost prevent the industry from undertaking preservation work internally, and from allowing others to assume such responsibility. The recommendation made by this paper is not simply for preservation professionals and enthusiasts to collaborate with the industry, but to do so by advocating the commercial benefits that preservation may offer to the industry

    Organization, Program and Structure: An Analysis of the Chinese Innovation Policy Framework

    Get PDF
    The paper first identifies the stakeholders involved in the design and implementation of China’s innovation policy and compares them with different government systems in selected Organization for Economic Co-operation and Development (OECD) countries. In order to disclose the relative strength and weaknesses inside China’s innovation policy framework, we proceed to utilize policy practices in the OECD countries as a guideline to examine China's innovation policy in five categories: reform in the public S&T institutions, financial policy, business innovation support structure, human resource policy and legislative actions. Subsequently, several weak components of the Chinese innovation policy framework are identified and two of them are selected for further analysis: education and human resource policy, and protection of Intellectual Property Rights (IPR). Finally, the paper provides some priorities and possible actions for future innovation policy developments in China.

    The Study on the Effectiveness of Preventive Methods for Online Piracy

    Get PDF
    As online use becomes commonplace in the digital environment, more and more people are indiscriminately copying, sharing, and reproducing online content. Thus, the government and institutions strengthen the level of punishment or take strong sanctions, but online piracy behavior is not reduced and becomes an ethically serious problem. Therefore, the purpose of this study is to empirically examine the effect of two common preventive methods, perceived morality and punishment, on self-control and piracy intention based on the deterrence theory. This study also attempts to investigate the mixed outcomes of gender differences to determine what preventive measures are gender-specific. The result of this study shows that the perceived morality directly effects on reducing online piracy intention while the perceived punishment effect on increasing self-control. The direct effect of punishment on reducing online piracy is moderated by online education. The gender differences vary the degree of morality by education and punishment. This study would provide both theoretical and practical implications emphasizing awareness and moral beliefs of online piracy and suggesting the awareness of gender differences in developing deterrence methods

    Cybercrime Pervasiveness, Consequences, and Sustainable Counter Strategies

    Get PDF
    As our connectivity and dependency on technology increases, so does our vulnerability. Technology has provided not only new tools, but also new opportunities for criminals in the digital world. The abuse of new technologies has been threatening economic and Jinancial security and actually devastating the lives of affected indivicluals. In Nigeria, cybercrime has recorded mostly foregin-based individuals and organizations as victims thereby getting Nigeria ranked among the nations with notorious pemasiveness of high-tech crimes. Indeed, adequately formulating a strategy to contain the menace of cybercrime presents aformidable challenge to law enforcement. This paper x-rays noted instances of cybercrime pervasiveness, its devastating consequences, and up-to-date countermeasures in Nigeria It develops an enforceable/sustainable framework to determine how critical infrastructures are put at risk snd how law enforcement should react in responding to the threats

    Security of m-learning system : a collective responsibility

    Get PDF
    Innovation in learning technologies and services is driven by demands from Higher Educational Institutions (HEIs) in order to meet their students’ needs and make knowledge delivery easier. The technology could play a pivotal role in extending the possibilities for teaching, learning, and research in educational institutions. M-learning emerged from this innovation as a result of an unprecedented explosion in the number of mobile devices due to availability and affordability of mobile phones, smartphones and tablets among students. Competition in the mobile device industry is also encouraging developers to be innovative, constantly striving to introduce new features. Consequently, newer sources of risks are being introduced in the mobile computing paradigm at manufacturing level. Similarly, many m-learning promoters and developers focus on developing and delivering learning content and infrastructure for m-learning system without adequate consideration for security of stakeholders’ data, whereas the use of these mobile technologies for learning poses a serious threat to confidentiality, integrity and privacy of those involved in teaching and learning, yet traditional security threats are also evolving. Against this backdrop, the stakeholders in education sector (i.e. education providers, educators, m-learning promoters and developers) should begin to consider the security implications of these devices in modern teaching and learning environments. The purpose of this paper is to identify the m-learning security issues that stakeholders may face, how they are being affected by the security threats, who among is stakeholders are affected or most affected by security issues in m-learning using three Nigeria universities as case studies and what are the responsibilities of the stakeholders in ensuring risk free m-learning

    Music and software piracy : issues and solutions for music teachers and media intensive educators

    Get PDF
    The rampant piracy of digital materials is not just a problem for the individual home user. In today\u27s world it is increasingly a concern for educators and their school district as a whole. Many recent court actions have been brought against school districts based the illegal use of unlicensed software and other copyrighted materials. This project presents the issues of music and software piracy and the legalities of the United States Copyright Act. It presents common examples for use in the music or media intensive classroom, as well as legal usage requirements including the payment of royalties and purchase of recording or distribution licenses. Also covered are methods and suggestions on how faculty members can ensure that their school is compliant with current law and beyond the scope of legal actions that can adversely affect the district both financially and in the realm of public relations

    Student Downloading and File-Sharing: Problems and Responses for College Housing

    Get PDF
    Today's college students are the most technology-savvy, computer-oriented generation of college students in history: Twenty percent have been using computers since the primary grades; more than 70% check their e-mail at least daily; and most (85%) own their own computers (Jones, 2002). One recent study found that 94% of campus residents had access to computers in their residence hall rooms (Knerr & Woosley, 2004). College students expect that they will have near-ubiquitous, high-speed computer access wherever they are on campus (Barran, 2003). To the coveted title of "most wired campus" we now must add "most unwired campus," which recognizes the migration to wireless Internet service (http://www.intel.com/pressroom/kits/centrino/unwired_colleges-04.pdf). Although easy access to computers and high-speed networks may contribute positively to students' academic experiences in significant ways, this technology also has had adverse impacts on campus (Barratt, 2003). One area that has received considerable media attention in the past few years is downloading and file-sharing of copyrighted material, such as music and movies. Under the No Electronic Theft Law (NET Act), these activities are a violation of copyright, and individual violators may face both imprisonment and fines
    corecore