JMM The International Journal on Media Management
|
|
|
- Kelley Ferguson
- 10 years ago
- Views:
Transcription
1 JMM The International Journal on Media Management Article Identification Number: JMM 1109 Full Title of Article: Copyright Piracy on the University Campus: Trends and Lessons from the Software and Music Industries Preferred Abbreviated Title for Running Head: Key Words (for indexing and abstract services up to 6 words): Copyrights, Piracy, Intellectual Property Rights Abstract: In a survey of students at three public universities and one private liberal arts college, Chiang and Assane (2002) found that 53 per cent of the sample admitted to software piracy. Though this is a staggering percentage, over the past five years the public focus on copyright piracy among young technology savvy users, particularly university students, has shifted from software to music piracy via file sharing and CD reproduction. This paper studies the characteristics of these industries along with recent technological advances affecting them. We analyze how economic incentives to reduce piracy on the university campus have been successful for the software industry, and how the lack of such incentives in the music industry has caused a larger piracy issue today. Based on these findings, we discuss possible solutions to reducing music piracy on the university campus. mcm institute for Media and Communications Management University of St. Gallen mm journal The International Journal on Media Management Blumenbergplatz. 9, CH-9000, Switzerland Telephone: +41 (71) , Fax: +41 (71)
2 Piracy.doc Page 2 Copyright Piracy on the University Campus: Trends and Lessons from the Software and Music Industries Introduction Copyright piracy has been a persisting problem since the dawn of the information age. The technology to reproduce information-goods, goods where the majority of the value derives from the inherent creative content rather than their physical form, has become increasingly efficient and less costly. As a result, the ability to obtain near exact reproductions of software, CDs, DVDs, and to a lesser extent books and manuscripts, offers consumers an opportunity to capture more consumer surplus at the expense of the copyright holder. There are drawbacks, however; for example, illegally reproduced versions of software often lack user manuals and consumer technical support. In addition, increased piracy results in higher prices to those who purchase goods through legal channels. Thus, unless one acquires all copyrighted goods through illegal channels, the costs of piracy are shared by all consumers. In a similar sense, as piracy reduces overall profit, producers also suffer costs. The precise definition of piracy is ambiguous. On the supplier side (i.e. software and music firms), piracy is generally defined as the duplication and/or distribution of a copyrighted good without license. However, on the demand side, many argue this definition ignores the existence of network externalities, an idea that the more users of a product (licensed or not), the greater its value (Shy 1999). In essence, many unlicensed users who find a product satisfactory eventually become licensed users. Although both sides have valid arguments, the difficulty lies in the fact that deferred economic gains to copyright holders are difficult to measure, while current losses are not. In an independent study on estimated annual losses due to software piracy, the International Planning and Research
3 Piracy.doc Page 3 Corporation (1999) estimated the worldwide revenue loss due to software piracy in 1998 as approximately US$11 billion. This figure was calculated based on the difference between estimated demand for software worldwide and actual shipments by software firms. Again, this estimate ignores any potential deferred gains. This paper analyzes copyright piracy by university students. A recent study by Chiang and Assane (2002) found that 53 per cent of sampled students admitted to owning unlicensed software. In the same vein, universities face growing concern over additional types of media piracy on campus, particularly music piracy, which has gained abundant attention due to recent high profile lawsuits against developers of file-sharing software that allows copyrighted music to be acquired at negligible cost. In this paper, piracy is defined as the act of acquiring copyrighted products without license. Simply stated, in the context of a university, when a copyright law is broken, universities become concerned as they can face negative publicity along with the risk of large fines. Efforts to reduce copyright piracy in universities as well as in a general setting have met significant difficulties. One concern is that enforcement is arbitrary (see Klein et al and Romer 2002 for a recent discussion). Another point of view says copyright enforcement is not economically efficient if potential deferred gains resulting from piracy exist (see Watt 2000 and Boldrin et al. 2002). Comparing the software industry with the music industry, we argue in this paper that economic incentives play an important role in the success of copyright protection, and that students are no exception they respond positively to incentives, which in turn may lead to less piracy. The remainder of the paper is organized as follows. First, the motivation behind copyright violations is discussed. Then, an analysis of the software and music industries illustrates and compares key problems and possible solutions. A final section concludes.
4 Piracy.doc Page 4 The Art of Sharing Re-Visited Individuals gain from sharing. Sharing goods can increase consumer satisfaction by diversifying the bundle of goods that one consumes. This holds true whether a good is characterized as single-use (sharing foods in a pot-luck setting) or multi-use (sharing a book). In order to understand how individuals benefit from sharing, our analysis begins with a simple example of comic book trading among youths. We then examine the more complex scheme regarding software and music products. First, consider the case of comic book sharing among youths. Assume each child owns a collection of comic books that he or she acquired through purchase or as a gift. Assuming after each book is read, value remains in the book if additional children read the same book, then the Pareto-improving action is to trade comic books after one reads their own. This form of sharing is a type of localized information dissemination that is legal under most copyright law (i.e. Title 17 U.S. Code) because there exists only one authorized user at a time; in essence, the original comic book is shared in the same fashion as a library book. Now consider the parallel with software and music products. The notion of sharing software programs has existed since the introduction of personal computers. One user would purchase or acquire software, then share their collection with another much like the sharing of comic books. However, a key difference arises: instead of relinquishing the software (as with the comic book), the owner makes a copy of the software and trades reproductions of the software with others. This form of sharing is illegal under copyright laws of most nations. Moving forward into the digital music era and the dawn of the Internet and filesharing, technological advances have allowed the art of sharing to evolve from localized to global exchanges. One can now share software and music products with others around the world, without even knowing with whom one is sharing.
5 Piracy.doc Page 5 Furthermore, one can share exponentially a single original good generating thousands or millions of reproductions. The global expansion of illegal sharing, common among software and music products, has become a critical problem threatening the value of intellectual property. Software Piracy on the University Campus Software copyright piracy is a major problem facing universities. Chiang and Assane (2002) used a sample survey of students from four U.S. universities to estimate the likelihood of software piracy based on student characteristics. For example, a student s major, class standing, and personal risk perceptions each influence the propensity of software piracy. Based on this work, the leading causes of software piracy among university students can be reconciled. First, many university classes require students to obtain and use computer software. In addition, students also use such software for personal activities. Second, students have above average technical skills compared with the general population, facilitating reproduction methods. Third, students have low levels of disposable income relative to the general adult population because many do not work or only work part-time. Furthermore, the high cost of a university education itself drains the budgets of many self-financing students leading them to look for less expensive means of obtaining software. Finally, the university atmosphere provides access to peers with similar attitudes that may perhaps be more riskpreferring than average. Universities are concerned with the level of software piracy. It bestows a dishonorable label upon the institution, although for some students, software hackers are admired for their acute intellect. In terms of resources, the exchange of software or music via the Internet exhausts the server capacities at many universities (Anderson 2000), leading to greater expenditures and the need to expand server capacity. Above all, universities face the risk of hefty fines and
6 Piracy.doc Page 6 reprimands as software firms pursue and prosecute alleged copyright infringements on campus. But instead of relying on universities to reduce copyright violations, the software industry itself has sprung into action. In the latter part of the 1990s, the software industry took substantial steps to increase the incentive for university students to acquire software goods legally. For example, software firms entered into extensive agreements with computer makers to offer software bundles that are pre-installed when the computer is purchased. Thus, the cost of the software is embedded in the price of the computer at a substantial reduction in price compared with the price when sold individually. This is successful because of the nature of bundling consumers obtain some software that is valuable to them and some that is not. By charging a single price for the bundle, the software firm increases revenues by selling software to both consumers interested in the software as well as those who are not. Even at a reduced price, software makers often increase revenues using this approach. According to Chiang and Assane (2002), price is the most important reason for software piracy. Of those students admitting to owning unlicensed software, 7 of 10 say their decisions were primarily influenced by money, while far fewer were influenced by software availability or convenience. Some software makers have responded by providing software free on the Internet and relying on alternative forms of revenue, such as Internet advertising and premium services. Another common technique used by software firms is offering student discounts or student versions of software, allowing students to purchase goods at lower prices. This is an example of second and third degree price discrimination that increases revenues to software firms. Some students who would have pirated software are now purchasing licensed copies at reduced prices; benefits include access to technical support services, software upgrades and patches, along with user manuals.
7 Piracy.doc Page 7 Finally, the software industry has taken advantage of the benefits of licensing software. For example, a software firm charges a fixed fee to a university allowing up to 1000 computers on campus access to the software and 200 at-large transferable licenses (i.e. copies that faculty or students can use temporarily on their personal computers). The benefits are two-fold: universities can equip offices and student labs with the latest software at reduced group prices, and they can offer secondary licenses to students and faculty to use the software at home (usually with a built-in timer to allow for temporary access). Both results allow greater access of software to students, reducing the desire to obtain software illegally. The efforts of the software industry have generated some success. Although the average usage of software continues to rise among university students, evidence shows that software piracy has not risen, and may have even slightly dropped (Hoover 2002). But despite these encouraging findings, software violations by university students are still far from over (Carnevale 2002). Yet, in recent years, greater public attention has shifted to music copyright violations, a shift that is likely due to their overwhelming increase in the past few years. The Music Industry and the University Campus The idea of storing music on a personal computer is not a new phenomenon. Music files have long been available. However, the process of acquiring music files has changed in recent years with the introduction of highspeed Internet access and CD read-and-write drives. Now, music lovers can download music from various Internet sites and from other individuals using filesharing software, or they can duplicate existing compact discs. This section focuses on the use of Internet file-sharing software. File-sharing software gained worldwide attention when Shawn Fanning introduced Napster in By Autumn 2000, there were an estimated 70 million
8 Piracy.doc Page 8 users exchanging billions of music files across the Internet (Liebowitz 2002). File-sharing software such as Napster is unique in the sense that individuals have access to a virtual database of music files without the existence of a centralized database. The software works as follows: when an individual installs the software and is online, any music file stored in the Napster folder becomes available for any other user to identify and download. The software facilitates the process by providing a search engine that allows one to search the music collection of every connected user in the world. The end result is the vast transfer of music files worldwide. A number of critical issues arise from file-sharing software. First, from a legal standpoint, it is unclear whether the service or its users violate copyright law because such technology is not explicitly described in existing laws. Nonetheless, most courts have interpreted the actions of file-sharing software users as copyright piracy because a copyrighted good has been attained without compensation to the copyright owner. Users of file-sharing software have largely balked at attempts by the music industry to stop file-sharing, particularly those that are offered free. Another concern is that many users are in countries without effective copyright laws. But focusing on universities, the ubiquitous presence of music-reproduction via file-sharing is a clear concern to the music industry as well as to universities themselves. Many universities have taken steps to limit or ban file-sharing, particularly music-sharing software. Unlike most software, the vast majority of music-sharing performed using university servers is for non-academic purposes. In addition, music-sharing consumes a high level of Internet bandwidth. It has been estimated that during the height of the problem, nearly half of university server capacities were used for music downloads, reducing the efficiency of Internet servers campus-wide (ResNet 2000). The concern here is that universities purchase server
9 Piracy.doc Page 9 capacity to facilitate academic purposes. Music downloads, with no academic value, result in additional costs. Solutions to Music Piracy on the University Campus The solution to music piracy is not one that can be imposed overnight using draconian enforcement methods. Recent attempts to do so by way of court litigation yielded few results and increased the rift between producers and consumers. An alternative approach taken by many European nations is the introduction of levies on various types of recording media, which theoretically are distributed to copyright holders. This approach is based on the theory of appropriation, where a copyright holder acknowledges the existence of reproduction but charges higher prices to those more likely to do so (Liebowitz 1985). However, due to their discriminatory and arbitrary nature, the success of levies has been small compared to their opposition. As the experience of the software industry suggests, a significant reduction in music piracy will occur only when the incentive not to engage in such activities is sufficient. And though the threat of punishment is indeed one such incentive, it needs to be complemented by other economic incentives attractive to musicsharing proponents such as university students. The most common suggestion to reduce music piracy is to simply reduce prices or offer student discounts similar to the software industry. However, key differences arise. First, student versions of music CDs are impractical. Second, while the software industry derives a majority of its revenues from corporations, universities, institutions, and government, the music industry derives most of its sales from the very target of the music piracy problem: young individuals. Therefore, while reducing prices for young consumers may help deter piracy, it is not likely to increase revenues in the music industry. Various alternative ideas
10 Piracy.doc Page 10 based on economic reasoning and lessons from the software industry are discussed below. First, there is the possibility of licensing music; the equivalent of a feebased music-sharing agreement. Using this method, users pay a monthly fee to access a database of old and new music produced by music distributors. Several large music distribution companies have recently attempted, though largely unsuccessfully, to introduce these services (Mathews et al. 2002). Complaints among subscribers include the limited music selection compared to free musicsharing sites and the inability to transfer downloaded music to portable CDs. Another approach to promote the use of licensing is to bundle licenses with the purchase of a computer, thereby embedding the cost of licenses into the computer. A comparable approach is the current practice of bundling Internet access with computer purchases. Using this method, purchasing a computer would include, for example, access to a selection (based on music tastes) of both classic and current music for a limited period of time. Aside from lessons of the software industry, a key concern among users of music-sharing software is that they desire only selected titles by an artist, not the entire album. In the past decade, the production of music singles, particularly in the U.S., has nearly ceased. Consumers argue that the greed of music distributors selling full albums exclusively has spurred greater music-sharing. In contrast, distributors claim that music-sharing software has evaporated the demand for singles because many consumers simply download them. A consistent implication from this is that increasing the availability of singles will reduce piracy, but will have an uncertain affect on overall profits. The question remains whether the re-introduction of music singles would generate profit despite the existence of file-sharing, or become another large financial loss to distributors.
11 Piracy.doc Page 11 Finally, and perhaps the most promising idea to reduce music piracy by students is to increase the linkages between music distributors and universities themselves. Although universities do not have a large stake in music products compared to software products, there are incentives for cooperation on both sides. Many universities have already taken action by introducing awareness campaigns and heightening the use of anti-piracy devices on university networks (Kearney 2000). Conclusion Copyright piracy can be argued as a consequence of technological innovation (Silva & Ramello 2000). As file-reproducing technologies continue to enhance the information era, the need to protect information goods from their unauthorized reproduction remains an important objective for copyright owners. This paper has analyzed the incidence of copyright piracy on the university campus, specifically in the form of software and music piracy. These goods are highly prone to unauthorized reproduction due to their useful and popular nature, along with the abilities of students to produce near-perfect copies at minimal costs. To combat this problem, the software industry has taken steps over the past five years to decrease the incidence of software piracy. Based on survey findings of university students between 1996 and 2000, these efforts are at least stemming the tide if not decreasing the rate of software piracy. More recently, the music industry has taken center stage as a result of a surge in piracy, largely attributed due to the invention of file-sharing software allowing users to easily exchange music files (and software programs) over the Internet. Because of the rapid growth in piracy, the music industry faces a critical dilemma- it needs a short-run solution before it can engage in a long-run solution. Its short-run solution was to confront the use of file-sharing software via lawsuits and enforcement threats. The optimal long-run solution is likely to parallel the
12 Piracy.doc Page 12 solutions used by the software industry: to decrease incentives by consumers to pirate music while increasing incentives to acquire music and other information goods through legal channels.
13 Piracy.doc Page 13 References Anderson, K. 2000, Napster Expelled by Universities, BBC News Online, 26 Sept. [Online]. Available: [Accessed 15 May 2002]. Boldrin, M. & Levine, D. 2002, The Case Against Intellectual Property, American Economic Review, Vol. 92, No. 2, pp Carnevale, D. 2002, Software Piracy Seems Rampant Among Students in Survey at 2 Universities, The Chronicle of Higher Education, 4 Mar. Chiang, E. & Assane D. 2002, Software Copyright Infringement Among College Students, Applied Economics, 34, pp Hoover, A. 2002, On College Campuses, A Surprise: Software Piracy in Decline, University of Florida News & Public Affairs, 28 Feb., pp.1-2. International Planning and Research Corporation 1999, 1998 Global Software Piracy Report [Online]. Available: Kearney, P. 2000, Rock and Roll Spies: Record Industry Snoops Out College Music Pirates, The Stranger, Vol. 9, No. 40, Jun. Klein, B, Lerner, A, & Murphy, K 2002, The Economics of Copyright Fair Use in a Networked World, American Economic Review, Vol. 92, No. 2, pp Liebowitz, S. 1985, Copying and Indirect Appropriability: Photocopying of Journals, Journal of Political Economy, Vol. 93, No. 5, pp Liebowitz, S. 2002, Policing Pirates in the Networked Age, Policy Analysis, Cato Institute, No. 438, pp.1-28.
14 Piracy.doc Page 14 Mathews, A., Peers, M, & Wingfield, N. 2002, Music Industry is Finally Online, But There Aren t Many Listeners, Wall Street Journal, 7 May, pp.a1-2. ResNet 2000, Napster and University Bandwidth, Vanderbilt University [Online]. Available: [Accessed 15 May 2002]. Romer, P. 2002, When Should We Use Intellectual Property Rights? American Economic Review, Vol. 92, No. 2, pp Silva, F. & Ramello, G. 2000, Sound Recording Market: The Ambiguous Case of Copyright and Piracy, Industrial and Corporate Change, 9, pp Shy, O. 1999, A Strategic Approach to Software Protection, Journal of Economics and Management Strategy, Vol. 8, No. 2, pp Watt, R. 2000, Copyright and Economic Theory: Friends or Foes?, Edward Elgar, Cheltenham & Northhampton.
15 Piracy.doc Page 15 Acknowledgements: The authors wish to thank three anonymous referees, Sylvia Chan-Olmsted, Andrew Clark, James Peach, Judet Roqueta, Charles Becker, Bernard Malamud, and Lawrence Kenny for their comments, support, and encouragement. This paper was completed while Djeto Assane was serving as Visiting Professor at the American Economic Association Summer Minority Program at the University of Colorado at Denver.
14.23 Government Regulation of Industry
14.23 Government Regulation of Industry Class 24: Regulation of Copyright: The case of internet music MIT & University of Cambridge 1 Outline What is copyright? The History of Napster Economics of Copyright
Case 3:15-cv-02020-AC Document 1 Filed 10/27/15 Page 1 of 8
Case 3:15-cv-02020-AC Document 1 Filed 10/27/15 Page 1 of 8 Carl D. Crowell, OSB No. 982049 email: [email protected] Drew P. Taylor, OSB 135974 email: [email protected] CROWELL LAW P.O. Box 923 Salem,
Can you imagine a world where music flows into our homes much like water or
The Future of Music: Manifesto for the Digital Music Revolution By David Kusek and Gerd Leonhard Boston, Massachusetts: Berklee Press, 2005, ISBN 0-87639-059-9 Price $16.95, pp. 193 Reviewed by Ron Giambalvo
INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315
INSTITUTIONAL COMPLIANCE REQUIREMENTS PUBLIC LAW 110-315 The Digital Millennium Copyright Act (DMCA) and Peer-to-Peer File Sharing Policy Copying, distributing, and downloading copyrighted materials, including
AVCC. Australian Vice-Chancellors Committee the council of Australia s university presidents. Peer-to-Peer File Sharing: the Legal Landscape
AVCC Australian Vice-Chancellors Committee the council of Australia s university presidents Peer-to-Peer File Sharing: the Legal Landscape November 2003 This work in copyright free to universities and
Guidelines Applicability... 2. Guidelines Statements... 2. Guidelines Administration... 4. Management Responsibility... 4
Guidelines Applicability... 2 Guidelines Statements... 2 Guidelines Administration... 4 Management Responsibility... 4 Administrative Data Ownership... 4 Data Custodian Responsibilities... 4 Data User
WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which
WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which can lead to identity theft getting exposed to pornographic
The music industry experience in the online environment. Olivia Regnier Deputy Regional Director Europe IFPI
The music industry experience in the online environment Olivia Regnier Deputy Regional Director Europe IFPI 1 Summary The digital market for music New digital music services The challenge of copyright
ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET.
ENFORCEMENT OF IP RIGHTS IN THE DIGITAL ENVIRONMENT CONCERNS, CHALLENGES AND ACTIONS REQUIRED FOR THE PROTECTION OF THE SINGLE MARKET GRUR Workshop Brussels March 7, 2007 Michael Keplinger* Overview: 1.
Freemium 101. A brief introduction to the freemium business model
A brief introduction to the freemium business model What is freemium? e word freemium is made up from the words free and premium. It describes a business model where you give a core product away for free
Copyright Infringement and Enforcement in the US
Copyright Infringement and Enforcement in the US A Research Note, November 2011 The U.S. House of Representatives is currently debating the Stop Online Piracy Act (SOPA) the counterpart to the Senate s
Changing Business Models in the Creative Industries: The cases of Television, Computer Games and Music. Executive Summary
Changing Business Models in the Creative Industries: The cases of Television, Computer Games and Music Executive Summary This is an independent report commissioned by the Intellectual Property Office (IPO).
Software Asset Management Guide
Software Asset Management Guide WHY MANAGE SOFTWARE ASSETS Introduction IN TODAY'S ECONOMY, software is indispensable to every organization, large and small. Thanks to software, businesses are more efficient
Copyright (Infringing File Sharing) Amendment Bill 2010 - further glossary of terms relating to File Sharing and the Digital Environment
Copyright (Infringing File Sharing) Amendment Bill 2010 - further glossary of terms relating to File Sharing and the Digital Environment As requested by the Commerce Select Committee Contents Introduction
If you re illegally downloading music from P2P filesharing applications like KaZaA, BitTorrent, or Limwire not only is your computer at risk for viruses, but you re at risk for school suspension, heavy
THE IDEA THAT GOOD MUSIC COMES CHEAP IS ONE BIG LIE!
THE IDEA THAT GOOD MUSIC COMES CHEAP IS ONE BIG LIE! TABLE OF CONTENTS TEACH YOUR KIDS GOOD HABITS TEACH THEM THE IMPORTANCE OF COPYRIGHT The potential to earn income from sales and other uses incentivises
Music, Film, TV and the Internet. A guide for parents and teachers
Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally
PIRATES OF THE DIGITAL MILLENNIUM
PIRATES OF THE DIGITAL MILLENNIUM By John Gantz and Jack B. Rochester Upper Saddle River, NJ, Financial Times Prentice Hall, 2005, ISBN0-13-246315-2 (Price $25.95) pp. 294. Reviewed by Rachel S. Leeds
COMPUTER USE POLICY. 1.0 Purpose and Summary
COMPUTER USE POLICY 1.0 Purpose and Summary 1. This document provides guidelines for appropriate use of the wide variety of computing and network resources at Methodist University. It is not an all-inclusive
Unauthorized File-Sharing and Pirated CDs without. Effective Copyright Enforcement: A Vietnam Case Study 1
Unauthorized File-Sharing and Pirated CDs without Effective Copyright Enforcement: A Vietnam Case Study 1 Koji Domon Faculty of Social Sciences, Waseda University 1-6-1 Nishiwaseda, Shinjuku-ku, Tokyo
Digital Music. Goals of Intellectual Property Law. Intellectual Property Protection. Copyright. What Copyright Protects
Digital Music NBA 600 Digital Music Class 6, Mon 11/5 (Originally Wed 10/31) Last time talked about economics of digital goods and services Today focus on music industry Technological changes and relation
Music, Film, TV and the Internet. A guide for parents and teachers
Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally
DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com
DIGITAL WATERMARKING: FOSTERING AND ENHANCING LEGITIMATE PEER-TO-PEER (P2P) ECOSYSTEMS DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com Copyright 2006 1 TABLE OF CONTENTS
How to Survive a Software Audit through Effective Software Management. By John Tomeny, Sassafras Software Inc.
assafras oftware Box 150, Hanover, NH 03755 (603) 643-3351 http://www.sassafras.com [email protected] How to Survive a Software Audit through Effective Software Management By John Tomeny, Sassafras Software
Policy for the Acceptable Use of Information Technology Resources
Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...
Let the Pirates Patch? An Economic Analysis of Network Software Security Patch Restrictions
Let the Pirates Patch? An Economic Analysis of Network Software Security Patch Restrictions Terrence August and Tunay I. Tunca Graduate School of Business, Stanford University Stanford, CA, 94305 Extended
An Overview of Intellectual Property and Intangible Asset Valuation Models
An Overview of Intellectual Property and Intangible Asset Valuation Models Jeffrey H. Matsuura University of Dayton School of Law ABSTRACT This paper reviews the economic models most commonly applied to
Valdosta State University. Information Resources Acceptable Use Policy
Valdosta State University Information Resources Acceptable Use Policy Date: December 10, 2010 1. OVERVIEW... 3 2. SCOPE... 3 3. DESIGNATION OF REPRESENTATIVES... 3 3.1 UNIVERSITY PRESIDENT... 3 3.2 VICE
Ad-Hoc Committee on Academic Integrity. Survey Summary Report
Ad-Hoc Committee on Academic Integrity Survey Summary Report Presented at the UAA Faculty Senate Retreat 24 August 2011 CONTENTS I. Methodology II. Perceptions of Academically Dishonest Behaviors Table
The True Price of Peer to Peer File-Sharing
Canadian Intellectual Property Council Conseil canadien de la propriété intellectuelle The True Price of Peer to Peer File-Sharing Re-examining Don t blame the P2P file-sharers: the impact of free music
FAQ s on The Center for Copyright Information And Copyright Alert System
1. How significant is online content theft? FAQ s on The Center for Copyright Information And Copyright Alert System Content theft is estimated to cost the U.S. economy $58 billion, 373,000 American jobs
Copyright, standards and the internet
Copyright, standards and the internet In brief The Internet has made it easier to find and obtain ISO and IEC International Standards. The purpose of this brochure is to help users and customers of ISO
Issues in Copyright Management & File Sharing
Issues in Copyright Management & File Sharing Madhavan Manivannan Ethics Seminar 1 Copyright definition Copyright is a legal right created by the law of a country that grants the creator of an original
Peer to Peer File Sharing and Copyright Infringement Policy
Peer to Peer File Sharing and Copyright Infringement Policy Overview The abuse of network resources to illegally obtain and distribute media or software, through peer to peer (P2P) networks, or direct
Music and the Internet. A guide for parents and teachers
Music and the Internet A guide for parents and teachers Music on the internet what you should know There are many great ways of accessing music safely and legally online. This guide aims to keep parents,
Equipment Needed. Connecting to the Internet
All resident students are provided with access to a high-speed Internet connection. Connection to this network is done at the students own risk. The College is not responsible for material viewed or downloaded
An Evaluation of Privacy and Security Issues at a Small University
An Evaluation of Privacy and Security Issues at a Small University Abstract by Michael North Carolina Agricultural and Technical State University [email protected] Colleges and universities process large
Gutenberg 3.2 Ebook-Piracy Report
Gutenberg 3.2 Ebook-Piracy Report What does piracy cost the publishers? Ersatzraten (replacement rates) Manuel Bonik Dr. Andreas Schaale Pic. from ref. [1] Berlin, September 2012 Prologue The report Gutenberg
2012 Key Trends in Software Pricing & Licensing Survey
2012 Key Trends in Software Pricing & Licensing Survey Sponsored by Flexera Software The State of the (Software) Estate: Waste Is Running Rampant in Enterprises 2016 Key Trends in Software Pricing & Licensing
Protecting Your Ideas: An Introduction to Intellectual Property Rights. By Sasha G. Rao and Andrew J. Koning
Protecting Your Ideas: An Introduction to Intellectual Property Rights By Sasha G. Rao and Andrew J. Koning You have an idea. Something that s going to revolutionize the industry. You re excited, but before
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical
MUSIC, VIDEO AND SOFTWARE PIRACY POLICY
Information Technology Services MUSIC, VIDEO AND SOFTWARE PIRACY POLICY Date approved: 17 March 2005 Date Policy will take effect: 17 March 2005 Date of Next Review: December 2010 Approved by: Custodian
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College
Policy and Procedure for Internet Use Summer Youth Program Johnson County Community College This Policy and Procedures for Internet Use booklet has been prepared for Summer Program students with access
Intellectual Property Group Presentation. Using Open Source Software Issues to Consider. Peter J. Guffin, Esq. Pierce Atwood LLP January 22, 2009
Intellectual Property Group Presentation Using Open Source Software Issues to Consider Peter J. Guffin, Esq. Pierce Atwood LLP January 22, 2009 I. Agenda Select key terms in various open source licenses
III. EDUCATION A. BACKGROUND
Education 201 III. EDUCATION A. BACKGROUND Public awareness of the importance of intellectual property in the information age is essential to the successful implementation and growth of the NII. The average
copyright reform Bill C - 11
intellectual property bulletin June 2012 copyright reform Bill C - 11 After several failed attempts, the federal government has finally passed copyright reform legislation, namely Bill C-11, the Copyright
Winny Case. 1.1 Overview of Winny Case On May 31, 2004, various news was reported on the Web including the following item. 1
Winny Case A P2P Software Copyright Case in Japan Impact on the Information Society and Legal Analysis Takato NATSUI Professor at Meiji University Law Faculty, Tokyo Japan Lawyer at Asuka-Kyowa Law Firm,
MAINE COMMUNITY COLLEGE SYSTEM. SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks
MAINE COMMUNITY COLLEGE SYSTEM GENERAL ADMINISTRATION Section 203 SUBJECT: COMPUTER AND NETWORK USE PURPOSE: To promote the responsible use of college and System computers and networks As with any college
COPYRIGHT, PEER-TO-PEER FILE SHARING AND DMCA SUBPOENAS
1 of 6 8/16/2007 9:16 AM TOPIC: COPYRIGHT, PEER-TO-PEER FILE SHARING AND DMCA SUBPOENAS INTRODUCTION: This past summer saw developments relating to peer-to-peer ( P2P ) music file sharing. Of most significance,
Acceptable Usage Policy
Version 2.1 20141230 Acceptable Usage Policy Acceptable Usage Policy Contents 1. PURPOSE OF THIS POLICY... 2 2. GENERAL... 2 3. APPLICATION... 2 4. UNREASONABLE USE... 2 5. UNACCEPTABLE USE... 3 6. SPAM...
AGREEMENT BETWEEN USER AND Global Clinical Research Management, Inc.
AGREEMENT BETWEEN USER AND Global Clinical Research Management, Inc. The Global Clinical Research Management, Inc. Web Site is comprised of various Web pages operated by Global Clinical Research Management,
PIRACY OF INTELLECTUAL PROPERTY: PAST, PRESENT, AND FUTURE
PIRACY OF INTELLECTUAL PROPERTY: PAST, PRESENT, AND FUTURE By Michael Waldman Johnson Graduate School of Management Cornell University Sage Hall Ithaca, NY 14853 (607) 255-8631 [email protected] July 2013
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY
BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY The Acceptable Use Policy ("the Policy") governs use of the Buckeye Express High Speed Internet Service ("the Service"). All subscribers
finding the balance between public and private health the example of australia
finding the balance between public and private health the example of australia By Zoe McKenzie, Senior Researcher This note provides an overview of the principal elements of Australia s public health system,
Art Institute Intellectual Property Policy (MAY 2013)
I. Purpose or Scope Art Institute Intellectual Property Policy (MAY 2013) The unauthorized distribution of copyrighted material, including unauthorized peer-to-peer file sharing, may subject students and
PEW INTERNET PROJECT DATA MEMO. BY: Director Lee Rainie and Research Specialist Mary Madden (202-296-0019)
PEW INTERNET PROJECT DATA MEMO BY: Director Lee Rainie and Research Specialist Mary Madden (202-296-0019) RE: Preliminary findings from a Web survey of musicians and songwriters DATE: May 2004 Between
Policy Governing Computer Security and Resource Allocation
(In the text that follows, the policy is set in straight type; additional explanatory material is set in italics and is not to be considered part of the policy itself.) 1. Rationale In support of its mission
SUBMISSION IN RESPONSE TO THE AUSTRALIAN GOVERNMENT S ONLINE COPYRIGHT INFRINGEMENT DISCUSSION PAPER
SUBMISSION IN RESPONSE TO THE AUSTRALIAN GOVERNMENT S ONLINE COPYRIGHT INFRINGEMENT DISCUSSION PAPER SEPTEMBER 2014 LEVEL 5 6 EDEN PARK DRIVE MACQUARIE PARK NSW 2113 AUSTRALIA +61 2 9744 4500 bbcworldwide.com
ABOUT PHONOGRAPHIC PERFORMANCE LIMITED LICENCE FOR SCHOOLS
ABOUT PHONOGRAPHIC PERFORMANCE LIMITED LICENCE FOR SCHOOLS CEFM are the collection agents within the UK schools sector for the Phonographic Performance Limited (PPL). In turn, the PPL administers the performance
'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy
Created: 2/18/2011 Page 1 of 8 'Namgis First Nation is hereinafter referred to as "the government." 1.0 Overview Though there are a number of reasons to provide a user network access, by far the most common
AGREEMENT BETWEEN USER AND International Network of Spinal Cord Injury Nurses
AGREEMENT BETWEEN USER AND International Network of Spinal Cord Injury Nurses The International Network of Spinal Cord Injury Nurses Web Site is comprised of various Web pages operated by International
