Online Communication
How can traditional (or old media) enterprises such as film, television and music overcome the threat of online piracy and file sharing?
Author: XXXXXXX Tutor: XXXXXXXX
The rise of the Internet era opened the whole new market for traditional media full of opportunities as well as threats. Online piracy being one of them because the music and film industry loses £5.4bn in a year and if it was reduced by 10% it could have created up to 13 thousand jobs in the UK. There are various attempts taken to fight with online piracy; a case study of Anti-Counterfeiting Trade Agreement will be considered as well as other legislations attempting to regulate copyrights in the Internet. This essay is also going to look at main motives and reasons for online piracy and suggest the solutions. Main obstacles in dealing with piracy are legislative issues, semiotic disputes, little awareness or different attitudes of the Internet users.
For the old media to fully overcome the threat of online piracy is as likely as completely eradicating crime. Hoverer, there are means to limit the copyright infringement in the Internet. Suggested methods are improving the legislation, changing public’s mind-sets and making legal ways widely and easily accessible.
Firstly it is crucial to define the terms as especially in case of online piracy they are often misunderstood and are the or controversial. The definition of online piracy varies depending on the source, but the majority agrees that it refers to: “copyright violation, infringement, unauthorised copying, storage, reproduction, distribution, or sale of intellectual property—for example, music CDs, movie videocassettes. With regard to film and television, the term primarily relates to downloading, uploading, linking to, or otherwise providing access to unauthorized copies of movies, television shows or other copyrighted content on the Internet and making and/or selling
Bibliography: 2. Collberg C., Nagra J.,(2010) Surreptitious Software, Addison-Wesley, New York 3 4. Gunasekaran A. (2008), Techniques and Tools for the Design and Implementation of Enterprise Information Systems, IGI Publishing, New York 5 6. Lehnert W., (2003) Web 101, Making the ‘Net Work for you, 2nd Edition, Addison Wesley, New York. 7. Tavani H., (2007) Ethics & Technology, Ethical Issues in Age of Information and Communication Technology, 2nd Edition, John Wiley & Sons, Inc., USA 8 * http://www.bbc.co.uk/news/uk-england-south-yorkshire-16544335 [20.02.2012] Appendix 1 – Online Piracy Statistics (http://www.go-gulf.com/blog/online-piracy 20.02.2012) Appendix 2 – Case Study (http://uk.reuters.com/article/2011/10/01/uk-japan-trade-counterfeiting-idUKTRE79018620111001) Anti-counterfeiting agreement signed in Tokyo The EU, Mexico and Switzerland have not signed the agreement but have until May 1, 2013, to do so, according to the METI. [ 17 ]. Collberg C., Nagra J.,(2010) Surreptitious Software, Addison-Wesley, New York [ 18 ] Lehnert W., (2003) Web 101, Making the ‘Net Work for you, 2nd Edition, Addison Wesley, New York. Chapter 2.13 Software Piracy and Copyright Infringements p. 86 [ 19 ]