Portal:Digital Piracy: Difference between revisions
No edit summary |
No edit summary |
||
Line 9: | Line 9: | ||
<tr> | <tr> | ||
<td style="vertical-align:top;padding-right:15px;width:50%"> | <td style="vertical-align:top;padding-right:15px;width:50%"> | ||
<div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | |||
== Current Methodologies == | |||
{{:Current Methodologies}} | |||
<p align=right>[[Current Methodologies| '''Read More...''']]</p> | |||
</div> | |||
<div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | <div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | ||
Line 17: | Line 23: | ||
<div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | <div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | ||
== | == Piracy among Digital Natives == | ||
{{: | {{:Piracy among Digital Natives}} | ||
<p align=right>[[ | <p align=right>[[Piracy among Digital Natives| '''Read More...''']]</p> | ||
</div> | </div> | ||
Line 50: | Line 50: | ||
<div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | <div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | ||
== | == Digital Piracy and Law == | ||
{{: | {{:Digital Piracy and Law}} | ||
<p align=right>[[ | <p align=right>[[Digital Piracy and Law| '''Read More...''']]</p> | ||
</div> | </div> | ||
<div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | <div style="background-color:#FFFFFF;border:solid 1px black;padding:8px 8px;margin-bottom: 20px"> | ||
== Solutions == | == Solutions == | ||
{{:Solutions for Digital | {{:Solutions for Digital Piracy}} | ||
<p align=right>[[Solutions for Digital | <p align=right>[[Solutions for Digital Piracy| '''Read More...''']]</p> | ||
</div> | </div> | ||
Revision as of 16:27, 24 November 2007
What is Digital Piracy?
In the simplest terms, piracy is obtaining materials without the proper rights of legal ownership. In a broader sense, piracy can represent a whole range of intellectual and physical robbery. Like what the traditional usage of this term suggests, the theft committed by ruthless sea barbarians in the early 1700s is analogous to the present day methods to wrongfully acquire or distribute copyrighted material. Yes, the recent surge in pirated Pirates of the Caribbean films is, least to say, ironic.
Current MethodologiesAdvent of the internet and the rapid increase of personal computers means more people than ever before have the capability to share information online. Though these advancements give users unprecedented access to the world's data, enforcing proper copyright restrictions while allowing justifiable sharing freedoms have not been attained. Thus, many have pointed to these new technologies as the facilitators of so-called "digital piracy." Today, users employ many different applications and services to illegally transfer copyrighted material. Factoring intentionality out of the equation, this section aims to introduce these online trade tools. History and OverviewTechnological advancements in the years of the new millennium brought sweeping changes to the way data is transferred across the world. The rapid increase in the availability and acceptance of broadband internet connections has allowed people from the far reaches of the globe to download large multimedia files at much faster speeds than ever before. Sharing files between computers became easier for the general population to understand. The once dominant UseNets and IRC channels slowly gave way to user-friendly graphical user interface (GUI) peer-to-peer (P2P) programs where anyone can make a simple search to produce desirable results. Emerging technologies such as Wikis and BitTorrent coupled with old tools like email and instant messaging provided additional techniques where information can be transferred from one client to the next. Finally, the adoption of standardized media formats improved the sharing experience as a whole. All of these changes, old and new, provided the foundations for the present day's pervasive illegal distribution of copyrighted material. Piracy among Digital Natives
Teens use communication channels on the internet to broaden their circle of friends to include both real and virtual friends. In creating blogs, they share in writing thoughts about themselves, as well as comments about others, and the world around them. Beyond strictly blogging, the page design and links they include are also indirect expressions of the self (Papacharissi 2002). This points to a digital opportunity - beyond the technical/ design skills being learned, teens are learning to express abstract ideas (in this case the self) through visual appearance, design, and affiliations. Asserting Identity with the Mobile MediaThe Digital Native is constantly connected. To be constantly connected is to have continual access to your friends, to your chosen information, to your creative outletâ¦it also means that âdigital information explosionâ (the ever-faster growing amount of published information available) and 'Digital Information Overload' (defined on wikipedia as âthe state of having too much information to make a decision or remained informed about a topic,â] is always in your face. The information explosion surrounds, shoving the native simultaneously in different directions, making it hard to stand ground as âyourselfâ â especially when at times itâs impossible to even hear yourself think. |
NarrativesTrevor is doing a project for school. Since he is very adept at video mashups, he decides to use clips from different TV shows and movies to assist him with the project. After completing the masterpiece, Trevor is very excited about his work and wants not only his class but also the whole world to see his creation. Due to the fact that long segments of copyrighted material were used in the making of this clip, he decides to post the video onto YouTube with an obscure name to avoid detection and uploads it onto five other video sharing services DailyMotion, Revver, GoFish, MySpace Video, and Facebook Video to act as mirrors. He then embeds the clip onto his blog and uses IM, email, text messaging, and Twitter to spread the word about this update. Digital Piracy and LawPresent day US copyright regulations stemmed from the first days of nationhood. When Americaâs founding fathers composed the United States Constitution in 1787, they gave Congress the power "to promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries." [1] This line of text in Article I, section 8 bestowed upon the State fundamental rights to a monopoly over the copyright industry. It was the governmentâs job to asset, distribute, and control all copyrights. "The First Congress implemented the copyright provision of the U.S. Constitution in 1790," modeled quite similarly to the Statue of Anne. [2] Since then there had been three major revisions which occurred in the years 1870, 1909, and 1976. SolutionsEliminating piracy in the foreseeable future is a next to impossible task. There will always be people seeking ways to circumvent laws for a variety of reasons. There is hope, however. Even though wiping out piracy is not feasible, reducing this theft of digital material can be accomplished.There are four possible approaches--raising awareness, improving business strategies, adjusting enforcement techniques, and embracing policy amendments--are outlined here. Relevant Research and ArticlesSusan P. Crawford, "Who's in Charge of Who I Am? Identity and Law Online," December 8, 2004 Posting Your Resume on YouTube, The Wall Street Journal, December 6, 2006 Danah Boyd, 'Facebook's "Privacy Trainwreck": Exposure, Invasion, and Drama,' September 8, 2006 Chinese Web Site Rips Off Facebook, Harvard Crimson, February 15, 2007 Google and Your Health Information, eWeek.com, May 29, 2007 Identity and the virtual community (Donath) "Staying Connected via Cellphone (and Cellphone Bill)", 'NY Times', June 27, 2007 |