IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Policing of Movie and Music Piracy: The Utility of a Nodal Governance Security Framework

Policing of Movie and Music Piracy: The Utility of a Nodal Governance Security Framework
View Sample PDF
Author(s): Johnny Nhan (Texas Christian University, USA) and Alesandra Garbagnati (University of California Hastings College of Law, USA)
Copyright: 2013
Pages: 18
Source title: Digital Rights Management: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-2136-7.ch056

Purchase

View Policing of Movie and Music Piracy: The Utility of a Nodal Governance Security Framework on the publisher's website for pricing and purchasing information.

Abstract

Ongoing skirmishes between mainstream Hollywood entertainment conglomerates and Peer-to-Peer (P2P) file-sharing networks recently reached a crescendo when a Swedish court convicted members of the world’s largest BitTorrent, The Pirate Bay, and handed out the stiffest sentence to date.1 Four operators of The Pirate Bay received one year imprisonments and fines totaling $30 million, including confiscation of equipment. While this verdict sent shockwaves amongst P2P networks, piracy remains rampant, and this incident further exacerbated relations between file sharers and Hollywood. In retaliation, supporters of P2P file-sharing attacked websites of the law firms representing the Hollywood studios (Johnson, 2009). This victory by Hollywood studios may be a Pyrrhic defeat in the long run if the studios do not soften their antagonistic relations with the public. This chapter explores structural and cultural conflicts amongst security actors that make fighting piracy extremely difficult. In addition, it considers the role of law enforcement, government, industries, and the general public in creating long-term security models.

Related Content

Ben van Lier. © 2018. 21 pages.
Jose-Luis Perez-Trivino. © 2018. 18 pages.
Gabriel R. Ricci. © 2018. 20 pages.
Tommaso Bertolotti, Selene Arfini, Lorenzo Magnani. © 2018. 14 pages.
Francesco Albert Bosco Cortese. © 2018. 31 pages.
Lambèr Royakkers, Peter Olsthoorn. © 2018. 18 pages.
John Forge. © 2018. 11 pages.
Body Bottom