E-Business Presentation Sendspace Consultancy Report Current Situation Essay

PAGES
6
WORDS
1654
Cite
Related Topics:

E-Business Presentation Sendspace Consultancy Report

Current Situation

Competitors Review

In the last decade there has definitely been an increasing trend of online file sharing (Cisco, 2011). While in the beginning users mostly downloaded files from basic P2P systems, over the years these systems have evolved in response to user requirements, faster internet connections, and mounting legal pressures to curb illegal copyright infringement. BitTorrent files became a popular alternative after direct P2P sharing systems began being systematically shut down by litigation. However, more recently, systems known as Cyberlockers have effective replaced BitTorrent sharing systems (TorrentFreak, 2011) (Lee, R., 2007).

In a Cyberlockers system, the illegal distribution of copyrighted material occurs by the users themselves and the webhosting service technically has no liability (Envisional, 2011). However, Megaupload, the industry leader, has been inundated with an overwhelming array of criminal charges and their site has been shut down. This creates an interesting position for companies like Sendspace. On the one hand, there is a considerable amount of market share up for grabs. However, on the other hand, if they continue operations in a cyberlocker system it will likely only be a matter of time before the company faces the same fate as Megaupload. Therefore, it is recommended that Sendspace begins to diversify its product lineup immediately so that it can hedge its future risk.

Introduction

Cyberlockers are one-click file hosting systems that have become the new development in file sharing technology and peer-to-peer file transfers (Antoniades, D., Markatos, E.P. And Dovrolis, C., 2009) (Lee, R., 2007). Sendspace currently operates solely in this industry and only provides online file hosting services to their clientele. The company was founded in 2005, and all of its servers are located in the United States. Since the U.S. led the charge to bring down Megaupload, this could be a risky location to host servers.

Sendspace offers a unique product mix that provides solutions for users to share large files (up to 10GB per file) over the internet. Their storage services support all file formats such as music, video, software, document etc. The company's target demographic is individual internet users however some corporate users also find the services useful. Users may upload files to the Sendspace site as well as download files totally free with some limitations to size and speed. There is also a substantial amount of revenue generated from premium users who subscribe to premium account to get larger storage, faster speed and use the site ad free.

Figure 1 - Sendspace Membership Options

This company was chosen because it has a unique stance in an incredibly turbulent marketplace. Although it is not likely for Sendspace to be the next in line to face legal issues pertaining to copyright infringement, the company will undoubtedly will encounter legal problems if it keeps operating with the same business model. Therefore Sendspace must make effective use of their time to diversify their product mix so that if legal issues ensue then the whole company will not be devastated. It is time for Sendspace to make a bold move in a different direction and this report was prepared with that in mind.

Current Situation

Various C2C e-commerce models were analyzed and applied to the Sendspace business model (Rayport, J.F. And Jaworski, B.J., 2001). In a C2C model like the one Sendspace uses transactions can occur in one of two ways. Transactions can take place either when:

1. Users (C) upload files to Sendspace - storage of contents

2. Users (C) download files from Sendspace - distribution of contents

Furthermore, financial transactions can occur either when users click the ads banner or subscribe premium account.

Sendspace acts as:

1. One of intermediates of online file sharing

2. Response for file storage and distribution

Figure 2 - Sendspace Business Processes

In 2011, global monthly internet traffic was estimated to be 1.78 Exabyte's (4.5 billion DVDs), 33% of the traffic or 6,000 petabytes (1.5 billion DVDs) were generated by file sharing (Cisco, 2011). According to a report launched in Jan 2011 (Envisional, 2011): 7% of global internet traffic was contributed by cyberlockers and of that traffic the follow breakdown was registered:

Figure 3 - Cyberlockers Traffic...

...

Megaupload was the leading industry competitor up until their site was shut down because of their alleged involvement in copyright infringement issues (Future of copyright, 2011). Hotfile is another industry leader that is based in Panama and accounts for a large percentage of the total market share (Reuters.com, 2011). Rapidshare is based in Switzerland and is the only one who does not provide an incentive for file up-loaders; similar to Sendspace. The following chart was prepared to illustrate the main attributes of the competitor's sites:
Figure 4 - Competitor Review

Conclusion

The demand of sharing copyrighted content is considerably large and, even without Megaupload, the industry is booming (BBC News, 2011). Given the history of file sharing, users and designers will undoubtedly keep evolving their platforms well into the future to work around the various obstacles they face. With that being said, Cyberlocker itself is considered a legal service (Smith, E., 2011). The company's themselves are not directly advocating or participating in copyright infringement. Yet cyberlockers run their business at the expense of copyright holders' benefit (Turban, E., 2009) (Jelveh, Z. And Ross, K., 2012). Furthermore, some of these sites offer incentives to up-loaders in order to encourage them to upload content. From the perspective of many legal authorities, this form of participation of distribution of copyrighted content may be liable for copyright infringement. As a result this will bring a high legal risk to cyberlockers sites and the industry in general.

Recommendation

As a result of the volatility in the industry, Sendspace must act now to diversify its product line up. It is recommended that the organization begin development of an online video sharing subpage. By looking at the data about traffic usage, a pornography channel would like generate the most traffic that could either click on banner ads or possible join the site as a premium member. The subpage could be modeled after Youtube, however only contain adult videos. In order to drive traffic, the following incentives would be offered users:

Uploader

1. Users that upload original videos (for premimu account only) should get an incentive or award for their participation; possibly a premium account for free if their content is popular.

Downloader

1. Free watching with limitations such as low resolution videos, several ad banners, and access to preview only or selected videos.

2. Subscribers may purchase a premium account or upload original video to full access the other original videos.

The primary justification for such a diversification is that there is large demand on pornography content (Envisional, 2011). With such a big market for adult content, a site such as Sendspace could easily tap into market share with an innovative design. By focusing on original content and motivating uploaders by offering them incentive, the company could easily carve out a market niche. Furthermore, such a diversification would require no extra investment in infrastructure; only slight website modification. Furthermore, since there is less risk from individual copyright claims in this industry, especially compared with corporate copyright claim from the movie and music industries, it is reasonable to suspect that Sendspace could easily reduce its exposure to any future legal liabilities.

Works Cited

Abbot, R. (2009) The Reality of Modern File Sharing. Journal of Internet Law, 13(5), pp. 3-8.

Adamsick, C. (2008). "Warez" the Copyright Violation? Digital Copyright Infringement: Legal Loopholes and Decentralization. TechTrends, 52(6), pp. 10-12.

Antoniades, D., Markatos, E.P. And Dovrolis, C. (2009) One-click Hosting Services: a File-sharing Hideout, IMC '09 Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. [PDF] Available from: http://www.net.t-labs.tu-berlin.de/teaching/ss10/IM_seminar/pdf/p223- antoniades.pdf [Accessed: 1/3/12].

BBC News (2011) Piracy websites attract billions of visits. [WWW] Available from: http://www.bbc.co.uk/news/technology-12163161 [Accessed: 1/3/12].

Chatham, C. (2012) Five Great Alternatives to MegaUpload File Sharing. United States, Chatham.

Cisco (2011) Cisco Visual Networking Index: Global Mobile…

Sources Used in Documents:

TorrentFreak (2011) Top 10 Largest File-Sharing Sites. [WWW] Available from: http://torrentfreak.com/top-10-largest-file-sharing-sites-110828 / [Accessed: 1/3/12].

Turban, E. (2009) Electronic Commerce 2010: A Managerial Perspective. 6th ed. Prentice Hall, p.713-718.

Zeropaid (2010) Rapidshare Beats Perfect 10, for Now, in U.S. Court. [WWW] Available from: http://www.zeropaid.com/news/89190/rapidshare-beats- copyright-infringement-charges-in-us-court / [Accessed: 23 Mar 2012].


Cite this Document:

"E-Business Presentation Sendspace Consultancy Report Current Situation" (2012, March 28) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/e-business-presentation-sendspace-consultancy-78961

"E-Business Presentation Sendspace Consultancy Report Current Situation" 28 March 2012. Web.26 April. 2024. <
https://www.paperdue.com/essay/e-business-presentation-sendspace-consultancy-78961>

"E-Business Presentation Sendspace Consultancy Report Current Situation", 28 March 2012, Accessed.26 April. 2024,
https://www.paperdue.com/essay/e-business-presentation-sendspace-consultancy-78961

Related Documents
Copyright Basics
PAGES 6 WORDS 1888

Copyright Basics Copyright law is designed and enacted to protect artists and other creators. Just as an inventor deserves to patent an invention, an artist deserves the right to own created material including but not limited to film, photography, music, and writing. Although copyright law in many cases ignores the rights of consumers to do as they please with materials they legally purchased, American federal and state statutes do the best

Copyright Law in Hong Kong Internationally, Hong Kong has been obligated to protect copyright pursuant to various international as well as domestic copyright conventions which apply to Hong Kong. Amongst the importance of intellectual property right, copyright as well has been recognized under Article 15(1) of the International Covenant on Economic, Social and cultural rights (ICESCR) specifying that "The States Parties to the present Covenant recognize the right of everyone… to

Copyright Law and the Music
PAGES 25 WORDS 9076

As technology and the capability of removing artifacts from recordings improve this area of the law will be likely to be revisited in the future. This last revision to copyright law raised more questions than it answered. For instance, was it acceptable to colorize black and white movies? Did this alter them from the original work, or was this an acceptable? Was it OK to alter pieces of work to

Copyright Laws vs. Peer-to-Peer File Transfer This paper presents a detailed examination of copyright laws, with a comparison to peer-to-peer file transfer. The author will take the reader on an exploratory journey, in which the details and outcomes of several well-known cases will be scrutinized. The author will also discuss the importance of copyright laws, and the elements of various cases that caused the rulings to go the way they did.

The student enters an illustration contest, and wins first place. The first place prize is a $5,000 check. The student is sued for copyright infringement. In this case, the use of the illustration was done as a commercial venture, yet was also done as a criticism, something quite obviously protected by Section 107. The use of the copyrighted material may have damaged the market in which the tuna company operated,

In order to take refugee from these invalid assertions, she made a fair use claim for all the material that had copyrights. The video was only twenty nine seconds long and the music was near to being audible for only twenty seconds. If these fair use claim wouldn't have been made an innocent women and her family would have been sued for doing something that they didn't do intentionally.