Verified Document

Ethics And Technology: Illegal Downloads Thesis

Arguably the deficiencies in processes and technologies throughout the distribution channel enable the unethical sharing of digital property by consumers in the first place. it's as if the incompetence of these channel partners' platforms, either from a website standpoint with the support of DRM technologies or the reliance on faulty, often poorly designed DRM systems, technologies and techniques create much opportunity to take digital and intellectual property and repurpose it illegally across P2P sites that seek to make all music egalitarian (Lysonski, Durvasula, 2008). it's as if the mid-tier of the distribution channel is leaving the door open wide enough from an intellectual property standpoint to allow for individuals to selectively choose which songs, digital products of all sort, and what platforms they want to repurpose them on (Levin, Dato-on, Manolis, 2007).

When the music distributors, both in the form of traditional forms including music stores selling CDs and non-traditional forms including music download sites, and the manufacturers of electronics equipment have on the one hand the right of "making available" digital assets for sale per their contracts with producers under 17 U.S.C. § 106(3) fail to protect these assets they invite piracy. Yet across the entire tiers of distribution channels of the music and digital entertainment industries the need for more uniformity of process for protecting copyrights is needed. This approach to looking at which members of a distribution channel have the processes most susceptible to enabling and encouraging piracy by a lack of auditability and efficiency is where the legal responsibility lies. In effect the lack of DRM, process and audit controls in place for music distributors and with manufacturers and most importantly the lack of consistency has left the industry with no other choice but to threaten the consumer to attempt to gain compliance (Levin, Dato-on, Manolis, 2007). Not only has this been a public relations disaster it is not a scalable enforcement strategy. The fact that the industry is using DRM more as a means to lock other vendors out of each others' installed bases of users and customers and less about doing what this technology is supposed to do, which is enforce copyright laws (Dannenberg, 2006) is a case in point. Enforcement of copyright laws needs to be across the areas of the distribution channel which has the scalability to make a significant difference in compliance and enforcement rapidly as well.

Conclusion

Copyright infringement laws are being tested daily by the widespread practice of illegally downloading and distributing music. To prosecute the individual is to entirely miss the point, and also to create a legal workload that will not scale over time. The fact that music distributors, manufacturers of music players and electronic equipment that can play music all cannot find a common platform for Digital Rights Management (DRM) is clearly where liability for copyright infringement...

The use of P2P sites for the unlawful distribution of music has become a fertile area for copyright infringement activity (Banerjee, Faloutsos, Bhuyan, 2008). Yet to consider the myriad of permutations and combinations of how individuals repurpose, share, burn onto CDs and load onto their MP3 players illegally gained songs misses the point. The issue is one of a cohesive, unified standard that is unenforceable across all digital assets covered by 17 U.S.C. § 106(3). The distribution channels many approaches to delivery of music needs to have a unified standard to protect music and all forms of digital entertainment content. What the distribution channel partners and for that matter the entire music industry strive to accomplish is to create an enforceable, auditable standard for DRM that does not require consumers to give up their individual data and most importantly, does not violate the individual rights to privacy as the Sony Root Kit did. Instead there must be a consistency to the execution of this standard so that once music and all other forms of digital content arrive with a consumer they cannot duplicate, sell, post or use as easily as they can today.
References

Altschuller, S., & Benbunan-fich, R.(2009). Is music downloading the new prohibition? What students reveal through an ethical dilemma. Ethics and Information Technology, 11(1), 49-56.

Banerjee, a., Faloutsos, M., & Bhuyan, L. (2008). The P2P war: Someone is monitoring your activities. Computer Networks, 52(6), 1272.

Norman E. Bowie. (2005). Digital Rights and Wrongs: Intellectual Property in the Information Age. Business and Society Review, 110(1), 77-96.

Ross Dannenberg. (2006). Copyright Protection for Digitally Delivered Music: A Global Affair. Intellectual Property & Technology Law Journal, 18(2), 12-16.

Robert F. Easley. (2005). Ethical Issues in the Music Industry Response to Innovation and Piracy. Journal of Business Ethics, 62(2), 163-168.

Gerlich, R., Turner, N., & Gopalan, S. (2007). Ethics and Music: A Comparison of Students at predominantly White and Black Colleges and Their Attitudes Towards File Sharing. Academy of Educational Leadership Journal, 11(2), 1-11.

Harrison Green. (2007). Digital Music Pirating by College Students: An Exploratory Empirical Study. Journal of American Academy of Business, Cambridge, 11(2), 197-204.

Aron M. Levin, Mary Conway Dato-on, & Chris Manolis. (2007). Deterring illegal downloading: the effects of threat appeals, past behavior, subjective norms, and attributions of harm. Journal of Consumer Behaviour, 6(2/3), 111.

Aron M. Levin, Mary Conway Dato-on, & Kenneth Rhee. (2004). Money for Nothing and Hits for Free: The Ethics of Downloading Music from peer-to-Peer Web Sites. Journal of Marketing Theory and Practice, 12(1), 48-60.

Steven Lysonski, & Srinivas Durvasula. (2008). Digital piracy of MP3s: consumer…

Sources used in this document:
References

Altschuller, S., & Benbunan-fich, R.(2009). Is music downloading the new prohibition? What students reveal through an ethical dilemma. Ethics and Information Technology, 11(1), 49-56.

Banerjee, a., Faloutsos, M., & Bhuyan, L. (2008). The P2P war: Someone is monitoring your activities. Computer Networks, 52(6), 1272.

Norman E. Bowie. (2005). Digital Rights and Wrongs: Intellectual Property in the Information Age. Business and Society Review, 110(1), 77-96.

Ross Dannenberg. (2006). Copyright Protection for Digitally Delivered Music: A Global Affair. Intellectual Property & Technology Law Journal, 18(2), 12-16.
Cite this Document:
Copy Bibliography Citation

Related Documents

Ethical Dilemmas in Information Technology
Words: 618 Length: 2 Document Type: Essay

Ethical Dilemmas in IT Ethical Dilemmas in Information Technology Information technology is a relatively recent phenomenon in our everyday political, social, and private lives. As such, centuries-old understandings of ethics and morality cannot easily be reconciled with the ever growing development of information technology. There are numerous cases, when information technology poses ethical dilemmas. In general, such cases occur when the good of the organization (government, companies) conflicts with the good of

Ethics and Derivatives Ethical and Financial Risks
Words: 1147 Length: 3 Document Type: Case Study

Ethics and Derivatives Ethical and Financial Risks of Derivatives This paper examines the ethical and financial risks of derivatives. The paper discusses moral philosophies, how white collar crime differs from blue collar crime, and reviews the role of corporate culture and banking industry leaders in the banking industry meltdown that contributed to the worst recession in U.S. history. The moral philosophy most applicable to understanding the banking industry meltdown is teleology. Teleological ethics

Business Ethics Issues a Company's
Words: 1800 Length: 6 Document Type: Essay

On the other hand, applicable laws do have authority and under the concept of moral relativism, it may be justified that any duly passed law be complied with (Svensson & Wood, 2008). One lesson from this case might be that laws between entities in different sovereign nations can be much harder to enforce than laws between entities within the same nation. In the future, Pakistan and other nations might want

Computer Security People, Process and Technology Are
Words: 4780 Length: 15 Document Type: Capstone Project

Computer Security People, process and technology are three things which are involved in information security. Biometrics, passwords and firewalls are some of the technical measures and these are not enough in justifying threats to information. In order to protect information from destruction and to secure systems, a blend of different procedures is required. While deploying information security some factors need to be considered for instance processes like de-registration and registration

P2P and the E-Music Industry
Words: 4372 Length: 15 Document Type: Research Proposal

(Kajuter, Baumgartner & Van, 2001, p. 37) (Hansen, Matthews, Mosconi & Sankaran, 2001, p. 33) Business 2 Consumer (B2C) The realistic and optimal development of the current e-music industry is the shift from illegitimate P2P exchanges to B2C exchanges that allow the artists, support systems and entire communities which rely on revenue from legitimate sales to ensure recovery of investment and potential profit. The potential for such a transition, which could

MP3 Players Industry Brief History
Words: 5567 Length: 13 Document Type: Term Paper

The initial MP3 founders backed by the open source model coded the MP3 software that speeded up the recognition of the MP3 audio format. (Behind the Files: History of MP3) at the time of writing the code for MP3 format, an array of compression intensities can be programmed. To take an example, an MP3 made with 128 Kbit compression intensity will have enhanced sound reproduction quality and bigger file

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now