Verified Document

Threats To Copyright And Ownership Of Intellectual Property Research Paper

Threats to Ownership and Copyright of Intellectual Property The intellectual property (IP) is defined as an original creative work, which may be tangible or intangible form legally protected by law. (Raman, 2004). The intellectual properties include the rights to scientific, artistic and literary works. Moreover, IP covers the invention of human endeavor, scientific discoveries, and industrial design. A current revolution of information technology has made IPs the greatest assets of assets. In the last few decades, there has been a rapid growth of digital discoveries where the IPs of the digital products are in electronic format. However, hackers have taken the advantages of the digital form of IP products by invading and stealing their IP in order to produce the counterfeited products and later sell them online. (Zucker, & Nathan, 2014). IP theft refers to an infringement of patents and copyright through counterfeiting of digital theft. Counterfeiting is an imitation of physical goods without obtaining an authorization. However, a digital theft is an act of stealing transmitted or electronically recorded content without authorization. (Zucker, & Nathan, 2014).

The objective of this paper is to discuss threats to ownership and copyright of the intellectual property.

Major cyber Security Issues to the threats to Ownership and Copyright of IP

The advent of the internet and network technologies provide superior benefits to firms assisting in delivering the digital products that could be accessed globally, and enhancing firms market advantages. Despite the benefits that firms derive from the new technology, firms face threats of intellectual property thefts. Hackers take the advantages of superior network connectivity to steal firms' intellectual properties. The internet technology facilitates a widespread of IP theft because the internet allows the IP thieves to sell the counterfeited product online. Moreover, online threat occurs through P2P (peer-to-peer) networks, streaming websites, and cyberlockers. Moreover, pirated movies are uploaded online for distribution.

In the United States, many firms have lost revenue worth billions of dollars because of intellectual properties, and the issue affects virtually all industries. However, companies producing the digital products are particularly affected. In 2014,...

companies lost over $275 billion from the IP thefts, and more than 500 million unique IT thefts were recorded. More importantly, the software product, digital books, movies, music, video games, and periodicals particularly suffer the intellectual property thefts. A study carried out by Columbia University reveals that 70% of young people between 18 and 29 illegally downloaded software, music, or video files online. Thus, the IP theft has affected the revenue of the music industry leading to a decline in revenue since 1999. (Halpern, 2001). The greatest challenges that the U.S. industry face is from state-sponsored hackers from China and Russia who steal the intellectual properties of the U.S. firms with the intention of producing the counterfeited products and sell them at a cheaper price. The estimated revenue loss from pirating from China amount to billions of dollars, and illegal websites selling pharmaceutical products are springing up globally, and 50% of online pharmaceutical products are selling counterfeited product. (NIPRCC (2011). In addition to lost revenue, organizations face challenges in protecting their intellectual properties, which ultimately make them incur high costs to protect their IPs.
While the United States has promulgated different laws to protect the IPs of organizations, however, these laws are ineffective to combat the IT thefts in the contemporary IT environment. For example, the U.S. introduces the DMCA ("Digital Millennium Copyright Act") to protect the digital media from being pirated, however, this law is ineffective. (Barker, 2005 p 1). It is essential to realize that the U.S. laws are only applicable in the United States and not applicable in other countries. The intrigue things about the recent IP issues is that many companies that steal the IPs of the U.S. firms are located outside the United States where the U.S. copyright laws are ineffective. The sad things about the IP thefts are that many of the IP protected products are sold online where sellers do not have physical offices. Thus, it is nearly impossible to track down companies illegally selling the IP protected products.

2. Recommended Policy Controls to manage threats to Intellectual Property

The increasing threats to the ownership and copyright of the intellectual property require an intervention of the U.S. government to…

Sources used in this document:
Reference

Barker, D. M., (2005). Defining the Contours of the Digital Millennium Copyright Act: The Growing Body of Case Law Surrounding the DMCA, 20 Berkeley Tech. L.J. 47.

Guess, R., Hadley, J., Lovaas, S., & Levine, D.E. (2014). Protecting digital rights: Technical approaches. In Bosworth, et al. (Eds.), Computer Security Handbook (6th ed., pp. 42.1-42.23). New York, NY: John Wiley & Sons.

IP Center (2011). Intellectual Property Rights Violations: A Report on Threats to United States Interests at Home and Abroad. National Intellectual Property Rights Coordination Center.

NIPRCC (2011). Intellectual Property Rights Violations: A Report on Threats to United States Interests at Home and Abroad .National Intellectual Property Rights Coordination Center.
Cite this Document:
Copy Bibliography Citation

Related Documents

Intellectual Property in Cyberspace the
Words: 1039 Length: 3 Document Type: Research Paper

In the contemporary cyber environment, innovation does not enhance success. For example, most patents such as songs and books receive low rewards. The author suggests that there is a need to make rules to enhance the bargain of intellectual property owners. Part 2 In the contemporary cyberspace and it world, the traditional copyright law has not been sufficient to protect intellectual property right in the face current development of computer and

Role of Technology in Corporate and Social
Words: 2557 Length: 7 Document Type: Essay

Role of Technology in Corporate and Social Responsibility Insider trading. The insider trading case that has become most prominent is that against Raj Rajaratnam who ran the hedgefund Galleon Group, and was charged along with his co-defendant, Danielle Chiesi, a former consultant with New Castle Funds, LLC ("Insider Trading," 2010). Rajaratnam was convicted of 14 counts of insider trading, which makes this case the largest scheme concocted by a hedge fund

Cloud Computing and Computing
Words: 7745 Length: 25 Document Type: Thesis

Risk, Risk Management Strategies, and Benefits in Cloud Computing SITUATIONAL ANALYSIS PREMISE STATEMENT KEY DEFINITIONS SERVICE AND DEPLOYMENT MODELS BENEFITS OF CLOUD COMPUTING SECURITY ASPECTS Storage Reliability Virtualization Trust Physical Security Legal Compliance CLOUD COMPUTING RISKS RISK Management STRATEGIES Vendor Evaluation Centralized Information Governance Other Organization-Level Measures Individual-Level Security Measures Cloud computing model Cloud computing service and deployment models ISO/IEC broad categories The emergence of cloud computing has tremendously transformed the world of computing. Today, individuals, organizations, and government agencies can access computing resources provided by a vendor on an on-demand basis.

Right to Use the Name
Words: 2160 Length: 7 Document Type: Term Paper

There have been several arguments with reference to the social impact of the Intellectual Property, and it has been observed that the Intellectual property law has been responsible for the promotion of the competitive forces in such a manner that 'antitrust law does not address, and may do so based on evidence that would be insufficient in an antitrust context' (Brinson, 1994). It is indeed a difficult practice related

Ethics and Technology: Illegal Downloads
Words: 2424 Length: 7 Document Type: Thesis

Arguably the deficiencies in processes and technologies throughout the distribution channel enable the unethical sharing of digital property by consumers in the first place. it's as if the incompetence of these channel partners' platforms, either from a website standpoint with the support of DRM technologies or the reliance on faulty, often poorly designed DRM systems, technologies and techniques create much opportunity to take digital and intellectual property and repurpose it

Open Source Software
Words: 1916 Length: 5 Document Type: Essay

The term "open source software" has been used to refer to computer software whose source code is available for public use, either exactly the way it is, or after certain alterations are made to it. Such software normally requires no license fee. OSS applications are available for various purposes like web design, communications, office automation, content management, and operating systems (Necas & Klapetek, 2012). One major difference between proprietary software

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now