Effectiveness of anti-piracy technology: Finding appropriate solutions for evolving online piracy
Business Horizons 56(2):149-157, March 2013
Author: Hasshi Sudler, Internet Think Tank, Inc.
Abstract
Trends in online piracy have reached record levels and threaten traditional industry supply chains.
Music, motion pictures, print media, and software are some of the most vulnerable content pirated online.
Recent increases in piracy can be historically traced to the digital revolution, introduction of the
World Wide Web, and growth of broadband technologies, rather than a sudden shift in consumer behavior.
The digital and Internet paradigm shifts have fundamentally changed supply chain ecosystems, as well as
opened the door to greater acts of piracy. Under these new ecosystems, digital rights management (DRM)
has proven ineffective at stopping piracy. Furthermore, DRM systems have been shown to discourage legitimate
buyers. A new approach to piracy is needed to account for recent changes in supply chain ecosystems. Several
industry leaders demonstrate effective solutions combining technology and innovative business models that
encourage consumers toward legitimate consumption while leveraging piracy. Given these examples, industries
can address online piracy by combining appropriate technology, innovative business models, and piracy analytics
in the evolving supply chain ecosystems.
Piracy in Cyber Space: Consumer Complicity, Pirates and Enterprise Enforcement
Enterprise Information Systems 5(2):255-271, May 2011
Authors: Peggy E. Chaudhry, Villanova University; Sohail S. Chaudhry, Villanova University;
Stephen A. Stumpf, Franklin University Switzerland; Hasshi Sudler, Internet Think Tank, Inc.
Abstract
This article presents an overview of the growth of internet piracy in the global marketplace.
The ethical perceptions (or lack of) of the younger generation is addressed, in terms of their
willingness to consume counterfeit goods on the web. Firms face the task of educating the consumer
that downloading music, software, movies and the like, without compensation, is unethical. This
awareness is critical for decreasing the demand for counterfeit goods in the virtual marketplace,
where a consumer can exhibit a rogue behavior with a limited fear of prosecution. We address the
pyramid of internet piracy, which encompasses sophisticated suppliers/facilitators, such as the
Warez group. Recent sting operations, such as Operation Buccaneer, are also depicted to highlight
successful tactical maneuvers of enforcement agencies. An overview of the Digital Millennium Copyright
Act and the No Electronic Theft Act is included to debate the controversy surrounding this legislation.
A discussion of enterprise enforcement mechanisms and novel anti-piracy technology for cyberspace is
provided to reveal some of the tools used to fight the pirates, such as innovations in digital watermarking
and NEC's recently announced video content identification technology. Enterprise information systems and its
interdependence on the internet are also demanding new technologies that enable internet investigators to
rapidly search, verify and potentially remove pirated content using web services. The quality of service of
web services designed to efficiently detect pirated content is a growing consideration for new anti-piracy
technology.
|
|
|