Operational Factors Affecting the Confidentiality of Proprietary Digital Assets

Total Page:16

File Type:pdf, Size:1020Kb

Operational Factors Affecting the Confidentiality of Proprietary Digital Assets Operational Factors Affecting the Confidentiality of Proprietary Digital Assets DISSERTATION Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Brett Joseph Massimino, M.B.A. Graduate Program in Business Administration The Ohio State University 2014 Dissertation Committee: John V. Gray, Co-Advisor Kenneth K. Boyer Co-Advisor James A. Hill Elliot Bendoly Copyrighted by Brett Joseph Massimino 2014 Abstract The leakage of an organization’s proprietary, digital assets to unauthorized parties can be a catastrophic event for any organization. The magnitude of these events have been recently underscored by the Target data breach, in which 70 million consumer credit card accounts were compromised, and financial costs are expected to exceed $1 billion. Digital assets have steadily progressed beyond low-value data and information, and into high-value knowledge- based domains. Failures to protect these latter types of digital assets can have even greater implications for firms or even macroeconomic conditions. Using the Target event as an illustrative motivation, we highlight the importance of two relatively-unexplored topics within the domain of digital asset protections - (1) vendor management, and (2) worker adherence to standard, well-codified procedures and technologies. We explicitly consider each of these topics through the separate empirical efforts detailed in this dissertation. Our first empirical effort examines the effects of sourcing and location decisions on the confidentiality of digital assets. We frame our study within a product-development dyad, ii with a proprietary, digital asset being shared between partners. We treat confidentiality as a performance dimension that is influenced by each organization accessing the asset. Specifically, we empirically investigate the realm of electronic video game development and the illegal distribution activities of these products. We employ a series of web-crawling data collection programs to compile an extensive secondary dataset covering the legitimate development activities for the industry. We then harvest data from the archives of a major, black-market distribution channel, and leverage these data to derive a novel, product-level measure of asset confidentiality. We examine the interacting factors of industrial clustering (agglomeration) and national property rights legislations in affecting this confidentiality measure. We find that (1) firms within industry clusters tend to have significantly higher levels of asset confidentiality, (2) strong national property rights tend to suppress this benefit, and (3) these effects are greatly amplified for client organizations. Our second empirical effort seeks insight into the compliance behaviors of workers with tasks related to digital asset protections. Here, we frame a general, dual-task setting in which a worker has a procedural task as a primary responsibility (e.g., manufacturing), but is also requested to comply with a discretionary, protection-oriented task. We draw from Goal Setting Theory and task switching theories to elicit two factors which may significantly impact the worker’s performance on each of these tasks: (1) the level of resource utilization for the worker, and (2) the level of attribution (group vs. individual) held for the protection- iii oriented task. In our analyses, we examine several performance variables, including: task performance, task switching and sequencing behaviors, and goal achievement levels. Through a controlled, laboratory experiment, we find that individual accountability on the protection task positively relates to the subjects’ performance on both tasks. We also find evidence for a negative, nonlinear relationship between resource utilization and performance of the protection-oriented task, and find that this relationship is further moderated by the protection-tasks type of outcome attribution. iv Vita August 2004 B.S. Engineering, Computer Engineering; Summa cum Laude The University of Pittsburgh August 2009 M.B.A, Supply Chain Management; Lehigh University August 2009 to present .......................Doctoral Candidate, The Ohio State University Fields of Study Major Field: Business Administration v Table of Contents Abstract..................................................................................................................................................ii Vita .........................................................................................................................................................v Table of Contents................................................................................................................................vi List of Tables ......................................................................................................................................xii List of Figures....................................................................................................................................xiv Chapter 1: Introduction.......................................................................................................................1 The DIKW Hierarchy .....................................................................................................................7 The Evolution of Proprietary Assets ..........................................................................................10 Digital Assets and Asset Confidentiality During the 1980’s................................................12 Digital Assets and Asset Confidentiality During the 1990’s................................................15 The Current State of Proprietary Assets.................................................................................17 vi Challenges in Protecting Proprietary Digital Assets .................................................................21 The Target Breach of 2013.......................................................................................................24 Supply Chain Challenges for Asset Confidentiality ..............................................................31 Worker Behavioral Challenges for Asset Confidentiality (Chapter 3) ...............................52 Chapter 2: Protecting the Confidentiality of Proprietary, Digital Assets - The Effects of Industrial Agglomeration and National Property Rights..............................................................67 Abstract ...........................................................................................................................................68 Introduction....................................................................................................................................69 Theory and Hypotheses ................................................................................................................72 Direct Effects of Industrial Agglomeration...........................................................................73 Direct Effects of National Property Rights (NPR) Protections .........................................76 Moderating Effects of National Property Rights (NPR) Protections................................78 Empirical Context, Data, and Operationalization.....................................................................79 Dependent Variable...................................................................................................................81 vii Independent Variables ..............................................................................................................87 Control Variables .......................................................................................................................89 Sample Size Attrition.................................................................................................................91 Analysis............................................................................................................................................95 Sensitivity and Post-hoc Analyses ........................................................................................ 104 Practical Significance of Findings......................................................................................... 110 Discussion .................................................................................................................................... 113 Chapter 3: Resource Utilization, Secondary Task Outcome Attribution, and Secondary Goal Achievement .................................................................................................................................... 118 Abstract ........................................................................................................................................ 119 Introduction................................................................................................................................. 120 Theoretical Bases and Related Literature ................................................................................ 131 Goal Setting Theory ............................................................................................................... 131 Task Switching and the Pursuit of Multiple Goals ............................................................ 155 viii Summary of Contextual Factors Relevant for This Study ................................................ 182 Hypotheses..................................................................................................................................
Recommended publications
  • Warez All That Pirated Software Coming From?
    Articles http://www.informit.com/articles/printerfriendly.asp?p=29894 Warez All that Pirated Software Coming From? Date: Nov 1, 2002 By Seth Fogie. Article is provided courtesy of Prentice Hall PTR. In this world of casual piracy, many people have forgotten or just never realized where many software releases originate. Seth Fogie looks at the past, present, and future of the warez industry; and illustrates the simple fact that "free" software is here to stay. NOTE The purpose of this article is to provide an educational overview of warez. The author is not taking a stance on the legality, morality, or any other *.ality on the issues surrounding the subject of warez and pirated software. In addition, no software was pirated, cracked, or otherwise illegally obtained during the writing of this article. Software piracy is one of the hottest subjects in today's computerized culture. With the upheaval of Napster and the subsequent spread of peer-to-peer programs, the casual sharing of software has become a world-wide pastime. All it takes is a few minutes on a DSL connection, and KazaA (or KazaA-Lite for those people who don't want adware) and any 10-year-old kid can have the latest pop song hit in their possession. As if deeply offending the music industry isn't enough, the same avenues taken to obtain cheap music also holds a vast number of software games and applications—some worth over $10,000. While it may be common knowledge that these items are available online, what isn't commonly known is the complexity of the process that many of these "releases" go through before they hit the file-sharing mainstream.
    [Show full text]
  • Warez Trading and Criminal Copyright Infringement by Eric Goldman*
    Goldman, Warez Trading Warez Trading and Criminal Copyright Infringement By Eric Goldman* ABSTRACT Warez traders have been blamed as a significant cause of copyright piracy, which has led to several dozen conviction of warez traders in the past two years. The article analyzes how criminal copyright infringement and other laws apply to warez trading. The article also describes the prosecutions of warez trading, including a comprehensive chart of all warez trading convictions. The article concludes with a brief policy discussion about the problems created by Congress’ effort to criminalize warez trading. TABLE OF CONTENTS 1. Introduction page 2 2. What is Warez Trading? 3 3. The Criminal Copyright Infringement Statute 5 4. Elements of a Prosecution and Applicable Defenses 6 a. Element #1: Valid Copyright 6 b. Element #2: Infringement 6 c. Element #3: Willfulness 12 d. Element #4(a): Commercial Advantage or Private Financial Gain 14 e. Element #4(b): Retail Value of Infringed Works 15 f. Statute of Limitations 17 5. Other Criminal Liability of Warez Trading 17 a. Anti-Circumvention Laws 17 b. Anti-Hacking Laws 18 c. Anti-Theft Laws 19 d. Trade Secret Protection Laws 20 e. Copyright Management Information Integrity Laws 20 6. Criminal Copyright Prosecutions of Warez Traders 21 a. Jeffrey Levy 22 b. Eric Thornton 23 c. Brian Baltutat 23 d. Fastlane 24 e. Pirates With Attitude 25 f. Operations Buccaneer, Bandwidth and Digital Piratez 27 g. William Fitzgerald 31 h. Operation Safehaven 31 i. Operation Cybernet 32 j. Movie Traders 32 * Eric Goldman ([email protected]) is an Assistant Professor at Marquette University Law School in Milwaukee, WI.
    [Show full text]
  • Crack Intros: Piracy, Creativity, and Communication
    International Journal of Communication 9(2015), 798–817 1932–8036/20150005 Crack Intros: Piracy, Creativity, and Communication MARKKU REUNANEN1 Aalto University School of Arts, Design and Architecture, Finland PATRYK WASIAK University of Wroclaw, Poland DANIEL BOTZ Ludwig Maximilian University, Germany This article examines “crack intros,” short animated audiovisual presentations that reside at the crossroads of software piracy, creativity, and communication. Since the beginning of the home computer era in the late 1970s, users have copied and shared software with one another. Informal swapping between friends quickly evolved into organized piracy, known as the “warez scene,” which operated across borders. Starting in the early 1980s, pirated games were often accompanied by screens where groups boasted their accomplishments and sent messages to others. The screens soon turned into flashy intros that contained animated logos, moving text, and music. In this article, we describe crack intros from three different perspectives: first, through their history; second, by treating them as creative artifacts; and, finally, by considering them as a communication medium. The three perspectives offer a novel peek into the practices of early software piracy and its little-known creative aspects. Keywords: software piracy, creativity, crack intros, digital culture Markku Reunanen: [email protected] Patryk Wasiak: [email protected] Daniel Botz: [email protected] Date submitted: 2015–01–29 1 We would like to express our gratitude to Tero Heikkinen, Michel Lamblin, Antti Silvast, and the two anonymous reviewers for their valuable comments that helped us to improve this article. We thank the Kone Foundation for funding the Kotitietokoneiden aika ja teknologisen harrastuskulttuurin perintö (Home Computer Era and the Heritage of Technological Hobbyist Culture) research project.
    [Show full text]
  • Electronic Potlatch a Study on New Technologies and Primitive Economic Behaviors
    Alf Rehn Electronic Potlatch a study on new technologies and primitive economic behaviors SPECIAL VERSION FOR THE WAREZ SCENE RESPECT Copywrong alf rehn 2001 Special note: This is the full text of my Ph.D.-thesis in Industrial management, which I defended at the Royal Institute of Technology, Stockholm, Sweden. List of references has been omitted due to me being lazy and all. This text may be freely distributed wherever. Contact: [email protected] :-) ,-,-,-,-,-,-,-,-,-,-,-, 1 …being an essay on the economic… Tsuyoshi enjoyed his work. Quite often he came across bits and pieces of videotape that were of archival interest. He would pass the images on to the net. The really big network databases, with their armies of search engines, indexers, and catalogs, had some very arcane interests. The net machines would never pay for data, because the global information networks were non-commercial. But the net machines were very polite, and had excellent net etiquette. They returned a favor for a favor, and since they were machines with excellent, enormous memories, they never forgot a good deed. […] “I’m not a gangster at all. I never do anyone any harm.” “Oh no?” Louise glowered at him. “Listen, pal, I know a lot more about your set-up, and your kind of people, than you think I do. I’ve been studying your outfit for a long time now. We computer cops have names for your kind of people. Digital panarchies. Segmented, polycephalous, integrated influence networks. What about all these free goods and services you’re getting all this time?” She pointed a finger at him.
    [Show full text]
  • And “Fall” of the Mp3scene: a Global and Virtual Organization
    The “rise” and “fall” of the MP3scene: A Global and Virtual Organization An organizational, social relational and technological analysis Research thesis June 2009 Student: Jan Adriaan van der Wal Study: Information Science Mentor: dr. Ard Huizing Abstract. The scene, a synonym for the ‘Warez’1 scene, is a global and virtual organization where people copy, crack and distribute copyrighted digital material. The scene is split up into different areas, each with its own specific organizational structure, genre and practice. Amongst these areas are the games, MP3 (music), movies and software scene. The scene is a quite closed and fairly unknown organization that operates on the Internet. Unique organizational structures and many complex social relational and technological processes make this organisation an interesting phenomenon to study. This research is aimed at the MP3scene and describes the development and evolution from the start until its state today from an academic point of view. The objective of this research is to gain more insights in the ongoing organizational, social relational and technological processes within a global and virtual organization like the MP3scene. Acknowledgement. Individuals: Ard H., Steven G., Paul G., Bart B., Lir, D.H., xenner, toma, ktaakt. Groups: MS, MiM, SE Keywords: community, practice, emerging, structure-agency, complex global microstructures, sociality, institutionalizing, engagement, identity, social learning, passion and anarchy Author: J.A. van der Wal, [email protected] 1 ‘Warez’ is a term to define pirated material. Tetzlaf, D. (2000). Yo-Ho-Ho and a Server of Warez: Internet Software Piracy and the New Global Information Economy. In A. Herman, & T.
    [Show full text]
  • Software Piracy Exposed.Pdf
    323_Sof_Pir_FM.qxd 8/30/05 2:19 PM Page i Register for Free Membership to [email protected] Over the last few years, Syngress has published many best-selling and critically acclaimed books, including Tom Shinder’s Configuring ISA Server 2004, Brian Caswell and Jay Beale’s Snort 2.1 Intrusion Detection, and Angela Orebaugh and Gilbert Ramirez’s Ethereal Packet Sniffing. One of the reasons for the success of these books has been our unique [email protected] program. Through this site, we’ve been able to provide readers a real time extension to the printed book. As a registered owner of this book, you will qualify for free access to our members-only [email protected] program. Once you have registered, you will enjoy several benefits, including: ■ Four downloadable e-booklets on topics related to the book. Each booklet is approximately 20-30 pages in Adobe PDF format. They have been selected by our editors from other best-selling Syngress books as providing topic coverage that is directly related to the coverage in this book. ■ A comprehensive FAQ page that consolidates all of the key points of this book into an easy-to-search web page, pro- viding you with the concise, easy-to-access data you need to perform your job. ■ A “From the Author” Forum that allows the authors of this book to post timely updates and links to related sites, or additional topic coverage that may have been requested by readers. Just visit us at www.syngress.com/solutions and follow the simple registration process.
    [Show full text]
  • Order in the Warez Scene – Explaining an Underground Virtual Community with the CPR Framework Priyank Chandra University of Michigan Ann Arbor, USA [email protected]
    Online Behaviors #chi4good, CHI 2016, San Jose, CA, USA Order in the Warez Scene – Explaining an Underground Virtual Community with the CPR Framework Priyank Chandra University of Michigan Ann Arbor, USA [email protected] ABSTRACT have their origins in the scene. As a virtual community, it The paper analyzes the warez scene, an illegal underground consists of a distributed network of individuals working in subculture on the Internet, which specializes in removing groups under pseudonyms - their real world identities copy protection from software and releasing the cracked unknown to each other and activities not limited to any software for free. Despite the lack of economic incentives single geographical location. The groups participating in the and the absence of external laws regulating it, the warez warez scene are committing intellectual property theft and scene has been able to self-govern and self-organize for operating in unarguably illegal spaces. However, even in more than three decades. Through a directed content the face of potential legal sanctions, they have been able to analysis of the subculture’s digital traces, the paper argues successfully sustain the warez scene to bring out goods that that the ludic competition within the warez scene is an do not provide them with economic compensation for more institution of collective action, and can, therefore, be than three decades. approached as a common-pool resource (CPR). Subsequently, the paper uses Ostrom’s framework of long- On December 11, 2001, a 15 months-long investigation led enduring common-pool resource institutions to understand by the United States Customs Service together with the the warez scene’s longevity and ability to govern itself.
    [Show full text]
  • Warez Trading and Criminal Copyright Infringement Eric Goldman Santa Clara University School of Law, [email protected]
    Santa Clara Law Santa Clara Law Digital Commons Faculty Publications Faculty Scholarship 1-18-2004 Warez Trading and Criminal Copyright Infringement Eric Goldman Santa Clara University School of Law, [email protected] Follow this and additional works at: http://digitalcommons.law.scu.edu/facpubs Automated Citation Eric Goldman, Warez Trading and Criminal Copyright Infringement (2004), Available at: http://digitalcommons.law.scu.edu/facpubs/185 This Article is brought to you for free and open access by the Faculty Scholarship at Santa Clara Law Digital Commons. It has been accepted for inclusion in Faculty Publications by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. Goldman, Warez Trading Warez Trading and Criminal Copyright Infringement By Eric Goldman* ABSTRACT Warez traders have been blamed as a significant cause of copyright piracy, which has led to several dozen conviction of warez traders in the past two years. The article analyzes how criminal copyright infringement and other laws apply to warez trading. The article also describes the prosecutions of warez trading, including a comprehensive chart of all warez trading convictions. The article concludes with a brief policy discussion about the problems created by Congress’ effort to criminalize warez trading. TABLE OF CONTENTS 1. Introduction page 2 2. What is Warez Trading? 3 3. The Criminal Copyright Infringement Statute 5 4. Elements of a Prosecution and Applicable Defenses 6 a. Element #1: Valid Copyright 6 b. Element #2: Infringement 6 c. Element #3: Willfulness 12 d. Element #4(a): Commercial Advantage or Private Financial Gain 14 e.
    [Show full text]
  • A Road to No Warez: the No Electronic Theft Act and Criminal Copyright Infringement , 82 Or
    Santa Clara Law Santa Clara Law Digital Commons Faculty Publications Faculty Scholarship 7-1-2003 A Road to No Warez: The oN Electronic Theft Act and Criminal Copyright Infringement Eric Goldman Santa Clara University School of Law, [email protected] Follow this and additional works at: http://digitalcommons.law.scu.edu/facpubs Part of the Internet Law Commons Automated Citation Eric Goldman, A Road to No Warez: The No Electronic Theft Act and Criminal Copyright Infringement , 82 Or. L. Rev. 369 (2003), Available at: http://digitalcommons.law.scu.edu/facpubs/123 This Article is brought to you for free and open access by the Faculty Scholarship at Santa Clara Law Digital Commons. It has been accepted for inclusion in Faculty Publications by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. ERIC GOLDMAN* A Road to No Warez: The No Electronic Theft Act and Criminal Copyright Infringement n the second half of the 1990s, copyright owners repeatedly Isought Congress's help addressing the challenges posed by the Internet and other new technologies. Congress responded with a suite of new protections, including restrictions against circumven­ tion,! longer copyright terms,2 increased statutory damages,3 and criminalization of willful non-commercial infringement. This Article examines the latter of those changes, effectuated through the No Electronic Theft Act4 (the "Act" or the "NET Act"). The Act represents a significant change to copyright law be cause it subtly shifts the paradigm underlying criminal copy­ right infringement. For 100 years, criminal infringement pun­ ished infringers who derived a commercial benefit based on someone else's copyrighted work.
    [Show full text]
  • Warez Trading and Criminal Copyright Infringement by Eric Goldman*
    Warez Trading and Criminal Copyright Infringement By Eric Goldman* 1. INTRODUCTION. In 1994, David LaMacchia became the first person criminally prosecuted for warez trading. At the time, criminal copyright infringement required infringement for commercial advantage or private financial gain. Because LaMacchia acted without commercial motives, the government chose not to prosecute LaMacchia for criminal copyright infringement and instead prosecuted him under conspiracy to commit wire fraud. However, a U.S. Supreme Court case had already declared that copyrighted works were not capable of being taken by fraud,1 so the judge quickly dismissed the case.2 It took copyright owners three years, but they finally addressed the perceived hole exposed by LaMacchia‟s prosecution when Congress enacted the No Electronic Theft (NET) Act (the “NET Act”)3 in 1997. The NET Act modified the existing criminal copyright infringement statute to address LaMacchia‟s conduct in two principal ways: first, by expanding the definition of “financial gain” to cover bartering implicit in warez trading, and second, by creating a new basis of criminal copyright infringement liability that requires only a minimum quantum of infringement irrespective of motive. There is no real question that the NET Act successfully criminalized most warez trading.4 This Article explores how criminal copyright laws apply to warez trading, some of the enforcement actions under the law, and some of the policy concerns about criminalizing warez trading. The Article concludes by discussing why it appears inevitable that warez traders will continue to be jailed for their activities. * Eric Goldman ([email protected]) is an Assistant Professor at Marquette University Law School in Milwaukee, WI.
    [Show full text]