Hackere / Crackere

Total Page:16

File Type:pdf, Size:1020Kb

Hackere / Crackere UNIVERSITETET I OSLO Institutt for informatikk Hackere / Crackere Masteroppgave (60 studiepoeng) Ørjan Nordvik 1. februar 2006 Sammendrag Denne masteroppgaven går kort sagt ut på å finne ut hva som karakteriserer hackere og crackere. Det er viktig å klargjøre så tidlig som mulig i oppgaven hvordan jeg tolker disse to termene. I kapittel tre vil jeg gå grundig igjennom dette, men først vil jeg her kort oppsummere hvordan jeg kommer til å bruke begrepene hacker og cracker. Hackere er dataeksperter som holder seg på den riktige siden av loven, mens crackere er de som bryter loven. For å kunne diskutere de sentrale begrepene har jeg gjort en litteraturstudie som resulterte i kapittel tre, samt en empirisk undersøkelse ved å intervjue dataeksperter, hackere og crackere. Det er den empiriske undersøkelsen som består av en rekke kvalitative intervjuer, og data fra sekundærlitteraturen som danner datagrunnlaget i denne oppgaven. Hackere og crackere er etter min mening ikke homogene grupper som lett lar seg beskrive med få setninger. Det finnes et utall av motiver som ligger bak deres handlinger enten de er hacker eller cracker. Måten de arbeider på avhenger ofte av hvilket ferdighetsnivå de har. Det klassiske bilde av hackere som kvisete, coladrikkende fjortisser med tykke briller er en myte. Hackere og crackere finnes i alle samfunnslag og er like gjerne 30 som 15 år. Forord Denne masteroppgaven inngår som en del av mastergraden min ved Institutt for Informatikk, Universitetet i Oslo våren 2006. Området for forskningen er innen Informasjonssystemer oppgaven fokuserer på karakteristikker av hackere og crackere. Oppgaven er av «lang» type og gir 60 studiepoeng. Jeg vil veldig gjerne rette en stor takk til veilederen min Gisle Hannemyr for konstruktiv og god veiledning. En stor takk går også til alle jeg har intervjuet og ellers alle andre som har bidratt med hjelp til denne oppgaven. Oslo, 1. februar 2006 Ørjan Nordvik Innhold 1. INTRODUKSJON ......................................................................................................1 1.1 Problemstilling ......................................................................................................................................2 1.2 Motivasjon og bakgrunn......................................................................................................................3 1.3 Avgrensing..............................................................................................................................................3 1.4 Organisering av oppgaven...................................................................................................................4 2. INFORMANTENE......................................................................................................7 2.1 Presentasjon av informantene.............................................................................................................8 2.1.1 Utvalg A ........................................................................................................................................8 2.1.2 Utvalg B .......................................................................................................................................11 2.2 Sekundærlitteratur..............................................................................................................................12 3. TEORIGJENNOMGANG .......................................................................................15 3.1 Hackerbegrepet....................................................................................................................................15 3.1.1 Hvordan defineres hackere og crackere..................................................................................16 3.1.2 Forvirringen rundt hackerbegrepet .........................................................................................19 3.1.3 Hacker – Cracker ........................................................................................................................21 3.1.4 Min bruk av termene .................................................................................................................23 3.1.5 Hackergenerasjonene.................................................................................................................24 3.1.6 De opprinnelige hackerne .........................................................................................................26 3.1.7 Richard Stallmann / Free software..........................................................................................28 3.1.8 Hackeretikken.............................................................................................................................32 3.2 Hacker- og crackervarianter...............................................................................................................34 3.2.1 White hat hacker.........................................................................................................................35 3.2.2 Hacktivist.....................................................................................................................................35 3.2.3 Black hat hacker..........................................................................................................................37 3.2.4 Cyberpunk...................................................................................................................................38 3.2.5 Phreaker.......................................................................................................................................39 3.2.6 Scriptkiddie ................................................................................................................................ 40 3.2.7 Social engineer ........................................................................................................................... 41 3.2.8 Sammenhengen mellom variantene........................................................................................ 41 3.3 Metoder for hacker- og crackerangrep............................................................................................44 3.3.1 Exploits........................................................................................................................................ 44 3.3.2 IRC og botnet.............................................................................................................................. 46 3.3.3 DoS/DDoS.................................................................................................................................. 47 3.3.4 Social engineering...................................................................................................................... 50 3.3.5 Virus ............................................................................................................................................ 52 3.3.6 Spyware / Adware.................................................................................................................... 53 3.3.7 Spam............................................................................................................................................ 54 3.4 Dagens situasjon................................................................................................................................. 55 3.4.1 Mørketallsundersøkelsen .........................................................................................................55 3.4.2 Åndsverksloven......................................................................................................................... 63 3.4.3 Trender........................................................................................................................................ 68 3.4.4 Cracking teknikker .................................................................................................................... 69 4. FORSKNINGSMETODE........................................................................................73 4.1 Introduksjon ........................................................................................................................................ 73 4.2 Kvantitativ vs. kvalitativ metode..................................................................................................... 74 4.3 Metoder for datainnsamling og analyse......................................................................................... 75 4.3.1 Grounded theory ....................................................................................................................... 77 4.3.2 Prosessen i grounded theory.................................................................................................... 79 4.3.3 Dybdeintervjuer......................................................................................................................... 82 4.3.4 Nettsamtaler (chat).................................................................................................................... 84 4.3.5 E-post samtaler .......................................................................................................................... 86 4.3.6 Diskusjonsgrupper .................................................................................................................... 86 4.3.7 Litteraturstudie .......................................................................................................................... 87 4.4 Hjelpemidler.......................................................................................................................................
Recommended publications
  • The High-Definition Multimedia Interface
    technology High-Defi nition Multimedia Interface It’s the interconnect that sorts out a lot of problems we thought we had and a few that we didn’t; it’s the High-Defi nition Multimedia Interface. NIGEL JOPSON discovers a new digital connector that has all sorts of implications for the future — including the forced deactivation of analogue outputs. just 15% of new sets sold this year will include it and be able to deliver the full 1080 high resolution picture that these devices are being sold on. Unlike the disparate disc formats that have polarised manufacturers into two camps, the HDMI connector has cross-industry support. The founders include electronics manufacturers Hitachi, Matsushita Electric (Panasonic), Philips, Sony, Thomson (RCA), Toshiba, and Silicon Image. Digital Content Protection LLC (a subsidiary of Intel) is providing High-bandwidth Digital Content Protection (HDCP) for HDMI. In addition, HDMI has the very partisan support of major movie producers Fox, Universal, Warner Bros and Disney, and system operators DirecTV and EchoStar (Dish Network) as well as CableLabs and Samsung. So HDMI is an industry-supported, uncompressed, all-digital audio/video interface. The small connector provides the interface between any compatible digital audio/video source, such as a set-top box, DVD player or AV receiver and a compatible digital audio and/or video monitor. It was conceived as a sort of digital SCART, primarily a point-to-point connector; HDMI grew out of DVI and the picture side is backwards compatible (providing that copy protection is implemented). HDMI adds support for component video, multichannel audio, the so-called universal CD control, and the concept of auto-confi guration.
    [Show full text]
  • Is the Idea of Fair Digital Rights Management an Oxymoron? The
    Royal Holloway Series Fair Digital Rights Management Fair digital rights management HOME THE BIRTH OF DIGITAL RIGHTS Is the idea of fair digital rights management an oxymoron? The MANAGEMENT music industry has been turned upside down by the Internet, and UNFAIR DIGITAL RIGHTS has tried various methods to protect its profits. But many of its MANAGEMENT actions have been either futile or heavy-handed. Christian Bonnici A DIGITAL RIGHTS and Keith Martin examine various approaches to see which would DILEMMA be most effective and fair to all parties. A COMPROMISE SOLUTION CONCLUSION REFERENCES 1 Royal Holloway Series Fair Digital Rights Management HERE ARE FEW issues more provocative than that THE BIRTH OF DIGITAL of the management of rights to digital content. RIGHTS MANAGEMENT For some consumers the internet is seen as an We will frame our discussion around music HOME Tagent of digital freedom, facilitating free and media, which is one of the most high profile types THE BIRTH OF easy access to digital content such as music and of digital content. FIGURE 1 (page 3) shows a sim - DIGITAL RIGHTS films. For some digital content providers the ple timeline indicating some of the milestones in MANAGEMENT internet has been seen as a technology that has the development of music media. The publication UNFAIR damaged their ability to earn money from selling of the MP3 music compression algorithm in 1991 DIGITAL RIGHTS their products. represents the most significant development with MANAGEMENT The solution to providers’ fears has been vari - respect to digital rights to music media, and this A DIGITAL ous attempts to control access to digital content event is pivotal to our discussion.
    [Show full text]
  • Of Price Discriminiation, Rootkits and Flatrates
    Of Price Discriminiation, Rootkits and Flatrates Volker Grassmuck Helmholtz-Zentrum für Kulturtechnik, Humboldt-University Berlin 19 February 2006 DRAFT VERSION – final version is slated for print publication Licensed under Creative Commons Share-Alike Germany 2.0 „Copyright owners continue to be ambivalent about the Internet. On the one hand, it represents a fantastic new medium for distribution; on the other, many in the publishing industry see it as one ‚giant, out of control copying machine.‘ ... The very technological advances that make rights management more difficult – the dramatic reduction in costs of copying and distribution – also offer a fantastic opportunity for owners of intellectual content.“1 Without scarcity there is no market. Information by its nature is a public good.2 Copyright law artificially creates scarcity by granting exclusive rights to it for a limited time. Media technology so far helped enforcability of those rights because the means of production and the means of distribution of informational goods were expensive and therefore scarce. The digital revolution does away with this scarcity. PC and Internet bring to virtually everyone the power of the printing press and the recording studio. Only now, information‘s defining qualities of non-rivalrousness and non-excludability come to full bearing. Zero cost for reproduction and distribution is indeed a fantastic value proposition for information vendors. Alas, it is undermined by the fact that for consumers the cost of copying and distribution is zero as well. Peer-to-peer networks show that transporting bits from A to B is now such a low-cost service that users can effortlessly provide it to each other.
    [Show full text]
  • Information Doesn't Want to Be Free Cory Doctorow
    Information Doesn’t Want to Be Free Laws for the Internet Age Cory Doctorow Copyright © 2014 Cory Doctorow Cover design by Sunra Thompson. All rights reserved, including right of reproduction in whole or in part, in any form. McSweeney’s and colophon are registered trademarks of McSweeney’s, a privately held company with wildly fluctuating resources. Printed by Thomson-Shore in Michigan. ISBN 978-1-940450-28-5 10 9 8 7 6 5 4 3 2 1 www.mcsweeneys.net v FOREWORDS Neil Gaiman viii Amanda Palmer xii 0. INTRODUCTION Detente xviii 0.1 What Makes Money? xx 0.2 Don’t Quit Your Day Job—Really xxii 1. DOCTOROW’S FIRST LAW Any Time Someone Puts a Lock on Something That Belongs to You and Won’t Give You the Key, That Lock Isn’t There for Your Benefit 1 1.1 Anti-Circumvention Explained 4 1.2 Is This Copyright Protection? 7 1.3 So Is This Copy Protection? 12 1.4 Digital Locks Always Break 14 1.5 Understanding General-Purpose Computers 21 1.6 Rootkits Everywhere 23 1.7 Appliances 26 1.8 Proto-Appliances: The Inkjet Wars 28 1.9 Worse Than Nothing 31 2. DOCTOROW’S SECOND LAW Fame Won’t Make You Rich, But You Can’t Get Paid Without It 37 2.1 Good at Spreading Copies, Good at Spreading Fame 41 2.2 An Audience Machine 43 2.3 Getting People to Care About Your Work 49 2.4 Content Isn’t King 51 2.5 How Do I Get People to Pay Me? 53 2.6 Does This Mean You Should Ditch Your Investor and Go Indie? 64 2.7 Love 66 2.8 The New Intermediaries 69 2.9 Intermediary Liability 75 2.10 Notice and Takedown 77 2.11 So What’s Next? 80 2.12 More Intermediary Liability, Fewer Checks and Balances 82 2.13 Disorganized Channels Are Good for Creators 87 2.14 Freedom Can Be Expensive, but Censorship Costs Us the World 90 vi FOREWORDS 3.
    [Show full text]
  • The Public Domain: Enclosing the Commons of the Mind
    37278_u00.qxd 8/28/08 11:04 AM Page i The Public Domain ___-1 ___0 ___ 1 37278_u00.qxd 8/28/08 11:04 AM Page ii Thomas Jefferson to Isaac McPherson, August 13, 1813, p. 6. -1 ___ 0 ___ 1 ___ 37278_u00.qxd 8/28/08 11:04 AM Page iii James Boyle The Public Domain Enclosing the Commons of the Mind Yale University Press ___-1 New Haven & London ___0 ___ 1 37278_u00.qxd 8/28/08 11:04 AM Page iv A Caravan book. For more information, visit www.caravanbooks.org. Copyright © 2008 by James Boyle. All rights reserved. The author has made an online version of this work available under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 License. It can be accessed through the author’s website at http://james-boyle.com. Printed in the United States of America. ISBN: 978-0-300-13740-8 Library of Congress Control Number: 2008932282 A catalogue record for this book is available from the British Library. This paper meets the requirements of ANSI/NISO Z39.48–1992 (Permanence of Paper). It contains 30 percent postconsumer waste (PCW) and is certified by the Forest Stewardship Council (FSC) -1 ___ 0 ___ 1 ___ 37278_u00.qxd 8/28/08 11:04 AM Page v Contents Acknowledgments, vii Preface: Comprised of at Least Jelly?, xi 1 Why Intellectual Property?, 1 2 Thomas Jefferson Writes a Letter, 17 3 The Second Enclosure Movement, 42 4 The Internet Threat, 54 5 The Farmers’ Tale: An Allegory, 83 6 I Got a Mashup, 122 7 The Enclosure of Science and Technology: Two Case Studies, 160 8 A Creative Commons, 179 9 An Evidence-Free Zone, 205 10 An Environmentalism for Information, 230 ___-1 Notes and Further Readings, 249 ___0 Index, 297 ___ 1 v 37278_u00.qxd 8/28/08 11:04 AM Page vi -1 ___ 0 ___ 1 ___ 37278_u00.qxd 8/28/08 11:04 AM Page vii Acknowledgments The ideas for this book come from the theoretical and practical work I have been doing for the last ten years.
    [Show full text]
  • Crack Dvd Encryption
    Crack dvd encryption click here to download Here, we'll show you how to rip your DVDs to your computer using the This will let Handbrake read your encrypted DVDs and rip them to your. DeCSS was one of the first free computer programs capable of decrypting content on a commercially produced DVD video disc. Before the release of DeCSS, Linux-based computing systems could not play video DVDs. DeCSS was developed without a license from the DVD Copy Control The CSS decryption source code used in DeCSS was mailed to Derek ​Origins and history · ​Technology and derived · ​Legal response. Jon Lech Johansen also known as DVD Jon, is a Norwegian programmer who has worked on Johansen has denied writing the decryption code in DeCSS, saying that this part of the project originated from someone in Germany. He only. WonderFox DVD Video Converter is just the right DVD copy software to copy locked DVD; it will help you crack and copy protected DVD with ease. You pay good money for your DVDs, but they're hardly the only format their current DVDs protected with CSS, Macrovision content protection. New code that opens DVDs for copying is posted on the Internet. The anonymous developers of the decryption program that removes DVD copy protection had an easy time doing it, thanks to a gaffe by a. How to crack protected dvd. 1. How to Crack Protected DVD There are so many protected DVDs in the market, but do you know how to crack. WinX DVD Ripper is free DVD ripping software for copy protected DVDs.
    [Show full text]
  • Happy Birthday (Oct 28, 1998) DMCA! DMCA: the Good, the Bad, the Ugly? DMCA and Chilling Effects Jon Lech Johansen
    Happy Birthday (Oct 28, 1998) DMCA! DMCA: The good, the bad, the ugly? Blogs, search engines, e-commerce sites, video and Notice and take down for copyright infringement social-networking portals are thriving today thanks in http://www.ivanhoffman.com/dmca.html large part to the notice-and-takedown regime ushered http://www.chillingeffects.org/dmca512/faq.cgi in by the much-maligned copyright overhaul. A decade ago, when the DMCA was enacted, these To submit a takedown notice, provide: innovations were unheard of, embryonic or not yet Complainant: name, address, e-signature conceived. Now, Google has grown into one of the Where are the infringing materials? Ref/link/id world's largest companies, and its video-sharing site Statement: no legal basis for use of materials YouTube has left an enduring mark on public Statement: act on behalf of copyright holder discourse. http://blog.wired.com/27bstroke6/2008/10/ten-years-later.html CPS 82, Fall 2008 14.1 CPS 82, Fall 2008 14.2 DMCA and chilling effects Jon Lech Johansen Dmitry Sklyarov, Elcomsoft, 2001 DeCSS Arrested? Conference? How does DVD encryption work? Ed Felten, SDMI, 2001 What is GPL issue with original code? RIAA urges reconsideration Brute force attack on 40-bit key beyond DeCSS http://www.cs.princeton.edu/~prc/Parodies.html Alex Halderman, Sony rootkit Apple, iTunes, Fairplay, DRM Digital Rights Management Ben Edelman and CIPA (children’s internet iPhone protection act) Hacker Jon Research, tools, distribution, “just sue” CPS 82, Fall 2008 14.3 CPS 82, Fall 2008 14.4 P2P: origins and current state Napster, copyright, law Shawn Fanning Napster was centralized, file-sharing/p2p Napster, 1998-99 Why was it centralized? Under 20, mp3, … What did centralization mean? Where are files? Centralized server Rupture, EA $15 million Napster started just after DMCA, court cases new Justin Frankel A&M Records, Inc.
    [Show full text]
  • CACODE IS SPEECH: Legal Tinkering, Expertise, and Protest Among Free and Open Source Software Developers
    CODE IS SPEECH: Legal Tinkering, Expertise, and Protest among Free and Open Source Software Developers GABRIELLA COLEMAN CDepartment ofA Media, Culture, and Communication, NYU We do not act because we know. We know because we are called upon to act. —Johann Gottlieb Fichte THE POETICS OF LAW, TECHNOLOGY, AND PROTEST Like many computer aficionados today, Seth Schoen writes all of his software as “Free and Open Source Software” (F/OSS) to ensure that the source code—the underlying directions of computer programs—will remain accessible for other developers to use, modify, and redistribute. In so doing, a Free Software developer like Schoen not only makes technology but also participates in an emerging effort that redefines the meaning of liberal freedom, property, and software by asserting in new ways that code is speech. For example, a tiny portion of a 456 stanza haiku written by Schoen in February 2001 makes just this claim: Programmers’ art as that of natural scientists is to be precise, complete in every detail of description, not leaving things to chance. CULTURAL ANTHROPOLOGY, Vol. 24, Issue 3, pp. 420–454. ISSN 0886-7356, online ISSN 1548-1360. C 2009 by the American Anthropological Association. All rights reserved. DOI: 10.1111/j.1548-1360.2009.01036.x CODE IS SPEECH Reader, see how yet technical communicants deserve free speech rights; see how numbers, rules, patterns, languages you don’t yourself speak yet, still should in law be protected from suppression, called valuable speech! Schoen’s protest poem not only argued that source code is speech but also demonstrated it: the extensive haiku was in fact a transcoding of a short piece of Free Software called DeCSS, which could be used to decrypt access controls on DVDs in violation of current copyright laws.
    [Show full text]
  • RUTGERS LAW JOURNAL [Vol
    R U T G E R S L A W J OURNAL VOLUME 40 SPRING 2009 NUMBER 3 WHY PIRATES (STILL) WON’T BEHAVE: REGULATING P2P IN THE DECADE AFTER NAPSTER Annemarie Bridy Governing people, in the broad meaning of the word, governing people is not a way to force people to do what the governor wants; it is always a versatile equilibrium, with complementarity and conflicts between techniques which assure coercion and processes through which the self is constructed or modified by himself. – Michel Foucault1 INTRODUCTION Napster went legit years ago. Grokster and Aimster are fading memories. And the once ubiquitous media coverage of peer to peer (“P2P”) file sharing has dwindled to occasional updates on legal and tech blogs. But hundreds of lawsuits, thousands of takedown notices, and millions of dollars later, victory Associate Professor, University of Idaho College of Law. The author would like to thank David Post and Clint Jeffery for comments on earlier drafts of this article and the Institute for Intellectual Property and Information Law at the University of Houston Law Center, which funded the project through its Sponsored Scholarship Grant Program. Thanks also to Axel Krings and participants in the University of Idaho CS (Computer Science) Colloquium, where portions of this article were presented. 1. Michel Foucault, About the Beginning of the Hermeneutics of the Self: Two Lectures at Dartmouth, 21 POL.THEORY 198, 203-204 (1993) (footnote omitted). 565 566 RUTGERS LAW JOURNAL [Vol. 40:565 for the entertainment industry in the war on P2P remains elusive. Illegal music file sharing, notwithstanding the popularity of legal download services like iTunes, continues by all accounts at a robust rate, with The Economist reporting that for every one song that is legally purchased, about twenty are illegally downloaded.2 For organizations like the Recording Industry Association of America (“RIAA”), this is a devastating statistic not only because it signifies a wealth of lost revenue, but also because it signifies a long-running failure of both public and private regulation.
    [Show full text]
  • Digital Music Technology &
    Digital Music Technology & Law Anton Hopen, U.S. Registered Patent Attorney 33rd Annual National Conference on Law & Higher Education DISCLAIMER….. Overview MP3 Technology Copyrights Fair Use Digital Rights Management RIAA and DMCA P2P Sharing Parody Ringtones The MP3 File MPEG-1 AUDIO LAYER 3 MP3 Development Patents Rights to MP3? COPYRIGHTS TO DIGITAL AUDIO Five (5) Exclusive Rights Given to Copyright Owners? #1 ______________________ #2 ______________________ #3 ______________________ #4 ______________________ #5 ______________________ #1: Right to Reproduce the Work #2: Right to Create Derivatives #3: Distribute Copies to Public #4: Perform Work Publicly #5: Display Work Publicly Four (4) Factors of Fair Use #1 _____________________ #2 _____________________ #3 _____________________ #4 _____________________ Fair Use Factor #1 Purpose and Character of Use Fair Use Factor #2 Nature of the Use Creativity 120 100 80 60 40 Creativity 20 0 * Values are arbitrary Fair Use Factor #3 Portion Used 10% Rule Fair Use Factor #3 Portion Used 10% Rule Fair Use Factor #4 Effect of Use on Market Music CD Sales DIGITAL RIGHTS MANAGEMENT DRM Issues How is digital media different from analog media? DRM in device licensing Does HDMI have DRM? Advanced Access Content System Disney Intel Microsoft Panasonic Warner Bros. IBM Toshiba Sony DRM – Content Scrambling System Jon Lech Johansen DRM – Contest Scrambling System DeCSS Code Fragment Sony BMG CD DRM (2005) Extended Copy Protection (XCP) MediaMax CD-3 Current DRM Approach ~$.99 downloads non-DRM Unlimited subscriptions – DRM enabled May 14, 1998 DIGITAL MILLENNIUM COPYRIGHT ACT DMCA - Reverse Engineering For Violating or For Encouraging Interoperability Violation of Purposes Copyrights 17 U.S.C.
    [Show full text]
  • Comment Submitted by Glenn Kerbein, Pirate Party of the United States
    DRM consultation response for FTC If a company sold a chair, but it came with an End User License Agreement which stated that you could only sit in it on certain days, during certain times? If a bank tried to sell a repossessed house, but warned that if more than 3 people tried to live there at once, the bank would repossess it? This is the situation with digital rights management, or DRM. (needs a transition, and another sentence.) DRM is an implementation of technology in the form of software, which is used in attempts by the proprietor to arbitrarily apply restrictions. In practice, DRM is used to restrict interoperability, and lock out viable, and legal uses, in the name of 'copy protection', and is widely, and frequently bypassed. Often, this has alienated and hurt consumers of DRM enabled products, and driven those who would have purchased the product legally to download it illegally. Perhaps one of the most widespread uses of DRM is on DVDs. Discs are limited in one of two ways: The first of these is through the use of region codes, region-encoded discs, meaning that DVD players will only play discs whose region codes match their own. For example, I can't play a region 'four' disc (Mexico and South America) with my region 'one' (North America) DVD player. The rationale for this, is that it is costly to make thousands of copies for cinema use, so releases are staggered, with reels from the first countries being shipped to later countries in the list, with local language soundtracks (in some instances) accompanying it.
    [Show full text]
  • Z24: Digital Rights Management
    Z24: Digital Rights Management Mark Handley Intellectual Property Law “Intellectual property law cannot be patched, retrofitted, or expanded to contain digitized expression…Information wants to be free.” John Perry Barlow Is he right? [See “Information Rules, A Strategic Guide to the Network Economy” by Carl Shapiro and Hal Varian] 1 Production and Distribution Digital technology lowers production costs Digital technology lowers distribution costs Examples Tape recorder lowers production, but not distribution costs AM radio broadcast lowers distribution costs, not reproduction costs Make Lower Distribution Costs Work for You Information is an experience good Must give away some of your content in order to sell rest Can use product line/versioning Easy to read, hard to print Historical Examples: Libraries Video rental as prelude to purchase Growing the market 2 Demand for Repeat Views Give away all your content, but only once Music, books, video have different use patterns Children Barney: free videos Disney: sued daycare centers Adults Illicit Copying Timely information: not a big problem Cheap information: not a big problem Negative feedback: the bigger you are, the easier to detect 3 Lessons Two challenges: cheap production, cheap distribution Cheap distribution: helps advertise by giving away samples Cheap distribution: good for bootleggers, but their need to advertise helps control them Copy protection that imposes costs on users is vulnerable to competitive forces IANAL I am not a lawyer. I’m probably wrong on legal issues. 4 THE LAW There are four basic types of Intellectual Property Law Copyright Protects writing, music, video, etc against copying. Occurs by default. Patent Protects ideas against duplication.
    [Show full text]