MASTER THESIS Ivan G

Total Page:16

File Type:pdf, Size:1020Kb

MASTER THESIS Ivan G MASTER THESIS Ivan G. Angelov Tilburg University Faculty of Law Law & Technology LAW & TECNOLOGY 2011 - 2013 Master Thesis Topic: How to guide creative industries towards adopting new business models? Ivan G. Angelov ANR: 569597 Thesis Supervisor: Dr. mr. ir. M.H.M. Schellekens Faculty of Law, Law & Technology Tilburg University 1 | P a g e Table of Contents • INTRODUCTION ….………………………………………………………………………………….4 • METHODOLOGY ……………………………………………………………………………………..9 1. CHAPTER I: Copyright Enforcement Failure.………………………………………10 1.1 Internet Changed Everything ……………………………………………………10 1.2 Napster – The Beginning of the Copyright Wars ……………………….11 1.3 Grokster’s Lawsuit ……………………………………………………………………12 1.4 Gnutella, Kazaa and Megaupload …………………………………………….13 1.5 RIAA’s Litigation Campaign ………………………………………………………14 1.6 The Legal Campaign in Europe …………………………………………………16 1.6.1 Pirate Bay ……………………………………………………………………….16 1.6.2 Individual Users ……………………………………………………………..16 1.7 Copyright Enforcement ……………………………………………………………17 1.7.1 Aftermath ……………………………………………………………………….17 1.7.2 The Problems Behind the Enforcement …………………………..18 2. CHAPTER II: New Business Models: New Opportunities for Copyright Holders …………………………………………………………………………………………………20 2.1 The Alternative ………………………………………………………………………..20 2.2 New Business Models Work …………………………………………………….22 2.2.1 iTunes …………………………………………………………………………22 2.2.2 Subscription Based Models …………………………………………24 2.2.2.1 Music ……………………………………………………………..24 2.2.2.2 Movies ……………………………………………………………24 2.2.3 Ad Based Models …………………………………………………………25 2.2.4 Target Advertisement …………………………………………………25 2.2.5 Music Video Models ……………………………………………………26 2.3 Provide Users With What They Want ……………………………………….26 2.3.1 Experience ………………………………………………………………….26 2.3.2 Reasonable Prices ……………………………………………………….27 2 | P a g e 2.4 Provide Copyright Holders With What They Want: Better Exercise of Their Rights ……………………………………………………………………………….28 2.4.1 Greater Control …………………………………………………………..28 2.4.2 New License Strategies and Effective Competition Models………………………………………………………………………………….30 2.5 Smaller Labels Benefits …………………………………………………………….32 2.6 Artists Benefits …………………………………………………………………………33 3. CHAPTER III: CREATING AN ENVIRONMENT FOR THE NEW BUSINESS MODELS ……………………………………………………………………………………………….34 3.1 Guidance Required …………………………………………………………………..35 3.2 The Four Modalities …………………………………………………………………36 3.3 Law: Smarter Enforcement ………………………………………………………37 3.3.1 Changing the Vision on Enforcement-Reasons …………….37 3.3.2 Government’s Actions-Materializing the New Vision on Copyright Enforcement ………………………………………………………..37 3.3.2.1 Directions of Reconsidering ……………………………37 3.3.2.2 Providing Legal Offerings Online …………………….40 3.3.2.3 HADOPI ………………………………………………………….43 3.3.2.4 Incentives for Copyright Owners …………………….46 3.4 The Market: More Effective Licensing System ………………………….47 3.5 Social Norms: Educating Consumers ………………………………………..53 3.6 Architecture: Better Designed Platforms ………………………………….54 • CONCLUSION ………………………………………………………………………………………..56 • BIBLIOGRAPHY ……………………………………………………………………………………..59 3 | P a g e Introduction The fast development of the Internet and its unlimited capabilities to distribute information basically to every corner of the earth, brought one of the most complex issues modern law must solve - online copyright infringement. The levels of online copyright infringement are skyrocketing, because of the perpetual technological development of the Internet and this worries music companies, movie companies and other copyright owners. 1 The copyright holders fear, and not without a good reason, that they cannot prevent this process and furthermore they are concerned that in the near future it will become even more burdensome. For now the main direction copyright holders adhere to, is copyright enforcement, which gives them the opportunity for tracking and suing individual Internet users that infringe their rights. However, until now these efforts seem to yield the necessary results as the copyright piracy continues to form a serious problem. Copyright holders are struggling in this battle feeling unable to protect their own property. All the legal measures adopted in combating this infringement turn out to be just temporary or lack effect at all. Organizations such as Recording Music Associations of America (RIAA) and Motion Picture Association of America (MPAA) are specifically created to protect copyright owners’ rights. Protecting copyrights is the essential mission of both organizations. 2 RIAA has greatly contributed in shutting down the pioneer in peer-to-peer (P2P) networking Napster in 2001. Subsequently with joint efforts, RIAA and MPAA closed Grokster. However, the fight against decentralized servers continued and legal battles against KaZaa, Gnutella and MegaUpload followed. Creative industries succeeded to shut them down, but the piracy rates continued to increase dramatically. New and more sophisticated P2P networks emerged, as “Bit Torrent” giant is one of the most notorious. During the litigation campaign initiated by RIAA thousands of individual users were monitored and sued in United States’ courts. At the beginning, the lawsuits resulted in positive direct effects, like the decrease of the individuals who illegally download, as well as in indirect effects, like the raise of “ the public consciousness about the illegality of downloading ”. 3 It was thought that lawsuits will manage to cut off file impetus of the file swappers. However, it was not the case as this strategy did little to deter this illegal activity. 4 Thus, RIAA’s litigation 1 Steven Seidenberg, ‘Copyright in the age of You Tube’ ABA JOURNAL (posted on Feb 1, 2009), available at: http://www.abajournal.com/magazine/article/copyright_in_the_age_of_youtube/ (accessed 08.01.2012) 2 RIAA.com, About us, available at: http://www.riaa.com/aboutus.php?content_selector=about-who-we-are-riaa ; MPAA.org, Content Protection, available at: http://www.mpaa.org/contentprotection (accessed 08.01.2012) 3 Kristina Groennings, ‘An Analysis of the Recording Industry’s Litigation Strategy Against Direct Infringers’, Vanderbilt Journal of Entertainment Law & Practice’ (2005), p. 391, available at: http://www.jetlaw.org/?page_id=8558 (accessed 10.01.2012) 4 Ibid, p. 390 4 | P a g e campaign lasted 5 years and was abandoned in 2008 due to lack of results. 5 Copyright holders realized that fighting online piracy by filing lawsuits was not the solution. A litigation costs a large amount of funds, could last years and it does not guarantee that the court will find the defendant liable. The court decision in Lenz v. Universal Music Corporation showed that copyright owners in their efforts to limit the online copyright infringement file unconsidered lawsuits against the Internet users, which as a consequence leads to not just wasting money and time, but also to users’ dissatisfaction. 6 Thus, rather realizing the problems caused by piracy rates, consumers saw creative industries as their enemy. Such a frustration is further justified due to lawsuits such as Capitol Records vs. Thomas . This trial, supported by RIAA, did not bring any notable success in diminishing the online copyright infringements, as well as the other previous trials. It seems that the enormous damages claimed by the plaintiff are rather aimed at terrifying the illegal downloaders, as a deterring method, then an actual expected resolution of the case. 7 This thesis explores enforcement in terms of legal proceedings only. Other enforcement mechanisms such as site blocking and cutting funds to allegedly infringing websites were not taken into account. The reason is that such mechanisms could be unambiguous. For instance, site blocking could be applied in an oppressive manner and could affect negatively the freedom of Internet provides. 8 Its application could result into imposing censorship. 9 Site blocking is further part of the mechanisms proposed in the Stop Online Piracy (hereinafter SOPA). 10 Cutting funds to infringing websites is another tool SOPA envisages. 11 Considering the wide public debates against this bill as well as the mass protests, including the unprecedented Wikipedia blackout, analyzing such enforcement measures could shift the focus of the current thesis. As there are many debates and fears against imposing censorship on free speech in Internet, 12 the current thesis sticks to less controversial and debated enforcement mechanisms, avoiding any analyses far from its research idea. 5 Marcia Keyser, ‘Napster, Grokster and the RIAA lawsuits’, ConneXions (last edited on Dec 14, 2011), available at: http://cnx.org/content/m41469/latest/ (accessed 01.07.2012) 6 Seidenberg, note 1 7 William Henslee, ‘Money for Nothing and Music for Free? Why the RIAA Should Continue to Sue Illegal File – Sharers.’ John Marshal Review of Intellectual Property Law (2009 – 2010), p. 22, available at: http://www.jmripl.com.php5-10.dfw1-2.websitetestlink.com/issues/article/21 (accessed 10.15.2012) 8 Kate O’Flaherty, ‘Web site blocking is oppressive and won’t work’, The Inquirer (published on Dec 2, 2011), available at: http://www.theinquirer.net/inquirer/opinion/2129699/web-site-blocking-oppressive-wont (accessed 05.07.2012) 9 Ibid. 10 Jared Newman, ‘SOPA and PIPA: Just the Facts’, PC World (Jan 17, 2012), available at: http://www.pcworld.com/article/248298/sopa_and_pipa_just_the_facts.html (accessed 20.01.2012) 11 Ibid. 12 Matt Peckham, ‘SOPA Won’t stop online piracy, would censor everyone else’, Time Techland (published on Nov 17, 2011), available
Recommended publications
  • What Is Peer-To-Peer File Transfer? Bandwidth It Can Use
    sharing, with no cap on the amount of commonly used to trade copyrighted music What is Peer-to-Peer file transfer? bandwidth it can use. Thus, a single NSF PC and software. connected to NSF’s LAN with a standard The Recording Industry Association of A peer-to-peer, or “P2P,” file transfer 100Mbps network card could, with KaZaA’s America tracks users of this software and has service allows the user to share computer files default settings, conceivably saturate NSF’s begun initiating lawsuits against individuals through the Internet. Examples of P2P T3 (45Mbps) internet connection. who use P2P systems to steal copyrighted services include KaZaA, Grokster, Gnutella, The KaZaA software assesses the quality of material or to provide copyrighted software to Morpheus, and BearShare. the PC’s internet connection and designates others to download freely. These services are set up to allow users to computers with high-speed connections as search for and download files to their “Supernodes,” meaning that they provide a How does use of these services computers, and to enable users to make files hub between various users, a source of available for others to download from their information about files available on other create security issues at NSF? computers. users’ PCs. This uses much more of the When configuring these services, it is computer’s resources, including bandwidth possible to designate as “shared” not only the and processing capability. How do these services function? one folder KaZaA sets up by default, but also The free version of KaZaA is supported by the entire contents of the user’s computer as Peer to peer file transfer services are highly advertising, which appears on the user well as any NSF network drives to which the decentralized, creating a network of linked interface of the program and also causes pop- user has access, to be searchable and users.
    [Show full text]
  • This Opinion Is Not a Precedent of the TTAB in Re Scram Software Pty Ltd
    This Opinion is not a Precedent of the TTAB Mailed: November 23, 2016 UNITED STATES PATENT AND TRADEMARK OFFICE _____ Trademark Trial and Appeal Board _____ In re Scram Software Pty Ltd. _____ Serial No. 86658580 _____ Joshua M. Gerben, Gerben Law Firm PLLC, for Scram Software Pty Ltd. Brittany A. Estell, Trademark Examining Attorney, Law Office 122, John Lincoski, Managing Attorney. _____ Before Zervas, Hightower, and Larkin, Administrative Trademark Judges. Opinion by Larkin, Administrative Trademark Judge: Scram Software Pty Ltd. (“Applicant”) seeks registration on the Principal Register of the mark CLOUD SHERIFF in standard characters (“CLOUD” disclaimed) for goods and services identified as: “Computer software for encrypting, decrypting, synchronizing, replicating, processing, transmitting, exchanging, storing, backing up, archiving, organizing, sharing, modifying, updating, digitally signing, watermarking, removing metadata from, manipulating and accessing files and directories, data, documents, information, messages, emails, text, photos, images, graphics, music, audio, video, and multimedia content via Serial No. 86658580 global and local computer networks and other communication networks; computer software for encrypting, decrypting, integrity checking and detecting unauthorized activity of computer files, directories, documents, folders, data and information; computer software for use in a cloud or networked computing environment providing data encryption and privacy relating to storing, organizing, transmitting, processing,
    [Show full text]
  • The Effects of Digital Music Distribution" (2012)
    Southern Illinois University Carbondale OpenSIUC Research Papers Graduate School Spring 4-5-2012 The ffecE ts of Digital Music Distribution Rama A. Dechsakda [email protected] Follow this and additional works at: http://opensiuc.lib.siu.edu/gs_rp The er search paper was a study of how digital music distribution has affected the music industry by researching different views and aspects. I believe this topic was vital to research because it give us insight on were the music industry is headed in the future. Two main research questions proposed were; “How is digital music distribution affecting the music industry?” and “In what way does the piracy industry affect the digital music industry?” The methodology used for this research was performing case studies, researching prospective and retrospective data, and analyzing sales figures and graphs. Case studies were performed on one independent artist and two major artists whom changed the digital music industry in different ways. Another pair of case studies were performed on an independent label and a major label on how changes of the digital music industry effected their business model and how piracy effected those new business models as well. I analyzed sales figures and graphs of digital music sales and physical sales to show the differences in the formats. I researched prospective data on how consumers adjusted to the digital music advancements and how piracy industry has affected them. Last I concluded all the data found during this research to show that digital music distribution is growing and could possibly be the dominant format for obtaining music, and the battle with piracy will be an ongoing process that will be hard to end anytime soon.
    [Show full text]
  • The Business of Anti-Piracy: New Zones of Enterprise in the Copyright Wars
    International Journal of Communication 6 (2012), 606–625 1932–8036/20120606 The Business of Anti-Piracy: New Zones of Enterprise in the Copyright Wars RAMON LOBATO1 JULIAN THOMAS Swinburne University of Technology From the perspective of copyright holders, piracy represents lost revenue. In this article we argue that piracy nevertheless has important generative features. We consider the range of commercial opportunities that piracy opens up outside of the media industries, identifying four overlapping fields of legal anti-piracy enterprise: technological prevention, revenue capture, knowledge generation, and policing/enforcement. Our analysis notes the commercialization of these activities and their close relationship with the informal media economy. A case study of recent “speculative invoicing” lawsuits demonstrates the extent of this commercialization and its detachment from the mainstream content industries. A key strategy of content industry groups during their long war on piracy has been to associate copyright infringement with lost revenue for artists, producers, and media businesses. Consumers are now familiar with the claim that piracy directly threatens the livelihoods of cultural workers and generates large profits for criminal organizations, bootleggers, and online intermediaries. Hence, the model of a zero-sum economic redistribution between two camps—producers and pirates—with the latter cannibalizing the revenues of the former. This is an ever-present theme in anti-piracy discourse, exemplified by the Motion Picture Association of America’s claim that “copyright theft means declining incomes, lost jobs and reduced health and retirement benefits” (MPAA, 2010, p. 2) and by the Australian Federation Against Copyright Theft’s warning that “film and TV piracy rips more than $230 million out of the Australian economy each year” (AFACT, 2008, p.
    [Show full text]
  • Piratez Are Just Disgruntled Consumers Reach Global Theaters That They Overlap the Domestic USA Blu-Ray Release
    Moviegoers - or perhaps more accurately, lovers of cinema - are frustrated. Their frustrations begin with the discrepancies in film release strategies and timing. For example, audiences that saw Quentin Tarantino’s1 2 Django Unchained in the United States enjoyed its opening on Christmas day 2012; however, in Europe and other markets, viewers could not pay to see the movie until after the 17th of January 2013. Three weeks may not seem like a lot, but some movies can take months to reach an international audience. Some take so long to Piratez Are Just Disgruntled Consumers reach global theaters that they overlap the domestic USA Blu-Ray release. This delay can seem like an eternity for ultiscreen is at the top of the entertainment a desperate fan. This frustrated enthusiasm, combined industry’s agenda for delivering digital video. This with a lack of timely availability, leads to the feeling of M is discussed in the context of four main screens: being treated as a second class citizen - and may lead TVs, PCs, tablets and mobile phones. The premise being the over-anxious fan to engage in piracy. that multiscreen enables portability, usability and flexibility for consumers. But, there is a fifth screen which There has been some evolution in this practice, with is often overlooked – the cornerstone of the certain films being released simultaneously to a domestic and global audience. For example, Avatar3 was released entertainment industry - cinema. This digital video th th ecosystem is not complete without including cinema, and in theaters on the 10 and 17 of December in most it certainly should be part of the multiscreen discussion.
    [Show full text]
  • The Robustness of Content-Based Search in Hierarchical Peer to Peer Networks
    The Robustness of Content-Based Search in Hierarchical Peer to Peer Networks ∗ M. Elena Renda Jamie Callan I.S.T.I. – C.N.R. Language Technologies Institute and School of Computer Science Scuola Superiore Sant’Anna Carnegie Mellon University I-56100 Pisa, Italy Pittsburgh, PA 15213, US [email protected] [email protected] ABSTRACT Keywords Hierarchical peer to peer networks with multiple directory services Peer to Peer, Hierarchical, Search, Retrieval, Content-based, Ro- are an important architecture for large-scale file sharing due to their bustness effectiveness and efficiency. Recent research argues that they are also an effective method of providing large-scale content-based federated search of text-based digital libraries. In both cases the 1. INTRODUCTION directory services are critical resources that are subject to attack Peer to peer (P2P) networks have emerged in recent years as a or failure, but the latter architecture may be particularly vulnera- popular method of sharing information, primarily popular music, ble because content is less likely to be replicated throughout the movies, and software, among large numbers of networked com- network. puters. Computers (‘nodes’) in P2P networks can be information This paper studies the robustness, effectiveness and efficiency providers and information consumers, and may provide network of content-based federated search in hierarchical peer to peer net- services such as message routing and regional directory services. works when directory services fail unexpectedly. Several recovery A single node may play several roles at once, for example, posting methods are studied using simulations with varying failure rates. queries, sharing files, and relaying messages.
    [Show full text]
  • Online Piracy
    Online Piracy Christian Helmers 16 April 2015 1 / 31 Online piracy • Digital technologies: • Create, transform, copy data • Digital technologies: transmission, display and analysis of data through copying • Enabled large-scale online piracy • Piracy: illegal copying of copyrighted material online • Music • Movies • Ebooks/audiobooks • Software • Note: [Piracy] is not an offense of timeless character, universally definable by a priori criteria. It is far richer and trickier than that. (Johns, 2009:4) • Beware: often very ideological debate 2 / 31 P2P: Napster 3 / 31 P2P: The Pirate Bay 4 / 31 P2P: LimeWire Pirate Edition (\Not an equivalent, not a replacement, but the exact same thing") 5 / 31 P2P: More BitTorrent sites 6 / 31 Direct downloads: Megaupload 7 / 31 Direct downloads: many anonymous options 8 / 31 Cracking devices: Amazon's MOBI 9 / 31 Online piracy • Digital technologies: • P2P music sharing software: Napster, KaZaa, Morpheus, Grokster, BitTorrent sites, etc. • Direct downloads, file repositories • Cracking software • Enabled large-scale online piracy • Importance of digital platforms for sharing • File sharing market organized in private groups with tightly controlled access (non-profit) • Filehosters often for-profit 10 / 31 The economics of piracy (Klein et al., 2002) • Negative effect on copyright owner: • Pirated copies substitutes for legal downloads (but lower quality files may limit substitution) • Inability to price-discriminate • Inability to control prices • Positive effect on copyright owner: • Sampling (learning) • Space
    [Show full text]
  • Title: P2P Networks for Content Sharing
    Title: P2P Networks for Content Sharing Authors: Choon Hoong Ding, Sarana Nutanong, and Rajkumar Buyya Grid Computing and Distributed Systems Laboratory, Department of Computer Science and Software Engineering, The University of Melbourne, Australia (chd, sarana, raj)@cs.mu.oz.au ABSTRACT Peer-to-peer (P2P) technologies have been widely used for content sharing, popularly called “file-swapping” networks. This chapter gives a broad overview of content sharing P2P technologies. It starts with the fundamental concept of P2P computing followed by the analysis of network topologies used in peer-to-peer systems. Next, three milestone peer-to-peer technologies: Napster, Gnutella, and Fasttrack are explored in details, and they are finally concluded with the comparison table in the last section. 1. INTRODUCTION Peer-to-peer (P2P) content sharing has been an astonishingly successful P2P application on the Internet. P2P has gained tremendous public attention from Napster, the system supporting music sharing on the Web. It is a new emerging, interesting research technology and a promising product base. Intel P2P working group gave the definition of P2P as "The sharing of computer resources and services by direct exchange between systems". This thus gives P2P systems two main key characteristics: • Scalability: there is no algorithmic, or technical limitation of the size of the system, e.g. the complexity of the system should be somewhat constant regardless of number of nodes in the system. • Reliability: The malfunction on any given node will not effect the whole system (or maybe even any other nodes). File sharing network like Gnutella is a good example of scalability and reliability.
    [Show full text]
  • Scaling Content Delivery Outline P2P System
    3/17/2019 Problem: Scaling Content Delivery • Millions of clients server and network meltdown 15-441/641: Content Delivery Peer-to-Peer 15-441 Spring 2019 Profs Peter Steenkiste & Justine Sherry Fall 2019 https://computer-networks.github.io/sp19/ Outline P2P System • Peer-to-peer • Overlays: naming, addressing, and routing • CDNs • Leverage the resources of client machines (peers) • Computation, storage, bandwidth 3 4 1 3/17/2019 P2P Definition Why p2p? • Harness lots of spare capacity Distributed systems consisting of interconnected • 1 Big Fast Server: $10k/month++ versus 1000s .. 1000000s clients: $ ?? nodes able to self-organize into network topologies with the purpose of sharing resources such as • Capacity grows with the number of users! content, CPU cycles, storage and bandwidth, • Build very large-scale, self-managing systems capable of adapting to failures and accommodating • Same techniques useful for companies, transient populations of nodes while maintaining • E.g. Akamai’s 14,000+ nodes, Google’s 100,000+ nodes acceptable connectivity and performance, without requiring the intermediation or support of a global • But: servers vs. arbitrary nodes, hard vs. soft state (backups vs caches), …. centralized server or authority. • Also: security, fairness, freeloading, .. • No single point of failure – A Survey of Peer-To-Peer Content Distribution Technologies, • Some nodes go down – others take over Androutsellis-Theotokis and Spinellis • … government shuts down nodes – peers in other countries are available 6 P2P Construction Key Idea: Network Overlay P2P Overlay Network • A network overlay is a network that is layered on top of the Internet • Simplified picture: overlays use IP as their datalink layer • Overlays need the equivalent of all the functions IP networks need: Clients • Naming and addressing Servers • Routing SPRINT • Bootstrapping Verizon • Security, error recovery, etc.
    [Show full text]
  • Universidade Federal Do Rio De Janeiro Escola De Comunicação Centro De Filosofia E Ciências Humanas Jornalismo
    UNIVERSIDADE FEDERAL DO RIO DE JANEIRO ESCOLA DE COMUNICAÇÃO CENTRO DE FILOSOFIA E CIÊNCIAS HUMANAS JORNALISMO CULTURA DO HYPE: COMO MOVIMENTOS MUSICAIS EFÊMEROS DA DÉCADA DE 2000 CRIARAM NOVOS ÍCONES NA CULTURA POP TÚLIO BRASIL VILELLA RIO DE JANEIRO 2014 III UNIVERSIDADE FEDERAL DO RIO DE JANEIRO ESCOLA DE COMUNICAÇÃO CENTRO DE FILOSOFIA E CIÊNCIAS HUMANAS JORNALISMO CULTURA DO HYPE: COMO MOVIMENTOS MUSICAIS EFÊMEROS DA DÉCADA DE 2000 CRIARAM NOVOS ÍCONES NA CULTURA POP Monografia submetida à Banca de Graduação como requisito para obtenção do diploma de Comunicação Social/ Jornalismo. TÚLIO BRASIL VILELLA Orientadora: Profa. Dra. Rose Marie Santini RIO DE JANEIRO IV 2014 UNIVERSIDADE FEDERAL DO RIO DE JANEIRO ESCOLA DE COMUNICAÇÃO TERMO DE APROVAÇÃO A Comissão Examinadora, abaixo assinada, avalia a Monografia Cultura do Hype: Como Movimentos Musicais Efêmeros da Década De 2000 Criaram Novos Ícones na Cultura Pop, elaborada por Túlio Brasil Vilella. Monografia examinada: Rio de Janeiro, no dia ........./........./.......... Comissão Examinadora: Orientadora: Profa. Dra. Rose Marie Santini Doutora em Ciência da Informação – UFF/IBICT Departamento de Comunicação - UFRJ Prof. Marcio Tavares d`Amaral Doutor em Letras (Ciências da Literatura) pela – UFRJ Departamento de Comunicação -. UFRJ Prof. Paulo Guilherme Domenech Oneto Doutor em Filosofia - Université de Nice Departamento de Comunicação – UFRJ RIO DE JANEIRO V 2014 FICHA CATALOGRÁFICA BRASIL, Túlio. Cultura do Hype: Como movimentos musicais efêmeros da década de 2000 criaram novos ícones na cultura pop. Rio de Janeiro, 2014. Monografia (Graduação em Comunicação Social/ Jornalismo) – Universidade Federal do Rio de Janeiro – UFRJ, Escola de Comunicação – ECO. Orientadora: Rose Marie Santini VI As pessoas vão se esquecendo.
    [Show full text]
  • Three Case Studies on Mp3.Com, Napster and Kazaa
    University of Wollongong Research Online Faculty of Engineering & Information Sciences - Honours Theses University of Wollongong Thesis Collections 25-10-2004 Digital distribution music services and the demise of the traditional music industry: three case studies on mp3.com, Napster and Kazaa K. Alves University of Wollongong Follow this and additional works at: https://ro.uow.edu.au/thesesinfo University of Wollongong Copyright Warning You may print or download ONE copy of this document for the purpose of your own research or study. The University does not authorise you to copy, communicate or otherwise make available electronically to any other person any copyright material contained on this site. You are reminded of the following: This work is copyright. Apart from any use permitted under the Copyright Act 1968, no part of this work may be reproduced by any process, nor may any other exclusive right be exercised, without the permission of the author. Copyright owners are entitled to take legal action against persons who infringe their copyright. A reproduction of material that is protected by copyright may be a copyright infringement. A court may impose penalties and award damages in relation to offences and infringements relating to copyright material. Higher penalties may apply, and higher damages may be awarded, for offences and infringements involving the conversion of material into digital or electronic form. Unless otherwise indicated, the views expressed in this thesis are those of the author and do not necessarily represent the views of the University of Wollongong. Recommended Citation Alves, K., "Digital distribution music services and the demise of the traditional music industry: three case studies on mp3.com, Napster and Kazaa" (2004).
    [Show full text]
  • A Safe and Efficient Storage Scheme Based on Blockchain and IPFS for Agricultural Products Tracking
    Journal of Computers Vol. 29 No. 6, 2018, pp. 158-167 doi:10.3966/199115992018122906015 A Safe and Efficient Storage Scheme Based on BlockChain and IPFS for Agricultural Products Tracking JinTao Hao*, Yan Sun, Hong Luo Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing 100876, China {haojintao, Sunyan, luoh}@bupt.edu.cn Received 9 January 2018; Revised 22 January 2018; Accepted 22 January 2018 Abstract. The adoption of agricultural products traceability management based on Internet of Things (IoT) technology provides excellent benefits for the current food safety issues. The provenance data can demonstrate agricultural products movement process from the countryside to the dining table. However, the massive provenance data incurs an inefficient query. Meanwhile, the provenance data can be tampered deliberately which affect food safety. There are seldom reported approaches that can solve the above problem effectively. In this paper, we propose a data storage model based on Inter-Planetary File System (IPFS) and blockchain. First, IPFS is used to store video, images, and real-time monitoring data reported from the sensors. Then, in order to avoid a malicious user in case of data faking attack, we exploit the blockchain to store the IPFS hash address of the provenance data. Based on that, we design an authentication mechanism based on blockchain. It can verify the data and ensures effective data security. The experimental results show that the proposed approach can outperforms the existing methods. Keywords: agricultural products tracking, blockchain, IPFS, storage scheme 1 Introduction For agricultural products movement process from the countryside to the dining table, it needs to go through the cultivation, processing, transportation and sales.
    [Show full text]