Student Digital Piracy in the Florida State University System:An Exploratory Study on Its Infrastructural Effects

Total Page:16

File Type:pdf, Size:1020Kb

Student Digital Piracy in the Florida State University System:An Exploratory Study on Its Infrastructural Effects University of Central Florida STARS Electronic Theses and Dissertations, 2004-2019 2010 Student Digital Piracy In The Florida State University System:an Exploratory Study On Its Infrastructural Effects Jeffrey Reiss University of Central Florida Part of the Educational Leadership Commons Find similar works at: https://stars.library.ucf.edu/etd University of Central Florida Libraries http://library.ucf.edu This Doctoral Dissertation (Open Access) is brought to you for free and open access by STARS. It has been accepted for inclusion in Electronic Theses and Dissertations, 2004-2019 by an authorized administrator of STARS. For more information, please contact [email protected]. STARS Citation Reiss, Jeffrey, "Student Digital Piracy In The Florida State University System:an Exploratory Study On Its Infrastructural Effects" (2010). Electronic Theses and Dissertations, 2004-2019. 4196. https://stars.library.ucf.edu/etd/4196 STUDENT DIGITAL PIRACY IN THE FLORIDA STATE UNIVERSITY SYSTEM: AN EXPLORATORY STUDY ON ITS INFRASTRUCTURAL EFFECTS by JEFFREY REISS B.S. University of Central Florida, 2003 M.S. University of Central Florida, 2005 A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Education in the Department of Educational Research, Technology, and Leadership in the College of Education at the University of Central Florida Orlando, Florida Spring Term 2010 Major Professor: Rosa Cintrón © 2010 Jeffrey Reiss ii ABSTRACT Digital piracy is a problem that may never disappear from society. Through readily available resources such as those found in a university, students will always have access to illegal goods. While piracy is a global phenomenon, an institution’s resources combined with the typical college student’s lack of funds makes it more lucrative. Students use a number of methods to justify their actions ranging from previewing media to bringing justice to a corrupt company. While trying to understand the mindset of pirates is one route to deal with piracy, corporations attempted to alleviate the situation using added software encoding. These messages are not always effective, and in some cases caused further damage to consumer morale. Furthermore, students such as Joel Tenenbaum, who continued to pirate music despite warnings from his parents and the recording industry, exemplify the type of person that is unfazed by legal threats, leading to a question of ethics. Students may not feel that downloading is stealing despite numerous warnings from the Digital Millennium Copyright Act and other major media organizations. The predominant solution used by universities involves monitoring the students’ network connection to detect Peer-to-Peer (P2P) connections or other connections that involve the transferring of copyrighted goods. Unfortunately, the current tools contain flaws that a crafty student may easily circumvent, undermining any attempts a university’s IT department may use to deter piracy. iii This study explored the nature of piracy prevention tools used by IT departments in the Florida State University System in order to determine their relative effectiveness. The study also looked into the opinions of the Information Security Officer in terms of alternative piracy prevention techniques that do not involve legal action and monitoring. It was found that most institutions do not use a formal piece of software that monitors for infringing data. They also stated that while their current techniques can do its required task, it was not perfected to a point where it could run autonomously. Furthermore, institutions agreed that students lack proper ethics and concern over the matter of copyright, but were not fully convinced that other preventions methods would be effective. The study ultimately considered monitoring techniques a short-term solution and that more research should be put into finding long-term solutions. It also implied that IT departments should be better funded in order to keep up with the technological gap. iv ACKNOWLEDGMENTS First of all, I would like to thank my dissertation committee chair and advisor, Dr. Rosa Cintrón. Your passion for this program ensured that I reached my fullest potential in writing this dissertation. I greatly appreciate all of your dedication and guidance through the process. Thanks also go out to my committee members Dr. Tammy Boyd, Dr. Margaret Miller, and Dr. George Pawlas. Your suggestions and comments during the defense process helped immensely. I also value your collective interest in a topic that was a bit outside of the “norm” for this program. I would also like to thank my friends and extended family for their consistent moral support and understanding of the level of commitment required for this process. Your thoughts and well wishes were always much appreciated. To my sister, Dr. Elayne Reiss, commonly known as my “younger, female clone,” I thank you for putting up with me over all these years of academia. The program would not have been nearly as interesting or fun without you. I am proud that we have now had the unique opportunity as brother and sister to graduate from the same program with the same degrees at the same time on three separate occasions. Finally, I would like to thank my parents for their support, encouragement, and patience. v TABLE OF CONTENTS LIST OF FIGURES ............................................................................................................. x LIST OF TABLES .............................................................................................................. xi CHAPTER 1: PROBLEM AND RESEARCH DESIGN ................................................... 1 Introduction ........................................................................................................... 1 Problem Statement ................................................................................................ 3 Purpose of Study .................................................................................................... 5 Significance of the Study ....................................................................................... 6 Research Questions ................................................................................................ 8 Definition of Terms ............................................................................................... 8 Conceptual Framework ....................................................................................... 11 Delimitations of the Study .................................................................................. 13 Organization of the Study ................................................................................... 14 CHAPTER 2: LITERATURE REVIEW .......................................................................... 15 Introduction ......................................................................................................... 15 The History of Copyrights and Copyright Infringement .................................. 15 Foreign Copyrights and the United States.............................................. 17 The Fair Use Clause ................................................................................. 19 Digital Millennium Copyright Act (DMCA) .......................................... 21 Software Piracy .................................................................................................... 21 vi Physical Media versus Digital Media ...................................................... 24 Copyright Infringement and File Sharing .......................................................... 27 Profiling Student Software Pirates ...................................................................... 33 Demographic Profiling ............................................................................ 34 Identifying Ethics, and Motives .............................................................. 38 Matching to Psychological Models ......................................................... 42 Criminology and Self-Control ................................................................. 49 Qualitative Studies ................................................................................... 52 Digital Rights Management: A Problematic Solution ...................................... 55 The Influence of the Recording Industry ........................................................... 59 Finding Profit Despite Piracy .................................................................. 64 Policies of the Higher Education Act ................................................................. 72 Creative Commons ................................................................................... 75 Software Deterrents to Piracy ............................................................................. 77 Software Deterrents as Ethical Beings .................................................... 81 Classical Ethics ..................................................................................................... 83 Ethical Relativism .................................................................................... 83 Utilitarianism ........................................................................................... 85 Deontological Theories ............................................................................ 87 Virtue Ethics ............................................................................................ 92 vii Ethics and Computers .........................................................................................
Recommended publications
  • Illegal P2P File Sharing on College Campuses – What's the Solution? Antionette D
    College of William & Mary Law School William & Mary Law School Scholarship Repository Student Award Winning Papers Student Publications and Awards 2008 Illegal P2P File Sharing on College Campuses – What's the Solution? Antionette D. Bishop Repository Citation Bishop, Antionette D., "Illegal P2P File Sharing on College Campuses – What's the Solution?" (2008). Student Award Winning Papers. 4. https://scholarship.law.wm.edu/awardwinning/4 Copyright c 2008 by the authors. This article is brought to you by the William & Mary Law School Scholarship Repository. https://scholarship.law.wm.edu/awardwinning Illegal P2P File Sharing on College Campuses—What’s the Solution? Antionette D. Bishop* TABLE OF CONTENTS I. THE MUSIC INDUSTRY’S RESPONSE TO ILLEGAL P2P FILE SHARING............................................................................. 517 II. COLLEGE–STUDENT RELATIONSHIP .......................................... 518 III. PUBLIC POLICY CONCERNS ........................................................ 519 A. Efficient Use of College Funds ............................................ 519 B. Academic Freedom............................................................... 520 IV. ALTERNATIVE PROPOSED SOLUTION: COLLECTIVE LICENSING .................................................................................. 521 V. CONCLUSION............................................................................... 522 Since the introduction of Napster in 1999, illegal peer-to-peer (P2P) file sharing1 has been a continuously growing problem for
    [Show full text]
  • Stream-Ripping: Its Role in the UK Music Piracy Landscape Three Years On
    Stream-ripping: Its role in the UK music piracy landscape three years on September 2020 PRS for Music Foreword Stream-ripping: its role in the UK music piracy landscape three years on builds on research we published with the Intellectual Property Office three years ago. The initial research, Stream-ripping: How it works and its role in the UK music piracy landscape, came at a time when little work had been done to understand the size of problem posed by stream-ripping. The previous report allowed us to map the landscape of online music piracy and to gain insight into the functioning and the business model of stream-ripping services. We found evidence to support our assumption that stream-ripping was on course to become the dominant mode of online infringement. This second wave of research shows that our expectation is now the reality: stream-ripping services account for more than 80% of the top 50 music specific piracy sites. We can see that the services are becoming more sophisticated, offering better quality downloads, evolving their revenue streams, and becoming more adept at operating beneath the radar, with many using the popular content delivery network Cloudflare to obfuscate the location of their servers. But what we can also see is that concerted efforts by the industry do work: a reduction of more than 50% of BitTorrent sites can be attributed to increased geo-blocking and enforcement efforts over the past three years. Since this research was conducted, the world has changed beyond what anyone could have imagined. Amidst the massive societal changes, the almost global lockdown caused by the COVID-19 pandemic has also accelerated the acculturation of digital services.
    [Show full text]
  • You Are Not Welcome Among Us: Pirates and the State
    International Journal of Communication 9(2015), 890–908 1932–8036/20150005 You Are Not Welcome Among Us: Pirates and the State JESSICA L. BEYER University of Washington, USA FENWICK MCKELVEY1 Concordia University, Canada In a historical review focused on digital piracy, we explore the relationship between hacker politics and the state. We distinguish between two core aspects of piracy—the challenge to property rights and the challenge to state power—and argue that digital piracy should be considered more broadly as a challenge to the authority of the state. We trace generations of peer-to-peer networking, showing that digital piracy is a key component in the development of a political platform that advocates for a set of ideals grounded in collaborative culture, nonhierarchical organization, and a reliance on the network. We assert that this politics expresses itself in a philosophy that was formed together with the development of the state-evading forms of communication that perpetuate unmanageable networks. Keywords: pirates, information politics, intellectual property, state networks Introduction Digital piracy is most frequently framed as a challenge to property rights or as theft. This framing is not incorrect, but it overemphasizes intellectual property regimes and, in doing so, underemphasizes the broader political challenge posed by digital pirates. In fact, digital pirates and broader “hacker culture” are part of a political challenge to the state, as well as a challenge to property rights regimes. This challenge is articulated in terms of contributory culture, in contrast to the commodification and enclosures of capitalist culture; as nonhierarchical, in contrast to the strict hierarchies of the modern state; and as faith in the potential of a seemingly uncontrollable communication technology that makes all of this possible, in contrast to a fear of the potential chaos that unsurveilled spaces can bring.
    [Show full text]
  • VALLATH NANDAKUMAR 3105 Eaneswood Dr, Austin, TX 78746 (512)-923-9658 (Cell); [email protected]
    VALLATH NANDAKUMAR 3105 Eaneswood Dr, Austin, TX 78746 (512)-923-9658 (Cell); [email protected] EDUCATION • 1990 University of California, Berkeley, CA Ph.D. in Electrical Engineering. • 1985 University of California Berkeley, CA M.S. in Electrical Engineering. • 1982 Indian Institute of Technology, Madras, India BTech in Electrical Engineering (Electronics). EXPERIENCE • Teaching in the ECE and CS Department at the University of Texas, Austin (5 years) o C, C++, Java programming, Algorithm Design • Taught course modules at the graduate level in cell phone technology, VLSI testing, VLSI design, Internet hardware, technical writing, physics. (5 years) • Research and development activities in superconducting electronics, high-end optical communication, integrated circuit design methodologies, Computer-Aided Design tools, and cyber security software. • Published 6+ papers in IEEE journals on superconducting electronics. • Six patents granted in VLSI and superconductors. • Managed teams of 30+ people spanning multiple countries. • Have conducted computer programming contests with 400+ student participants from all over Asia coming together. EMPLOYMENT HISTORY AND EXPERIENCE Aug. 2013-Present Full-time Lecturer in the Departments of Computer Science, and Electrical and Computer Engineering, University of Texas, Austin • Courses taught: Algorithms, basic and advanced programming, Ethics of Computer Science, Writing for CS majors • Texas University Interscholastic League Director for Computer Science, 2013-2014. Mar 2012-Jun 2013 Substitute Teacher, Eanes Independent School District, Austin, TX • Substitute teacher for grades K-12 and all subjects. Mar 2012-Jun 2013 Tutor, Austin Community College, Austin, TX • Taught Algebra and Calculus, Business Economics, Statistics, Physics, English, German. Oct 2006-Jun 2013 Professor/Adjunct Professor, Amrita University, Amritapuri Campus, India (http://www.amrita.edu) • Director of Center of Excellence in Cyber Security • Taught courses in VLSI architecture, design and testing, and on Wireless systems.
    [Show full text]
  • Piracy Landscape Study
    Piracy Landscape Study: Analysis of Existing and Emerging Research Relevant to Intellectual Property Rights (IPR) Enforcement of Commercial-Scale Piracy Prepared for the U.S. Patent and Trademark Office Solicitation Number: 1333BJ19Q00142004 Brett Danaher Michael D. Smith Rahul Telang Chapman University Carnegie Mellon University Carnegie Mellon University This Version: March 20, 2020 Table of Contents Executive Summary ...................................................................................................................... 3 1. The Piracy Ecosystem........................................................................................................... 4 1.1 Piracy of Physical Goods................................................................................................ 6 1.1.1 Manufacturing......................................................................................................... 7 1.1.2 Discovery ................................................................................................................ 7 1.1.3 Distribution ............................................................................................................. 8 1.1.4 Communication, Payment Processing and Fulfillment ......................................... 11 1.2 Piracy of Digital Goods ................................................................................................ 11 1.2.1 Sources.................................................................................................................. 12 1.2.2
    [Show full text]
  • KPMG FICCI 2013, 2014 and 2015 – TV 16
    #shootingforthestars FICCI-KPMG Indian Media and Entertainment Industry Report 2015 kpmg.com/in ficci-frames.com We would like to thank all those who have contributed and shared their valuable domain insights in helping us put this report together. Images Courtesy: 9X Media Pvt.Ltd. Phoebus Media Accel Animation Studios Prime Focus Ltd. Adlabs Imagica Redchillies VFX Anibrain Reliance Mediaworks Ltd. Baweja Movies Shemaroo Bhasinsoft Shobiz Experential Communications Pvt.Ltd. Disney India Showcraft Productions DQ Limited Star India Pvt. Ltd. Eros International Plc. Teamwork-Arts Fox Star Studios Technicolour India Graphiti Multimedia Pvt.Ltd. Turner International India Ltd. Greengold Animation Pvt.Ltd UTV Motion Pictures KidZania Viacom 18 Media Pvt.Ltd. Madmax Wonderla Holidays Maya Digital Studios Yash Raj Films Multiscreen Media Pvt.Ltd. Zee Entertainmnet Enterprises Ltd. National Film Development Corporation of India with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. entity. (“KPMG International”), a Swiss with KPMG International Cooperative © 2015 KPMG, an Indian Registered Partnership and a member firm of the KPMG network of independent member firms affiliated and a member firm of the KPMG network of independent member firms Partnership KPMG, an Indian Registered © 2015 #shootingforthestars FICCI-KPMG Indian Media and Entertainment Industry Report 2015 with KPMG International Cooperative (“KPMG International”), a Swiss entity. All rights reserved. entity. (“KPMG International”), a Swiss with KPMG International Cooperative © 2015 KPMG, an Indian Registered Partnership and a member firm of the KPMG network of independent member firms affiliated and a member firm of the KPMG network of independent member firms Partnership KPMG, an Indian Registered © 2015 #shootingforthestars: FICCI-KPMG Indian Media and Entertainment Industry Report 2015 Foreword Making India the global entertainment superpower 2014 has been a turning point for the media and entertainment industry in India in many ways.
    [Show full text]
  • Steal These Policies: Strategies for Reducing Digital Piracy
    THE INFORMAtiON TECHNOLOGY & INNOVAtiON FOUNDAtiON Steal These Policies: Strategies for Reducing Digital Piracy BY DANIEL CASTRO, RICHARD BENNETT AND SCOTT ANDES | DECEMBER 2009 We need to open a broad Executive Summary dialogue that engages all stakeholders, including he rise of broadband Internet access and cheap storage, along government, content with the growth of digital content, has enabled digital pi- owners, website racy to flourish around the world. Piracy enables the unau- operators, technolog y T thorized distribution of music, movies, television programs, software, developers, and ISPs video games, books, photos, and periodicals quickly and easily, to the and other intermediaries, detriment of creative artists and legitimate rights holders. These prac- on how to improve the global response to piracy. tices threaten not only the robust production of digital content in the future, but U.S. jobs in the present. Unfortunately, many advocates, believing that information should be free, would have government not only turn a blind eye to digital piracy, but actively tie the hands of companies who seek to limit digital piracy. This report makes the case that digital piracy is a serious problem with significant ramifica- tions for the U.S. economy, that a number of approaches, including technical solutions such as content identification, are needed to reduce piracy, and that governments should support legitimate industry ef- forts to reduce digital piracy, including those that focus on the revenue streams of those engaging in piracy. There is no “silver bullet” that will solve controls such as locks, closed-circuit the piracy problem—no single technical TV, and anti-theft packaging as well or legislative proposal will completely as a government-funded system of law solve such a complex issue—but there enforcement, digital piracy requires a are many “lead bullets” that can help coordinated approach.
    [Show full text]
  • Music Piracy and the Audio Home Recording Act
    MUSIC PIRACY AND THE AUDIO HOME RECORDING ACT In spite of the guidance provided by the Audio Home Recording Act1 (AHRA) of 1992, music companies are once again at odds with consumer electronics manufacturers. This time around, the dispute is over certain information technology products that enable consumers to copy digital music and transfer them to different formats, or exchange them over the Internet. This article will discuss anti-piracy measures being taken by digital content owners and the United States legislature to combat piracy and evaluate them in light of the AHRA. The Promulgation of Music Piracy Over the last two years, the music industry has fed the media stark statistics about “piracy,” the act of copying digital music content to a blank CD, or uploading or downloading it on the Internet. According to various newspaper articles, an estimated 3.6 billion songs are illegally downloaded each month in the United States.2 In 1999, the music industry estimated that one in four compact discs of new music was actually an unauthorized copy.3 By the end of 2001, it was estimated that as many CDs were burned and copied as were bought.4 In Europe, blank CDs are outselling recorded CDs (although these blank CDs might have also been purchased for legitimate reasons, such as to back-up personal computer files).5 And since 1999, ownership of CD burners has nearly tripled.6 This trend of consumers sharing their music rather than purchasing it may be attributable to many factors, including the slow economy. However, the music industry seems to believe that the most likely culprit in this trend is the rise of digital music,7 i.e., free online file sharing, and the growing popularity of CD burners.8 In an act of self-defense, the largest record companies are developing anti-piracy technology to protect their copyrighted music against the information technology industry’s 1 17 U.S.C.
    [Show full text]
  • The Impact of Digital File Sharing on the Music Industry: an Empirical Analysis
    Topics in Economic Analysis & Policy Volume 6, Issue 1 2006 Article 18 The Impact of Digital File Sharing on the Music Industry: An Empirical Analysis Norbert J. Michel∗ ∗Nicholls State University, [email protected] Copyright c 2006 The Berkeley Electronic Press. All rights reserved. The Impact of Digital File Sharing on the Music Industry: An Empirical Analysis∗ Norbert J. Michel Abstract The first file-sharing software, Napster, was shut down in 2001, but the copying technology’s impact on the music industry is still passionately debated. This paper uses micro-level data from the Consumer Expenditure Survey to examine the impact of Internet file sharing on music sales. Music industry representatives argue that the practice decreases CD sales, while supporters of file-sharing allege the practice could actually increase sales. Using household-level data from the Consumer Expenditure Survey, we find support for the claim that file-sharing has decreased sales. KEYWORDS: file sharing, copyright, music industry ∗This paper is based on Chapter 6 of my Ph.D. dissertation (University of New Orleans, Dept. of Economics and Finance). I thank my co-chairs, Arja Turunen-Red and Oscar Varela, as well as Gerald Whitney, Stan Liebowitz, and my committee members for their helpful suggestions and comments. I also thank Tracy Foertsch and several anonymous referees. Any errors are solely my responsibility. Norbert J. Michel, Nicholls State University, 310 B Powell, Thibodaux, LA. 70310, [email protected] , 985-448-4223. Michel: The Impact of Digital File Sharing on the Music Industry INTRODUCTION The impact of new copying technology on the music industry has been hotly debated since the launch of the first file-sharing software, Napster, in 1999.
    [Show full text]
  • Determinants of the Music Piracy Divide
    University of Pennsylvania ScholarlyCommons Wharton Research Scholars Wharton Undergraduate Research 5-2007 Determinants of the Music Piracy Divide Valentina Assenova University of Pennsylvania Follow this and additional works at: https://repository.upenn.edu/wharton_research_scholars Part of the Business Commons, and the Internet Law Commons Assenova, Valentina, "Determinants of the Music Piracy Divide" (2007). Wharton Research Scholars. 73. https://repository.upenn.edu/wharton_research_scholars/73 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/wharton_research_scholars/73 For more information, please contact [email protected]. Determinants of the Music Piracy Divide Abstract Why has physical piracy of music grown globally in recent years despite international efforts to reduce the problem? This research employs cross-country time series data analysis to examine physical music piracy rates across developed and developing economies. We provide 1999-2004 cross-country evidence from 70 countries that mean global music piracy rates grew over this period, and observe different mean rates for OECD and non-OECD countries. We examine the effect of per capita income, legal enforcement and technology on piracy rates in the developed and developing economies and choose a fixed-effects model. Our model indicates that variations in piracy of CDs and digital music on CD-Rs among all countries are largely due to growing Internet subscriptions. For non-OECD countries, the model suggests that the increase in Internet
    [Show full text]
  • Online Media Piracy: Convergence, Culture, and the Problem of Media
    Online Media Piracy: Convergence, Culture, and the Problem of Media Change Sean Fuller Department of Gender and Cultural Studies The University of Sydney A thesis submitted to fulfil requirements for the degree of Doctor of Philosophy at the University of Sydney i DECLARATION I hereby declare that this submission is my own work and that, to the best of my knowledge and belief, it contains no material previously published or written by another person nor material which to a substantial extent has been accepted for the award of any other degree or diploma of the university or any other institute of higher learning, except where due acknowledgement has been made in the text. Sean Fuller April 7, 2018 ii Abstract This thesis proposes that there is a symbiotic relationship between the emergence of online media piracy and the industrial, economic and legal changes that have shaped contemporary popular media in the early 21st century. The Internet is at the heart of most recent transformations of the popular media environment, such as the emergence of video- on-demand formats for film and television consumption and the impact this has had on the nature of those media forms. This thesis discusses the powerful role played by online media piracy in shaping these developments, both through changing the expectations of consumers, and the options that are available for distributors of media content. As well as exploring the diverse forms and practices of online media piracy today, this thesis also explores theories of media change, considering how we might understand such piracy as a force underpinning media change, and how the changes it has helped shape might be placed in a broader historical context.
    [Show full text]
  • The Invisible Defense Against Music Piracy
    THE JOHN MARSHALL REVIEW OF INTELLECTUAL PROPERTY LAW THE INVISIBLE DEFENSE AGAINST MUSIC PIRACY PAIGE CLARK ABSTRACT Music piracy has continuEd to affEct thE music industry. SpEcifically, music- streaming sErvice providers that thought thEy wEre protEcted, such as Spotify, havE suffEred from music piracy as a result of innovativE illegal downloading wEbsitEs. Music piratEs havE crEatEd illegal downloading wEbsitEs that provide dEtailed and Efficient ways to download and sync music from Spotify without paying for thE premium sErvices or membership fEEs. As a result, illegal downloading has had an advErsE impact on various music-streaming sErvice providers’ copyrights. To obtain protEction and diminish music piracy and liability to music artists and labEls, thEsE music-streaming sitEs should givE thought to thE music piracy issuE and implement EffEctivE tEchnological measures to qualify undEr thE DMCA anti-circumvEntion and safe harbors provisions. This commEnt discussEs thE issuEs music-streaming sitEs struggle with and proposEs a fEw ways Spotify and othEr music-streaming sitEs can possibly meEt thE DMCA rEquirements and obtain protEction. Copyright © 2016 ThE John Marshall Law School Cite as PaigE Clark, The Invisible Defense Against Music Piracy, 15 J. MARSHALL REV. INTELL. PROP. L. 297 (2016). THE INVISIBLE DEFENSE AGAINST MUSIC PIRACY PAIGE CLARK I. INTRODUCTION............................................................................................................. 298 A. Spotify Linked To A Significant DEcline In Music Piracy
    [Show full text]