IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Policing of Movie and Music Piracy: The Utility of a Nodal Governance Security Framework

Policing of Movie and Music Piracy: The Utility of a Nodal Governance Security Framework
View Sample PDF
Author(s): Johnny Nhan (Texas Christian University, USA)and Alesandra Garbagnati (University of California Hastings College of Law, USA)
Copyright: 2011
Pages: 18
Source title: Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
Source Author(s)/Editor(s): Thomas J. Holt (Michigan State University, USA)and Bernadette H. Schell (President's Advisor on Cybercrime, University of Ontario, Canada; Vice-Provost at Laurentian University, USA)
DOI: 10.4018/978-1-61692-805-6.ch005

Purchase

View Policing of Movie and Music Piracy: The Utility of a Nodal Governance Security Framework on the publisher's website for pricing and purchasing information.

Abstract

Ongoing skirmishes between mainstream Hollywood entertainment conglomerates and Peer-to-Peer (P2P) file-sharing networks recently reached a crescendo when a Swedish court convicted members of the world’s largest BitTorrent, The Pirate Bay, and handed out the stiffest sentence to date.1 Four operators of The Pirate Bay received one year imprisonments and fines totaling $30 million, including confiscation of equipment. While this verdict sent shockwaves amongst P2P networks, piracy remains rampant, and this incident further exacerbated relations between file sharers and Hollywood. In retaliation, supporters of P2P file-sharing attacked websites of the law firms representing the Hollywood studios (Johnson, 2009). This victory by Hollywood studios may be a Pyrrhic defeat in the long run if the studios do not soften their antagonistic relations with the public. This chapter explores structural and cultural conflicts amongst security actors that make fighting piracy extremely difficult. In addition, it considers the role of law enforcement, government, industries, and the general public in creating long-term security models.

Related Content

Hossam Nabil Elshenraki. © 2024. 23 pages.
Ibtesam Mohammed Alawadhi. © 2024. 9 pages.
Akashdeep Bhardwaj. © 2024. 33 pages.
John Blake. © 2024. 12 pages.
Wasswa Shafik. © 2024. 36 pages.
Amar Yasser El-Bably. © 2024. 12 pages.
Sameer Saharan, Shailja Singh, Ajay Kumar Bhandari, Bhuvnesh Yadav. © 2024. 23 pages.
Body Bottom