A Survival Analysis of Albums on Ranking Charts

  • Sudip Bhattacharjee
  • Ram D. Gopal
  • James R. Marsden
  • Rahul Telang

Maintaining security in the digital world continues to grow in complexity. Firms must protect operating hardware and sensitive data against increasingly innovative threats. With the emergence of digital goods comes a new security front where firms face the reproduction and rapid distribution of the digital goods themselves. Certainly, firms already have had to protect many of their goods from “knockoffs,” but protecting digital goods represents a new level of challenge since the cost of copying and distributing such goods is virtually zero and can occur extensively within very short periods of time. The music industry has been the “poster industry” for facing such threats. The industry’s goods are digital by nature. Further, the appearance of Peer-to-Peer networks offered the means to copy (download) the goods and distribute (share) them rapidly.


Hazard Rate Post Period Music Industry Online Music Digital Good 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Adler, Moshe, “Stardom and Talent,” American Economic Review. 75 (March 1985) 208-212.Google Scholar
  2. Albert, Steven, “Movie Stars and the Distribution of Financially Successful Films in the Motion Picture Industry,” Journal of Cultural Economics. 22 (1998) 249-270.CrossRefGoogle Scholar
  3. Associated Press, “Norwegian hacker cracks iTunes code,” CNN, November 27, 2003,
  4. Bergstein, B., “Copy Protection Still a Work in Progress,” Associated Press,;_y lt=ArOQdPcARo.I0hnGv20mpcdk24cA;_ylu=X3oDMTBidHQxYjh2BHNlY wN5bnN0b3J5, Nov 18, 2005.
  5. Bhattacharjee, S., R.D. Gopal, K. Lertwachara, and J.R. Marsden, “Impact of Legal Threats on Individual Behavior: An Analysis of Music Industry Actions and Online Music Sharing,” Journal of Law and Economics. 49 (1) (April 2006) 91-114.Google Scholar
  6. Bhattacharjee, S., R.D. Gopal, K. Lertwachara, and J.R. Marsden, “Whatever Happened To Payola? An Empirical Analysis of Online Music Sharing,” Decision Support Systems. 42 (1) (2006) 104-120.CrossRefGoogle Scholar
  7. Bradley, M., “Sony Aims at Pirates - and Hits Users,” Christian Science Monitor, Nov 9, 2005,
  8. Bradlow, Eric T. and Peter S. Fader, “A Bayesian Lifetime Model for the Hot 100 Billboard Songs,” The Journal of the American Statistical Association. 96 (2001) 368-381.CrossRefGoogle Scholar
  9. Chung, Kee H. and Raymond A.K. Cox, “A Stochastic Model of Superstardom: An Application of the Yule Distribution,” Review of Economics and Statistics. 76 (4) (November 1994) 771-775.CrossRefGoogle Scholar
  10. Clarke, G., “DVD Jon Hacks Media Player File Encryption,” The Register, September 2, 2005,
  11. Cox, A.K. and Kee H. Chung, “Patterns of Research Output and Author Concentration in the Economics Literature,” Review of Economics and Statistics. 73 (4) (Nov. 1991) 740-747.CrossRefGoogle Scholar
  12. Cox, D.R., “Regression Models and Life Tables,” Journal of the Royal Statistical Society Series B. 34 (1972) 187-220.Google Scholar
  13. Craver, S.A., Min Wu, Bede Liu, Adam Stubblefield, Ben Swartzlander, Dan W. Wallach, Drew Dean, and Edward W. Felten, “Reading Between the Lines: Lessons from the SDMI Challenge,” Proc. of 10th USENIX Security Symposium (August 2001).Google Scholar
  14. Felten, E.W., “A Skeptical View of DRM and Fair Use,” Communications of the ACM. 46 (4) (April 2003) 56-61.CrossRefGoogle Scholar
  15. Felten, E.W., “Inside RISKS: DRM and Public Policy,” Communications of the ACM. 48 (7) (July 2005) 112.CrossRefGoogle Scholar
  16. Goodley, S., “Disharmony over music pirates on the Internet,” The Telegraph, January 9, 2003,
  17. Halderman, J.A., “Evaluating New Copy-Prevention Techniques for Audio CDs,” Proc. ACM Workshop on Digital Rights Management, Washington, DC, November 2002.Google Scholar
  18. Levene, Mark, Trevor Fenner, Geroge Loizou, and Richard Wheeldon, “A Stochastic Model for the Evolution of the Web,” Computer Networks. 39 (2002) 277-287.Google Scholar
  19. Patrizio, A., “Why the DVD Hack Was a Cinch,” Wired News, November 2, 1999,,1282,32263,00.html
  20. Reuters, “CD Crack: Magic Marker Indeed,” May 20, 2002,,1282,52665,00.html
  21. Reuters, “Sony Tests Technology to Limit CD Burning,” CNET News. June 1, 2005,,39029666,39189658,00.htm
  22. Rosen, Sherwin, “The Economics of Superstars,” American Economic Review. 71 (December 1981) 845-858.Google Scholar
  23. Russinovich, M., “Sony, Rootkits and Digital Rights Management Gone Too Far,”, Mark’s Sysinternals Blog, October 31, 2005.
  24. Schneier, B., Secrets and Lies: Digital Security in a Networked World. John Wiley & Sons, Inc., New York, 2000.Google Scholar
  25. Simon, Herbert A., “On a Class of Skew Distribution Functions,” Biometrika. 42 (1955) 425-440.Google Scholar
  26. Smith, E., “Sony BMG Faces Civil Complaint Over CD Software,”, The Wall Street Journal. (November 22, 2005).
  27. Yule, G. Udny, “A Mathematical Theory of Evolution, based on the Conclusions of Dr. J.C. Willis, F.R.S.,” Philosophical Transactions of the Royal Society B. 213 (1924) 21-87.Google Scholar
  28. Ziemann, George, “RIAA’s Statistics Don’t Add Up to Piracy,” December 11, 2002,

Copyright information

© Springer Science + Business Media, LLC 2008

Authors and Affiliations

  • Sudip Bhattacharjee
    • 1
  • Ram D. Gopal
    • 1
  • James R. Marsden
    • 2
  • Rahul Telang
    • 2
  1. 1.University of ConnecticutUSA
  2. 2.Carnegie Mellon UniversityUSA

Personalised recommendations