Skip to main content
  • 484 Accesses

Abstract

This chapter assesses the current and future trends and trajectory of the optical media piracy in the Philippines and Vietnam as well as in the world. Media piracy is an evolving cybercrime which can easily adapt to the current technological and global environment. This chapter also traces briefly the development of media piracy from the VCR technology using the cassette format to the current digital and nanotechnology using the Internet and file sharing protocols. Optical disc piracy will be a transitory phenomenon in developing countries with underdeveloped IP and Internet culture. As a country increases in Internet penetration, the locus of media piracy shifts from the temporal space of the sidewalk stalls selling pirated DVDs or illegal CD–DVD shops to the cyberspace of the Internet. The use of discs becomes less popular as online media piracy becomes more convenient, easier, and cheaper with direct illegal downloading, peer-to-peer sharing, and other evasive techniques with the latest sophisticated hardware and software technologies. This chapter then examines some popular and current online digital piracy such as peer-to-peer (P2P) file sharing, cyberlocker, media box, anti-circumvention technology, digital spying and hacking, and other online piracy supported by digital, cloud, and nanotechnology. It also makes projections on how media piracy would develop with the advent of quantum computing and technology. Media piracy follows technological advancement and innovation, thus making it difficult for authorities to curb. It uses the same technology used by copyright holders which provides them with a variety of options to respond to regulation. Finally, this chapter examines the difficulty of regulating the Internet and the role and future involvement of China in counterfeiting and media piracy. With the rise of online media piracy, regulating the Internet would then be the main challenge of law enforcement and copyright owners as regulating the Web to curb piracy would be difficult with legality and illegality becoming more intimately connected with the growing sophistication of technology and with the conflicting business interests between service providers and content providers and between copyright and top IT and ICT industries.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    www.nedcc.org

  2. 2.

    “Faster, more efficient, more robust: Nanotechnology in computers, mobile phones, and more” at http://www.nanostart.de/en/nanotechnology/nanotechnology-information/692-faster-more-efficient-more-robust-nanotechnology-in-computers-mobile-phones-and-more.

  3. 3.

    http://www.riaa.com/faq.php

  4. 4.

    See www.bittorrent.com.

  5. 5.

    See Cheng (2012): “Only 0.3 % of files on BitTorrent confirmed to be legal” at http://arstechnica.com/tech-policy/2010/07/only-03-of-files-on-bit-torrent-confirmed-to-be-legal/.

  6. 6.

    Cited in Villavicencio (2012): “Philippines has 10th highest BitTorrent downloads in the world — report” at http://www.interaksyon.com/infotech/philippines-has-10th-highest-bittorrent-downloads-in-the-world-report

  7. 7.

    “IFPI Loses “Deep-Linking” Case Against Baidu” at https://torrentfreak.com/ifpi-loses-deep-linking-case-against-baidu-100126/

  8. 8.

    See “DRM Protection, Need Removal or not” at http://www.m4vconverterplus.com/drm-removal/drm-protection-removal.html.

    http://www.m4vconverterplus.com/drm-removal/drm-protection-removal.html

  9. 9.

    See “Outlawing Distribution of DRM Circumvention Technology” at https://wikispaces.psu.edu/display/IST43213/Outlawing+Distribution+of+DRM+Circumvention+Technology.

  10. 10.

    “Players of cloud-based entertainment software access these unauthorized servers to play copyrighted games that are made available through hacked software or circumvention of technological protection measures, which are used by rights holders to control unauthorized access to, and prevent unauthorized copying of, protected content” (2014 USTR Special 301 Report, p. 21).

  11. 11.

    See Jones: “Nanotechnology” at http://physics.about.com/od/nanotechnology/p/nanotechnology.htm.

  12. 12.

    A meter is about 10 % longer than a yard.

  13. 13.

    See Bellis: “Introduction to Nanotechnology” at http://inventors.about.com/od/nstartinventions/a/Nanotechnology.htm.

  14. 14.

    “Nano Servers are the future of Cloud Computing says research!” at https://storageservers.wordpress.com/2013/10/31/nano-servers-are-the-future-of-cloud-computing-says-research/

  15. 15.

    “Forecasts From the Futurist Magazines” at http://www.wfs.org/Forecasts_From_The_Futurist_Magazine

  16. 16.

    See Condon, S. “SOPA, PIPA protests spur Congress to rethink bills” at http://www.cbsnews.com/news/sopa-pipa-protests-spur-congress-to-rethink-bills/.

  17. 17.

    IIPA’s Letter to Susan Wilson February 7, 2014, pp. ix–x

  18. 18.

    China’s best known multinationals may not be comparable to giant US MNCs such as Coca-Cola, McDonalds, Apple, or Pfizer, but the growth of Chinese MNCs in terms of total revenues is consistently climbing. Twelve Chinese companies were included in Fortune’s Global 500 list in 2001. And only a decade later, in 2011, that number rose to 61 (including four with headquarters in Hong Kong). China now ranks third on the global list, only slightly behind Japan but well behind American firms. Please see Shambaugh: “Are China Multinationals Really Multinational?” at http://www.brookings.edu/research/articles/2012/07/10-china-multinationals-shambaugh.

  19. 19.

    See “Supporting Document 2: China’s Growth through Technological Convergence and Innovation” p. 163 at http://www.worldbank.org/content/dam/Worldbank/document/SR2–161–228.pdf.

  20. 20.

    “China Boasts World’s Fastest Computer”

    http://www.voanews.com/content/china-boasts-worlds-fastest-computer/1683465.html

  21. 21.

    Word Bank Supporting Report 2, p at http://www.worldbank.org/content/dam/Worldbank/document/SR2–161–228.pdf

References

  • Bijker, W. (1987). The social construction of bakelite: Toward a theory of invention. In B. Wiebe, T. Hughes, & T. Pinch (Eds.), The social construction of technological systems: New directions in the sociology and history of technology. Cambridge, MA: MIT Press.

    Google Scholar 

  • Bijker, W. (1995). Of bicycles, bakelites, and bulbs: Toward a theory of sociotechnical change. Cambridge, MA: MIT Press.

    Google Scholar 

  • Browne, C., & Johnson, D. (2000). VCR development, diffusion and impact. http://www.smecc.org/video/vcr_development_diffusion_impact.pdf. Accessed 21 Dec 2014.

  • Care, C. (2008). From analogy-making to modeling: The history of analog computing as a modeling technology. Ph.D. thesis. Department of Computer Science, University of Warwick. http://go.warwick.ac.uk/wrap/2381. Accessed 4 June 2015.

  • Castells, M., & Cardoso, G. (Eds.). (2013). Piracy cultures: How a growing portion of the global population is building media relationships through alternate channels of obtaining content. University of Southern California: USC Annenberg Press.

    Google Scholar 

  • Cusumano, M., et al. (1992). Strategic maneuvering and mass-market dynamics: The triumph of VHS over beta. Business History Review, 66, 51–94.

    Article  Google Scholar 

  • Fleischmann, K. R. (2006). Boundary objects with agency: A method for studying the design-use interface. The Information Society, 22(2), 77–87. Doi: 10.1080/01972240600 567188.

    Article  Google Scholar 

  • Fung, W. M. J., & Lakhani, A. (2013). Combatting peer-to-peer file sharing of copyrighted material via anti-piracy laws: Issues, trends, and solutions. Computer Law and Security Review, 29(4), 382–402.

    Article  Google Scholar 

  • Holmstrom, J., & Stalder, F. (2001). Drifting technologies and multi-purpose networks: The case of the Swedish cashcard. Information and Organization, 11(2001), 187–206. Doi: 10.1016/S1471-7727(01)00004-5

    Article  Google Scholar 

  • IIPA (2013). International intellectual property alliance 2013 special 301 report. www.iipa.org. Accessed 2 June 2014.

  • IIPA (2014). International intellectual property alliance 2014 special 301 report. www.iipa.org. Accessed 4 May 2015.

  • Johnson, E. M., McGuire, D., & Wiley, N. D. (2008). The evolution of the peer-to-peer file sharing industry and the security risks for users. http://cds.dartmouth.edu/digital/assets/images/30750383.pdf. Accessed 2 Dec 1914.

  • Johnson, M. V., et al. (Eds.). (2014). Piracy cultures: Cinema and moving image culture for the twenty-first century. New York: Bloomsbury Academic.

    Google Scholar 

  • Khondker, H. H. (2006). Sociology of corruption and ‘corruption of sociology’: Evaluating the contributions of Syed Hussein Alatas. Current Sociology, 54(1), 25–39. Doi: 10.1177/0011392106058832.

    Article  Google Scholar 

  • Koepsell, D. (2009). Let’s get small: An introduction to transitional issues in nanotech and intellectual property. Nanoethics, 3(2), 157–166.

    Article  Google Scholar 

  • Kwok, S. H. (2004). File sharing activities over BT networks. ProQuest. http://www.informatik.uni-trier.de/~ley/pers/ht/k/Kwok:Sai_Ho.html

  • Law, J. (2006). Notes on the theory of the actor network: Ordering, strategy and heterogeneity. Lancaster University: Centre for Science Studies and the Department of Sociology. http://72.14.235.104/search?q=cache:2PB8bauNIMYJ:www.lancs.ac.uk/fss/sociology/pa Accessed 20 Sept 2007.

  • Lessig, L. (1999). Code: And other laws of cyberspace. New York: Basic Books.

    Google Scholar 

  • Letter of IIPA to Susan Wilson (2014). http://www.iipa.com/pdf/2014SPEC301COVERLETTER.pdf. Accessed 1 Jan 2015.

  • Levy, M. (Ed.). (1989). The VCR age: Home video recorders and mass communication. Newbury Park: Sage Publications.

    Google Scholar 

  • MacKenzie, D., & Wajcman, J. (1999). Introductory essay: The shaping of technology. In D. MacKenzie & J. Wajcman (Eds.), The social shaping of technology (2nd ed.). Buckingham: Open University Press.

    Google Scholar 

  • Marukawa, T. (2004). Towards a strategic realignment of production networks: Japanese electronics companies in China. In Regional strategies in a global economy: Multinational corporations in East Asia (pp. 99–117). München: Iudicium-Verl. ISBN: 389129848X.

    Google Scholar 

  • Menell, P. S. (2012). Judicial regulation of digital copyright windfalls: Making interpretive and policy sense of Viacom v. YouTube and UMG Recordings v. Shelter Capital Partners. UC Berkeley Public Law Research Paper No. 2049445. Available at SSRN: http://ssrn.com/abstract=2049445 or http://dx.doi.org/10.2139/ssrn.2049445

  • Paradise, P. R. (1999). Trademark counterfeiting, product piracy, and the billion dollar threat to the U.S. economy. Westport: Quorum Books.

    Google Scholar 

  • Peters, W. (1986). Toward negotiating a remedy to copyright piracy in Singapore. 7Nw.J. Int’l. L & Bus, 561, 1985–1986. http://scholarlycommons.law.northwestern.edu/5EA1BC14-1762-41C0-A156-478520C1DCC3/FinalDownload/DownloadId-A635F15668990900187F5BE342023D7C/5EA1BC14-1762-41C0-A156-478520C1DCC3/cgi/viewcontent.cgi?article=1207&context=njilb. Accessed 15 March 2015.

  • Rengifo García, E. (2014). Toward the extension of obligations to other intermediaries in the internet (Hacia La Extensión De Las Obligaciones De Otros Intermediarios En Internet) (December 9, 2014). Revista La Propiedad Inmaterial Número 18, 2014. Available at SSRN: http://ssrn.com/abstract=2535829

  • Ritzer, G. (2011). Globalization: The essentials. Malden: Wiley-Blackwell.

    Google Scholar 

  • Sarjaz, B. S., & Abbaspour, M. (2013). Securing BitTorrent using a new reputation-based trust management system. Peer-to-Peer Network Application, 6, 86–100. Doi: 10.1007/s12083-012-0141-y.

    Article  Google Scholar 

  • Segal, A. (2013). The challenge of China as a science and technology superpower. http://www.theguardian.com/science/political-science/2013/oct/11/china-science-superpower. Accessed 23 Jan 2015.

  • Smith, M. S., & Gross, T. (Eds.). (2011). The history of file sharing: Where did it begin? http://www.brighthub.com/computing/smb-security/articles/67395.aspx

  • Star, S. L. (1989). The structure of ill-structure solutions: Boundary objects and heterogeneous distributed problem solving. In M. Huhns & I. Gasser (Eds.), Distributed artificial intelligence (Vol. 2, pp. 37–54). London: Pitman.

    Chapter  Google Scholar 

  • Strauss, A. (1978). A social world perspective. Studies in Symbolic Interaction, 1, 119–128.

    Google Scholar 

  • Strauss, A. (1984). Social worlds and their segmentation processes. Studies in Symbolic Interaction, 5, 123–139.

    Google Scholar 

  • USTR (2014). United States trade representative 2014 special 301 report. www.ustr.gov. Accessed 7 May 2015.

  • Winner, L. (1998). Prophets of inevitability. MIT’s Technology Review, 101(2), 62.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this chapter

Cite this chapter

Ballano, V.O. (2016). Tracing Media Piracy: Current and Future Trends. In: Sociological Perspectives on Media Piracy in the Philippines and Vietnam. Springer, Singapore. https://doi.org/10.1007/978-981-287-922-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-981-287-922-6_7

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-287-920-2

  • Online ISBN: 978-981-287-922-6

  • eBook Packages: Social SciencesSocial Sciences (R0)

Publish with us

Policies and ethics