Abstract
This chapter assesses the current and future trends and trajectory of the optical media piracy in the Philippines and Vietnam as well as in the world. Media piracy is an evolving cybercrime which can easily adapt to the current technological and global environment. This chapter also traces briefly the development of media piracy from the VCR technology using the cassette format to the current digital and nanotechnology using the Internet and file sharing protocols. Optical disc piracy will be a transitory phenomenon in developing countries with underdeveloped IP and Internet culture. As a country increases in Internet penetration, the locus of media piracy shifts from the temporal space of the sidewalk stalls selling pirated DVDs or illegal CD–DVD shops to the cyberspace of the Internet. The use of discs becomes less popular as online media piracy becomes more convenient, easier, and cheaper with direct illegal downloading, peer-to-peer sharing, and other evasive techniques with the latest sophisticated hardware and software technologies. This chapter then examines some popular and current online digital piracy such as peer-to-peer (P2P) file sharing, cyberlocker, media box, anti-circumvention technology, digital spying and hacking, and other online piracy supported by digital, cloud, and nanotechnology. It also makes projections on how media piracy would develop with the advent of quantum computing and technology. Media piracy follows technological advancement and innovation, thus making it difficult for authorities to curb. It uses the same technology used by copyright holders which provides them with a variety of options to respond to regulation. Finally, this chapter examines the difficulty of regulating the Internet and the role and future involvement of China in counterfeiting and media piracy. With the rise of online media piracy, regulating the Internet would then be the main challenge of law enforcement and copyright owners as regulating the Web to curb piracy would be difficult with legality and illegality becoming more intimately connected with the growing sophistication of technology and with the conflicting business interests between service providers and content providers and between copyright and top IT and ICT industries.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
“Faster, more efficient, more robust: Nanotechnology in computers, mobile phones, and more” at http://www.nanostart.de/en/nanotechnology/nanotechnology-information/692-faster-more-efficient-more-robust-nanotechnology-in-computers-mobile-phones-and-more.
- 3.
- 4.
See www.bittorrent.com.
- 5.
See Cheng (2012): “Only 0.3 % of files on BitTorrent confirmed to be legal” at http://arstechnica.com/tech-policy/2010/07/only-03-of-files-on-bit-torrent-confirmed-to-be-legal/.
- 6.
Cited in Villavicencio (2012): “Philippines has 10th highest BitTorrent downloads in the world — report” at http://www.interaksyon.com/infotech/philippines-has-10th-highest-bittorrent-downloads-in-the-world-report
- 7.
“IFPI Loses “Deep-Linking” Case Against Baidu” at https://torrentfreak.com/ifpi-loses-deep-linking-case-against-baidu-100126/
- 8.
See “DRM Protection, Need Removal or not” at http://www.m4vconverterplus.com/drm-removal/drm-protection-removal.html.
http://www.m4vconverterplus.com/drm-removal/drm-protection-removal.html
- 9.
See “Outlawing Distribution of DRM Circumvention Technology” at https://wikispaces.psu.edu/display/IST43213/Outlawing+Distribution+of+DRM+Circumvention+Technology.
- 10.
“Players of cloud-based entertainment software access these unauthorized servers to play copyrighted games that are made available through hacked software or circumvention of technological protection measures, which are used by rights holders to control unauthorized access to, and prevent unauthorized copying of, protected content” (2014 USTR Special 301 Report, p. 21).
- 11.
See Jones: “Nanotechnology” at http://physics.about.com/od/nanotechnology/p/nanotechnology.htm.
- 12.
A meter is about 10 % longer than a yard.
- 13.
See Bellis: “Introduction to Nanotechnology” at http://inventors.about.com/od/nstartinventions/a/Nanotechnology.htm.
- 14.
“Nano Servers are the future of Cloud Computing says research!” at https://storageservers.wordpress.com/2013/10/31/nano-servers-are-the-future-of-cloud-computing-says-research/
- 15.
“Forecasts From the Futurist Magazines” at http://www.wfs.org/Forecasts_From_The_Futurist_Magazine
- 16.
See Condon, S. “SOPA, PIPA protests spur Congress to rethink bills” at http://www.cbsnews.com/news/sopa-pipa-protests-spur-congress-to-rethink-bills/.
- 17.
IIPA’s Letter to Susan Wilson February 7, 2014, pp. ix–x
- 18.
China’s best known multinationals may not be comparable to giant US MNCs such as Coca-Cola, McDonalds, Apple, or Pfizer, but the growth of Chinese MNCs in terms of total revenues is consistently climbing. Twelve Chinese companies were included in Fortune’s Global 500 list in 2001. And only a decade later, in 2011, that number rose to 61 (including four with headquarters in Hong Kong). China now ranks third on the global list, only slightly behind Japan but well behind American firms. Please see Shambaugh: “Are China Multinationals Really Multinational?” at http://www.brookings.edu/research/articles/2012/07/10-china-multinationals-shambaugh.
- 19.
See “Supporting Document 2: China’s Growth through Technological Convergence and Innovation” p. 163 at http://www.worldbank.org/content/dam/Worldbank/document/SR2–161–228.pdf.
- 20.
“China Boasts World’s Fastest Computer”
http://www.voanews.com/content/china-boasts-worlds-fastest-computer/1683465.html
- 21.
Word Bank Supporting Report 2, p at http://www.worldbank.org/content/dam/Worldbank/document/SR2–161–228.pdf
References
Bijker, W. (1987). The social construction of bakelite: Toward a theory of invention. In B. Wiebe, T. Hughes, & T. Pinch (Eds.), The social construction of technological systems: New directions in the sociology and history of technology. Cambridge, MA: MIT Press.
Bijker, W. (1995). Of bicycles, bakelites, and bulbs: Toward a theory of sociotechnical change. Cambridge, MA: MIT Press.
Browne, C., & Johnson, D. (2000). VCR development, diffusion and impact. http://www.smecc.org/video/vcr_development_diffusion_impact.pdf. Accessed 21 Dec 2014.
Care, C. (2008). From analogy-making to modeling: The history of analog computing as a modeling technology. Ph.D. thesis. Department of Computer Science, University of Warwick. http://go.warwick.ac.uk/wrap/2381. Accessed 4 June 2015.
Castells, M., & Cardoso, G. (Eds.). (2013). Piracy cultures: How a growing portion of the global population is building media relationships through alternate channels of obtaining content. University of Southern California: USC Annenberg Press.
Cusumano, M., et al. (1992). Strategic maneuvering and mass-market dynamics: The triumph of VHS over beta. Business History Review, 66, 51–94.
Fleischmann, K. R. (2006). Boundary objects with agency: A method for studying the design-use interface. The Information Society, 22(2), 77–87. Doi: 10.1080/01972240600 567188.
Fung, W. M. J., & Lakhani, A. (2013). Combatting peer-to-peer file sharing of copyrighted material via anti-piracy laws: Issues, trends, and solutions. Computer Law and Security Review, 29(4), 382–402.
Holmstrom, J., & Stalder, F. (2001). Drifting technologies and multi-purpose networks: The case of the Swedish cashcard. Information and Organization, 11(2001), 187–206. Doi: 10.1016/S1471-7727(01)00004-5
IIPA (2013). International intellectual property alliance 2013 special 301 report. www.iipa.org. Accessed 2 June 2014.
IIPA (2014). International intellectual property alliance 2014 special 301 report. www.iipa.org. Accessed 4 May 2015.
Johnson, E. M., McGuire, D., & Wiley, N. D. (2008). The evolution of the peer-to-peer file sharing industry and the security risks for users. http://cds.dartmouth.edu/digital/assets/images/30750383.pdf. Accessed 2 Dec 1914.
Johnson, M. V., et al. (Eds.). (2014). Piracy cultures: Cinema and moving image culture for the twenty-first century. New York: Bloomsbury Academic.
Khondker, H. H. (2006). Sociology of corruption and ‘corruption of sociology’: Evaluating the contributions of Syed Hussein Alatas. Current Sociology, 54(1), 25–39. Doi: 10.1177/0011392106058832.
Koepsell, D. (2009). Let’s get small: An introduction to transitional issues in nanotech and intellectual property. Nanoethics, 3(2), 157–166.
Kwok, S. H. (2004). File sharing activities over BT networks. ProQuest. http://www.informatik.uni-trier.de/~ley/pers/ht/k/Kwok:Sai_Ho.html
Law, J. (2006). Notes on the theory of the actor network: Ordering, strategy and heterogeneity. Lancaster University: Centre for Science Studies and the Department of Sociology. http://72.14.235.104/search?q=cache:2PB8bauNIMYJ:www.lancs.ac.uk/fss/sociology/pa Accessed 20 Sept 2007.
Lessig, L. (1999). Code: And other laws of cyberspace. New York: Basic Books.
Letter of IIPA to Susan Wilson (2014). http://www.iipa.com/pdf/2014SPEC301COVERLETTER.pdf. Accessed 1 Jan 2015.
Levy, M. (Ed.). (1989). The VCR age: Home video recorders and mass communication. Newbury Park: Sage Publications.
MacKenzie, D., & Wajcman, J. (1999). Introductory essay: The shaping of technology. In D. MacKenzie & J. Wajcman (Eds.), The social shaping of technology (2nd ed.). Buckingham: Open University Press.
Marukawa, T. (2004). Towards a strategic realignment of production networks: Japanese electronics companies in China. In Regional strategies in a global economy: Multinational corporations in East Asia (pp. 99–117). München: Iudicium-Verl. ISBN: 389129848X.
Menell, P. S. (2012). Judicial regulation of digital copyright windfalls: Making interpretive and policy sense of Viacom v. YouTube and UMG Recordings v. Shelter Capital Partners. UC Berkeley Public Law Research Paper No. 2049445. Available at SSRN: http://ssrn.com/abstract=2049445 or http://dx.doi.org/10.2139/ssrn.2049445
Paradise, P. R. (1999). Trademark counterfeiting, product piracy, and the billion dollar threat to the U.S. economy. Westport: Quorum Books.
Peters, W. (1986). Toward negotiating a remedy to copyright piracy in Singapore. 7Nw.J. Int’l. L & Bus, 561, 1985–1986. http://scholarlycommons.law.northwestern.edu/5EA1BC14-1762-41C0-A156-478520C1DCC3/FinalDownload/DownloadId-A635F15668990900187F5BE342023D7C/5EA1BC14-1762-41C0-A156-478520C1DCC3/cgi/viewcontent.cgi?article=1207&context=njilb. Accessed 15 March 2015.
Rengifo García, E. (2014). Toward the extension of obligations to other intermediaries in the internet (Hacia La Extensión De Las Obligaciones De Otros Intermediarios En Internet) (December 9, 2014). Revista La Propiedad Inmaterial Número 18, 2014. Available at SSRN: http://ssrn.com/abstract=2535829
Ritzer, G. (2011). Globalization: The essentials. Malden: Wiley-Blackwell.
Sarjaz, B. S., & Abbaspour, M. (2013). Securing BitTorrent using a new reputation-based trust management system. Peer-to-Peer Network Application, 6, 86–100. Doi: 10.1007/s12083-012-0141-y.
Segal, A. (2013). The challenge of China as a science and technology superpower. http://www.theguardian.com/science/political-science/2013/oct/11/china-science-superpower. Accessed 23 Jan 2015.
Smith, M. S., & Gross, T. (Eds.). (2011). The history of file sharing: Where did it begin? http://www.brighthub.com/computing/smb-security/articles/67395.aspx
Star, S. L. (1989). The structure of ill-structure solutions: Boundary objects and heterogeneous distributed problem solving. In M. Huhns & I. Gasser (Eds.), Distributed artificial intelligence (Vol. 2, pp. 37–54). London: Pitman.
Strauss, A. (1978). A social world perspective. Studies in Symbolic Interaction, 1, 119–128.
Strauss, A. (1984). Social worlds and their segmentation processes. Studies in Symbolic Interaction, 5, 123–139.
USTR (2014). United States trade representative 2014 special 301 report. www.ustr.gov. Accessed 7 May 2015.
Winner, L. (1998). Prophets of inevitability. MIT’s Technology Review, 101(2), 62.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this chapter
Cite this chapter
Ballano, V.O. (2016). Tracing Media Piracy: Current and Future Trends. In: Sociological Perspectives on Media Piracy in the Philippines and Vietnam. Springer, Singapore. https://doi.org/10.1007/978-981-287-922-6_7
Download citation
DOI: https://doi.org/10.1007/978-981-287-922-6_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-287-920-2
Online ISBN: 978-981-287-922-6
eBook Packages: Social SciencesSocial Sciences (R0)