Evolution of Piracy and Corresponding Legislation

Prior to beginning work on this assignment, read Chapter 5 in the textbook and view the Digital  (Links to an external site.)Piracy (Links to an external site.) (Links to an external site.) and Steve Wozniak: Digital Piracy (Links to an external site.) videos. You must include at least one additional scholarly and/or professional source for your paper. You may wish to review the recommended resources for this week for assistance with this research. You may also access the MSCJ Professional Sources (Links to an external site.) guide for assistance with finding appropriate resources.

Theft of intellectual property, such as music and video recordings, has been commonplace for many years. During the 1970s and 1980s portable inexpensive recording devices made piracy of video and music relatively easy to accomplish. With the advent of the MP3 and MP4 formats utilized to compress large files for data storage and portability, piracy has flourished. Motion pictures, music, and data can now be easily accessed via small personal computerized devices such as cellular phones, tablets, and MP3 players. In addition, large files can be easily stored on digital flash drives often no bigger than a coin. This has enabled digital pirates to safely store movies, music, and data for transport to locations on a global scale.

In this paper, you must

  • Analyze the technical evolution of digital piracy including the impact of new digital formats such as CD, DVD, MP3, and MP4 to intellectual property piracy.
  • Explain the growth of innovative file sharing such as peer-to-peer (P2P) and Internet Relay Chat (IRC) and their impact on the methods for detecting and preventing intellectual property piracy.
  • Trace the evolution of legislation and organizations such as the World Intellectual Property Organization (WIPO), the Copyright Act of 1976, No Electronic Theft (NET) Act, and Directive 91/250/EEC/2009/24/EC designed to curtail and prevent digital piracy.

The Evolution of Piracy and Corresponding Legislation paper:

  • Must be three to five double-spaced pages (750-1,250 words) in length (not including title and references pages) and formatted according to APA style as outlined in the Writing Center (Links to an external site.).
  • Must include a separate title page with the following:
    • Title of paper
    • Student’s name
    • Course name and number
    • Instructor’s name
    • Date submitted
  • Must use at least three scholarly sources in addition to the course text.
  • Must document all sources in APA style as outlined in the Writing Center.
  • Must include a separate references page that is formatted according to APA style as outlined in the Writing Center.

 

Required Resources

Text

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction (2nd ed.).  Retrieved from https://www.vitalsource.com/

  • Chapter 4: Malware and Automated Computer Attacks
  • Chapter 5: Digital Piracy and Intellectual Property Theft

Article

CISCO. (n.d.). What is the difference: Viruses, worms, trojan horses, and bots?  (Links to an external site.) Retrieved from http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html

  • This online resource, by Cisco Systems, contains detailed explanations of computer viruses, worms, Trojan horses, and bots. It will assist you in the development of this week’s discussion posts.
    Accessibility Statement is not available
    Privacy Policy (Links to an external site.)

Multimedia

Larkin, D. [Dom Larkin]. (2014, June 8). Digital Piracy (Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=RMaXj1Kjis8

IgnorantPCFanboys. (2011, September 22).

Steve Wozniak: Digital piracy (Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=jJRSjFqu-8Q

Order your essay today and save 10% with the discount code ESSAYHELP