Assignment:
Evolution of Piracy and Corresponding Legislation
Prior to beginning work on this assignment, read Chapter the textbook and view the Digital Piracy and Steve Wozniak: Digital Piracy videos. You must include at least one additional scholarly and/or professional source for your paper. You may wish to review the recommended resources for assistance with this research. You may also access the MSCJ Professional Sources guide for assistance with finding appropriate resources.
Theft of intellectual property, such as music and video recordings, has been commonplace for many years. During the 1970s and 1980s portable inexpensive recording devices made piracy of video and music relatively easy to accomplish. With the advent of the MP3 and MP4 formats utilized to compress large files for data storage and portability, piracy has flourished. Motion pictures, music, and data can now be easily accessed via small personal computerized devices such as cellular phones, tablets, and MP3 players. In addition, large files can be easily stored on digital flash drives often no bigger than a coin. This has enabled digital pirates to safely store movies, music, and data for transport to locations on a global scale.
In this paper, you must
1. Analyze the technical evolution of digital piracy including the impact of new digital formats such as CD, DVD, MP3, and MP4 to intellectual property piracy.
2. Explain the growth of innovative file sharing such as peer-to-peer (P2P) and Internet Relay Chat (IRC) and their impact on the methods for detecting and preventing intellectual property piracy.
Trace the evolution of legislation and organizations such as the World Intellectual Property Organization (WIPO), the Copyright Act of 1976, No Electronic Theft (NET) Act, and Directive 91/250/EEC/2009/24/EC designed to curtail and prevent digital piracy.
The Evolution of Piracy and Corresponding Legislation paper:
Must be three to five double-spaced pages (750 to 1,250 words) in length (not including title and references pages) and formatted according to APA style as outlined in the Writing Center.
Required Resources
Text
Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction (2nd ed.).
Chapter: Malware and Automated Computer Attacks
Chapter: Digital Piracy and Intellectual Property Theft
Article
CISCO. (n.d.). What is the difference: Viruses, worms, trojan horses, and bots?
This online resource, by Cisco Systems, contains detailed explanations of computer viruses, worms, Trojan horses, and bots. It will assist you in the development of discussion posts.
Multimedia
Larkin, D. [Dom Larkin]. (2014, June 8). Digital Piracy
This video is a screencast presentation of the many aspects of digital piracy. The video will assist you in the development of this week's written assignment.
Accessibility Statement
IgnorantPCFanboys. (2011, September 22).
Steve Wozniak: Digital piracy
This video is an interview with Steve Wozniak on the early culture surrounding digital piracy. The video will assist you in the development of written assignment.
Accessibility Statement
Mr. Ford's Class. (2014, January 21).
Technology in 10: Malware, Viruses, Worms, and More (Season 1 - Episode 3)
This video is a lecture style analysis of malware, viruses, and worms. It will assist you in the development of discussion post.
Recommended Resources
Dissertation
Lough, D. L. (2001). A taxonomy of computer attacks with applications to wireless networks (Doctoral dissertation, Virginia Polytechnic Institute and State University).
This dissertation examines in detail the variety of attacks that can be levied at computers and provides a taxonomy of such criminal activity. Special attention is given to attacks vie wireless networks.
Article
Hinduja, S. (2003). Trends and patterns among online software pirates. Ethics and Information Technology, 5(1), 49-61.
The full-text version of this article is available through the ProQuest database in the University of Arizona Global Campus Library. This article provides information on the trends and patterns of software pirates working on a university campus. It may assist you in the development of this week's activities.
Multimedia
arXter. (2009, January 8). HARDtalk: The music industry - Digital music & piracy.
This video is a British news style discussion of global digital piracy and the variety of methods governments can utilized to help combat digital piracy.
Accessibility Statement
Imperva. (2014, January 30).
Automated hacking tools - Meet the new rock stars in the cyber underground
This video is a webinar discussing automated computer hacking, firewall applications, and various methods that can be utilized to protect data.
Accessibility Statement
Websites
MSCJ Professional Sources
This resource site will provide assistance in researching additional sources for the assessments within this course.