SlideShare una empresa de Scribd logo
1 de 13
The fight against P2P
Peer-to-peer technology overview Peer-to-peer (P2P) technology capitalizes on the use of Internet and other networks by making use of “distributed, interconnected computers to communicate faster, more flexibly and more dynamically” (Taylor, 2007) According to MPAA,  (http://www.mpaa.org/) P2P  enables Internet “to (1) make files (including movies and music) stored on their computer available for copying by other users; (2) search for files stored on other users’ computers; and (3) transfer exact copies of files from one computer to another”
2 effects The sampling effect, emerges when individuals want to see if they like a song or a movie before buying it.  The substitution effect, when people download music and movies instead of buying them. (Birgitte Andersen, 2002) This effect generates most controversies about P2P because it leads to copyright infringements.
Questions to be answered How should stakeholders respond to the P2P challenge? Can Governments stop the illegal file sharing? How important are the social norms?
P2P is all around  P2P is a global phenomenon and it seems unstoppable. Past experience shows that even though P2P websites are closed, many new others are opened somewhere else. The reality is that users like to communicate with the world and share things.
The stakeholders and their stakes
The stakeholders and their stakes On one side, there are the music and movie producers which see P2P file sharing as stealing and lost revenues. Some artists oppose to P2P file sharing because they see the threat of new artists which are promoted for free through this technology.  On the other side, there are the Internet users who see the technology as a way of sharing files with the great Internet community. The P2P idea started from sharing content among friends, but later on, the communities grew larger and larger in the same time with the Internet penetration increase.  Legislators are on another side. They are caught between the industry’s claims and the ones of the users. The main dilemma they have to address is how to maintain the P2P benefits while minimizing the harm it causes to artists.
Lessons from the past One of the most famous is the VCRs case. In 1976, Walt Disney Productions and Universal City Studios sued Sonny for copyright infringement when it launched the Betamax VCRs. There are some important lessons to be learned from this precedent. The first one is that law looks for the balance between the rights of the content creator and the way his/her creation can generate new value when it is used by others. The second one is that the balance is set after a technology has matured. This may be a hint that realistic copyright laws will be adopted only after industries and users have reached a compromise. Finally, the third lesson is that history repeats itself. Legislators cannot anticipate the tech innovations and industries cannot seek legal protection each time an innovation threatens their status quo
The law and the social norms “if people can be made to act properly because of social norms, rather than because of fear of legal sanction, then the desired behavior can be obtained at less cost.” (Lee, 2002) Attempts to enforce the law are expensive, especially in the cases of global phenomena like P2P file share. In addition, regulators lose trust when they oppose the wishes of the masses and take the part of the few powerful parties. Industry also incurs high loses because of bad publicity.
P2P content as public good Content shared through P2P has the qualities of a public good: it can be consumed or enjoyed by communities, it doesn’t lose its value by use, it has high development costs and it can be reproduced cheaply (non-rival good). (Lessig, Free Culture: The Nature and Future of Creativity, 2005) These characteristics facilitate some people to free ride.
The solutions Limit copy right protected material sharing. For instance, people could pay an extra fee for the Internet connection. This solution would be easy to implement from an administrative view. Internet service providers (ISPs) would probably want to receive assurances of protection from liability from their subscribers’ actions. (Gervais, 2003)
The solutions Reduce users’ motivation to download illegally copyright material.  Some companied apply successfully existing business models to reach this objective. For instance, Amazon business model can be seen as the reverse of the Gillette one. (Lee, 2002) In the Amazon case, the books sold at $4 discount are the blades and the Kindle, sold for more than $250, is the razor.
Conclusions P2P technology is a global phenomenon which impacts users, legislators and entertainment industry. Each party will have to compromise in the future to reach a common agreement. The solution to the P2P dilemmas may be the new business models. Some organizations stopped the fight against the masses attachment to P2P. They have leveraged this new trend into successful products and services.

Más contenido relacionado

La actualidad más candente

Regulating code
Regulating codeRegulating code
Regulating code
blogzilla
 
Program For The Future: The Commons as a collective intelligence meta-innovation
Program For The Future: The Commons as a collective intelligence meta-innovationProgram For The Future: The Commons as a collective intelligence meta-innovation
Program For The Future: The Commons as a collective intelligence meta-innovation
Mike Linksvayer
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijing
Internet Law Center
 
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology SeminarThe Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
Mike Linksvayer
 
Sarah Jamieson_corrections
Sarah Jamieson_correctionsSarah Jamieson_corrections
Sarah Jamieson_corrections
Sarah Jamieson
 
Digital citizen
Digital citizenDigital citizen
Digital citizen
jesskb17
 
Digital citizen
Digital citizenDigital citizen
Digital citizen
jesskb17
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
Brian Rowe
 

La actualidad más candente (20)

Regulating code
Regulating codeRegulating code
Regulating code
 
Net Neutrality 03
Net Neutrality 03Net Neutrality 03
Net Neutrality 03
 
Program For The Future: The Commons as a collective intelligence meta-innovation
Program For The Future: The Commons as a collective intelligence meta-innovationProgram For The Future: The Commons as a collective intelligence meta-innovation
Program For The Future: The Commons as a collective intelligence meta-innovation
 
RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social Side
 
Com 300 dl
Com 300 dlCom 300 dl
Com 300 dl
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijing
 
The Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology SeminarThe Commons - Networked Politics & Technology Seminar
The Commons - Networked Politics & Technology Seminar
 
Legal Issues of Web 2.0
Legal Issues of Web 2.0Legal Issues of Web 2.0
Legal Issues of Web 2.0
 
Future Of Internet Presentation
Future Of Internet PresentationFuture Of Internet Presentation
Future Of Internet Presentation
 
Net Neutrality and The FCC
Net Neutrality and The FCCNet Neutrality and The FCC
Net Neutrality and The FCC
 
The Future of the Internet
The Future of the InternetThe Future of the Internet
The Future of the Internet
 
The Free Internet Project talk in SF
The Free Internet Project talk in SFThe Free Internet Project talk in SF
The Free Internet Project talk in SF
 
Sarah Jamieson_corrections
Sarah Jamieson_correctionsSarah Jamieson_corrections
Sarah Jamieson_corrections
 
Digital citizen
Digital citizenDigital citizen
Digital citizen
 
Digital citizen
Digital citizenDigital citizen
Digital citizen
 
Marsden #icis2013
Marsden #icis2013Marsden #icis2013
Marsden #icis2013
 
Decoding the Net Neutrality Debate
Decoding the Net Neutrality DebateDecoding the Net Neutrality Debate
Decoding the Net Neutrality Debate
 
Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550 Privacy law and policy 2 - LIS550
Privacy law and policy 2 - LIS550
 
Polinter02
Polinter02Polinter02
Polinter02
 
L9 yem ethical fault_lines_ownership_authorship
L9 yem ethical fault_lines_ownership_authorshipL9 yem ethical fault_lines_ownership_authorship
L9 yem ethical fault_lines_ownership_authorship
 

Destacado

Formulir jawaban 2015(1)
Formulir  jawaban 2015(1)Formulir  jawaban 2015(1)
Formulir jawaban 2015(1)
Haq Sasax
 
บุคลากรครูที่เกษียณ12
บุคลากรครูที่เกษียณ12บุคลากรครูที่เกษียณ12
บุคลากรครูที่เกษียณ12
Calvinlok
 
Mjs vol 27_3_2_field_and_petrographic_studies
Mjs vol 27_3_2_field_and_petrographic_studiesMjs vol 27_3_2_field_and_petrographic_studies
Mjs vol 27_3_2_field_and_petrographic_studies
Godang Shaban
 
บุคลากรครูที่เกษียณ12
บุคลากรครูที่เกษียณ12บุคลากรครูที่เกษียณ12
บุคลากรครูที่เกษียณ12
Calvinlok
 
Training report on ultratech cement
Training report on ultratech cementTraining report on ultratech cement
Training report on ultratech cement
Deepak Bansal
 
2012 EURIB - Brand Management
2012 EURIB - Brand Management2012 EURIB - Brand Management
2012 EURIB - Brand Management
Joost Augusteijn
 
如何选择数据分析方法
如何选择数据分析方法如何选择数据分析方法
如何选择数据分析方法
小熊 张
 

Destacado (20)

Economy is dead
Economy is deadEconomy is dead
Economy is dead
 
BIOGRAPHY
BIOGRAPHYBIOGRAPHY
BIOGRAPHY
 
Formulir jawaban 2015(1)
Formulir  jawaban 2015(1)Formulir  jawaban 2015(1)
Formulir jawaban 2015(1)
 
Igz igz
Igz igzIgz igz
Igz igz
 
Pre projeto
Pre projetoPre projeto
Pre projeto
 
20070901.mydomain
20070901.mydomain20070901.mydomain
20070901.mydomain
 
Pay it forward
Pay it forwardPay it forward
Pay it forward
 
AI in Economics
AI in EconomicsAI in Economics
AI in Economics
 
บุคลากรครูที่เกษียณ12
บุคลากรครูที่เกษียณ12บุคลากรครูที่เกษียณ12
บุคลากรครูที่เกษียณ12
 
Mjs vol 27_3_2_field_and_petrographic_studies
Mjs vol 27_3_2_field_and_petrographic_studiesMjs vol 27_3_2_field_and_petrographic_studies
Mjs vol 27_3_2_field_and_petrographic_studies
 
บุคลากรครูที่เกษียณ12
บุคลากรครูที่เกษียณ12บุคลากรครูที่เกษียณ12
บุคลากรครูที่เกษียณ12
 
Training report on ultratech cement
Training report on ultratech cementTraining report on ultratech cement
Training report on ultratech cement
 
Conversa skype
Conversa skypeConversa skype
Conversa skype
 
Principales monedas
Principales monedasPrincipales monedas
Principales monedas
 
2012 EURIB - Brand Management
2012 EURIB - Brand Management2012 EURIB - Brand Management
2012 EURIB - Brand Management
 
11111 110830225437-phpapp02
11111 110830225437-phpapp0211111 110830225437-phpapp02
11111 110830225437-phpapp02
 
Wars of the world
Wars of the worldWars of the world
Wars of the world
 
如何选择数据分析方法
如何选择数据分析方法如何选择数据分析方法
如何选择数据分析方法
 
囲碁のお勉強(社内勉強会資料)
囲碁のお勉強(社内勉強会資料)囲碁のお勉強(社内勉強会資料)
囲碁のお勉強(社内勉強会資料)
 
Km
KmKm
Km
 

Similar a Fight against P2P

Innovation Case Study BitTorrent
Innovation Case Study BitTorrentInnovation Case Study BitTorrent
Innovation Case Study BitTorrent
Petter S. Rønning
 
Lse mp pbrief1_creative_destruction_and_copyright_protection
Lse mp pbrief1_creative_destruction_and_copyright_protectionLse mp pbrief1_creative_destruction_and_copyright_protection
Lse mp pbrief1_creative_destruction_and_copyright_protection
LSEMediaPolicy
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
mayank272369
 
Chris Freitas Copyright Laws
Chris Freitas   Copyright LawsChris Freitas   Copyright Laws
Chris Freitas Copyright Laws
Chris Freitas
 
Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The Internet
Adjem
 
Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The Internet
Adjem
 
Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The Internet
Adjem
 
Michael Demont DMCA Research Paper
Michael Demont DMCA Research PaperMichael Demont DMCA Research Paper
Michael Demont DMCA Research Paper
Michael Demont
 

Similar a Fight against P2P (11)

Innovation Case Study BitTorrent
Innovation Case Study BitTorrentInnovation Case Study BitTorrent
Innovation Case Study BitTorrent
 
Polinter08
Polinter08Polinter08
Polinter08
 
Gruop 1
Gruop 1 Gruop 1
Gruop 1
 
Lse mp pbrief1_creative_destruction_and_copyright_protection
Lse mp pbrief1_creative_destruction_and_copyright_protectionLse mp pbrief1_creative_destruction_and_copyright_protection
Lse mp pbrief1_creative_destruction_and_copyright_protection
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
Chris Freitas Copyright Laws
Chris Freitas   Copyright LawsChris Freitas   Copyright Laws
Chris Freitas Copyright Laws
 
Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The Internet
 
Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The Internet
 
Intellectual Property Rights And The Internet
Intellectual Property Rights And The InternetIntellectual Property Rights And The Internet
Intellectual Property Rights And The Internet
 
Michael Demont DMCA Research Paper
Michael Demont DMCA Research PaperMichael Demont DMCA Research Paper
Michael Demont DMCA Research Paper
 
Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles
Copyright and Fair Use: Transnational Troubles

Copyright and Fair Use: Transnational Troubles

 

Último

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 

Último (20)

Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 

Fight against P2P

  • 2. Peer-to-peer technology overview Peer-to-peer (P2P) technology capitalizes on the use of Internet and other networks by making use of “distributed, interconnected computers to communicate faster, more flexibly and more dynamically” (Taylor, 2007) According to MPAA, (http://www.mpaa.org/) P2P enables Internet “to (1) make files (including movies and music) stored on their computer available for copying by other users; (2) search for files stored on other users’ computers; and (3) transfer exact copies of files from one computer to another”
  • 3. 2 effects The sampling effect, emerges when individuals want to see if they like a song or a movie before buying it. The substitution effect, when people download music and movies instead of buying them. (Birgitte Andersen, 2002) This effect generates most controversies about P2P because it leads to copyright infringements.
  • 4. Questions to be answered How should stakeholders respond to the P2P challenge? Can Governments stop the illegal file sharing? How important are the social norms?
  • 5. P2P is all around P2P is a global phenomenon and it seems unstoppable. Past experience shows that even though P2P websites are closed, many new others are opened somewhere else. The reality is that users like to communicate with the world and share things.
  • 6. The stakeholders and their stakes
  • 7. The stakeholders and their stakes On one side, there are the music and movie producers which see P2P file sharing as stealing and lost revenues. Some artists oppose to P2P file sharing because they see the threat of new artists which are promoted for free through this technology. On the other side, there are the Internet users who see the technology as a way of sharing files with the great Internet community. The P2P idea started from sharing content among friends, but later on, the communities grew larger and larger in the same time with the Internet penetration increase. Legislators are on another side. They are caught between the industry’s claims and the ones of the users. The main dilemma they have to address is how to maintain the P2P benefits while minimizing the harm it causes to artists.
  • 8. Lessons from the past One of the most famous is the VCRs case. In 1976, Walt Disney Productions and Universal City Studios sued Sonny for copyright infringement when it launched the Betamax VCRs. There are some important lessons to be learned from this precedent. The first one is that law looks for the balance between the rights of the content creator and the way his/her creation can generate new value when it is used by others. The second one is that the balance is set after a technology has matured. This may be a hint that realistic copyright laws will be adopted only after industries and users have reached a compromise. Finally, the third lesson is that history repeats itself. Legislators cannot anticipate the tech innovations and industries cannot seek legal protection each time an innovation threatens their status quo
  • 9. The law and the social norms “if people can be made to act properly because of social norms, rather than because of fear of legal sanction, then the desired behavior can be obtained at less cost.” (Lee, 2002) Attempts to enforce the law are expensive, especially in the cases of global phenomena like P2P file share. In addition, regulators lose trust when they oppose the wishes of the masses and take the part of the few powerful parties. Industry also incurs high loses because of bad publicity.
  • 10. P2P content as public good Content shared through P2P has the qualities of a public good: it can be consumed or enjoyed by communities, it doesn’t lose its value by use, it has high development costs and it can be reproduced cheaply (non-rival good). (Lessig, Free Culture: The Nature and Future of Creativity, 2005) These characteristics facilitate some people to free ride.
  • 11. The solutions Limit copy right protected material sharing. For instance, people could pay an extra fee for the Internet connection. This solution would be easy to implement from an administrative view. Internet service providers (ISPs) would probably want to receive assurances of protection from liability from their subscribers’ actions. (Gervais, 2003)
  • 12. The solutions Reduce users’ motivation to download illegally copyright material. Some companied apply successfully existing business models to reach this objective. For instance, Amazon business model can be seen as the reverse of the Gillette one. (Lee, 2002) In the Amazon case, the books sold at $4 discount are the blades and the Kindle, sold for more than $250, is the razor.
  • 13. Conclusions P2P technology is a global phenomenon which impacts users, legislators and entertainment industry. Each party will have to compromise in the future to reach a common agreement. The solution to the P2P dilemmas may be the new business models. Some organizations stopped the fight against the masses attachment to P2P. They have leveraged this new trend into successful products and services.