SlideShare a Scribd company logo
Video Piracy
• Global crime
• Branches out from digital piracy which is
defined as “the illegal copying and/or
downloading of copyrighted software (such as
Microsoft Windows, Microsoft Office, and
other copyrighted programs), music, video, or
other digital material (MP3s, Hollywood
movies, and digital audio books among
others) (Al-Rafee & Cronan, p.249)”.
Video Piracy
• Ponte (2008) explains that “in recent years,
the movie industry seems to be producing yet
another disaster film-Global Movie Piracy,
starring menacing theater cammers, devious
downloaders, and corrupt optical disc
manufacturers (p.331-32)”.
• Motion Picture Association of America (MPA)
has estimated losses of about $18 billion
dollars (Ponte, 2008).
Bootleggers vs. Illegal Copying
• Bootleggers are those who record live movies
in an actual theatre which may or may not
include the assistance of a cinema employee
and later sending it to 2nd and/or 3rd party that
will reproduce onto a disc and distribute it to
various points (Ponte, 2008).
• Illegal copying consists of copying movies
straight from a DVD, VHS, and/or video CD
(Ponte, 2008).
Video Piracy
• Being that video piracy has become a lucrative
business, numerous measures have been
taken into account to stop the illegal
production and distribution of movies from
legislative action to law suits yet the constant
battles between the movie industry and
honest consumers make it difficult to establish
laws against this cybercrime.
Social Learning Theory & Video Piracy
• Akers’ social learning theory is used to explain the
reasons why people commit crimes such as video
piracy.
• The basic argument presented here is the fact
that in order for video piracy and other
cybercrimes to occur, people have to learn how
to use a computer (Morris, 2012).
• The process of learning according to Akers (Akers
et al., 1979), includes the process of observing,
imitating, modeling, and having the behavior
reinforced. From this point on, behaviors will
continue to occur depending on the positive or
negative reinforcements they may have.
References
• Akers, R.L., Krohn, M.D., Lanza-Kaduce, L., &
Radosevich, M. (1979). Social learning and deviant
behavior: A specific test of a general theory. American
Sociological Review, 44(4), 636-655.
• Al-Rafee, S., Cronan, T.P.(2006). Digital piracy: Factors
that influence attitude toward behavior. Journal of
Business Ethics, 63, 237-259.
• Ponte, L.M. (2008). Coming attractions: Opportunities
and challenges in thwarting global movie piracy.
American Business Law Journal, 45(2), 331-369.

More Related Content

What's hot

Illegal downloading
Illegal downloadingIllegal downloading
Illegal downloading
cb8744
 
Copyright presentation mcfarland
Copyright presentation mcfarlandCopyright presentation mcfarland
Copyright presentation mcfarland
susanrmcfarland
 
Module 1 presentation - human rights 101-introduction to the ontario human ...
Module 1   presentation - human rights 101-introduction to the ontario human ...Module 1   presentation - human rights 101-introduction to the ontario human ...
Module 1 presentation - human rights 101-introduction to the ontario human ...
42Dawny
 

What's hot (17)

DRM in online music stores
DRM in online music storesDRM in online music stores
DRM in online music stores
 
Rkcsi2012
Rkcsi2012Rkcsi2012
Rkcsi2012
 
DEA: the dangerous downloaders act
DEA: the dangerous downloaders actDEA: the dangerous downloaders act
DEA: the dangerous downloaders act
 
Copyright
Copyright Copyright
Copyright
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Misuse of internet
Misuse of internetMisuse of internet
Misuse of internet
 
Illegal downloading
Illegal downloadingIllegal downloading
Illegal downloading
 
Illegal downloading
Illegal downloadingIllegal downloading
Illegal downloading
 
Copyright presentation mcfarland
Copyright presentation mcfarlandCopyright presentation mcfarland
Copyright presentation mcfarland
 
SOPA
SOPASOPA
SOPA
 
Music Piracy
Music PiracyMusic Piracy
Music Piracy
 
Module 1 presentation - human rights 101-introduction to the ontario human ...
Module 1   presentation - human rights 101-introduction to the ontario human ...Module 1   presentation - human rights 101-introduction to the ontario human ...
Module 1 presentation - human rights 101-introduction to the ontario human ...
 
Infrastructure, Platform, Locality: A response to Motta and Georgiou
Infrastructure, Platform, Locality: A response to Motta and GeorgiouInfrastructure, Platform, Locality: A response to Motta and Georgiou
Infrastructure, Platform, Locality: A response to Motta and Georgiou
 
Ethics And Computing
Ethics And ComputingEthics And Computing
Ethics And Computing
 
The Cultural Logic Of The Remix
The Cultural Logic Of The RemixThe Cultural Logic Of The Remix
The Cultural Logic Of The Remix
 
Actor Network Theory - Modernity to Postmodernity
Actor Network Theory - Modernity to PostmodernityActor Network Theory - Modernity to Postmodernity
Actor Network Theory - Modernity to Postmodernity
 
Piracy
PiracyPiracy
Piracy
 

Viewers also liked

Presentacion trabajo colaborativo rs
Presentacion trabajo colaborativo rsPresentacion trabajo colaborativo rs
Presentacion trabajo colaborativo rs
mendezfrancy
 
04 April 21, 2013, The Parables Of The Hidden Treasure And The Fine Pearl
04 April 21, 2013, The Parables Of The Hidden Treasure And The Fine Pearl04 April 21, 2013, The Parables Of The Hidden Treasure And The Fine Pearl
04 April 21, 2013, The Parables Of The Hidden Treasure And The Fine Pearl
First Baptist Church Jackson
 
Alteridad y consenso
Alteridad y consensoAlteridad y consenso
Alteridad y consenso
aguirrejm8
 
La pierna y el pie
La pierna y el pieLa pierna y el pie
La pierna y el pie
1367282
 

Viewers also liked (6)

Presentacion trabajo colaborativo rs
Presentacion trabajo colaborativo rsPresentacion trabajo colaborativo rs
Presentacion trabajo colaborativo rs
 
Cordillera de talamanca liz
Cordillera de talamanca lizCordillera de talamanca liz
Cordillera de talamanca liz
 
Bitacora 8
Bitacora 8Bitacora 8
Bitacora 8
 
04 April 21, 2013, The Parables Of The Hidden Treasure And The Fine Pearl
04 April 21, 2013, The Parables Of The Hidden Treasure And The Fine Pearl04 April 21, 2013, The Parables Of The Hidden Treasure And The Fine Pearl
04 April 21, 2013, The Parables Of The Hidden Treasure And The Fine Pearl
 
Alteridad y consenso
Alteridad y consensoAlteridad y consenso
Alteridad y consenso
 
La pierna y el pie
La pierna y el pieLa pierna y el pie
La pierna y el pie
 

Similar to Video piracy

Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
tamiuthomas
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
tamiuthomas
 
Principles of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxPrinciples of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docx
harrisonhoward80223
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
donnajames55
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014
dixieyeager
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010
dixieyeager
 
Joint Conf on Dig Libraries 03 Closing Keynote
Joint Conf on Dig Libraries 03 Closing KeynoteJoint Conf on Dig Libraries 03 Closing Keynote
Joint Conf on Dig Libraries 03 Closing Keynote
Tom Moritz
 

Similar to Video piracy (20)

Piracy Essay
Piracy EssayPiracy Essay
Piracy Essay
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Cybercrime an international-crisis
Cybercrime an international-crisisCybercrime an international-crisis
Cybercrime an international-crisis
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Movie Piracy and its Consequences.pdf
Movie Piracy and its Consequences.pdfMovie Piracy and its Consequences.pdf
Movie Piracy and its Consequences.pdf
 
Essay On Piracy
Essay On PiracyEssay On Piracy
Essay On Piracy
 
Principles of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docxPrinciples of Computer Security, Fourth Edition Copyright .docx
Principles of Computer Security, Fourth Edition Copyright .docx
 
Intro to new and digital media
Intro to new and digital mediaIntro to new and digital media
Intro to new and digital media
 
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Fight against P2P
Fight against P2PFight against P2P
Fight against P2P
 
Ethics
EthicsEthics
Ethics
 
Ethics
EthicsEthics
Ethics
 
Policing Piracy 2011
Policing Piracy 2011Policing Piracy 2011
Policing Piracy 2011
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
DMCAexemptions2010edit2014
DMCAexemptions2010edit2014DMCAexemptions2010edit2014
DMCAexemptions2010edit2014
 
Digital Piracy
Digital PiracyDigital Piracy
Digital Piracy
 
Dmc aexemptions2010
Dmc aexemptions2010Dmc aexemptions2010
Dmc aexemptions2010
 
Joint Conf on Dig Libraries 03 Closing Keynote
Joint Conf on Dig Libraries 03 Closing KeynoteJoint Conf on Dig Libraries 03 Closing Keynote
Joint Conf on Dig Libraries 03 Closing Keynote
 

Video piracy

  • 1. Video Piracy • Global crime • Branches out from digital piracy which is defined as “the illegal copying and/or downloading of copyrighted software (such as Microsoft Windows, Microsoft Office, and other copyrighted programs), music, video, or other digital material (MP3s, Hollywood movies, and digital audio books among others) (Al-Rafee & Cronan, p.249)”.
  • 2. Video Piracy • Ponte (2008) explains that “in recent years, the movie industry seems to be producing yet another disaster film-Global Movie Piracy, starring menacing theater cammers, devious downloaders, and corrupt optical disc manufacturers (p.331-32)”. • Motion Picture Association of America (MPA) has estimated losses of about $18 billion dollars (Ponte, 2008).
  • 3. Bootleggers vs. Illegal Copying • Bootleggers are those who record live movies in an actual theatre which may or may not include the assistance of a cinema employee and later sending it to 2nd and/or 3rd party that will reproduce onto a disc and distribute it to various points (Ponte, 2008). • Illegal copying consists of copying movies straight from a DVD, VHS, and/or video CD (Ponte, 2008).
  • 4. Video Piracy • Being that video piracy has become a lucrative business, numerous measures have been taken into account to stop the illegal production and distribution of movies from legislative action to law suits yet the constant battles between the movie industry and honest consumers make it difficult to establish laws against this cybercrime.
  • 5. Social Learning Theory & Video Piracy • Akers’ social learning theory is used to explain the reasons why people commit crimes such as video piracy. • The basic argument presented here is the fact that in order for video piracy and other cybercrimes to occur, people have to learn how to use a computer (Morris, 2012). • The process of learning according to Akers (Akers et al., 1979), includes the process of observing, imitating, modeling, and having the behavior reinforced. From this point on, behaviors will continue to occur depending on the positive or negative reinforcements they may have.
  • 6. References • Akers, R.L., Krohn, M.D., Lanza-Kaduce, L., & Radosevich, M. (1979). Social learning and deviant behavior: A specific test of a general theory. American Sociological Review, 44(4), 636-655. • Al-Rafee, S., Cronan, T.P.(2006). Digital piracy: Factors that influence attitude toward behavior. Journal of Business Ethics, 63, 237-259. • Ponte, L.M. (2008). Coming attractions: Opportunities and challenges in thwarting global movie piracy. American Business Law Journal, 45(2), 331-369.