Search icone
Search and publish your papers

Piracy of music on the Internet and solutions to this problem

About the author


About the document

Published date
documents in English
25 pages
0 times
Validated by
  1. Intoduction
  2. PART I: The Kyoto Protocol
    1. Global warming
    2. The vertices of the earth
    3. The contents of the Protocol
  3. PART II: American diplomacy around the Kyoto Protocol
    1. General Remarks
    2. The positions of the presidents of the United States before the Kyoto Protocol
    3. The presidencies of Bill Clinton (1993-2001)
    4. The term of George W. Bush (2001-2009)
  4. Conclusion

Networks of water, electricity, telephone and the Internet are the sources of externalities which can be positive or negative. In the case of the Internet, network users have seen a way to share their "cultural property" at a lower cost. Users have developed "peer to peer networks" or P2Ps which designate a network on which computers can exchange files. This particular network is a problem because when computers exchange files directly, they "bypass" the rights of intellectual property.

According to a study by ADMI (Civil Society for Administration of the Rights of Artists and Musicians), nearly 250 million users of P2P sharing about 150 billion discs (according to the IFPI i.e International Federation of Phonographic Industry) has caused a decrease of about $ 20 billion in sales.
In this report, we will examine the issues related to music piracy on the Internet and particularly to the various remedies proposed to address this worrying situation.

?Music piracy', is a term that is used to define the act of downloading files in spite of copyrights. It is major cause for concern and has greatly worried music artists. However, to curb the phenomenon is not simple for governments as they relate to the transfer of information goods between users. These files are digitized and transferred and it is difficult to apply any kind of protection for these files.
So, how do we fight against music piracy and protect intellectual property rights associated with these works? To understand this phenomenon, it seems necessary to understand the economics of networks and the externalities arising.

So, in this paper we try (I) to understand the operation, and the path that gradually led to the illegal appropriation of music. And (II)Study the various remedies proposed for the fight against music piracy on the Internet and the various advantages and disadvantages of these remedies.

Studies have shown that the crisis that is being experienced by the music industry is not the first, indeed, the various technological changes that have marked the twentieth century have led to crises that have challenged the organization of the industry.

If we go back to the origin of the music industry we'll see that it begins with the phonograph, (invented by Edison in 1877.) It was the first device to allow for the reproduction of a sound recording. A few years later, the gramophone was invented but neither was believed to have commercial potential. A few years later, the Columbia Phonograph Company managed to allocate this other dimension and begin the music trade in America.

The solutions:
The piracy of music is bad for the music industry. The hackers who download these pieces of music do not respect intellectual property rights that are inherent to them. For the recording and film industry, it is counterfeit. Articles L. 122-4, L. 335 and the Intellectual Property Code provides that: "Any publication of writing, musical composition, drawing, painting or any other printed or engraved production in whole or in part, in disregard of laws and regulations author's property is a forgery and any forgery is a crime.

As a result, the industry and the legislature will consider how to preserve the remuneration of artistic creation while protecting the rights of the authors (one can hardly go without the other). In this paper we will present various solutions to this problem.

Recent documents in computer science category

Net neutrality in United States

 Science & technology   |  Computer science   |  Presentation   |  10/02/2018   |   .doc   |   3 pages

Reconstructing householder vectors from tall-skinny QR

 Science & technology   |  Computer science   |  Presentation   |  04/21/2017   |   .doc   |   4 pages