rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9789067042383

Fighting the War on File Sharing

by
  • ISBN13:

    9789067042383

  • ISBN10:

    9067042382

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2007-06-11
  • Publisher: T.M.C. Asser Press

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $89.99 Save up to $29.25
  • Rent Book $60.74
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    SPECIAL ORDER: 1-2 WEEKS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

How To: Textbook Rental

Looking to rent a book? Rent Fighting the War on File Sharing [ISBN: 9789067042383] for the semester, quarter, and short term or search our site for other textbooks by Aernout Schmidt , Wilfred Dolfsma , Wim Keuvelaar. Renting a textbook can save you up to 90% from the cost of buying.

Summary

Fighting the War on File Sharing aims at a multi-faceted understanding of why peer-to-peer services currently fail to gain their full potential in our society. The analysis focuses on music-file sharing. Three parts of the book ('The Morality of Regulation by Architecture', 'The Economics of Peer-to-Peer in Music' and 'Intellectual Property Rights for Music File Sharing') investigate the positions and opinions that individual disciplines can offer. As these analyses yield partial solutions, the final part of the book provides an institutional framework and applies it to produce new and crisp results on a tough, otherwise almost comprehensively researched subject. The framework recognizes the influence of outstanding work from law and information technology (Lessig), political anthropology (Douglas, Geertz, Smits), new institutional economics (Coase, North, Greif) and jurisprudence (Fuller, Bobbitt, Tamanaha). Its application allows a glimpse of veritable multidisciplinary co-operation concerning the perplexities of regulating the regularities in our social behaviour.

Author Biography

Aernout Schmidt and W. Keuvelaar are both affiliated to elaw@Leiden, Centre for Law in the Information Society at Leiden University Wilfred Dolfsma is affiliated to the Utrecht School of Economics and to Maastricht University (UNU-MERIT)

Table of Contents

Prefacep. V
Summary of contentsp. VII
Preliminariesp. 1
Peer-to-Peer Problemsp. 3
The World According to Lessigp. 5
Cultural and Institutional Theoriesp. 6
The Morality of Regulation by Architecturep. 8
Structurep. 8
The Morality of Regulation by Architecturep. 11
IT as a Relevant Disciplinep. 13
Asking a Questionp. 15
Roles in IT practicep. 16
The storyp. 17
Bootingp. 18
Some history: Moore's law, law, standardsp. 19
The operating systemp. 22
Handles for regulation during bootp. 24
The desktopp. 25
As a part to the operating system: policiesp. 26
As a port to applications: stand-alone, client-server, peer-to-peerp. 26
Two application semantics, four efficiencies (intermezzo)p. 27
The reference approachp. 28
The convention approachp. 30
Application characteristics by conventionp. 31
Asking a question (summing up)p. 34
Regulation by Design and Deploymentp. 35
Application design methodologyp. 35
The ITdesign framework Sectionsp. 37
The ITdesign framework Chaptersp. 37
Remodelling Napsterp. 38
Regulation by design and deployment (summing up)p. 48
The Morality of Regulation by Architecturep. 48
Eight conditionsp. 49
Moral challenges for regulation by architecturep. 52
Five questionsp. 53
Is regulation by architecture a one-way projection of authority?p. 53
Who can make legitimate regulation by architecture?p. 54
What are the institutional roles?p. 55
What are the role moralities involved?p. 56
How is interaction placed in regulation by architecture and its administration?p. 56
Basic assumptions on the morality of regulators by architecturep. 57
The morality of regulation by architecturep. 57
Morality of duty (M1)p. 58
Morality of aspiration (M2)p. 62
The Economics of P2P in Musicp. 63
Introductionp. 65
Markets for Information Goodsp. 67
Some Economics of Intellectual Property Rightsp. 71
The music industry: digitisationp. 72
Market Standards, Business Models and Future Musicp. 77
Three Models Assessedp. 85
Products & Prices: Welfare Implicationsp. 88
Conclusionsp. 92
Intellectual Property Rights for Music File Sharingp. 93
Prefacep. 95
Approachp. 95
Copyright, neighbouring rights and file sharingp. 95
Problem definitionp. 96
Contextp. 97
Restrictions to the research projectp. 98
Research goalp. 98
Plan of workp. 98
The WIPO Treatiesp. 99
Introductionp. 99
Exploitation rightsp. 99
The right of reproductionp. 99
The right of distributionp. 100
The right of rentalp. 100
The right of communication and making available to the publicp. 101
Limitationsp. 102
Exercise and enforcementp. 102
Technical protection measuresp. 102
The Application of Copyright and Neighbouring Rightsp. 103
Introductionp. 103
The right of reproductionp. 103
The right of distributionp. 105
The right of rentalp. 106
The right of communication and making available to the publicp. 106
New questions and problemsp. 107
The Application of the Restriction of Private Copyingp. 108
Introductionp. 108
Private copying in Directive 2001/29/ECp. 108
Private copying according to current lawp. 109
Private copying according to future lawp. 110
New questions and problemsp. 111
The non-commercial criterionp. 111
A home copying levy on other equipmentp. 112
Determining the amounts of fair contribution and retributionp. 112
The need for collective administrationp. 113
The Exercise of Copyright and Neighbouring Rightsp. 113
Introductionp. 113
Individual or collectivep. 113
Exercising musical copyrightp. 114
Exercising neighbouring rights with respect to musicp. 115
New questions and problemsp. 116
Legitimacy of collective administration organizationsp. 116
Increasing importance of competition lawp. 117
Territorial boundaries and (national) collective administrationp. 117
The Enforcement of Copyright and Related Rightsp. 118
Introductionp. 118
Civil law enforcementp. 118
Penal law enforcementp. 118
Directive on measures and procedures to ensure enforcementp. 119
Liability of software providersp. 120
Napsterp. 120
Grokster and Streamcastp. 121
KaZaAp. 123
New questions and problemsp. 124
Mass infringement and privacyp. 124
Careful behaviour of software providersp. 125
Digital Rights Managementp. 126
Introductionp. 126
The legal framework for digital rights managementp. 126
New questions and problemsp. 128
Position of 'open information' initiativesp. 128
Accountability, individual normative choicep. 128
Summaryp. 129
Postscriptp. 129
Understanding the Warp. 133
Introductionp. 135
Mainstream IT, economic and legal analysesp. 136
ITp. 136
Economicsp. 137
The lawp. 141
Preliminary conclusionsp. 145
Framing for Multidisciplinary Analysisp. 146
Warp. 148
War and peace as a multilevel affairp. 150
Danger and dirtp. 151
Culturesp. 152
Monstersp. 153
Organizationsp. 155
Domain and jurisdiction-organizations as normative systemsp. 156
Intermezzo: an interpretation of law-system moralityp. 159
Externalitiesp. 161
Marketsp. 162
Institutionsp. 163
Multidisciplinary institutional analysisp. 166
Institutional Analysis of the War on Music-file Sharingp. 168
Regularities in social behaviourp. 169
The music industryp. 169
Sharersp. 169
Providersp. 169
Courtsp. 170
Two questionsp. 170
Institutional analysisp. 171
Collective interestsp. 171
Domainsp. 172
Marketsp. 173
Rule-setsp. 174
Policiesp. 176
Norm-setsp. 178
Organizationsp. 179
Individualsp. 182
(Market) feedback mechanismsp. 184
Belief-setsp. 187
The war pathp. 188
Recommendations and Conclusionsp. 190
Institutional understandingp. 190
Monster, monster domains, monster marketsp. 190
Monster-managements strategiesp. 193
Institutional interpretationp. 194
The battles over hacked containers: piracy and private usep. 195
The battle over unprotected containers: sharingp. 197
Recommendationsp. 202
Conclusionsp. 202
Afterthoughtp. 204
Referencesp. 205
About the authorsp. 213
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program