Current Search: Piracy (x)
-
-
Title
-
A MODEL OF LOW-RISK PIRACY.
-
Creator
-
Camilo, Amil, Burguet, Roberto, University of Central Florida
-
Abstract / Description
-
Heterogeneous consumers make the decision to buy a durable good or to download a replica, and a monopolist chooses to price and protect their intellectual property in the form of an authentication cost. An optimal price and authentication cost is derived, and shown to be higher than the efficient outcome for a uniform distribution of consumers. The optimal selection of price and protection are shown to be commensurate with his authenticating technology, and the searching ability of consumers....
Show moreHeterogeneous consumers make the decision to buy a durable good or to download a replica, and a monopolist chooses to price and protect their intellectual property in the form of an authentication cost. An optimal price and authentication cost is derived, and shown to be higher than the efficient outcome for a uniform distribution of consumers. The optimal selection of price and protection are shown to be commensurate with his authenticating technology, and the searching ability of consumers. As an extension, a layout for a monopolist problem where consumers have different searching abilities is shown to be indistinct from a homogeneous case when consumers are uniformly distributed.
Show less
-
Date Issued
-
2019
-
Identifier
-
CFH2000495, ucf:45647
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH2000495
-
-
Title
-
SOMALI PIRACY AND THE INTRODUCTION OF SOMALIA TO THE WESTERN WORLD.
-
Creator
-
Jean-Jacques, Daniel, Walker, Ezekiel, University of Central Florida
-
Abstract / Description
-
This thesis investigates the origins of the modern phenomenon of Somali piracy within a deeper historical context. More specifically, this analysis concentrates on the development of piracy in the north of the country. It is here contended that Somali piracy is, in fact, the product of the confluence of three historical currents. The first of these currents is the progressive degeneration of traditional Somali institutions due to exposure to the colonial and global markets. The second is the...
Show moreThis thesis investigates the origins of the modern phenomenon of Somali piracy within a deeper historical context. More specifically, this analysis concentrates on the development of piracy in the north of the country. It is here contended that Somali piracy is, in fact, the product of the confluence of three historical currents. The first of these currents is the progressive degeneration of traditional Somali institutions due to exposure to the colonial and global markets. The second is the increasing reliance of northern Somalis on maritime resources due to over exploitation of the land and the fishing initiatives of the Barre regime. The final current is the intrusion of foreign fishing vessels into Somali territorial waters, beginning in the early 1990s, for the purposes of illegal fishing and the dumping of toxic waste.
Show less
-
Date Issued
-
2011
-
Identifier
-
CFE0003611, ucf:48876
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0003611
-
-
Title
-
STUDENT DIGITAL PIRACY IN THE FLORIDA STATE UNIVERSITY SYSTEM:AN EXPLORATORY STUDY ON ITS INFRASTRUCTURAL EFFECTS.
-
Creator
-
Reiss, Jeffrey, Cintron, Rosa, University of Central Florida
-
Abstract / Description
-
Digital piracy is a problem that may never disappear from society. Through readily available resources such as those found in a university, students will always have access to illegal goods. While piracy is a global phenomenon, an institutionÃÂ's resources combined with the typical college studentÃÂ's lack of funds makes it more lucrative. Students use a number of methods to justify their actions ranging from previewing media to bringing justice...
Show moreDigital piracy is a problem that may never disappear from society. Through readily available resources such as those found in a university, students will always have access to illegal goods. While piracy is a global phenomenon, an institutionÃÂ's resources combined with the typical college studentÃÂ's lack of funds makes it more lucrative. Students use a number of methods to justify their actions ranging from previewing media to bringing justice to a corrupt company. While trying to understand the mindset of pirates is one route to deal with piracy, corporations attempted to alleviate the situation using added software encoding. These messages are not always effective, and in some cases caused further damage to consumer morale. Furthermore, students such as Joel Tenenbaum, who continued to pirate music despite warnings from his parents and the recording industry, exemplify the type of person that is unfazed by legal threats, leading to a question of ethics. Students may not feel that downloading is stealing despite numerous warnings from the Digital Millennium Copyright Act and other major media organizations. The predominant solution used by universities involves monitoring the studentsÃÂ' network connection to detect Peer-to-Peer (P2P) connections or other connections that involve the transferring of copyrighted goods. Unfortunately, the current tools contain flaws that a crafty student may easily circumvent, undermining any attempts a universityÃÂ's IT department may use to deter piracy. This study explored the nature of piracy prevention tools used by IT departments in the Florida State University System in order to determine their relative effectiveness. The study also looked into the opinions of the Information Security Officer in terms of alternative piracy prevention techniques that do not involve legal action and monitoring. It was found that most institutions do not use a formal piece of software that monitors for infringing data. They also stated that while their current techniques can do its required task, it was not perfected to a point where it could run autonomously. Furthermore, institutions agreed that students lack proper ethics and concern over the matter of copyright, but were not fully convinced that other preventions methods would be effective. The study ultimately considered monitoring techniques a short-term solution and that more research should be put into finding long-term solutions. It also implied that IT departments should be better funded in order to keep up with the technological gap.
Show less
-
Date Issued
-
2010
-
Identifier
-
CFE0003131, ucf:48645
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0003131