• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Illegal music downloads. This Essay will treat and analyze main points of advantages and disadvantages of unauthorized media files sharing; Government's aspiration to put down a breach of copyright; the influence of free and unlimited music downloads on

Extracts from this document...

Introduction

INTRODUCTION Nowadays, music has become an integral part in the life of modern man. For many years people have been expressing their feelings using music or the words expressed by the appropriate tune. Music has developed over several decades: many professional artists had appeared in that period, whose records were accessed to everyone in any music store in the forms of LPs, then cassettes, then CDs... It can be spend hours on discussing the development of the music industry, which has become one of the most profitable business areas. However, during the development of this sphere in the world of business has appeared a set of new, various industries, one of which is the Internet Network. With the advent of the global information network, the music industry began to suffer losses, because the Internet network with high speed began to develop piracy, unauthorized (illegal) media files sharing. This Essay will treat and analyze main points of advantages and disadvantages of unauthorized media files sharing; Government's aspiration to put down a breach of copyright; the influence of free and unlimited music downloads on various spheres of activities, such as industries of recording, marketing and modern technologies; piracy impact on the job market and musicians' income; the effect of copyright infringement on the level of economic growth of the country. Nowadays almost every Internet user has access to various computer programs for music downloads. ...read more.

Middle

Musicians need to be paid like everyone else", therefore "pirates" should be cut off from the internet to avoid further violations of the law (The Independent, 8 July 2009). Finally, one of the highest impacts of piracy is its influence on the level of economic growth in the country. Customers do not pay taxes for the music, because they download all the media files absolutely for free; and producers, because they cannot sell their products (CD albums). People, who lose their jobs, also cannot pay any payments, because they are unemployed. Moreover, the Government needs to pay them various welfare benefits to help them to survive. According to the Institutions' for Policy Innovation article, "In 2005, piracy conservatively cost U.S. industries collectively at least $25.6 billion in lost revenue" (The Institute for Policy Innovation, 3 October 2007). In other words, piracy directly effects and greatly decreases the economic level in the country. For that reason, the Government aims "to crack down on illegal file-sharing" that would help to raise the level of the economy in the country (The Independent, 8 July 2009). The Government uses various methods to stop illegal music files sharing. Among those methods are simple ones as "sending warning letters to those making illegal downloads" and more serious - as various punishments (The Independent, 8 July 2009). ...read more.

Conclusion

Finally, digital music downloads increase the demand of music players that increases the profit of developing techniques industries. Since customers are interested in carrying their music with them, they are forced to buy any of various types of music players. In this area the most benefit the world wide companies such as IPod or Apple. The organisers of the Consumer Electronics Show (CES) claim, that the "sales of MP3 players soared by 200% in 2005 to $3bn (�1.73bn)" and demand of players is expected to hit in a future (BBC, 2006). In conclusion, the music industry is one of the most profitable areas of business and, therefore, like other similar spheres of activity it makes not only profit, but also a loss (in this paper, this loss is piracy, illegal downloads of media files). However, by analyzing all the benefits and losses coming from piracy, it is difficult to identify whether music downloads is loss or vice versa makes more profit for the music industry. Therefore most appropriate solution in this situation is to find a compromise between both sides of piracy. In other words, digital music downloads should not be stopped or limited, although it also should not be absolutely for free. Minimal cost has to be applied to every internet user, but customers should have an opportunity to choose any music they like. That kind of solution would greatly increased the profit of recording companies, income of musicians and level of economic growth would significantly raised by taxes earned on the sold digital music. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Marked by a teacher

    Examine the key features around the growth, development and policing of cyber crime in ...

    4 star(s)

    call it of but the stalker refuses to accept it and becomes obsessed with the victim. Love Obsessional, these are stalkers who haven?t had a relationship with the victim but they believe that themselves and the victim have a special connection.

  2. The Use of Big IP in Gamer.TV.

    This saves time and a lot of energy as the NOC is placed in a different building to where the main office is situated. They also have to keep that the database correct, so they are like monitors as well like the people in the NOC who also monitor everything that is going on.

  1. Building Local Area Networks

    You will then be prompted to restart the computer. When your computer restarts, you may be asked to enter your username and password for Windows Networking. For username, enter your first name. Leave the password field blank and click OK.

  2. Produce a report for the Managing Director of Animal World Magazine outlining different ways ...

    * A badly managed network may operate less efficiently then stand alone computer. * It is difficult to prevent the unauthorised access to data and software * Printing can be slow if there are less printers and more computers because it will queue up * Virus are more likely to

  1. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    in extract the valuable data chips inside which then can be inputted in many different processers and other hard drives. This would be another devastating occurrence to Teign and Tow, as this would bring this business in disrepute. The aftermath would be spent trying to comeback from this.

  2. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, ...

    the 'Prestel System' operated by BT, which provided subscribers with both email facilities and access to number of database service." (D.Rowland & E. Macdonald, 2005) so even they did not mean to do that but they tricked BT operates and as a result they were caught and a prosecution was bought under Forgery and Counterfeiting Act 1981.

  1. Local area networks (LANs).

    This can be a "dumb" device, meaning it has no operating system, just a monitor and keyboard, or a "smart" node, meaning it can do it's own computing because of an internal central processor. A server is a node on the network that provides services to the users of that network.

  2. Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues ...

    Trained cryptanalysts could break complex code and no code in theory is unbreakable but it may take a large amount of time to decipher. When the code is finally broken the information maybe be out of date for the purpose it was collected for.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work