• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Illegal music downloads. This Essay will treat and analyze main points of advantages and disadvantages of unauthorized media files sharing; Government's aspiration to put down a breach of copyright; the influence of free and unlimited music downloads on

Extracts from this document...


INTRODUCTION Nowadays, music has become an integral part in the life of modern man. For many years people have been expressing their feelings using music or the words expressed by the appropriate tune. Music has developed over several decades: many professional artists had appeared in that period, whose records were accessed to everyone in any music store in the forms of LPs, then cassettes, then CDs... It can be spend hours on discussing the development of the music industry, which has become one of the most profitable business areas. However, during the development of this sphere in the world of business has appeared a set of new, various industries, one of which is the Internet Network. With the advent of the global information network, the music industry began to suffer losses, because the Internet network with high speed began to develop piracy, unauthorized (illegal) media files sharing. This Essay will treat and analyze main points of advantages and disadvantages of unauthorized media files sharing; Government's aspiration to put down a breach of copyright; the influence of free and unlimited music downloads on various spheres of activities, such as industries of recording, marketing and modern technologies; piracy impact on the job market and musicians' income; the effect of copyright infringement on the level of economic growth of the country. Nowadays almost every Internet user has access to various computer programs for music downloads. ...read more.


Musicians need to be paid like everyone else", therefore "pirates" should be cut off from the internet to avoid further violations of the law (The Independent, 8 July 2009). Finally, one of the highest impacts of piracy is its influence on the level of economic growth in the country. Customers do not pay taxes for the music, because they download all the media files absolutely for free; and producers, because they cannot sell their products (CD albums). People, who lose their jobs, also cannot pay any payments, because they are unemployed. Moreover, the Government needs to pay them various welfare benefits to help them to survive. According to the Institutions' for Policy Innovation article, "In 2005, piracy conservatively cost U.S. industries collectively at least $25.6 billion in lost revenue" (The Institute for Policy Innovation, 3 October 2007). In other words, piracy directly effects and greatly decreases the economic level in the country. For that reason, the Government aims "to crack down on illegal file-sharing" that would help to raise the level of the economy in the country (The Independent, 8 July 2009). The Government uses various methods to stop illegal music files sharing. Among those methods are simple ones as "sending warning letters to those making illegal downloads" and more serious - as various punishments (The Independent, 8 July 2009). ...read more.


Finally, digital music downloads increase the demand of music players that increases the profit of developing techniques industries. Since customers are interested in carrying their music with them, they are forced to buy any of various types of music players. In this area the most benefit the world wide companies such as IPod or Apple. The organisers of the Consumer Electronics Show (CES) claim, that the "sales of MP3 players soared by 200% in 2005 to $3bn (�1.73bn)" and demand of players is expected to hit in a future (BBC, 2006). In conclusion, the music industry is one of the most profitable areas of business and, therefore, like other similar spheres of activity it makes not only profit, but also a loss (in this paper, this loss is piracy, illegal downloads of media files). However, by analyzing all the benefits and losses coming from piracy, it is difficult to identify whether music downloads is loss or vice versa makes more profit for the music industry. Therefore most appropriate solution in this situation is to find a compromise between both sides of piracy. In other words, digital music downloads should not be stopped or limited, although it also should not be absolutely for free. Minimal cost has to be applied to every internet user, but customers should have an opportunity to choose any music they like. That kind of solution would greatly increased the profit of recording companies, income of musicians and level of economic growth would significantly raised by taxes earned on the sold digital music. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Marked by a teacher

    Examine the key features around the growth, development and policing of cyber crime in ...

    4 star(s)

    call it of but the stalker refuses to accept it and becomes obsessed with the victim. Love Obsessional, these are stalkers who haven?t had a relationship with the victim but they believe that themselves and the victim have a special connection.

  2. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    The maintaining can include tasks such as cleaning, opening up the systems and extracting the dust inside. Computing fans are one of the most important items to be maintained, a broken fan could lead to a system overheating therefore the systems need to be checked.

  1. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, ...

    As stated above Computer Misuse Act states three offenses, the "provision of section 1,2 and 3 of the Computer Misuse Act, as now amended by the Police and Justice Act 2006, provide the major United Kingdom activity in the regard of illegal access involving hacking, virus and the misuse of devices."

  2. Building Local Area Networks

    From the Desktop, double click My Computer. Then double click Control Panel, and then the Network Icon. You are then presented with this screen; To select the relevant components, click the add button to access the following window. From this screen, select Protocol then click add.

  1. Produce a report for the Managing Director of Animal World Magazine outlining different ways ...

    Its expensive because of the large number of cables and connections required o Complicated o Difficult to install o Difficult to manage o Difficult to troubleshoot Details of Mesh Topology Topology Cable Connector Hardware Software Protocol Single Point Failure Mesh CAT5 RJ45 - C/S Ethernet - Ethernet Cable Summary Specification

  2. The Use of Big IP in Gamer.TV.

    Gamer use a program called web logic this stores the gamer's previous scores and information, It also stores private information on all the users and on all the staff at gamer, some of the information the users can see such as the other users profiles, but addresses and card numbers can only be seen by specific individuals at Gamer.

  1. Local area networks (LANs).

    A server will manage hardware and software resources or monitor the exchange of information through a network. Each server will respond to the requests of a user and provide a service, like printing a document or retrieving a stored file. There are two basic types of servers: Dedicated and Non-dedicated.

  2. Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues ...

    Trained cryptanalysts could break complex code and no code in theory is unbreakable but it may take a large amount of time to decipher. When the code is finally broken the information maybe be out of date for the purpose it was collected for.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work