Search results

1 – 10 of 274
Book part
Publication date: 16 December 2015

William A. Kerr

The World Food Program provides food aid to areas of the world where food security is poor or non-existent – often failed states. Food can be a weapon in such places and food aid…

Abstract

Purpose

The World Food Program provides food aid to areas of the world where food security is poor or non-existent – often failed states. Food can be a weapon in such places and food aid shipments a target for capture. This paper investigates the cost-effectiveness of international efforts to protect World Food Program aid shipments destined for Somalia from seaborne pirates off the Horn of Africa.

Findings

The lessons of history were ignored by those attempting to prevent food aid shipments from falling into the hands of pirates. The international community initially used very expensive naval assets to protect shipments. Over time, in an effort to reduce costs, the strategy and assets used to secure shipments evolved. This slow, cost-reduction-driven evolution of the international community’s anti-piracy efforts off the Horn of Africa has distinct parallels with the evolution of anti-piracy efforts in the eighteenth and nineteenth centuries. One difference between the historic and current anti-piracy strategies is that there does not appear to be an exit strategy for the latter.

Practical implications

Future anti-piracy initiatives might look to previous strategies to avoid the costly experience associated with Somalia-bound food aid shipments.

Social implications

Achieving food security objectives can be a resource-intensive activity in failed states. This paper provides insights into how the resource cost of providing food security can be reduced.

Details

Food Security in an Uncertain World
Type: Book
ISBN: 978-1-78560-213-9

Keywords

Book part
Publication date: 21 December 2013

Cecilia Blengino

Purpose – This chapter discusses the criminalization of sharing music on peer-to-peer (p2p) networks. Taking the Italian situation into consideration, it aims to…

Abstract

Purpose – This chapter discusses the criminalization of sharing music on peer-to-peer (p2p) networks. Taking the Italian situation into consideration, it aims to introduce a socio-legal reflection about the processes of construction of this deviance.

Design methodology/approach – Adopting a constructionist approach, this chapter first explores the ways in which the social problem of music piracy was built in Italy. The choice of the legislator to place this practice within the category of criminal behaviour was analysed and examined. In the second section, the points of view of other participants involved in the practice of file sharing are taken into account.

Findings – Placing file sharing within the jurisdiction of criminal law does not seem to respond to the needs to counter the infringement of a shared social value, but it rather seems to reflect the protagonists’ involvement into the process of legislative decision about piracy conception and idea of the damage caused by this phenomenon, promoted and conveyed by the music business. The way in which piracy is conceived by Italian legislation emerges here in its partial understanding of the effects of this practice. Sharing music on digital networks appears as a highly conflicted crime, whose harmfulness is scarcely perceived by the society. Furthermore, file sharing repression policy seems to give shape to a new victimless crime, whose harmful effects do not seem to actually fall back on artists or consumers.

Originality/value – Sharing music on the net and violating copyright is little studied from the perspective of the sociology of crime. Using this approach, this chapter contributes to a better understanding of the phenomenon.

Book part
Publication date: 21 December 2013

Serona Elton

Purpose – In this chapter, I explore the graduated response approach to combatting online piracy, and examine the different ways in which this approach has been…

Abstract

Purpose – In this chapter, I explore the graduated response approach to combatting online piracy, and examine the different ways in which this approach has been implemented in the United States and around the world.

Design/methodology/approach – I discuss the legal, political, and industrial origins and current state of the graduated response programs in each country.

Findings – Overall, the most successfully launched graduated response programs have been the ones where a single entity is overseeing the program implementation, and the code of conduct has been well articulated.

Originality/value of chapter – Few scholars have examined the processes leading up to the implementation of graduated response programs and the mechanics of how they work in practice. This chapter does this by looking, chronologically, at the developments in each country as well as the choreography of its notice process.

Details

Music and Law
Type: Book
ISBN: 978-1-78350-036-9

Keywords

Book part
Publication date: 18 June 2020

Anindya Bhukta

Abstract

Details

Legal Protection for Traditional Knowledge
Type: Book
ISBN: 978-1-80043-066-2

Book part
Publication date: 14 August 2015

Debora Halbert

This paper is designed to seek out the everyday narratives of copyright. To find these narratives, I analyze the comments section of websites where users can post their reactions…

Abstract

This paper is designed to seek out the everyday narratives of copyright. To find these narratives, I analyze the comments section of websites where users can post their reactions to copyright-related stories. I argue that understanding how people who are not legal scholars frame the use of copyright as they discuss sharing, owning, and controlling the copy is a good place to begin to develop a sense for the everyday life of copyright law.

Details

Special Issue: Thinking and Rethinking Intellectual Property
Type: Book
ISBN: 978-1-78441-881-6

Keywords

Book part
Publication date: 21 December 2013

Juan D. Montoro-Pons and Manuel Cuadrado-García

Purpose – Despite an abundance of literature on the effects of copyright infringement on music consumption, empirical evidence remains ambiguous. The aim of this…

Abstract

Purpose – Despite an abundance of literature on the effects of copyright infringement on music consumption, empirical evidence remains ambiguous. The aim of this chapter is to quantify the effect of copyright infringement on recorded music purchases and live music attendance for Spanish frequent music consumers, and to measure its effect on participation for all music consumers.

Design/methodology approach – We rely on survey data for the Spanish population as our main information source and use propensity score matching to estimate the average effect of copyright infringement on music consumption. In order to do so, the methodology aims at estimating the difference between actual outcomes (record purchases or attendance to live concerts) for copyright infringers and the (counterfactual) outcome would they had not been infringers.

Findings – Two findings stand out. First, and with regards to recorded music consumption, we find a net positive effect of copyright infringement on full album purchases although a nonsignificant one for tracks. Second, there is a positive and significant effect on live attendance, which is consistent with an indirect appropriation effect across products. These results are robust when participation is considered, but some interesting differences arise between recorded music purchasers and live concerts attenders.

Originality/value – First, the use of a counterfactual control group provides an additional approach to the assessment of copyright infringement. Second, within the same framework we investigate the effects of copyright infringement on recorded and live music, an approach that sheds some light on the degree of complementarity between both markets.

Book part
Publication date: 20 March 2007

Kyoko Fukukawa, Christine Ennew and Steve Diacon

This paper examines why ordinary people engage in aberrant consumer behavior (ACB), and pays particular attention to the extent to which consumer perceptions of corporate…

Abstract

This paper examines why ordinary people engage in aberrant consumer behavior (ACB), and pays particular attention to the extent to which consumer perceptions of corporate ‘unfairness’ lead to a response in kind. The study examines five ethical scenarios including insurance claim exaggeration and software piracy, using data from 344 UK consumers. Ajzen's theory of planned behavior (TPB) provides an initial analytical framework. The study also adopts an additional variable, perceived unfairness, referring to the extent to which an actor is motivated to redress an imbalance perceived as unfair.

In comparison to TPB, the study reveals different components of ACB. Furthermore, analysis of variance indicates that consumer perceptions of unfairness by insurance companies provide a significant reason for claim exaggeration. This suggests that ACB is one form of market response to unfair corporate performance. Thus it is argued that an examination of ACB will not only help to understand which ethical aspects of corporate performance might be perceived as unfair, but also to evaluate the extent to which it contributes to a negative perception of particular industries and corporations. The closing discussion considers how a consumer negative response to corporate performance might relate to pricing, product attributes and customer relationships.

Details

Insurance Ethics for a More Ethical World
Type: Book
ISBN: 978-1-84950-431-7

Book part
Publication date: 27 April 2004

Bharat Anand and Alexander Galetovic

In many sectors property rights over knowledge and information are weak as they are embodied in employees, competitors can copy or customers can pirate. Yet comprehensive studies…

Abstract

In many sectors property rights over knowledge and information are weak as they are embodied in employees, competitors can copy or customers can pirate. Yet comprehensive studies show that firms systematically invest in these assets. We offer a simple taxonomy of strategies that firms use to cope with weak property rights.We classify these strategies in three groups: (i) Some firms threaten offenders with strong competition. (ii) Other firms exploit complementarities and offer potential offenders a better deal than they can get elsewhere. (iii) And yet other firms exploit weak property rights and make profits on complementary assets or products that they can own.We go beyond taxonomy by showing when a particular strategy works. It depends systematically on the characteristics of both the asset and the investing firm.

Details

Intellectual Property and Entrepreneurship
Type: Book
ISBN: 978-1-84950-265-8

Book part
Publication date: 2 September 2009

Ruth A. Miller

This is an essay that will be misinterpreted. Before I even mention genocidal rights, I want to make clear what my argument is not. First, my argument is not that genocide has not…

Abstract

This is an essay that will be misinterpreted. Before I even mention genocidal rights, I want to make clear what my argument is not. First, my argument is not that genocide has not happened or does not continue to happen. Second, I will not suggest that genocide is not a serious crime. Finally, I will not try to develop a theory of victimhood – to challenge the centrality of the victim in discussions of genocide. Rather, my interest here will be the uncomfortably intimate relationship between genocidal violence on the one hand and the elaboration of civil, sovereign, and human rights on the other.

Details

Special Issue Revisiting Rights
Type: Book
ISBN: 978-1-84855-930-1

Abstract

Details

Energy Economics
Type: Book
ISBN: 978-1-83867-294-2

1 – 10 of 274