Free Essay

How Is Digital Piracy Hurting Modern Society?

In:

Submitted By noswall2112
Words 1689
Pages 7
| How is Digital Piracy Hurting Modern Society? | | |

Introduction Digital Piracy is a huge crime that is large hurting the entertainment business here in the United States and in other countries, but the question I ask myself is how digital piracy hurting modern society? What actions are our governments taking to stop people from downloading illegal music, movies, and software? How much of a profit loss is effecting the companies that are producing this digital material? If someone knows what the punishment is for downloading music, movies, and software would they still do it. This research will aim to understand what is digtal piracy is and why it is that people download illegal software, movies, and music.
Literature review In the article Examine Digital Piracy: Self-Control, Punishment, and Self-Efficacy, the authors introduce what digital piracy is and how it changes on a constant basis. They show how the “United States government has been cooperating in the fight against digital piracy with the software, music and movie industries with the Digital Millennium Copyright Act (DCMA)” (Zhang, Smith, McDowell, 2009). They discuss how most people think that digital piracy is acceptable, it a soft crime and it does not hurt anyone, and most think that this information should be exchanged freely. The authors also did an online-survey study on college students who were taking Management Information Sciences (MIS) course at a public university in the southern United States in 2006 (Zhang, Smith, McDowell, 2009). The reason college students were used is that piracy is very prevalent in academia, and students use pirated software extensively. The students were asked to complete the survey within a week and a confidentiality statement was included to assure the student that no personal information would be disclosed. A Likert scale was used with a scale of “1” to “5”, 1 being strongly disagree and 5 being strongly agree. Some of the questions subjects were asked had to do with Punishment Severity received, which was used to measure the severity of digital piracy punishment they would get if they were caught downloading illegal software. Other questions were about Self-Efficacy, which is used to find out if students are able to duplicate a copyrighted CD, download authorized software, music and DVD’s. This article had a limited number of people they could surveyed since it was not an entire population. They also should have talked to people that were charged with digital piracy infractions. The survey also gave incentive to who participated, giving an extra point on their final grade if they completed the survey. By doing this, students were encouraged to give any answer just to get the extra point on their final grade. The authors also pointed out were that respondents might not be fully aware that digital piracy could cause great financial loss for not only the artists, but the also the producers, managers, graphic artists and all other involved in the production of copyrighted materials. (Zhang, Smith, McDowell, 2009). In article titled Neutralizations and Rationalization of Digital Piracy: A Qualitative Analysis of University Students. The authors indicate how digital piracy has become a topic of immense concern, so much so, that it has attracted the attention of both legislators and academics (Moore, McMullan, 2009). It also explains what peer-to-peer file sharing (also known as P2P) is, and how it still continues to intrigue both researchers and practitioners in the fields of criminology, economics and computer science. The researchers and practitioners of these fields are interested in this because of the speed at which technology has evolved. It is creating conflicts between users and traditional intellectual property laws. Some people in the music and film industry have put the blame on technology for the lagging sales of compact disk and digital video disks. The authors created a questionnaire that they used in interviews with students that were self- confessed file sharers (Moore, McMullan, 2009). The students were selected from criminal justice and criminology courses were selected from three mid-size universities. These universities were picked from a previous research that the authors conducted on the attitudes of file sharers. (Moore, McMullan, 2009). The authors believed that college students were the best target group because they have easy access to computers and are mostly likely to have moderate or advance computer skills, and to engage in file sharing. The interview format that the authors used was a semi-interview format that they could use to obtain some basic information on the demographic of the students, and the frequency of file sharing activities. The answers received did not support any of the author’s expected results. The Participants age ranged from 18 to 29 years old, 14 of the participants were female and 30 being male. The results of the author’s research shows that people who download copyright materials via P2P networks will not stop there criminal behavior. They also discuss how it makes since that most of the people who use P2P file sharing software are law-abiding citizens, except when downloading copyrighted materials. The article titled Knowledge Of Software Piracy as an Antecedent to Reducing Pirating Behavior. The authors are asking the question “Can legislative and education outreach programs reduce the level of software piracy?”(Moores, Nill, Marcus, 2009,pg1). It also goes in to how much potential revenue relevance that software companies are losing around the world. Some of the legislation that governments around the have created to combat digital piracy is the DCMA, World Trade Organization’s (WTO), Trade-Related Aspects of Intellectual Property Rights (TRIPs), and the World Intellectual Property Organizations (WIPO). There have been educational programs since the 1990’s such as ‘Don’t Copy that Floppy’ which was developed by the Software Publisher Alliance (SPA) (Moores, Nill, Marcus, 2009, pg1). There also a site called “TheTrueCross.Org” that outlines the total amount of job losses and money that is lost with all types of counterfeiting and piracy. All these educational programs are designed for people to understand software piracy is a crime and it does have a harmful effect economic consequences and social. The authors investigated an individual’s software piracy behavior by using a survey and borrowing from the Theory of Planned Behavior (TPB) (Moores, Nill, Marcus, 2009, pg1). The Theory of Planned Behavior suggest that behavior is determined by one’s personal (attitude), social (subjective norms), and volitional (perceived behavioral control) beliefs (Moores, Nill, Marcus, 2009, pg1.) The survey that was created for this was a set of six questions. It was deigned to capture different aspects of software piracy for example legal protection given to the software, major economic and social losses in the U.S. with software piracy. The target sample that was used was business students at a southwestern university and the survey was given to 108 students. All the surveys were returned but 5 very incomplete and leaving just 103 surveys to use. The demographic was 52% males and 48% females. Some of the limitations that we found were that the information they gathered could not be honestly. When they gathered there information after the survey was a possibility that answers that they got were not answered honestly. Another was the communication channel that the knowledge about software piracy was acquired. The article titled Internet Scallywags: A Comparative Analysis of Multiple Forms and Measurements of Digital Piracy. The authors explains how internet based digital piracy has recently become a widespread occurrence (Whitney, 2009, pg. 1). He also goes on to say that if piracy could be decreased by 10% in the United States it would add about 100,00 new jobs and increase tax revenue by $21 billion dollars. The study that was conducted in this research was a combination what has been done in previous studies with software piracy. The author is attempting to find out which form of piracy ( i.e. software, music, movies) and then determine which ones are being downloaded more than the others. There are also other control variables that were introduced in to the study (i.e. broadband internet access and personal income) that the author said has not been used before(Whitney, 2009, pg. 1). This study was conducted at a mid-Atlantic college with a total of 513 students. The students were asked questions as to how often they downloaded files (movies, music, software) without paying for them, if their parents would approve of them downloading illegal movies, music, and/or software, if they knew what the punishment and the severity was if they were caught, what is their income and their parents income, what college major were they taking and what is there class year, and other questions (Whitney, 2009, pg. 6-7). From the results of the research it showed that students that had friends in digital piracy and who had strong parental support for such behavior were more likely to participate in such activities. The results also showed that if students knew that punishment was more than likely in software piracy, then they would not commit the act. The limitations that were brought up in this article were the all the data that was collected was self-reported and that the response on parental support and peer activity were inaccurate it.
Conclusion

Reference page

Zhang, L., Wayne, W. S., & William, C. M. (2009). Examining digital piracy: Self-control, punishment, and self-efficacy. Information Resources Management Journal, 22(1), 24-44. Retrieved from http://search.proquest.com/docview/215884683?accountid=27655
Moore, R., & McMullan, E. C. (2009). Neutralizations and rationalizations of digital piracy: A qualitative analysis of university students. International Journal of Cyber Criminology, 3(1), 441-451. Retrieved from http://search.proquest.com/docview/89069440?accountid=27655
Trevor, T. M., Nill, A., & Marcus, A. R. (2009). Knowledge of software piracy as an antecedent to reducing pirating behavior. The Journal of Computer Information Systems, 50(1), 82-89. Retrieved from http://search.proquest.com/docview/232572861?accountid=27655
Whitney, D. G. (2009). Internet scallywags: A comparative analysis of multiple forms and measurements of digital piracy. Western Criminology Review, 10(1), 15-28. Retrieved from http://search.proquest.com/docview/235106027?accountid=27655

Similar Documents

Free Essay

Nigerian Movies and the Youth

...JORIND 10 (2), June, 2012. ISSN 1596 - 8308. www.transcampus.org./journals, www.ajol.info/journals/jorind NOLLYWOOD MOVIES ANDNIGERIAN YOUTHS-AN EVALUATION J. O.Nnabuko Department of Marketing. University of Nigeria, Enugu Campus,Nigeria and Tina C. Anatsui Department of Mass Communication. Babcock University, Ilishan-Remo, Nigeria E-mail: chinyere_06@yahoo.com+234-805-2422-918 Abstract This paper is an advocacys on the impacts of Nollywood movies as the two-edge sword for the national development. It contends that its establishment has helped greatly in developing talents, and serves as a medium of entertainment and communication. It also highlights various critics that praised the ability of Nollywood industry in the past, and expresses concern on the reverse focus on the negative themes and its negative impact on youth behaviour and the image of Nigeria. The qualitative and quantitative data analysis based on the empirical secondary and primary data were employed. The data collected on both were presented in tabular form and analyzed using simple percentages. Purposive random sampling technique and questionnaire as an instrument were used during the class-meeting. Keywords: Nollywood, behavior, youths, movies Introduction Film was introduced into Nigeria in the 1900’s by the British colonialist who used it for propaganda purposes, while the church used it to spread the Gospel.The Colonial Administration and the Church saw film not only as a medium of entertainment but as...

Words: 5540 - Pages: 23

Free Essay

Nollywood Movies and Nigerian Youths - an Evaluation

...JORIND 10 (2), June, 2012. ISSN 1596 - 8308. www.transcampus.org./journals, www.ajol.info/journals/jorind NOLLYWOOD MOVIES ANDNIGERIAN YOUTHS-AN EVALUATION J. O.Nnabuko Department of Marketing. University of Nigeria, Enugu Campus,Nigeria and Tina C. Anatsui Department of Mass Communication. Babcock University, Ilishan-Remo, Nigeria E-mail: chinyere_06@yahoo.com+234-805-2422-918 Abstract This paper is an advocacys on the impacts of Nollywood movies as the two-edge sword for the national development. It contends that its establishment has helped greatly in developing talents, and serves as a medium of entertainment and communication. It also highlights various critics that praised the ability of Nollywood industry in the past, and expresses concern on the reverse focus on the negative themes and its negative impact on youth behaviour and the image of Nigeria. The qualitative and quantitative data analysis based on the empirical secondary and primary data were employed. The data collected on both were presented in tabular form and analyzed using simple percentages. Purposive random sampling technique and questionnaire as an instrument were used during the class-meeting. Keywords: Nollywood, behavior, youths, movies Introduction Film was introduced into Nigeria in the 1900’s by the British colonialist who used it for propaganda purposes, while the church used it to spread the Gospel.The Colonial Administration and the Church saw film not only as a medium...

Words: 5540 - Pages: 23

Free Essay

Emerging Asian Markets

...Foreign Direct Assessment: Analyzing the Mobility of FDI Models in Emerging Markets Kyle Himmelwright & Damian Zaccaria, Villanova Business School In this article, the authors will explore foreign direct investment in emerging markets. Applying a two prong investment model, they’ll assess three emerging Southeast Asian marketplaces; Indonesia, Thailand, and Malaysia. Additionally, they’ll explore the impact a variety of explicit and implicit factors have on the outcome. The research will indicate which of the three markets has the most potential for investment. Keywords: Foreign Direct Investment (FDI), emerging markets, investment, economic factors, growth, defense Foreign direct investment (FDI) plays a prominent and growing role in the global marketplace. FDI is defined as an investment made by a company or entity based in another country. The investment provides the firm with an opportunity to access new markets and marketing channels, cheaper production facilities, access to new technology, products, skills and financing (Goingglobal.com 2015). Accurately assessing marketplace factors is essential when evaluating whether to invest in a foreign market, especially when it comes to making decisions requiring foresight and conviction. “The world is changing very fast. Big will not beat small anymore. It will be the fast beating the slow.” Rupert Murdoch’s quote concisely illustrates the current state of the global marketplace; it simply isn't as big as...

Words: 10050 - Pages: 41

Premium Essay

Krugman Ethemes

...Trade Partners Maintain Unhealthy Long-Term Relationship" By Louis Uchitelle, New York Times, Saturday, September 18, 2004 1. The subject of this article centers on the current account balance. Does this seem like an "international trade" or an "international money" issue? Answer: Aspects of the issue seem to overlap with both areas of international economics. The article discusses goods and services transactions [trade], as well as international borrowing and exchange rates [money]. 2. Many economists seem to be giving the issue of the current account a lot of thought. Does there seem to be a consensus in the article? Does your answer surprise you? Answers will vary. If anything, the consensus is confusion—confusion at how the deficit has persisted for so long with no severe consequences. Bergsten stands out as the most alarmed, though almost every economist seems a bit concerned about the trade deficit. This economist, on the contrary, is not concerned at all about the current account deficit, and you may come to your own conclusion upon reading further chapters. In general economists tend to agree about many big-picture issues, but may disagree occasionally where the data is open to interpretation or when more ideological considerations come into play. 3. Near the end of the article there is a logical fallacy about the current account deficit. Can you find it? Answer: The 4th to last paragraph begins with the sentence "[w]ith less and less production...

Words: 10454 - Pages: 42

Premium Essay

Manager

...Introduction "U.S. and Trade Partners Maintain Unhealthy Long-Term Relationship " By Louis Uchitelle, New York Times, Saturday, September 18, 2004 1. The subject of this article centers on the current account balance. Does this seem like an "international trade" or an "international money" issue? Answer: Aspects of the issue seem to overlap with both areas of international economics. The article discusses goods and services transactions [trade], as well as international borrowing and exchange rates [money]. 2. Many economists seem to be giving the issue of the current account a lot of thought. Does there seem to be a consensus in the article? Does your answer surprise you? Answers will vary. If anything, the consensus is confusion—confusion at how the deficit has persisted for so long with no severe consequences. Bergsten stands out as the most alarmed, though almost every economist seems a bit concerned about the trade deficit. This economist, on the contrary, is not concerned at all about the current account deficit, and you may come to your own conclusion upon reading further chapters. In general economists tend to agree about many big-picture issues, but may disagree occasionally where the data is open to interpretation or when more ideological considerations come into play. 3. Near the end of the article there is a logical fallacy about the current account deficit. Can you find it? Answer: The 4th to last paragraph begins with the sentence "[w]ith less and less production at home…"...

Words: 10754 - Pages: 44

Premium Essay

Network Security and Ethical Hacking

...Network Security & Ethical Hacking ------------------------------------------------- ------------------------------------------------- Neal Patrick and his friends did not realise they were doing anything unethical, in fact: when asked by Congress “At what point he questioned the ethics of his actions” – he answered “Once the FBI knocked upon my door.” “I have found that inadequate network security is usually caused by a failure to implement security policies and make use of the security tools that are readily available. It’s vital that companies complete professional risk assessments and develop comprehensive security plans and infrastructures that are publicly supported by upper management” Network security is not only about the WAN (Wide Area Network) but also the LAN (Local Area Network) as the two go hand in hand. It is possible to not only have an attack from the Internet but also internally. The moment any form of computer device becomes network capable or dependent of some form of network function, there is a given need for protection to safeguard the flow of information to and from the said device on a given network whether public or private and/or from a trusted to non-trusted source. The problem with locking down a network tightly is the administrative overhead it creates. The more secure the network becomes the greater the need is for someone or a team to administrate this. Eventually you would reach a point where it becomes impossible for the end-user...

Words: 5261 - Pages: 22

Free Essay

Rethinking the Networked Economy: the True Forces Driving the Digital Marketplace

...Rethinking the Networked Economy: The True Forces Driving the Digital Marketplace. By Stan Liebowitz Professor of Economics University of Texas at Dallas 2/3/2002 Chapter 1 Introduction .............................................................................................. 1 A. What you will find in later chapters............................................................ 3 Chapter 2: Basic Economics of the Internet.............................................................. 9 A. How the Internet creates value.................................................................... 9 B. Special Economics of the Internet, or maybe not so special..................... 13 i. Network effects......................................................................................... 13 ii. Economies of Scale................................................................................... 15 iii. Winner take all.......................................................................................... 17 C. How the Internet Alters the likelihood of Winner-take-all....................... 20 Chapter 3: Racing to be first: Faddish and Foolish ................................................. 25 A. From Winner-take-all to First-Mover-Wins ............................................. 26 B. The Concept of Lock-In............................................................................ 32 i. Strong Lock-In ...................................................................

Words: 71038 - Pages: 285

Premium Essay

Corporate Social Responsibility

...Responsibilities Managing Company Ethics and Social Responsibility Ethical Individuals Ethical Leadership Organizational Structures and Systems Ethical Challenges in Turbulent Times Economic Performance Social Entrepreneurship Managerial Ethics and Corporate Social Responsibility LEARNING OBJECTIVES After studying this chapter, you should be able to do the following: 1 2 3 4 5 6 7 Define ethics and explain how ethical behavior relates to behavior governed by law and free choice. Explain the utilitarian, individualism, moral rights, and justice approaches for evaluating ethical behavior. Describe how individual and organizational factors shape ethical decision making. Define corporate social responsibility and how to evaluate it along economic, legal, ethical, and discretionary criteria. Describe four organizational approaches to environmental responsibility, and explain the philosophy of sustainability. Discuss how ethical organizations are created through ethical leadership and organizational structures and systems. Identify important stakeholders for an organization and discuss how managers balance the interests of various stakeholders. 118 Manager’s Challenge Timberland is known for great shirts and solid climbing boots. The company has had a good financial history with decent revenues and profits. But CEO Jeffrey Swartz wanted something more. In the early 1990s, he...

Words: 21252 - Pages: 86

Premium Essay

Ethics

...ETHICS IN INFORMATION TECHNOLOGY Third Edition This page intentionally left blank ETHICS IN INFORMATION TECHNOLOGY Third Edition George W. Reynolds Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Ethics in Information Technology, Third Edition by George W. Reynolds VP/Editorial Director: Jack Calhoun Publisher: Joe Sabatino Senior Acquisitions Editor: Charles McCormick Jr. Senior Product Manager: Kate Hennessy Mason Development Editor: Mary Pat Shaffer Editorial Assistant: Nora Heink Marketing Manager: Bryant Chrzan Marketing Coordinator: Suellen Ruttkay Content Product Manager: Jennifer Feltri Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Technology Project Manager: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Green Pen Quality Assurance Proofreader: Suzanne Huizenga Indexer: Alexandra Nickerson Composition: Pre-Press PMG © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission...

Words: 204343 - Pages: 818

Free Essay

Networks

...The Wealth of Networks The Wealth of Networks How Social Production Transforms Markets and Freedom Yochai Benkler Yale University Press New Haven and London Copyright _ 2006 by Yochai Benkler. All rights reserved. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. The author has made an online version of the book available under a Creative Commons Noncommercial Sharealike license; it can be accessed through the author’s website at http://www.benkler.org. Printed in the United States of America. Library of Congress Cataloging-in-Publication Data Benkler, Yochai. The wealth of networks : how social production transforms markets and freedom / Yochai Benkler. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-300-11056-2 (alk. paper) ISBN-10: 0-300-11056-1 (alk. paper) 1. Information society. 2. Information networks. 3. Computer networks—Social aspects. 4. Computer networks—Economic aspects. I. Title. HM851.B457 2006 303.48'33—dc22 2005028316 A catalogue record for this book is available from the British Library. The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources. 10 9 8 7 6 5 4 3 2 1...

Words: 214717 - Pages: 859

Premium Essay

Jpmorgan Matrix Structure

...managing NOW! Gary Dessler Florida International University Jean Phillips Rutgers University Houghton Mifflin Company Boston New York To Samantha Vice President, Executive Publisher: George Hoffman Executive Sponsoring Editor: Lisé Johnson Senior Marketing Manager: Nicole Hamm Development Editor: Julia Perez Cover Design Manager: Anne S. Katzeff Senior Photo Editor: Jennifer Meyer Dare Senior Project Editor: Nancy Blodget Editorial Assistant: Jill Clark Art and Design Manager: Jill Haber Senior Composition Buyer: Chuck Dutton Cover photo credits Main image: © Bryan F. Peterson/CORBIS Lower left image: © Stockbyte/Getty Images Lower right image: © David Oliver/Getty Images Additional photo credits are listed on page 516. Copyright © 2008 by Houghton Mifflin Company. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or by any information storage or retrieval system without the prior written permission of Houghton Mifflin Company unless such copying is expressly permitted by federal copyright law. Address inquiries to College Permissions, Houghton Mifflin Company, 222 Berkeley Street, Boston, MA 02116-3764. Printed in the U.S.A. Library of Congress Control Number: 2007924351 Instructor’s exam copy : ISBN-13: 978-0-618-83347-4 ISBN-10: 0-618-83347-1 For orders, use student text ISBNs: ISBN-13: 978-0-618-74163-2 ISBN-10: 0-618-74163-1 1 2 3 4 5 6 7...

Words: 96057 - Pages: 385

Premium Essay

Management Information Systems

...Course Technology’s Management Information Systems Instructor and Student Resources Introduction to IS/MIS Principles of Information Systems, Eighth Edition • Stair, Reynolds Fundamentals of Information Systems, Fourth Edition • Stair, Reynolds Management Information Systems, Sixth Edition • Oz Information Technology in Theory • Aksoy, DeNardis Office Applications in Business Problem-Solving Cases in Microsoft Access & Excel, Sixth Annual Edition • Brady, Monk Succeeding in Business Applications with Microsoft Office 2007 • Bast, Gross, Akaiwa, Flynn, et.al Succeeding in Business with Microsoft Office Excel 2007 • Gross, Akaiwa, Nordquist Succeeding in Business with Microsoft Office Access 2007 • Bast, Cygman, Flynn, Tidwell Databases Database Systems, Eighth Edition • Rob, Coronel Concepts of Database Management, Sixth Edition • Pratt, Adamski Data Modeling and Database Design • Umanath, Scamell A Guide to SQL, Seventh Edition • Pratt A Guide to MySQL • Pratt, Last Guide to Oracle 10g • Morrison, Morrison, Conrad Oracle 10g Titles Oracle9i Titles Enterprise Resource Planning Concepts in Enterprise Resource Planning, Third Edition • Monk, Wagner Data Communications Data Communications and Computer Networks: A Business User’s Approach, Fourth Edition • White Systems Analysis and Design Systems Analysis and Design in a Changing World, Fifth Edition • Satzinger, Jackson, Burd Object-Oriented Analysis and Design with the Unified Process • Satzinger, Jackson, Burd Systems Analysis and...

Words: 223685 - Pages: 895

Free Essay

Gmat

...GMAT GRADUATE MANAGEMENT ADMISSION TEST McGraw-Hill’s 2008 Edition James Hasik Stacey Rudnick Ryan Hackney New York | Chicago | San Francisco | Lisbon London | Madrid | Mexico City | Milan | New Delhi San Juan | Seoul | Singapore | Sydney | Toronto Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Manufactured in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. 0-07-151120-2 The material in this eBook also appears in the print version of this title: 0-07-149340-9. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. For more information, please contact George Hoare, Special Sales, at george_hoare@mcgraw-hill.com or (212) 904-4069. TERMS OF USE This is a copyrighted work and The McGraw-Hill Companies, Inc. (“McGraw-Hill”) and its licensors reserve all rights...

Words: 234594 - Pages: 939

Premium Essay

Paper

...Management of Information Security Third Edition This page intentionally left blank Management of Information Security Third Edition Michael Whitman, Ph.D., CISM, CISSP Herbert Mattord, M.B.A., CISM, CISSP Kennesaw State University ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Management of Information Security, Third Edition Michael E. Whitman and Herbert J. Mattord Vice President, Career and Professional Editorial: Dave Garza Executive Editor: Stephen Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Developmental Editor: Lynne Raughley Editorial Assistant: Meghan Orvis Vice President, Career and Professional Marketing: Jennifer McAvey Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Senior Content Project Manager: Andrea Majot Senior Art Director: Jack Pendleton Cover illustration: Image copyright 2009. Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information...

Words: 229697 - Pages: 919

Free Essay

Kiki

...1 . For Nassim Nicholas Taleb, black swans underlie almost everything about our world, from the rise of religions to events in our own personal lives. A BLACK SWAN Why do we not acknowledge the phenomenon of black swans until after they occur? Part of the answer, according to Taleb, is that humans are hardwired to learn specifics when they should be focused on generalities. We concentrate on things we already know and time and time again fail to take into consideration what we don't know. We are, therefore, unable to truly estimate oppor­ tunities, too vulnerable to the impulse to simplify, narrate, and categorize, and not open enough to rewarding those who can imagine the "impossible." For years, Taleb has studied how we fool our­ selves into thinking we know more than we actually do. We restrict our thinking to the irrelevant and inconsequential, while large events continue to surprise us and shape our world. Now, in this reve­ latory book, Taleb explains everything we know about what we don't know. He offers surprisingly simple tricks for dealing with black swans and ben­ efiting from them. Elegant, startling, and universal in its applica­ tions, The Black Swan will change the way you look at the world. Taleb is a vastly entertaining writer, with wit, irreverence, and unusual stories to tell. He has a polymathic command of subjects ranging from cognitive science to business to...

Words: 158140 - Pages: 633