| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

Towards A Theory of Piracy for the Information Age

Page history last edited by Riela Isabel Antonio 15 years, 1 month ago

 

Chapter: Towards A Theory of Piracy for the Information Age

Quote:

I have argued that using the core value framework, privacy can be grounded both instrumentally and intrinsically – instrumentally, as a support of all the core values, and intrinsically, as an expression of security. I am, however, concerned that the traditional instrumental/intrinsic understanding may be misleading. Traditionally, instrumental/intrinsic analyses push us in the direction of a search for a summum bonum, a greatest good. We try to find the one thing to which all other things lead. In the core value approach that I am advocating, some values may be more important than others, but there is not a summum bonum. Rather the model is one of an intersupporting framework. The core values, as the beams of a truss, are in support of each other.

What I expect to learn:

To be able to explain the theory of piracy

Review:                    

There are a lot to learn with the term “piracy” alone and that is something you can’t get away from especially if you are conscious about copyright security.

This chapter was particularly enlightening for me due to my surprise to the theory of piracy. At first I was like “What? Theory of what? I never thought that actually has a theory” but now I discovered that it should have because if it does not have a theory of its own, we would speculate for eternity without truly unravelling the concept of piracy and why people continue to spread that. I am not innocent in this matter knowing that in this generation, people are smarter than they were ten whole years ago and it almost seemed as though people discovering fire has the similar impact of people discovering internet. That is how huge internet is but of course, there is always that deep dark negative side that we are all fond off – piracy. We all do it. Come on, don’t even try and refuse answering this question because I know people downloaded a file or two when copyright was dumped by online users to share files. I remember the day I first downloaded an unlicensed file. I was just 13 years old when I experienced the bliss of having a connection and getting music files for me to listen to. We didn’t know it was wrong for us to do because first I was young and second, no one told us that such thing even has a theory! ( see kids, that’s the reason why you go to school, so you get bored and learn new and great things, significant or not). Imagine that. A thirteen years old kid committed an official crime. Well I guess “ignorance of the law is REALLY not an excuse”.

 

What I learned:

·         The definition of Greased Data

·         Grounding Piracy

·         The nature of piracy

·         Setting and adjusting policies for private situations

·         Publicity principle

·         The rules and conditions of governing private situations

Integrative Questions:            

1.    What is the adjustment principle?

2.    What is the definition of greased data?

3.    Explain the concept of Grounding piracy.

4.    What is the setting of policies for private situations?

5.    Enumerate the rules and conditions of governing those situations.

6.    What is the justification of exceptions principle?

Comments (0)

You don't have permission to comment on this page.