Menus:

Home
About the Author
Book Preview
Front Book Cover
Back Book Cover
Book Contents
Book Supplements
Book Credits
Book Links
Book News
Book Orders
Join the Discussion
Contact Us
Quick Survey
Survey Results
FAQS
Rumors and Gossip
Visitor Statistics
International
USA Welcome
Mars Mission
Spacetime
A Little Knowledge
Final Frontier
Life Choices
Love Stories I
Love Stories II
Human Condition
The Good Life
More Money
Deficits and Debt
Hither the Future
H.A.B.C.
Raise! Too
Just for Fun
Parade of Life
Celebrate Life
GeoEarth
Open Earth
Progress
One World
Guns and Bombs I
Guns and Bombs II
War and Peace I
War and Peace II
Black Crime USA I
Black Crime USA II
4th Dimension
Olympics 2012
Good News
Call to Duty
Addiction/Recovery
Desolate Worlds
A Perfect World
Invisible Life
Joy
Sexual Rapture
Enjoy
Global Awareness
Democracy
Nations
History
History Live
Think
The Big Picture
Save the Children
A Different Way
Big Fun
Staying Alive
Cosmic Secrets 1
Cosmic Secrets 2
Cosmic Secrets 3
Cosmic Secrets 4
Cosmic Secrets 5
Cosmic Secrets 6
Places and Faces
Thriller
Derailers
California Living
Global Living
Info Superhighway
World Wide Web
Retro Web
Contempo Web
Semantic Web
XML Web
Mobile Web
Education Web
Information Web
Business Web
Multilingual Web
Cloud Computing
Big Data
Health Is Wealth
Education for All
Food for All
Water for All
Prosperity for All
Nutrition for All
Justice for All
Hygiene for All
Tolerance/Respect 1
Tolerance/Respect 2
Tolerance/Respect 3
Ebola Watch 2014
Murder Watch 2015
Earth Watch
The Market System
Search Engine
PC-OS
Very Wise Humans
Memo to Humans
Work and Play
Rainbow
Web Weather Live
Annual B. Award
World War 3
Same Thing
The Human Story
12 C's
Comet Ride
Heaven and Hell
MENUS (FOOTER)



Courtesy of lsdsoftware.com | Read Aloud TTS (text to speech) Widget from readaloud.app Listen to this article

ANOTHER PERSPECTIVE ON THE PROBLEM OF DIGITAL PIRACY

The Business Software Alliance (BSA) and International Data Corporation (IDC): 2007 Global Software Piracy Study

In its 2007 review of software piracy, a study commissioned by the BSA and performed by the IDC concluded that worldwide losses attributable to software piracy totalled close to $48,000,000,000 (billion). The same 2007 global software piracy study calculated that the weighted average for worldwide software piracy was 38% for newly acquired desktop, laptop, and tablet computers in the countries studied. It should be noted that the BSA has updated these piracy results in subsequent studies.



Watch (Don't Copy That Floppy)








Credit for 2007 Software Piracy Data:
  1. BSA | The Software Alliance




Count Country Region Piracy Rate (% Percent) Piracy Loss ($ Millions)


The following table provides a statistical snapshot of the above-mentioned 2007 piracy study.

Summary Country 2007's Piracy Rate 2007's Piracy Losses
Weighted Average Rate and Total Losses Planet Earth 38% $47,809,000,000
Mean (Average) Piracy Rate Costa Rica, Mexico, and Oman 61% $423,088,496
Median (Middle or Center) Piracy Rate Turkey 64%  
Maximum (Highest) Piracy Rate Armenia 93%  
Minimum (Lowest) Piracy Rate United States 20%  
Mode (Most Frequent) Piracy Rate Austria, Belgium, Denmark, Finland, Sweden, and Switzerland 25%  

As the snapshot illustrates, of the countries reviewed in the 2007 software piracy study, the mean or average worldwide piracy rate was 61%, or an average (per country) loss of about $423,000,000 (million). The median, center, or middle worldwide software piracy rate was 64%. The minimum or lowest worldwide software piracy rate was 20%. The maximum or highest worldwide software piracy rate was 93%. The mode or most frequently occurring worldwide software piracy rate was 25%.

Understanding Human Behavior

Naturally, theft or dishonesty is not the only reason why some humans engage in digital piracy. Some additional factors to explain why humans engage in digital piracy include:

  1. Poverty - Citizens in poorer countries are desperate to join the computer age but cannot afford to purchase the most popular and versatile software applications. Piracy provides one option for the poorer members of society to join and to experience all of the benefits of the computer age.
  2. Lack of awareness - Citizens are not aware of all available options for consuming software applications such as the existence of open-source, free, and low-cost computing options such as the following ones:
  3. Convenience and price - For buyers of pirated digital products, the pirated copies are conveniently available at a steep discount below the manufacturer's or retailer's selling price. For sellers of pirated digital products, piracy decreases their business costs and increases their revenue stream.

Perhaps the predominant motivating factor to explain why some humans engage in digital piracy is this: Duplicating and file-sharing technologies make it very easy to anonymously pirate digital content coupled with the small chance of getting caught in the first place and the even smaller chance of being prosecuted in a court of law. Software piracy reduces to another case of the mostly-everybody's-doing-it syndrome. Duplicating and file-sharing technologies cause some humans to compromise or relax their moral and ethical system of values.



Watch [Don't Copy That 2 (Official Sequel to Don't Copy That Floppy)]


The act of copying floppies has become passe and antiquated—albeit the act of copying CDs and DVDs remains popular. Another more persistent, insidious, and pernicious problem for businesses and households alike is the dissemination of computer viruses, malware, phishing, and ransomware as perpetrated by ill-intentioned operators. Accordingly, the next two videos provide brief introductions to malware and ransomware. The next two videos, along with the infographic below, also offer strategies to safeguard against becoming victimized by such crippling computer infections.

Watch (Protect Your Computer from Malware)






Watch (Defend Against Ransomware - Business Tips)






How to protect your organization from RANSOMWARE

To quickly recover from a ransomeware computer infection and to avoid paying the ransom, a comprehensive, ongoing backup strategy is essential. The two strategies mentioned most often is (1) the private, on-premise approach and (2) the public, off-premise approach for safekeeping duplicate copies of the data stored on computers. With the private, on-premise strategy, the household or business firm is responsible for undertaking the backup chores and storing the resultant backups in a safe location (either on or off the premises). With the private, on-premise strategy, the household or business firm also is responsible for purchasing and maintaining the software and hardware required to back up computer data. In turn, the household or business would store the backups in a safe location either on or off the premises. (Note: In this data-storage context, a business firm could be a private business, non-profit organization, religious institution, educational institution, or governmental entity.) As illustrated in the above infographic, ManageEngine is one such business that provides the requisite products needed to implement the private, on-premise strategy. Needless to say, there are numerous other players in the private, on-premise data backup space such as AOMEI, EaseUS®, Paragon Software, Macrium Software, Acronis, and Clonezilla, to name a few such players in this private, on-premise space.



How to protect your organization from RANSOMWARE

With the public, off-premise strategy, essentially, the household or business firm would contract with an outside vendor for off-premise storage space or to undertake the task of backing up computer data and storing the resultant backup on the vendor's premises. The vendor would safely keep the backups in a secure location controlled by the vendor. With the advent of cloud computing, the public, off-premise strategy has become synonymous with being a public, cloud backup strategy. Again, ManageEngine is one such business that provides the requisite products needed to implement the public, off-premise strategy. Other players in the public, off-premise data backup space include NovaStor, Asigra, MSP360™, Veeam , Backblaze, Amazon Web Services, and Duplicati, to name a few such players in this public, on-premise strategy space. Essentially, the household or business firm would contract with an outside vendor to undertake the task of backing up the household's or business firm's computer data. The vendor would safely keep the backups stored offsite on its servers.

Most computer users are already familiar with popular file-hosting platforms such as Dropbox, Google Drive, Apple iCloud, MediaFire, Microsoft OneDrive, SugarSync, Amazon Photos Storage, Yandex.Disk, and Baidu Network Disk. These file-hosting platforms typically are used to store copies of important documents, photo collections, and so forth. These file-hosting platforms also are used to share files with friends and family members rather than being used to backup all of the data on a computer, including a copy of the operating system and all of the software applications installed on a given computer.

On a related note, another problem to have emerged is the problem of identity theft. This final video offers useful tips to help safeguard against becoming a victim of identity theft.

Watch (How to Protect Your Personal and Financial Information from Identity Theft)






FLATTER THIS SITE:




SEARCH THIS SITE:





Intellectual Property Disclosures: All videos and songs (as well as many of the images) referenced or spotlighted throughout this website are the legal and intellectual properties of others. All content and opinions on this website () are those of the author (Edward Bruessard) exclusively and do not necessarily reflect the opinions of the contributors, creators, owners, and distributors of these referenced videos, songs, and images. The author holds no legal interest or financial stake in any of these referenced videos, songs, and images. The contributors, creators, owners, and distributors of these referenced videos, songs, and images played no role at all regarding the appearance of said videos, songs, and images throughout this website; they had no clue that this website would be spotlighting their works.


Quick Information:

Since December 1979
See the 'About the Author' page of this website for more information Bruessard Literary Productions

ORDER PRODUCTS HERE

get it now

A. Get the Electronic or Digital Version of the Book (Abridged 2nd Edition)

  1. E-junkie
  2. XinXii

Get the Digital Version of the Book Now (Abridged 2nd Edition):

B. Get the Print Version of the Book (Abridged 2nd Edition)

1329_cover_front
Buy_now

C. Get the Excel Spreadsheet with Formulas

  1. Select Tables
    Add to Cart

D. Get the Offline pdf Version of This Website

  1. Offline Website Version
    Add to Cart

View Cart

CONTACT US

  1. Sendmail
  2. Email

TRENDING NOW

  1. Facebook
  2. Twitter
  3. YouTube
  4. 4 U 2 Comment

RELATED BRUESSARD WEBSITES