File Sharing and Online Piracy: How Does it Effect Copyrights? Is it Ethical?

1535 Words7 Pages
As you upload the most recent (and most spectacular) new Lady Gaga album Art Pop into your ITunes Library, you scale back and take a long look at your devoted collection. You’ve collected nearly 2000 songs, 150 movies, and 200 books. From the Beatles to Deadmau3, Miley Cyrus to Nirvana, you have every type of music you could possibly imagine. Worst of all, you don’t even listen to a tenth of it! You’ve collected all this media for an outrageous price too: Absolutely Nothing. After 2 and half years of constant file sharing through Limewire, Frostwire, and Vuze, You’ve easily transcended beyond a four or five thousand dollar threshold of Pirated Media. In the end though, your actions do come with a cost. When the federal government discovers…show more content…
It can be argued that the music industry has expanded into countless genres, artists and record labels over the years since 2000 to become bigger than it has ever been. So where have all the sales gone? It’s more than evident that file sharing has become much more attractive to music fans than it once was. People haven’t lost their interest in music, but have instead found new ways of obtaining it. These File sharing software such as Azuerus give the everyday computer the ability to obtain any files it’s user would like with a good internet connection and a couple clicks of a mouse. In short, people no longer need to pay for any music that they would like to own. Rojas, Fabio. The history of recording industry sales, 1973-2010. 2011. The History of Recording Industry Sales, 1973-2010, United States of America. Web. 3 Apr. 2014. Peer-to-Peer file sharing is a more unorthodox way of obtaining files because instead of going through a web browser to get files, computer users use software such as Limewire and Vuze to access the files on other user’s computers. These file sharing software find as many computers as they can with the files that they are looking for, divide up the information necessary among the computers, and download a fraction of information from each computer. Each computer is given the title “peer” if it is utilized in the
Get Access