Effectiveness of Countermeasures against Theft of Intellectual Properties

Verified

Added on  2022/11/13

|4
|817
|366
AI Summary
The following write-up discusses IP and the developments that can be done to all digital content to avoid breach of IP. Intellectual property offers protection for self content that allows other third parties to utilize the information. This approach encourages large production of intellectual commodities. For instance, only subscribed Netflix users can get to watch upcoming movies. This enables Netflix to earn extreme profits. This has not stopped black markets from sharing movies, top secrets and computer software’s for free which drains revenues for content creators.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running Head: FUNDAMENTAL INFORMATION OF ASSURANCE
Title:
Name of the author:
University
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Fundamental Information of Assurance
Effectiveness of
Countermeasures against Theft of
Intellectual Properties
Digital content need IT expertise to protect the content intellectual properties rights.
The risk of digital content theft can be managed though strict and practical intellectual
property (IP) policies. The online platforms are notorious and make digital content to be
vulnerable to breach of IP (Chebyshev, Sinitsyn, Parinov, Liskin, & Kupreev, 2018). The
following write-up discusses IP and the developments that can be done to all digital content
to avoid breach of IP.
Intellectual property offers protection for self content that allows other third parties to
utilize the information. This approach encourages large production of intellectual
commodities. For instance, only subscribed Netflix users can get to watch upcoming movies.
This enables Netflix to earn extreme profits. This has not stopped black markets from sharing
movies, top secrets and computer software’s for free which drains revenues for content
creators. Great internet connectivity has increased wide access to informative content through
various inter webs. Informative content which is created by innovators and inventors like
online bloggers, artist and entrepreneurs. The jobs have been created as a result of improved
technologies in this 21 century.
Most innovative people fall prey of stolen content due to lack of licensing
individualized ideas. This is as a result of lack of training and education around protection of
self content. As a frequent user of YouTube, one upcoming video blogger shared her dream
show to a media company. Unfortunately, her idea was turned down through email. But a few
months after her dream show idea was aired on television. This would have been prevented
through legal protection either by trade marking. Like iPhone owners can only access music
by purchasing it, which is the copyright granted to Apple to sell artist music.
Despite various documented methods of intellectual property will not guarantee
protection. Examples are patent, trademarks and trade secrets. Copyrights allow people to use
information, but not as a craft of self made (Sein-Echaluce et al., 2018). It has actually
enhanced digital content to be tracked wild wide. Kaspersky is a great example of well
intellectual good. It is a global software security company that ensures cybercrime is reduced,
advanced antivirus protection and safe online banking (Jamil, & Zaki, 2011). Ensuring
reduced breach of privacy. This actually encourages other companies to counterfeit their
commodities.
Consumers who are willing to use the commodity can buy it. One needs to upload the
code directly online in order to install the software. For the counterfeits produced in the black
market easily get blocked. Forgers lack the permission to produce the exact copyright hence
protecting Kaspserky from imitations. This will actually be effective for global enterprises
like Kylie cosmetics. Codes attached with the product can be tracked to identify fakes and
protect both interests of consumers and profit earned by inventors (Stallings, & Brown,
2017).
Document Page
Fundamental Information of Assurance
Involvement with legal arms to create copy rights will secure most intellectual
properties. Trademarks and patents can easily be terminated with time, causing interest in
conflict. More information will be shared widely by online bloggers and artist. Not allowing
access in various platforms online as anti theft protection is assured. The policy should
therefore seek to limit access to digital content on the internet created by innovators and
inventors towards stabling entrepreneurs.
Document Page
Fundamental Information of Assurance
References
Chebyshev, V., Sinitsyn, F., Parinov, D., Liskin, A., &Kupreev, O. (2018). IT threat
evolution Q1 2018. Statistics. Retrieved from https://securelist.com/it-threat-
evolution-q1-2018-statistics/85541/
Jamil, D., & Zaki, H. (2011). Security issues in cloud computing and countermeasures.
International Journal of Engineering Science and Technology (IJEST), 3(4), 2672-
2676.
Stallings, W., & Brown, L. (2017). Computer security: Principles and practice (4th ed.).
Upper Saddle River, NJ: Pearson.
Sein-Echaluce, M. L., Fidalgo-Blanco, Á., Artur, C. U., Artur, I. U., Ara, L. H., Guillén, P.
B., & García, C. B. (2018, October). MOOC on the correct use of the intellectual
property in academic environments. In Proceedings of the Sixth International
Conference on Technological Ecosystems for Enhancing Multiculturality (pp. 691-
697). ACM.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]