33)
Business 2 Consumer (B2C)
The realistic and optimal development of the current e-music industry is the shift from illegitimate P2P exchanges to B2C exchanges that allow the artists, support systems and entire communities which rely on revenue from legitimate sales to ensure recovery of investment and potential profit. The potential for such a transition, which could ultimately reduce B2B and "middle-man" sales revenue must be balanced with other solutions but could be the ultimate saving grace of the music industry, the evolving multifaceted system of exchanges and challenges. (Dennis, Fenech & Merrilees, 2004, p. 2) Like was said in the previous section, B2C exchanges should be based largely on the technology that has driven B2B technology advances that attempt to ensure ease of use for both exchanging entities and still provide adequate security for both the businesses and the information. (Leamer & Storper, 2001, p. 641)
Peer 2 Peer (P2P)
Currently, the pirate marketplace dwarfs the legal marketplace, and when that happens, that means investment in new music is compromised. Several years ago it was believed by the e-music industry and others that the illegal downloading user frequently sought the download venue as an introduction to the media and then subsequently went out and purchased a legitimate copy. (Mann, 2000, p. v39-4244) This is clearly no longer the case as technological advances have created a system that provides almost identical services, to consumers either legitimately or illegitimately and has been able to keep pace or advance anti-piracy technology such as encoding. What we do know is that piracy is on the rise and is not likely to slow down any time soon, despite the dire need for such to occur. P2P and single song downloads have in fact changed the face of the music industry, making it a place where users prefer single mixes to whole purchased CDs and artists, and their many support persons are having to completely change the manner in which they make and market their art. ("Your Message Must Fit," 2005, p. 2) (Leighton & Muldner, 2005, p. 295) (Brown et al., 2007, p. 120)
An expert on P2P file sharing, and a self styled user of such systems Gillespie, writes in 2001 of the fact that even the legitimate technology purveyors, who by the way are tremendously protective of their own software and hardware technologies are pandering to the P2P, illegal market, by making it very simple to utilize their technology to get and disseminate illegal downloads. Case in point, the i-Mac with i-Tunes, which didn't even sport a keyboard.
The subtitle was the grabber: "The new iMac with iTunes CD-RW. Take your favorite songs, put them in the order you want and burn a CD. After all, it's your music." No kid in his or her right mind wants to rearrange their own CDs. They already have them. What they want to do is use Napster, Gnutella, Bearshare, or iMesh to find and trade mp3s of songs and create totally new CD arrangements for personal amusement or dance re-mixes for parties. Apple knows this is how kids will use this technology, but an ad suggesting buying a Mac to rip off the music industry is not a real good idea in these litigious times. (Gillespie, 2001, p. 16)
Despite the "encoding" of the advertising the user is fully aware when he or she purchases the product that the intention of it are to utilize illegitimate sources for pleasure, and that the ads are written with legal council in mind. In short anti-piracy technology and intentions simply cannot keep up with the reality of ease of use and the technology industry giving consumers the ability to utilize illegal P2P and other sources without censure.
The evolution of P2P marketing much take the shape of legitimate utilization, which realistically increases awareness and availability of new and emerging artists as well as further developing the availability of global music and genres. (Lemley & Reese, 2004, p. 1345) (Madison, 2004, p. 1525) (Catalano, 2003, p. 98) Sadly, some groups and individuals see any attempt to curtail internet piracy as an assault on the "free" exchange system of the internet. (Lessig, 2001, p. 56) Realistically, those who stress the need to disseminate new artists materials as well as make users aware of the existence of "new to them" global or international options for listening would be removing the future potential of these same artist making a living in the future, if they did not also balance information availability with fair market distribution.
The Marketing Mix
Price
The dissemination of legitimate, frequently B2C or P2P systems for music sharing, at very reasonable prices, the most common being about a dollar makes media downloads...
Shoplifting & Social Process Theory The Social Process Theory argues that people commit crime based on social influences (McQuade, 2009). Social influences can be strong where shoplifting is concerned with peer pressure in delinquency or with family influences when family members are corrupt. Although the theory does not fully explain all acts of shoplifting, it does explain acts of shoplifting where delinquency and corrupt family members are concerned. Peer pressure causes stress
Shoplifting Detection and Deterrence Methods Perhaps the most common shoplifting deterrence technique is obvious surveillance. This may include either having cameras in the store screened by security personnel or covert observation of suspect shoppers. Simply the knowledge that shoppers are being watched can act as a deterrent. Store employees should be thoroughly briefed on how to prevent potential thefts. Store personnel should be briefed to keep track of suspicious items. Store
Restorative justice asks fundamentally different questions, and is based on a different set of assumptions, than the current criminal justice paradigm (Restorative Justice for Oakland Youth, n.d.). The most notable and important difference between the current criminal justice paradigm and the restorative justice paradigm is that restorative justice does not focus on the punishment and does not advocate a punitive criminal justice system. Instead, the restorative justice model is based
Shoplifting is currently one among the most prevalent of non-violent offenses in the U.S.A. Shoplifting refers to stealing property put forward for sale. It is a costly issue - U.S. businesses and consumers lose billions every year to shoplifting. The former have to bear the burden of security-related costs and that of lost merchandise, while the latter have to pay a larger amount as retail prices as sellers pass on
When requested to leave the premises the defendant refused to do so and proceeded to assault the security officer by throwing a beverage at said officer and then, subsequently, slapping the same officer. The defendant was detained by the store security and arrested by the local police. Victim's Statement George Petrie, the chief security officer for Publix, states that his employer would like to see the defendant punished for his actions
Integrative Case The case involve M, a 35-year-old mother with three children from two fathers. He most recent boyfriend, the father of the youngest child, has beaten her twice, been arrested and jailed, but is about to be released. Despite a restraining order, Melissa is terrified. Her economic situation is dire -- she lives at an inexpensive motel, works part-time for under the table wages, and relies on WIC services. Most
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now