Search the site

Site Map

Sections
Front Page

Today's News

Information Technology

Teaching

Publishing

Money

Government & Politics

Community Colleges

Science

Students

Athletics

International

People

Events

The Chronicle Review

Jobs

Features
Colloquy

Colloquy Live

Magazines & Journals

New Grant Competitions

Facts & Figures

Issues in Depth

Site Sampler

The Chronicle in Print
This Week's Issue

Back Issues

Related Materials

Services
About The Chronicle

How to Contact Us

How to Register

How to Subscribe

Subscriber Services

Change Your User Name
Change Your Password

Forgot Your Password?

How to Advertise

Press Inquiries

Corrections

Privacy Policy

The Mobile Chronicle

Help



The Chronicle of Higher Education
From the issue dated May 23, 2003


POINT OF VIEW

Steal This MP3 File

By G. ANTHONY GORRY

Sometimes when my students don't see life the way I do, I recall the complaint from Bye Bye Birdie, "What's the matter with kids today?" Then I remember that the "kids" in my class are children of the information age. In large part, technology has made them what they are, shaping their world and what they know. For my students, the advance of technology is expected, but for me, it remains both remarkable and somewhat unsettling.

In one course I teach, the students and I explore the effects of information technology on society. Our different perspectives on technology lead to engaging and challenging discussions that reveal some of the ways in which technology is shaping the attitudes of young people. An example is our discussion of intellectual property in the information age, of crucial importance to the entertainment business.

In recent years, many users of the Internet have launched an assault on the music business. Armed with tools for "ripping" music from compact discs and setting it "free" in cyberspace, they can disseminate online countless copies of a digitally encoded song. Music companies, along with some artists, have tried to stop this perceived pillaging of intellectual property by legal and technical means. The industry has had some success with legal actions against companies that provide the infrastructure for file sharing, but enthusiasm for sharing music is growing, and new file-sharing services continue to appear.

The Recording Industry Association of America recently filed lawsuits against four college students, seeking huge damages for "an emporium of music piracy" run on campus networks. However, the industry settled those lawsuits less than a week after a federal judge in California ruled against the association in another case, affirming that two of the Internet's most popular music-swapping services are not responsible for copyright infringements by their users. (In the settlement, the students admitted no wrongdoing but agreed to pay amounts ranging from $12,000 to $17,500 in annual installments over several years and to shut down their file-sharing systems.)

With so many Internet users currently sharing music, legal maneuvers alone seem unlikely to protect the industry's way of doing business. Therefore, the music industry has turned to the technology itself, seeking to create media that cannot be copied or can be copied only in prescribed circumstances. Finding the right technology for such a defense, however, is not easy. Defensive technology must not prevent legitimate uses of the media by customers, yet it must somehow ward off attacks by those seeking to "liberate" the content to the Internet. And each announcement of a defensive technology spurs development of means to circumvent it.

In apparent frustration, some companies have introduced defective copies of their music into the file-sharing environment of the Internet, hoping to discourage widespread downloading of music. But so far, the industry's multifaceted defense has failed. Sales of CD's continue to decline. And now video ripping and sharing is emerging on the Internet, threatening to upset another industry in the same way.

Music companies might have more success if they focused on the users instead of the courts and technology. When they characterize file sharing as theft, they overlook the interplay of technology and behavior that has altered the very idea of theft, at least among young people. I got a clear demonstration of that change in a class discussion that began with the matter of a stolen book.

During the '60s, I was a graduate student at a university where student activism had raised tensions on and around the campus. In the midst of debates, demonstrations, and protests, a football player was caught leaving the campus store with a book he had not bought. Because he was well known, his misadventure made the school newspaper. What seemed to be a simple case of theft, however, took on greater significance. A number of groups with little connection to athletics rose to his defense, claiming that he had been entrapped: The university required that he have the book, the publisher charged an unfairly high price, and the bookstore put the book right in front of him, tempting him to steal it. So who could blame him?

Well, my students could. They thought it was clear that he had stolen the book. But an MP3 file played from my laptop evoked a different response. Had I stolen the song? Not really, because a student had given me the file as a gift. Well, was that file stolen property? Was it like the book stolen from the campus bookstore so many years ago? No again, because it was a copy, not the original, which presumably was with the student. But then what should we make of the typical admonition on compact-disc covers that unauthorized duplication is illegal? Surely the MP3 file was a duplication of the original. To what extent is copying stealing?

The readings for the class amply demonstrated the complexity of the legal, technical, and economic issues surrounding intellectual property in the information age and gave the students much to talk about. Some students argued that existing regulations are simply inadequate at a time when all information "wants to be free" and when liberating technology is at hand. Others pointed to differences in the economics of the music and book businesses. In the end, the students who saw theft in the removal of the book back in the '60s did not see stealing in the unauthorized copying of music. For me, that was the most memorable aspect of the class because it illustrates how technology affects what we take to be moral behavior.

The technology of copying is closely related to the idea of theft. For example, my students would not take books from a store, but they do not consider photocopying a few pages of a book to be theft. They would not copy an entire book, however, perhaps because they vaguely acknowledge intellectual-property rights but probably more because copying would be cumbersome and time-consuming. They would buy the book instead. In that case, the very awkwardness of the copying aligns their actions with moral guidelines and legal standards.

But in the case of digital music, where the material is disconnected from the physical moorings of conventional stores and copying is so easy, many of my students see matters differently. They freely copy and share music. And they copy and share software, even though such copying is often illegal. If their books were digital and thus could be copied with comparable ease, they most likely would copy and share them.

Of course, the Digital Millennium Copyright Act, along with other laws, prohibits such copying. So we could just say that theft is theft, and complain with the song, "Why can't they be like we were, perfect in every way? ... Oh, what's the matter with kids today?" But had we had the same digital technology when we were young, we probably would have engaged in the same copying and sharing of software, digital music, and video that are so common among students today. We should not confuse lack of tools with righteousness.

The music industry would be foolish to put its faith in new protective schemes and devices alone. Protective technology cannot undo the changes that previous technology has caused. Should the industry aggressively pursue legal defenses like the suits against the four college students? Such highly publicized actions may be legally sound and may even slow music sharing in certain settings, but they cannot stop the transformation of the music business. The technology of sharing is too widespread, and my students (and their younger siblings) no longer agree with the music companies about right and wrong. Even some of the companies with big stakes in recorded music seem to have recognized that lawsuits and technical defenses won't work. Sony, for example, sells computers with "ripping and burning" capabilities, MP3 players, and other devices that gain much of their appeal from music sharing. And the AOL part of AOL Time Warner is promoting its new broadband service for faster downloads, which many people will use to share music sold by the Warner part of the company.

The lesson from my classroom is that digital technology has unalterably changed the way a growing number of customers think about recorded music. If the music industry is to prosper, it must change, too -- perhaps offering repositories of digital music for downloading (like Apple's newly announced iTunes Music Store), gaining revenue from the scope and quality of its holdings, and from a variety of new products and relationships, as yet largely undefined. Such a transformation will be excruciating for the industry, requiring the abandonment of previously profitable business practices with no certain prospect of success. So it is not surprising that the industry has responded aggressively, with strong legal actions, to the spread of file sharing. But by that response, the industry is risking its relationship with a vital segment of its market. Treating customers like thieves is a certain recipe for failure.

G. Anthony Gorry is a professor of management and computer science at Rice University.


http://chronicle.com
Section: The Chronicle Review
Volume 49, Issue 37, Page B20

Print this story
Easy-to-print version
 e-mail this story
E-mail this story


Copyright © 2003 by The Chronicle of Higher Education