Monday, May 18, 2020

William Shakespeare s Romeo And Juliet - 972 Words

Pravinee Hurbungs said, â€Å"Don’t fear the enemy that attacks you, but the fake friend that hugs you.† In Shakespeare s, Romeo and Juliet, Romeo is the enemy that Juliet doesn’t fear, but love, and Friar Lawrence is the fake friend that Juliet should fear. Others could say any other Romeo and Juliet character is to blame for their deaths, but I believe that Friar Lawrence is the one to blame. The friar is the one who married them, gave Juliet the idea to kill herself, and left her by herself when she awoke from her â€Å"death.† For those reasons, I believe Friar Lawrence is the most responsible one for both of their deaths. For those who have not read Romeo and Juliet, it is a play about two people, Romeo and Juliet, of enemy families, the Capulets, and the Montagues, who fall in love. They meet at a party that is suppose to bring Paris, one of Juliet’s love interest, and Juliet closer together so they could get married, and for Romeo to get over his old love, Rosaline. Within less than a day of meeting, basically the morning after the party, Romeo and Juliet decided to get married. The one who married them was Friar Lawrence, who only had ending the feud between the two families in mind when he did. After marrying Juliet, Romeo was asked to duel with Juliet’s cousin, Tybalt. Mercutio, the Prince’s cousin and Romeo’s friend, took Romeo’s place in dueling with Tybalt because he believe Romeo was not strong enough to fight him and win. Mercutio ended up being killed, and Romeo tookShow MoreRelatedWilliam Shakespeare s Romeo And Juliet1287 Words   |  6 PagesLizzy Baginski English Composition 2 Mr. Spera March 10, 2015 Romeo and Juliet Research Paper The movie Romeo and Juliet is a modern classic film that took place in 1996. Overall this is a timeless story that everyone should go and watch. This movie has an intriguing plot line that tells the story of two feuding families, The Montagues and The Capulets, and how the children of these two different families fall in love. The two children overcome various obstacles such as hiding their chemistry fromRead MoreWilliam Shakespeare s Romeo And Juliet 966 Words   |  4 Pages Beauty Over Gold â€Å"Beauty provoketh thieves sooner than gold.--William Shakespeare, 1623. In his book As You Like It, William Shakespeare pointed out the supremacy of love rather than the want of gold and wealth. Truly, beauty is more important to thieves than wealth. Many of the thieves in this world would rather have an elegant woman than to obtain precious rubies. After all, what good is a prosperous man if he doesn’t have a charming woman? Two famous men grab my attention who didn’t fear forRead MoreWilliam Shakespeare s Romeo And Juliet Essay1024 Words   |  5 PagesRomeo and Juliet is a tragedy written by William Shakespeare early in his career about two young star-crossed lovers whose deaths ultimately reconcile their feuding families. It was among Shakespeare s most popular plays during his lifetime and, along with Hamlet, is one of his most frequently performed plays. Today, the title characters are regarded as archetypal young lovers. Romeo and Juliet belongs to a tradition of tragic romances stretching back to antiquity. The plot is based on an ItalianRead MoreWilliam Shakespeare s Romeo And Juliet1124 Words   |  5 PagesThe play Romeo and Juliet is a tragedy written by William Shakespeare early in his career about two young star-crossed lovers whose deaths ultimately reconcile their feuding families. It was among Shakespeare s most popular plays during his lifetime and, along with Hamlet, is one of his most frequently performed plays. Today, the title characters are regarded as archetypal young lovers. Romeo and Juliet belongs to a tradition of tragic romances stretching back to antiquity. Its plot is based onRead MoreWilliam Shakespeare s Romeo And Juliet861 Words   |  4 Pagesgreatly shown in the play Romeo and Juliet by William Shakespeare. It was love at first sight with Romeo Montague and Juliet Capulet. Meeting at a party and falling in love to get married without even spending quality time with each other. Romeo and Juliet couldn t tell there parents because the Capulets and Montagues are long term rivals. Both Romeo and Juliet had to find different ways and excuses to make this marriage work. A big problem was developed. Romeo kills Juliet s cousin and is banishedRead MoreWilliam Shakespeare s Romeo And Juliet1770 Words   |  8 Pagesof Romeo and Juliet. The story of two destined lovers who were killed by their own doing. But what if they weren t two destined lovers who got unlucky, but doomed partners that were never going to have a good-life to begin with.William Sha kespeare gives us a view of early signs of gang conflict in the early age of Verona, Italy. He gives us a perspective of the norms and customs of Italy during the Setting of William Shakespeare s most famous story. Romeo and Juliet, by William Shakespeare, givesRead MoreWilliam Shakespeare s Romeo And Juliet1616 Words   |  7 Pageslove can also cause some of life s most controversial battles. These battles could stem from lack of patience, disagreement of moral values, and in some cases, an absence of attraction overall. In Romeo and Juliet by William Shakespeare, the issues that drive Romeo Montague and Juliet Capulet s to each of their dreadful misfortunes are inevitable. When it comes to many of Shakespeare s plays, Aristotle s theory is used to describe them as tragedies. Romeo and Juliet is known by many as a tragedyRead MoreWilliam Shakespeare s Romeo And Juliet1264 Words   |  6 Pagestheater-going public the most important dramatist in English literature, Shakespeare oc cupies a well-known position in the world of talented authors. His canon contains thirty-seven plays, written in the late sixteenth and early seventeenth centuries. Additionally, throughout the years, they continue to sustain critical attention, with the majority of his works circling tragedies, one being Romeo and Juliet. William Shakespeare s Romeo and Juliet speaks to the timeless appeal of star-crossed lovers. Their loveRead MoreWilliam Shakespeare s Romeo And Juliet924 Words   |  4 PagesWilliam Shakespeare’s Romeo and Juliet is a tragedy that follows the so-called love of two teenagers. The two fall in love at a masked ball and have a secret marriage. Throughout the play, their actions show how ridiculous love is, and how it is a danger to anyone who become twisted in its choking grasp. However, in the death of the youth and survival of the elders, an alternative explanation for the tragic events may be found. Although Shakespeare seems to be mocking love throughout the play, itRead MoreWilliam Shakespeare s Romeo And Juliet1279 Words   |  6 Pagesour lives. The great, classic writers teach timeless, valuable life skills. Shakespeare was the greatest writer of all time. His writings mainly consisted of dramas and sonnets. Romeo and Juliet, as well as, A MIdsummer Night’s Dream were written about the same time period. He was able to inter relate everything that wrote. For example, the tale of Pyramus and Thisbe could possibly be an advertisement for Romeo and Juliet. The basic structure of the two dramas is the same; two forbidden lovers meet

Wednesday, May 6, 2020

Good Versus Evil, Justice Versus Tyranny - 1909 Words

Good versus evil, justice versus injustice, liberty versus tyranny-- in battles such as these, determining who is who is not always easy. In the United States, social, economic, and political differences between the North and the South became increasingly apparent in the early 1800s. Slavery was an invidious discussion at the time, as both sides of the argument fully believed that they were right. The North believed it to be wrong and immoral, while the South believed the opposite. This, along with other highly disputatious issues, led the Union to disunion, and its eventual Civil War. Even though slavery was a sensitive and an anger inducing argument for both Northerners and Southerners already, many events over the course of the 1800s made it more so. In 1856, Senator Charles Sumner, a Massachusetts anti-slavery Republican, gave a speech to the Senate regarding whether Kansas should be admitted to the Union as one that allows slavery, or one that bans and illegalizes it entirely. Sumner took an anti-slavery stance, and ridiculed Stephen Douglas and Andrew Butler, both of whom were senators of Southern states and had pro-slavery views. Representative Preston Brooks was Butler s South Carolina kinsman, so Brooks, who also was a pro-slavery Southerner, had taken Sumner’s virulent speech personally. Brooks traveled to meet with Sumner to address his viewpoint on the speech. Preston, standing before Sumner’s desk, spoke to Sumner, but before Sumner could conjure a response,Show MoreRelatedThe New Jim Crow : Mass Incarceration Essay934 Words   |  4 Pa gesother measures. Although African Americans want to believe that the Clintons have their back, should the same results be expected? Although, Bernie Sanders also voted for the 1994 crime bill, Alexander argues that â€Å"there is such a thing as a lesser evil, and Hilary is not it (Alexander, 32).† With the selective information I have exposed myself to about the 2016 Election, I agree with the point that Michelle Alexander is trying to make. I have heard from numerous African Americans from my own communityRead MoreGun Rights a Necessity1392 Words   |  6 Pagesnecessity for protection and a natural right. It is written in the constitution under the second amendment that it is, â€Å"the right of the people to keep and bear arms.† The other side, the side fighting gun rights thinks that guns are an unnecessary evil; they cause death when it’s not necessary, and in the wrong hands it could be very dangerous. We have seen this in numerous school shooting and public shootings over the years. Gun rights are not just a hot topic between citizens, the government isRead MoreThe Comparison of Themes Between Lord of the Flies and Animal Farm 2291 Words   |  10 Pagestries to play the life game with the varied human nature of his characters (Wilson 54). Jack and his group have different and crueler ways of â€Å"playing† compared to Ralph because he is much more of a laid back character that carry the evil undertones of a possible evil evident. All of the events that the boys consider as games such as hunting, killing, chanting, and dancing are key elements to take down their establishment of the new society on the island. Symbolically speaking, all the games haveRead MoreSwords to Ploughshares : The Social Causes of Violence2136 Words   |  9 Pagesâ€Å"The effort necessary to remain uncorrupted in an environment where fear is an integral part of everyday existence is not immediately apparent to those fortunate enough to live in states governed by the rule of law† (Violence 314). When the norm is an evil, corrupt government why would one chose to go against the system? It is much easier to corrupt oneself and live then to die a clean death and in this way these â€Å"ungoverned states†. Jennifer Turpin and Lester R. Ku rtz look at how societies use â€Å"justifiedRead MoreEssay about Nathaniel Hawthorne’s Young Goodman Brown3241 Words   |  13 PagesNathaniel Hawthorne’s Young Goodman Brown   Ã‚  Ã‚  Ã‚  Ã‚  Nathaniel Hawthorne’s â€Å"Young Goodman Brown† captivates the reader through a glimpse of the Puritan church. The story also shows the struggle of good versus evil in the main character Goodman Brown. The role of the Puritan church is crucial in shaping Goodman Brown’s personality and helping the reader understand why he was reluctant to continue his journey.   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"Puritanism, movement arising within the Church of England in the latter part ofRead MorePlato and Aristotle on Democracy Essay examples2188 Words   |  9 Pageswho are not utterly degraded in not that bad a form of government and actually seems to praise it â€Å"that if the people are not utterly degraded, although individually they may be worse judges than those who have special knowledge as a body they are as good as better†. In Aristotle’s eyes the worst type of democracy is a Demagoguery, in which everyone’s voice is equal and the rule of the majority has a greater authority then the law. In this type of lawlessness where the masses gain more power than theRead MoreThe American Civil War : The Bloodiest And Most Gruesome War4070 Words   |  17 Pagesorder to prevent another American civil war this mean the economic system, whether the money is worked through slaves or everyone equally, must be compromised and the same throughout the nation. There is a saying that says: money is the root of all evil. So far, law enforcement everywhere agrees with that statement. It seems like there is nothing under that sun human beings won’t do for me, including killing and enslaving their fellow humans. Through research today and information uncovered fromRead MoreBargaining With The Devil7657 Words   |  31 Pages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Pages 2 - 5 When trying to resolve a conflict, there are generally three challenges which affect your ability to make a good decision on whether to negotiate or not: 1 2 You have to analyze the cost and benefits of negotiating versus all other viable alternatives 3 The three challenges You have to avoid all the emotional traps which can lead to a knee-jerk reaction You have to address all the moral and ethicalRead MoreTheodor Geisel2528 Words   |  11 Pagessurpassed absurdity and became something beautiful. Before that, though, Theodor Geisel was nationally noted for his political cartoons during World War II that enticed the mind to do more than think, but to ask questions and crave knowledge and justice. Dr. Seuss was not just a whimsical alter-ego of Mr. Geisel by any means, however. Dr. Seuss allowed Geisel to communicate his message to a new audience, in a unique way. Before his death, he left the world with a simple plea- â€Å"We need to do better†Read MoreGlobalization: A Powerful Weapon of the United States3140 Words   |  13 Pagesas part of a group of heroic martyrs of a new Middle Eastern revolution.1 These young men and women, whose pictures and names became national icons, were from all over the Arab world. They were all after the same thing; an end to the suppressive evil that they have witnessed throughout most of th eir lives and to many their entire lives. A few weeks later, inspired and encouraged by the events in Tunisia and the successful ousting of the Tunisian president Zine El Abidine Ben Ali, a similar

Protection of Online Media

Question: Write an essay on Protection of online media is an important aspect of online entertainment management, especially the use of DRM (Digital Rights Management). Answer: Means of communication have always been integral part of human life, and it would be difficult to imagine world without any communication channel. Starting with the verbal transmission, transcending through written, the new age media depends on the digital transmission for distribution of data and information worldwide. Digitization has simplified the task of creation and dissemination of media to a great extent. However, at the same time, it has also created problems of piracy, copying and unauthorized access to material jeopardizing the livelihood of millions of artists worldwide. Popularized by Gutenbergs press, copying in the digital age is a matter of seconds and has proven to be a great nuisance to content owners and creators wishing to keep their content exclusive. To tackle such issues of content and creators rights protection, WIPO provides guidelines through the framing of Technological Protection Measures (TPMs) and Rights Management Information (RMIs). These measures aim to stop the infringement of copyrights and give content owners complete control over their content. Apart from saving the livelihood of content owners directly, copyright protection measures also help e-businesses to maintain and increase their user base. The amount of trust in a website makes up the extent of customer loyalty towards it (Nissenbaum 2004). Introduction Different methods of communication have been used by humans since long time. They act as a medium of transferring, transacting and storing information. Whether it be songs, TV shows, radio transmissions, they all have helped society get informed and entertained for a long time. Earlier entertainment used to be in the form of bards, minstrels, plays, etc. forms which were limited in accessibility and reach. But, with the advent of technology, the method of delivering media to the mass audience has changed significantly. From its earlier stages of being a localized source of entertainment, media industry has long since grown into a full-fledged industry warranting professional analysis to determine what constitutes profits, what is and isnt legally viable, what is the latest technology available to cash out the maximum profit (ed. Alexander et al. 2003). Contemporary media education involves the study of issues involving freedom of speech, new communication technology and media contents effect on society, easy access to social media (ed. Alexander et al. 2003). As the worldwide access to the internet is increasing, more and more people are getting connected, processes are getting completed online, and use of social media as a tool of communication is constantly on the rise. The acceptability of these media products is the function of different media organizations acceptance and commercialization of them leading to their adoption and diffusion in the society (Albarran et al. 2006). An ever increasing number of media firms are trying to increase their global reach and trying to figure out how to utilize the full potential of new digital media environment (Doyle 2002; Herman McChesney 1997). In such a scenario, it becomes vital for both organizations and individuals to have access to controlled and secure content. For organizations, it is the protection for their revenue source while for individual users, access to electronically safe content means their privacy and independence is intact so that they can pursue their choices in a threat-free environment. Individual artists also require this security to ensure that the means of livelihood is accessible to him. One such example is a recent case in India where a movie was leaked online days before its release leaving the Bollywood in furore and the movies stakeholders got concerned about their prospective earnings. A typical computer being an assortment of hardware and software such as the motherboard, sound card, graphic card, etc., these things are in constant communication with each other, both internally and externally (Sims 2003). This to and fro of messages within and outside expose the whole system as well as the content stored therein to unrestricted access, necessitating the existence of systems to protect the data. Data Encryption plays an important role here. these systems allow the content creator and owner to distribute his content in a controlled manner to only authorized users and protect it from unauthorized ones. The problem mushrooms up in earnest once one security key assigned to an individual is made public so that now the program can be accessed by anyone eroding the chances of the content owner from profiting from a unique piece of work. Use of media devices such as portable digital music players, video recorders, etc. makes the distribution of such digital media content much easier, thus generating concerns about their protection. Their inherent complexity along with the daily introduced changes and upgrades in popular digital media such as video games make it quite difficult to protect them. This is where the concept of copyright comes into picture. According to WIPO (World Intellectual Property Organization), a copyright gives a creator legal rights over their literary and artistic creation (WIPO n.d.). Books, movies, paintings, sculptures, computer programs, databases, technical drawings, maps, etc. all are protected by copyrights only. The process of copying, mechanized by Gutenbergs press brought in the concept of copyright since making copies now was not an arduous task requiring days worth of labor. Digitization took this ease of copying a step forward and made it instantaneous and viral thus rendering the existing copyrighting laws obsolete. Copyright infringement laws are commonplace nowadays and are seen in newspapers on a daily basis. Not only copying, digitization has also helped in a lot many other ways to make digital content be mass accessible. The age old, time consuming, laborious tasks of writing, recording, maintaining, proofing, copy editing, etc. have now been compacted into a simpler version where content needs be just created and can directly be released online (The Future 2011). Discussion Without safe access to online media and entertainment, media industry would definitely collapse. Not only the content creators will shun it due to the reduced earnings and unappreciated efforts, but also the users who in the wake of no privacy and numerous threats, would much rather prefer no access rather than maligned access. This report discusses the concept of threat of copyright infringements in the context of media and entertainment industry and concurs that online media protection and DRMs are an important part of online media management. As the universal access to the online content increases, the possibility of its misuse increases proportionally. Increasing banking transactions being done online, saving of passwords and keys in web based software, storing confidential information online, all generate high risks of an electronic attack. Though digital copying of authentic traditional works of art such as sculptures and fine arts remain a challenge, not many of the other online available media like music, videos, games, etc. are safe from digital reproduction and transmission. The hackers have always been able to come up with new and innovative ways to extract information not meant for their eyes or to siphon off money not earned by them. For e.g., Canadian hacker Michael Calces hacking of various media sites such as CNN, Yahoo, Amazon and eBay in 2000 is said to have cost these companies several millions of dollars worth of capital just because a 15 years old was able to break into their cyberspace (Staff 2014). Uni versal access to media content depends on how conveniently the information service providers can recover their investments while staying within the confines of contemporary laws. And now, beyond the neo-traditional methods of mass communication, social media has become the new center stage for all things media and marketing (Kaplan Haenlein 2010; Montalvo 2011). To protect online content from threats of unauthorized access, even patented software, techniques and methodologies exist. For e.g., J Robert Sims, III of Hewlett-Packard Development Company, L.P., in 1998 developed a method of protecting the transfer of content over unsecured channels. Storage and transmission of bulk media over the internet is facilitated using cryptographic keys, both public and private. For his invention, Sims was granted a patent in 1999 by US PTO (Sims 2003). WIPO is the international body responsible for maintaining and enforcing intellectual property rights, policy, information and services related to IP. Established in 1967, WIPO has been source of observation of IP practices worldwide by its signatory nations. Though not all countries subscribe to it, those who do are expected to maintain the highest standards of IPR. According to Riaan J. Rudman (2014), Web 2.0 has been one of the major changes that have occurred in this decades old behemoth we call internet or world wide web. Web 2.0 has been one of the reasons for promoting sharing and collaboration. Though making lives easier, this also increases the cybersecurity threat to the next level. According to him, the higher the trust shown by a user towards a website, the higher would be his loyalty towards that site. In the ever transient business of internet, having customer loyalty is one of the few things that stops companies especially e-businesses, from going to the brink of bankruptcy and ultimate oblivion of shutdown. We 2.0s existence is enriched by the number of users engaged with it at any given moment. The higher the number of users, the larger the content generated by them and better the user experience with Web 2.0. As Karlgaard (2005) said, Social media platforms such as Facebook and YouTube thrive on the number of active users they have. The more, the merrier. However, this merriment can easily be turned to misery by inappropriate use of these platforms. The leak of private photographs, videos not meant for the public eye creates a lot of nuisance for celebrities and VIPs each year worldwide. While such releases are a matter of great public attention, they inconvenience the victim a lot. Hence, cybersecurity has been a prime concern to the masters and controllers of the internet from the start. Digital rights management (DRM) programs aim to restrict the access to digital content protected by copyright as well as the hardware used to enforce these policies. The usual arguments given in favour and against any Intellectual Property right (IPR) law are applicable in the case of DRMs also. Stifling of innovation, curtailing of rights, the creation of monopolies are all alleged cons of DRM while continued revenue generation and control over work are some of the arguments in favor of DRM (Sensarkar 2007 Calvert 2013). Digital Rights Management, though used in professional jargon, are not mentioned in the formal literature of WIPO Copyright Treaty and WIPO Performances and Phonograms Treaty (WPPT). These are the software meant to stop digital files from being copied without authorization. The formal treaties give DRM the names of Technological Protection Measures (TPMs) and Rights Management Information (RMIs) to address the concept of cybersecurity of copyrighted work (Ficsor 2010). TPMs are the technical measures such as encryption keys, etc. used by authors and other rights holders to restrict the piracy, copying, and transmission of their valuable work (IFPI 2003a). The basis for new licensing systems, RMIs the integrity and authenticity of the work, performance and phonogram in question. They act as powerful tools against copyright infringement (IFPI 2003b). However, even DRMs are not fool proof and oft times are susceptible to the hacking techniques of internet pirates, legitimate researchers and those believing in universal access to everything. Often common public is indifferent to the restrictions to access content which does not directly interfere with their functioning. However, the inconvenience caused is highly protested whenever these restrictions interfere with normal life of the same people. For e.g., in a study by Marc Fetscherin (2006), it was found that in the case of music and its piracy, a restriction to the playability of the content will be a source of disagreement amongst the users while a restriction to burn or copy such content would not be that big a deal. Conclusion At times, the most basic and the best sort of protection an artistic work of digital origin can have is self-policing. The honor based system through which media and many other such industries have thrived till now plays an equally important role here also. Though encrypted, a file once given access to a person cannot be expected not to be accessible to his friends and relatives also. After all, helping out each other is one of the cornerstones of our society. In such cases, the ethical standards followed by a person need to be above the friendship for him to consider digital media protection. Though the presence or absence of DRMs might be a thing of no concern to users at times, for authors and media content creators, the presence of such measures ensures that their rights are maintained and are available to them. Most of the human history has been passed down through the works of art of such artists, writers, and creators only. Had there been 50 Mona Lisas in the world, no one would have appreciated the marvel of Da Vincis work. Had there been exact replicas of Sistine Chapels roof, the works of Michelangelo would not be world famous today. Shakespeare would have died unknown and unappreciated had due credit not been given to him for his work. All these examples show that as important as free access to fine works of art is, it is equally important that these works are duly recognized and their copyrights are maintained. References Albarran, AB, Chan-Olmsted, SM Wirth, MO (eds.) 2006, Handbook of media management and economics, Routledge. Alexander, A, Owers, JE, Carveth, R, Hollifield, CA Greco, AN (eds.) 2003, Media economics: Theory and practice, Routledge. Calvert, P 2013, Digital Rights Management and Content Development, Online Information Review. Doyle, G 2002, Media ownership: The economics and politics of convergence and concentration in the UK and European media, Sage. Herman, ES McChesney, RW 1997, Global Media: The Missionaries of Global Capitalism, Cassel, London. Fetscherin, M 2006, Digital rights management: What the consumer wants, Journal of Digital Asset Management, vol. 2, no. 3-4, pp.143-149. Ficsor, M 2010, Digital Rights Management (DRM) and its co-existence with copyright exceptions, presentation during Sub-regional Seminar on the Protection of Computer Software and Databases IFPI 2003a, The WIPO Treaties: Technological Measures, viewed on 24 Jun. 2016, https://www.ifpi.org/content/library/wipo-treaties-technical-measures.pdf IFPI 2003b, The WIPO Treaties: Protection of Rights Management Information, viewed on 24 Jun. 2016, https://www.ifpi.org/content/library/wipo-treaties-rights-management-information.pdf Kaplan, AM Haenlein, M 2010, Users of the world, unite! The challenges and opportunities of Social Media, Business horizons, vol. 53, no. 1, pp.59-68. Karlgaard, R 2005, Ten laws of the modern world, Forbes, vol. 175, no. 10, pp. 33. Montalvo, RE 2011, Social media management, International Journal of Management Information Systems, vol. 15, no. 3, pp.91-96. Nissenbaum, H 2004, Will security enhance trust online, or supplant it?, in R Kramer K Cook (ed.), Trust and Distrust Within Organizations: Emerging Perspectives, Enduring Questions, Russell Sage Publication, pp.155-188. Rudman, RJ 2014, The Influence of Knowing Web 2.0 Risks and Controls on Web 2.0 Usage and Security Practices of Online Users, Journal of Applied Business Research, vol. 30, no. 1, pp. 105. Sensarkar, N 2007, The potential impact of digital rights management on the Indian entertainment industry, Journal of International Trade Law and Policy, vol. 6, no. 1, pp.45-55. Sims, JR 2003, Media content protection utilizing public key cryptography, US 6550011 B1. Staff 2014, Biggest hacking scandals of all time, Global News, 17 April, viewed 24 June