Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: April 30, 2024 Tue

Time: 2:43 am

Results for intellectual piracy

2 results found

Author: Fink, Carsten

Title: The Economic Effects of Counterfeiting and Piracy: A Review and Implications for Developing Countries

Summary: Policy makers around the world recognize the potentially harmful consequences of trademark counterfeiting and copyright piracy. Indeed, many countries have recently initiated policy reforms to strengthen the enforcement of intellectual property rights (IPR). Further, minimum standards of enforcement have been incorporated in many international treaties, especially trade agreements. This emphasis on enforcement raises basic questions about the actual impacts of IP rights infringement, which differ across the types of IPR and economic sectors. The authors review the academic literature and other studies in the public domain to evaluate what has been learned about these socioeconomic effects, with an emphasis on developing countries where possible. They also identify important gaps in our understanding of the consequences of counterfeiting and piracy and develop recommendations on how governments might collect data and conduct studies to better inform IPR enforcement policy.

Details: Washington, DC: World Bank, 2016. 46p.

Source: Internet Resource: World Bank Policy Research Working Paper No. 7586 : Accessed March 4, 2016 at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2740120

Year: 2016

Country: International

URL: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2740120

Shelf Number: 138046

Keywords:
Counterfeit Goods
Intellectual Piracy
Socioeconomic Conditions and Crime

Author: Nakao, Keisuke

Title: Transnational Policing: Preemption and Deterrence against Elusive Perpetrators

Summary: Why does a state directly police certain kinds of transnational perpetrators by itself while indirectly policing other kinds through their host government? To address this question, we develop a formal model, where Defender chooses either to police Perpetrators or to make Proxy do so. According to our theory, the delegation of policing can enhance its effectiveness in light of Proxy's three advantages: (a) Proxy can convince Perpetrators of punishments more credibly than Defender (communicative advantage); (b) Proxy is more likely to identify Perpetrators and detect what they hold dear (informational advantage); (c) Proxy can cripple and punish Perpetrators more effectively (offensive advantage). On the other hand, the delegation may cause inefficiency if Defender has limited information about Proxy's choice or cost of policing. Depending on the relative size between these advantages and disadvantages, one of the following four forms of policing may emerge: (i) Defender polices Perpetrators on her own (e.g., Somali counter-piracy operations); (ii) Defender induces Proxy to police Perpetrators (U.S. War on Drugs in Colombia and Mexico); (iii) Defender and Proxy together police Perpetrators (Operation Inherent Resolve); (iv) two or more Defender-Proxy states police Perpetrators in each's own domain (Interpol, Budapest Convention).

Details: Unpublished paper, 2016. 32p.

Source: Internet Resource: Accessed October 17, 2016 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2808474

Year: 2016

Country: International

URL: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2808474

Shelf Number: 144872

Keywords:
Cybercrime
Deterrence
Intellectual Piracy
Terrorism