This article outlines some of the main types of file-sharing systems and summarizes survey findings relating to file-sharing use. Three related theoretical models of compliance seeking through the use of technology are discussed, namely Lessig's (involving ‘code’ and ‘architecture’), Bottoms' (involving ‘constraint-based compliance’) and Clarke and others' work on ‘situational crime prevention’, and each is then applied to the specific topic of the illegal and legal distribution of music and films on the Internet.
|Number of pages||17|
|Journal||International Review of Law, Computers and Technology|
|Publication status||Published - 2005|
- cybercrime compliance criminology Internet DRM