All Academic, Inc. Research Logo

Info/CitationFAQResearchAll Academic Inc.
Document

Robin Hoods or thieves? A Foucauldian analysis of international trade policies regarding software piracy
Unformatted Document Text:  Foucauldian analysis of international trade policies 13 “probably” Russian mafia members, but not terrorists. He says that working through gangs is simply a more efficient way of getting things done than through government channels. [Once again,] Microsoft Corporation appears to be the entity most stridently suggesting the terrorism-funding connection; law enforcement officials say that while pirating is a big business now, that there is little evidence to support the notion that pirating software is funding terrorism. [Add citations.] In applying Foucault’s questions to the terrorism-funding rhetoric of Microsoft Corporation, particularly how this notion has become an object (Foucault’s question 1-c, see table, p. 34, herein) in the discourse. In analyzing the arena in which discourse gains legitimacy (Foucault’s question 2-b, see table, p. 34, herein) and in considering who benefits from the rhetoric (Foucault’s questions 1-c and 4-c, see table, p. 34, herein), it appears that the terrorism connection rhetoric produces benefits to Microsoft because of the engagement of law enforcement officials in protecting their products. Microsoft resources are saved if government-funded law enforcement agencies are involved in protecting Microsoft’s interests. The discourse is considered legitimate by law enforcement and other government officials, company representatives and employees, and international policy makers, as is clear by the rhetoric of these groups, samples of which are included throughout the present study. How computer software is protected by law. Software is protected by copyright law, along with the international copyright and intellectual property laws and treaties previously described. According to the Microsoft Windows 2000 Server Documentation page, copying software without the permission of the owner is “copyright infringement”

Authors: Malyshev, Yuri. and Hamilton, Ann.
first   previous   Page 13 of 34   next   last



background image
Foucauldian analysis of international trade policies 13
“probably” Russian mafia members, but not terrorists. He says that working through gangs
is simply a more efficient way of getting things done than through government channels.
[Once again,] Microsoft Corporation appears to be the entity most stridently suggesting the
terrorism-funding connection; law enforcement officials say that while pirating is a big
business now, that there is little evidence to support the notion that pirating software is
funding terrorism. [Add citations.]
In applying Foucault’s questions to the terrorism-funding rhetoric of Microsoft
Corporation, particularly how this notion has become an object (Foucault’s question 1-c,
see table, p. 34, herein) in the discourse. In analyzing the arena in which discourse gains
legitimacy (Foucault’s question 2-b, see table, p. 34, herein) and in considering who
benefits from the rhetoric (Foucault’s questions 1-c and 4-c, see table, p. 34, herein), it
appears that the terrorism connection rhetoric produces benefits to Microsoft because of
the engagement of law enforcement officials in protecting their products. Microsoft
resources are saved if government-funded law enforcement agencies are involved in
protecting Microsoft’s interests. The discourse is considered legitimate by law enforcement
and other government officials, company representatives and employees, and international
policy makers, as is clear by the rhetoric of these groups, samples of which are included
throughout the present study.
How computer software is protected by law. Software is protected by copyright
law, along with the international copyright and intellectual property laws and treaties
previously described. According to the Microsoft Windows 2000 Server Documentation
page, copying software without the permission of the owner is “copyright infringement”


Convention
Submission, Review, and Scheduling! All Academic Convention can help with all of your abstract management needs and many more. Contact us today for a quote!
Submission - Custom fields, multiple submission types, tracks, audio visual, multiple upload formats, automatic conversion to pdf.
Review - Peer Review, Bulk reviewer assignment, bulk emails, ranking, z-score statistics, and multiple worksheets!
Reports - Many standard and custom reports generated while you wait. Print programs with participant indexes, event grids, and more!
Scheduling - Flexible and convenient grid scheduling within rooms and buildings. Conflict checking and advanced filtering.
Communication - Bulk email tools to help your administrators send reminders and responses. Use form letters, a message center, and much more!
Management - Search tools, duplicate people management, editing tools, submission transfers, many tools to manage a variety of conference management headaches!
Click here for more information.

first   previous   Page 13 of 34   next   last

©2012 All Academic, Inc.