My latest Guardian column is "Internet copyright law has to have public support if it's going to work," and it goes into the difference between copyright infringement and plagiarism, and tries to understand why so many people got upset at Glee's legal ripoff of a Jonathan Coulton song:
Copyright experts were quick to explain that Fox's plagiarism was legal – the same rules that allowed Coulton to record his cover of Sir Mix-a-Lot's original "Baby Got Back" also allow Fox to produce a sound-alike version. But it's shoddy, because it is, at heart, a lie.
(Coulton got his own back on Fox: he rereleased his own "Baby Got Back" and billed it as a cover of the Glee version, with proceeds to charity – it climbed the iTunes chart while the Fox version was clobbered by angry Coulton fans who gave it one-star reviews)
Why does Fox's sin stick in the internet's craw? I think it's because Fox hasn't just wronged Coulton: they've wronged the public. We have been misled about the origin of a product we're being asked to purchase.
This is different from, say, a fake designer handbag that's offered as a cheap knockoff, where there's no intent to fool the purchaser, who understands that a 99% discount on a Vuitton bag means that it's really a "Vuitton" bag.
This kind of plagiarism is more like selling horsemeat labelled as beef burgers. Horsemeat can be perfectly harmless, and many people happily eat it, but when you buy beef burgers, you expect that you're getting what you paid for.
Internet copyright law has to have public support if it's going to work
Charles Duan from Public Knowledge sends us “a video we put together for Fair Use Week about copyright and fair use, to the tune of ‘Let It Go’ from Frozen, and full of clips of other fair use videos.”
An excellent excerpt from Aaron Perzanowski and Jason Schultz’s The End of Ownership: Personal Property in the Digital Economy on Motherboard explains how Section 1201 of the 1998 Digital Millennium Copyright Act — which bans tampering with or bypassing DRM, even for legal reasons — has allowed corporations to design their products so that using […]
Securelist’s report on the security vulnerabilities in Android-based “connected cars” describes how custom Android apps could be used to find out where the car is, follow it around, unlock its doors, start its engine, and drive it away.
Making people aware of goods and services in the digital age requires an array of new strategies from social media and email to number-crunching tools like Google Analytics. To get a handle on the techniques used to capture attention and convert traffic into dollars in a crowded online environment, the Full-Stack Marketer Bundle offers 22 hours of training to get […]
Having a luxurious bed isn’t just a fairy tale from a catalog; it is a real, affordable possibility with offerings like this Olive+Owen bedroom set. If you’re thinking of doing some “spring cleaning”, this bed set is an easy way to completely upgrade your room in one purchase.This 20-piece collection has all of the expected slumberland elements, […]
Python is immensely popular in the data science world for the same reason it is in most other areas of computing—it has highly readable syntax and is suitable for anything from short scripts to massive web services. One of its most exciting, newest applications, however, is in machine learning. You can dive into this booming […]