Skip to main content

Advertisement

Log in

Intellectual property and white-collar crime: report of issues, trends, and problems for future research

  • Studies
  • Published:
Trends in Organized Crime Aims and scope Submit manuscript

Abstract

This research examines the association between intellectual property (IP) and whitecollar crime (WCC), and identifies future research that might benefit policymakers; federal, state, and local agencies; and the general public. Research methods include a review of literature, a review of information and data in IPR violations and WCC, and inquiry in areas that directly deal with IP laws and enforcement practices, such as law enforcement agencies, IP-based industries and private law firms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Arrow, K.J. (1962). “Economic Welfare and the Allocation of Resources for Invention,” in Nelson, R. (Ed.), The rate and direction of inventive activity. Princeton, NJ: Princeton University Press.

    Google Scholar 

  • Audio Home Recording Act, 17 U.S.C. § 1001 et seq. (1992).

  • Bessen, J., and Maskin, E. (2000, January). “Sequential Innovation, Patents, and Imitation.” [Working Paper], Massachusetts Institute of Technology, Department of Economics. Retrieved October 10,2003, from http://www.researchoninnovation.org/patent.pdf.

  • Boldrin, M. and Levine, D.K. (2003, January). Perfectly Competitive Innovation. [Working Paper], University of Minnesota and University of California, Los Angeles. Retrieved April 29, 2005, from http://www.dklevine.com/papers/pci23.pdf.

    Google Scholar 

  • Borland, J. (2003, December 15). “Canada: Downloading Music Is Legal,” CNET News.com. Retrieved March 19, 2004, from http://news.zdnet.co.uk/business/legal/0,39020651, 39118537,00.htm.

  • Business Software Alliance (BSA). (2003a, June). Eighth AnnualBSA Global Software Piracy Study: Trends in Software Piracy 1994-2002. International Planning and Research Corporation.

  • Business Software Alliance (BSA). (2003b, August). 2002 U.S. Software: State Piracy Study. International Planning and Research Corporation.

  • Canadian Intellectual Property Office (CIPO). (1998, March 19). Circular no. 15: Private copying, strategis.gc.ca. Retrieved January 12, 2004, from http://strategis.gc.ca/sc_mrksv/cipo/cp/ cp_circ_15-e.html.

  • Coombe, R.J. and Herman, A. (2001). “Culture Wars on the Net: Intellectual Property and Corporate Propriety in Digital Environments,” The South Atlantic Quarterly, 100 (4), 919–947.

    Article  Google Scholar 

  • ETHICON, Inc. (2003, October 28). “Counterfeit Phone Alert.” Retrieved February 25, 2004, from http://www.ethicon.com/notice.html.

  • Feist Publications v. Rural Tel. Serv. Co., 499 U.S. 340,349 (1991).

  • Foley Bros., Inc. v. Filardo, 336 U.S. 281, 285, 93 L. Ed. 680, 69 S. Ct. 575 (1949).

  • Hartford Fire Ins. Co. v. California, 509 U.S. 764 (1993).

  • International Intellectual Property Alliance (IIPA). (2003, November). USTR 2003 “Special 301,” Decisions on Intellectual Property. Retrieved February 12, 2004, from http://www.iipa.com/ pdf/2003_Nov_USTR_LossUpd.pdf.

  • Kamal, M. and Bailey, M. (2003, July 26). “TRIPS: Whose Interests Are Being Served?” The Lancet, 362, 260.

    Article  Google Scholar 

  • Kanwar, S. and Evenson, R.E. (2001, June). Does Intellectual Property Protection Spur Technological Change?(Yale University). New Haven, CT: Economic Growth Center.

    Google Scholar 

  • Klein, N. (1999). No Logo: Taking Aim at the Brand Bullies. New York: Picador.

    Google Scholar 

  • Lanham Trademark Act, 15 U.S.C.§ 1115 et seq. (l 946).

  • Lee, H.K. (2001, February 28). “Salesman Caught in Trade Show Sting: Vendor Accused of Hiding Profits.” San Francisco Chronicle. Retrieved February 24,2003, from http://www.sfgate.com/ cgi-bin/article.cgi?file=/chronicle/archive/2001/02/28/MNW87715.DTL.

  • Los Angeles Police Department. (2003, September 12). “Major Brand Counterfeiting Ring Broken.” Retrieved February 24, 2004, from http://www.lapdonline.org/press_releases/2003/09/ prO3667.htm.

  • Lyman, J. (2003, November 3). RIAA Second Wave of Suits Hits File Traders, More to Come. TechNewsWorld.com. Retrieved January 23,2004, from http://www.ecommercetimes.com/perl/ story/32021.html.

  • Mazer v. Stein, 347 U.S. 201, 209 (1954).

  • Money Laundering Control Act, 18 U.S.C. § 1956 (1988).

  • “Nigeria Reaffirms Efforts to Eliminate Fake Drugs.” (2003, February 13). Xinhua General News Service.

  • Organization for Economic Co-operation and Development. (1998). “The Economic Impact of Counterfeiting.” Retrieved February 22, 2004, from http://www.oecd.org/dataoecd/ll/ll/ 2090589.pdf.

  • Ostergard, R.L. (1999). “Intellectual Property: A Universal Human Right? Human Rights Quarterly, 21 (1), 156–178.

    Article  Google Scholar 

  • Restatement of the Law, Third, Foreign Relations Law of the United States. (1987). The American Law Institute, Sec. 403, Reporters Note 1.

  • Romer, P. (1990). “Are Nonconvexities Important for Understanding Growth?” The American Economic Review (Papers and Proceedings), 80, 97–103.

    Google Scholar 

  • Sen, A. (1996). “Goods and People,” In W. Aiken and H. LaFollette (Eds.), World Hunger and Morality. Upper Saddle River, NJ: Prentice Hall.

    Google Scholar 

  • Shell, R.G. (2003, October 22). “Suing your Customers: A Winning Business Strategy?” Strategic Management. Retrieved January 23, 2004, from http://knowledge.wharton.upenn.edu/ index.cfm?fa=printArticle& ID=863.

  • Stern, B. (1996, June 10). “Warning! Bogus Parts Have Turned Up in Commercial Jets. Where Is the FAA?” Business Week, 90.

  • Sutherland, E.H. (1983). White Collar Crime: The Uncut Version. New Haven, CT: Yale University Press. (Originally published 1949).

    Google Scholar 

  • “The Criminalization of Copyright Infringement in the Digital Era. (1999). Harvard Law Review, 112(7), 1705-1722.

  • U.S. Bank Hit by International Hackers: Counterfeit Ring Hacks Nebraska Bank's Computer. (2003, July 24). Online Security. Retrieved February 25, 2004, from http://www.onlinesecurity.com/ links456.php.

  • United States Customs and Border Protection (CBP). (n.d. a). “Seizure Data” Retrieved February 11, 2004, from http://www.cbp.gov/xp/cgov/import/commercial_enforcement/ipr/seizure/ seizure_stats.xml.

  • United States Customs and Border Protection (CBP). (n.d. b). “Yearly Comparisons: Seizure Statistics for Intellectual Property Rights (mid-year FY 2003). Retrieved February 11, 2004, from http://www.cbp.gov/xp/cgov/import/commercial_enforcement/ipr/seizure/seizure_stats.xml.

  • United States Customs and Border Protection (CBP). (2004, January 14). U.S. Customs and Border Protection Announces Intellectual Property Rights Seizure Data [Press Release]. Retrieved February 11, 2004, from http://www.cbp.gov/xp/cgov/newsroom/press_releases/0tl42004_5. xml.

  • United States Department of Justice. (2004, January 28). Data presented at a meeting, Washington D.C.

  • United States Department of Justice, Federal Bureau of Investigation (FBI). (2002, July 17). “The Federal Bureau of Investigation and the U.S. Customs Service Today Announced the National Intellectual Property Rights Coordination Center's First Conference for Members of Congress and Industry in Washington D.C. [Press Release]. Retrieved February 11, 2004, from http:// www.fbi.gov/pressrel/pressrel02/outreach071702.htm.

  • United States Department of Justice, United States Attorney. (2001, March 6). “Silicon Valley Businessman Pleads Guilty to Hiding Proceeds of Sales of Counterfeit Computer Software [Press Release]. Retrieved February 24, 2004 from http://www.cybercrime.gov/dingPlea.htm.

  • United States Department of State, Bureau of Economic and Business Affairs, (n.d.) “Intellectual Property Rights Training Program Database.” Available at http://www.training.ipr.gov.

  • United States Security and Exchange Commission. ( 1999, August 30). Litigation release no. 16266. Retrieved February 20, 2004, from http://www.sec.gov/litigation/litreleases/lrl6266.htm.

  • Von Hippel, E. and Von Krogh, G. (2003). “Open Source Software and the “Private-Collective' Innovation Model: Issues for Organization Science. Organization Science, 14 (2), 209–223. Retrieved September 12,2004, from http://web.mit.edu/evhippel/wwwPrivateCollective WP.pdf.

    Article  Google Scholar 

  • World Intellectual Property Organization (WIPO). (2002, December). “Intellectual Property on the Internet: A Survey of Issues.” Retrieved September 16, 2003, from http://www.ecomerce. wipo. int/survey.

Download references

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Beresford, A.D., Desilets, C., Haantz, S. et al. Intellectual property and white-collar crime: report of issues, trends, and problems for future research. Trends Organ Crim 8, 62–78 (2005). https://doi.org/10.1007/s12117-005-1014-z

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12117-005-1014-z

Keywords

Navigation