Technological Development in Information Technology and the Demise of the Music Industry: The Case of Sungura Music in Zimbabwe and Digong Music of South Africa

作者: Medicine Magocha , Zandi Lesame

DOI: 10.5901/MJSS.2014.V5N15P272

关键词: CurrencyMusicSociologyMusic piracyDemiseIntellectual propertyPopular musicInformation technologyAdvertisingMusic industry

摘要: It’s agonizing to realize that someone spent months if not years of sleepless nights compiling, composing and committed produce a piece music art. In most cases before it gets into the market officially is deplorable thousands copies would have been sold illegally at bargain price like R10-00 in South African currency (US$1-00) US$1-00 Zimbabwe currency. This on-the-street cheap pricing cannot remunerate effort musicians neither does benefit pirates. The issues Intellectual Property Rights (IPRs) need be respected all forms Before 1990s, industry used lucrative for artists but now some view as unrewarding because fake copy their (and also films) sell on streets reaches stores. Copy right laws are no longer observed seriously. paper seeks answer following questions: What should done improve production supply processes Africa? Who blame this rampant piracy Southern countries - information technologist who reproduces CD or musician? Management art complex number educated enough thus basic business management knowledge skills. critiques illegal act African, establish model musical marketing sales towards profitability composers producers. article attempts offer possible solutions challenge. DOI: 10.5901/mjss.2014.v5n15p272

参考文章(5)
Marianne Loock, Alta van der Merwe, Marek Dabrowski, Characteristics and responsibilities involved in a Phishing attack Proceedings of the 4th international symposium on Information and communication technologies. pp. 249- 254 ,(2005) , 10.5555/1071752.1071800
Peter Stavroulakis, Mark Stamp, Handbook of Information and Communication Security Springer Publishing Company, Incorporated. ,(2010) , 10.1007/978-3-642-04117-4
Zulfikar Ramzan, Phishing Attacks and Countermeasures Handbook of Information and Communication Security. pp. 433- 448 ,(2010) , 10.1007/978-3-642-04117-4_23
Earl R. Babbie, The practice of social research ,(1969)