Free Essay

Digital Piracy

In: Computers and Technology

Submitted By Metalgod542
Words 1577
Pages 7
Digital piracy is making up profit from illegal copying and reselling music, videos, software videogames and other digital media which requires genuine. In 2005, loses of legal media and software industry from digital piracy was $200 billion (DSTI/IND (2007). Also, Oberholzer-Gee (2010) indicates that 60% of World Wide Web broadband busy by consumers’ video, game and music sharing. To avoid this issue intellectual proprietors use various methods. In this paper is shown methods to dodge problem of digital piracy.

There are two ways to protect legal digital content from piracy. Firstly, there is indirectly impact to society, where manufacturers are producing additional equipment like guitars for game “Guitar Hero” and forwarding special social services where people can play with each other via internet, so while people playing, system is checking license (Goel, 2010). In addition, companies perform free software with fewer options than paid software. Moreover, some organizations such as Free Software Association and Open Source agitation, which advert spreading software for free have helped to grapple with problem of expensive software and companies that gain from this, for example, Microsoft (Hill, 2007). Secondly, there is direct impact on users, where companies and internet providers use methods which impacts directly on users such as blocking peer-to-peer connections between users and web-sites where users can download pirated software. Furthermore, closing the sources of piracy is supported by governments of countries such as China (Tong, 2008). In this paper is shown methods to protect against piracy such as copy-protected software, closing sources of piracy, legislation and distribution of free soft. Each of solution will be described in 3 properties: effects in society, current state and effectiveness of the method. Moreover, paper demonstrates that no of these methods are not working alone in effective way.

In the 21st century the digital media and software industry are going to be one of the most profitable businesses and an annual growth of the industry is significant. For example, according to Adobe Corporation’s annual revenue report (2008) an income of the company was 724 millions of dollars in 2007 and income had grown by 148 million dollars to 872 million in 2008. Also, Goel claims that the U.S. music record industry’s income doubled in the last decade of 20th century from $7.5 billion in 1990 to $8.5 billion in 1999. In spite of these profits, companies lose large quantity of money from illegal copying of their products. The Business Software Alliance (2005) says that in 2004 the software industry had lost $33 billion from digital piracy. However, not only software industry has sheer loss from piracy, also, music and film industries took fewer profits from illegal copying. In addition, the rate of pirated media on computers is different. In comparison, in U.S. this number equals 21% and in China pirated software are installed on 90% of computers (Hill, 2007). So comprehensive rate of a piracy in China is caused by weak controlled legislation (ibid). To conclude, the piracy is a considerable problem and the society should deal with this problem, because piracy is not just copying, it is stealing.

In every region of world, there are different causes of piracy. Firstly, the main cause of piracy is human agency. In terms of one person, one pirated music file or one video game is not significant. However, in terms of whole internet society, it will be significant amount of money which equals $50 billion per year (Hill, 2007). People are downloading pirated software by different reasons, such as: unavailability of legal software in special region, too high pricing for programs or just miserliness. Secondly, the cause of piracy is the expansion of internet services as peer-to-peer file sharing, such as eDonkey, torrent or direct sharing. Moreover, there are sites with freely available to download illegal media and software content (Goel, 2010). For instance, Daily Variety Gotham (2006) writes that Spain has got the highest piracy rate in Western Europe as half of Spanish internet broadband is peer-to-peer connections between users. The first incident with widespread illegal peer-to-peer sharing was a Napster website with decentralized file sending system. As a result, these files were shared without any payments to record studios and music owners (Goel, 2006). Subsequently, by spreading high-speed internet connections and by refining video formats the video piracy is going to increase (Goel, 2006). Now it is much easier to download video file with pirated movie than 4 years ago. In comparison, the estimated time of downloading 700 megabyte movie is taken 30 minutes in 2010, while 4 years ago, in 2006 it was taken from 6 to 10 hours (The Global Broadband Speed Test, 2010).

Currently, there are 3 topmost methods to protect legal media from pirates. For instance, they are watermarking of media, using license keys and obfuscation of software parts. Firstly, watermarking of the media files depends on the type of media file. For instance, for video and images are using respectively video watermarking and image watermarking (Kwok and Yang, 2003). One of this methods Cox watermarking can be used for audio files watermarking which provides enough safety to media producers and convenience to users (ibid). Cox’s method based on the usage of 3 ID’s: ID of producer, ID of reseller and ID of consumer (ibid). At the reseller’s storage media files are saved with producer’s and reseller’s IDs (ibid). Next, when consumer purchases digital goods, consumer’s ID appends and file is available to usage (ibid). However, delivery time of media file to user and size of resellers’ media storage depends significantly on the algorithm of protecting (ibid). For example, one-bit watermarking needs more delivery time but less storage. In comparison, multiple-bit watermarking technology needs less delivery time but more storage space to save pre-prepared copyright-protected media files (ibid). Secondly, usage of license keys is the most used method to protecting digital goods from piracy (Anckaert, De Sutter, De Bosschere, 2004). This method based on sharing product keys to consumers which activate and make available to use software’s or media files.
Firstly, properties of copy-protected software and media are demonstrated in this paragraph. There are many varieties of the legal media protection from copying. For instance, there are obfuscation of parts in software and watermarking of media files (Collberg, 2002). Currently, the most used algorithm for protect legal software is using license keys and this method is useful. The first process, obfuscation makes software more secured and hard to hack (ibid). This method is appropriable, because it helps to avoid using non-obfuscated parts of code to creating pirates’ own applications and to hack legal software (ibid). The main way to check authenticity of intellectual property is the validation of the special key through internet. On the other hand, this solution can be harmful because it causes several negative effects for users such as: user need internet connection or somebody can steal user’s license key (ibid). On the other hand, hackers can create key generators, which can be used for illegal software usage. Efficiency of protection from piracy by this way decreases rate of illegal software significantly.

The second method to protect from piracy is closing and seizing websites by government. The main feature of this method is that governments of countries are supporting this method and are shutting websites with illegal distribution of pirated media. For example, torrents.ru was one of the first torrent-tracker websites in Russia which closed “for being an illegal source of computer software, films and music, and violating authors’ rights” (Interfax, 2010). Russian Government has taken the offensive, however they didn’t punish website owners (ibid). So, authors of torrents.ru just moved website to another mirror called rutracker.org (ibid). Also, NY Times (2006) reports that in the morning of 26th of November situation like this was happened in U.S. where ICE office of Homeland Security Investigations seized approximately 70 websites with pirated video, music, games and films. However, NY Times wrote that in the evening 26th of November mirror sites, which were made for serve seized sites, were discussed and viewed by internet users. So, these examples show that seizures of sources are not effective, because after shutting one source, the other sites with pirated media will pop out. To conclude, this paragraph shows that even governments operate against this issue, pirates will try to keep on their websites.

The third method of protecting from piracy is distribution of free-software. Multinational Monitor (2004) reports that free software is the way of using of software program as user wishes. User can change and modify source code in his needs, can redistribute copies (ibid). Therefore, efficiency of this type of software contains additional features, which are gratuitous, freeness to change and freeness to make copies. For instance, Keating (2003) confirms that in DiaDexus inc., California bioinformatics scientists use open source software in their researches and researchers say that free software helps to save money and have additional properties. For example, in this institution some experts explore source code and make add-ons and patches for areas which they need.
To summarize, there are three ways to prevent piracy. First, watermarking of media, using license keys, and obfuscation of software parts. Second, the closure and seizing of websites by the government. Third, the distribution of free-software. These are some proposed solutions to the rapidly growing piracy network and industry.

Similar Documents

Premium Essay

Digital Piracy

...Digital Piracy DIGITAL PIRACY In a day and age when almost all creative works can be put into digital form and legally distributed, there is also a huge potential for theft. This type of theft is known as digital piracy or intellectual property theft and often results in lost revenue, jobs, and wages. Battling online theft is a daily challenge for copyright owners. Digital piracy occurs when creative works such as graphics, photos, movies, songs, or text are distributed online without the consent of the artist, creator, or author and is in direct violation of copyright laws. (Artists Against Digital Theft) These thieves are often referred to as digital pirates. These pirates often setup professional and well-designed websites that trick consumers into believing they are legal. These websites are usually hosted overseas so that digital pirates can avoid requests to remove illegal content. It is very costly and time consuming for copyright owners to pursue international litigation to stop illegal distribution of their creative works. (Artists Against Digital Theft) In an attempt to stop digital piracy, the creative community is uniting together to “champion the rights of artists.” (Artists Against Digital Theft) A website called, Stop Stealing My Future, hosts a contest to help raise awareness about digital piracy. Artists upload videos of themselves explaining how digital piracy affects jobs and the digital arts industry. (Stop Stealing My Future) Another......

Words: 825 - Pages: 4

Premium Essay

Why Is Software Piracy so Pervasive

...Why is software piracy so pervasive? I believe software piracy is so wide-spread because of the easy method for sharing this software world-wide through the internet. With peer-to-peer sharing through torrent sites a person can share software with the world. Without the ability to share software on the internet piracy would be much less pervasive. I have heard some people make the excuse for using pirated software on the exorbitant profits that companies like Microsoft are generating due to overpriced software. Years ago there was an outcry that Microsoft should give a discount when a person purchased multiple copies. In response, Microsoft did finally offer a discounted Family Pak for their OS and Office. I also believe the conversion to digital formats like eBooks and mp3’s has made it easier to pirate these types of products. What are your innovative ideas to reduce this problem? This is a battle that I feel the software industry is losing although they have put up a fight. We have seen torrent sites shut down, individuals jailed, and people fined and yet pirating only seems to grow. Popular sites like isohunt and Demonoid which were shut down by the MPAA have resurrected their torrent site in different countries. Over the years the software industry has tried numerous methods including serial numbers, activation, and more recently online activation and authentication as Microsoft started with the new Office 2013, but it seems hackers continue to find methods...

Words: 312 - Pages: 2

Free Essay

Sopa

...and be happy. This is exactly what piracy is all about. So what exactly is so wrong with pirating? Piracy of entertainment is illegal and viewed as typically wrong by majority of people. Personally I have saved quite possibly thousands of dollars in pirating in my life. From the days of LimeWire where you could pirate a single song that you would have to download and wait throughout the night for it to be usable. To today where we are able to download whole discographies of artists within half an hour or less. However, today I would like to present you the facts that piracy isn’t as wrong as it appears and how each and everyone in this room can benefit from it by providing information on how it cannot be stopped, the monetary impacts of piracy, and other benefits of piracy. Transistion: Piracy is defined as the illegal trade or copy of digital entertainment according to the Merriam-Webster Dictionary. A study by Portsmouth University in 2014 concluded that the motives for piracy are that it saves money, often helps artists bypass record companies and allows access to content before it’s release date. Body I: Now that we know why people pirate we can look at how Piracy cannot be stopped. A. Goverments have attempted and momentarily succeded to take down pirating websites such as The Pirate Bay, but they revived and came back under multiple new domains within a short period of time B. In 2011 a bill called ‘SOPA’ or STOP ONLINE PIRACY ACT was introduced by US......

Words: 859 - Pages: 4

Premium Essay

Software Piracy

...positive, however; with the increased anonymity and ease of sharing information, piracy has become a very real issue for companies, both in and out of the workplace. Piracy can be segmented into two main industries; the multimedia industry which involves the copying of songs, videos and games, and the software industry which is the copying of software licences. For the purpose of this paper, we will be discussing the implications of software piracy, its effects on everyday businesses, and also briefly cover the effects on the industry itself. We will apply the theoretical framework and specify what this issue means to business managers in a practical setting. History Software Piracy originated in the 1960’s when the CD-RW drive was invented and floppy disks were traded. Since that time, the industry has grown significantly, especially in developing countries, resulting in billions of dollars of lost economic benefits and tax revenue. Prior to the 1980’s, one could pirate software without any legal implications. However, in the late 1970’s, Bill Gates, founder of Microsoft, lobbied for legislation to protect the integrity of software. When an individual or organization purchases software, it is the license to use the software that is purchased, not the software itself. As a result, Software Piracy is now an illegal act in most countries. One of the main advantages of Software Piracy is cost: the software is free or almost free to obtain. In addition, the......

Words: 1911 - Pages: 8

Free Essay

Good Governance

...the company. * Motives in pirating a “LOADED” employee/officer of competitor? (1) The company wants the experience and skills of employee. * By headcounting, the 2nd company will definitely benefit from the training, experience, and solid background the pirated individual has acquired from the 1st company. (2) Wants to acquire its competitor’s trade secret. * Not only experience but also the acquisition of the trade secrets or confidential information from the 1st company – like techniques, methodology, marketing strategy, classified formula, exclusive non public data or style. Example: BPI – pioneer automated teller machine and computerized banking * What is digital video recording? * What is Technology Piracy in Digital Recording? * Unauthorized...

Words: 600 - Pages: 3

Premium Essay

Music Industry

...technology that has been in discussion for years, and that is the comparison between the revenues of digital music that can be obtained through the internet to that of CD’s. There is also discussion of what the future may hold for the music industry. The International Federation of the Phonographic Industry (IFPI) has recently stated that there has been an 8 percent increase in global revenue for digital music in 2011 which is a $5.2 billion dollar increase from last year. Because of this increase that means there has to be a decrease somewhere, the decrease is found in the decline in sales of physical formats (CD’s), this market has dropped to 3 percent which is about $16.2 billion dollars. There is belief that in the future all physical formats of music will be a thing of the past and everything will be found digitally. The reason for this belief is that downloads of single digital tracks (which Apple iTunes capitalized on) rose to 11 percent in volume and digital albums rose to 24 percent. There is also discussion of what subscription music services such as Rhapsody, Spotify and Deezer have done to the music industry and its revenue. With these subscription music services there has been a 64 percent increase of subscribers since 2010 and a $13.4 million dollar increase. Recently the US has proposed two laws that could put an end to peer to peer sharing, the Stop Online Piracy Act (SOPA) and Protect Intellectual Property Act (PIPA). Because of these two laws the shutdown......

Words: 950 - Pages: 4

Premium Essay

Crime That Pays(and Pretty Well, Too)

...seven-level piracy temple, packed with nearly 2,000 small stalls, staffed by thousands of hard-charging, take no prisoner vendors, offering cheap knockoffs of the leading branded products in the world. Navigating a surreal bazaar gone wild, I stroll by stalls boldly displaying bogus Prada purses, Hugo Boss shirts, ad Hermes scarves; depending on how well you negotiate, each can be had for an absurd fraction of the price of the genuine version. Moving on, stall after stall offers infamous “copywatches,” Nike gear, Sony Jump Drives, Wii Remotes, Gillette razors, Oakley sunglasses, Zeiss binoculars, Nikon lenses, North Face jackets – one after another, in a seemingly endless procession of premier brand names. Despite spot-on comestic resemblance, virtually all is counterfeit. Moving around, one comes to digital zones, finding copies of software, music, games, and movies. Rack upon rack displays products from some of the best and the brightest minds of the world, now selling for ludicrously low prices-Microsoft Windows 7 for about a buck, Microsoft Office for $0.75, Wii Guitar Hero for a buck, Photoshop for two bucks, AutoCad for five dollars. Each stall is packed with an ever-changing collage of customers-Germans, Indians, Canadians, Brazilians, British, and Americans, and so on-each getting past initial shock, and many buying multiple titles. -DPS’s stroll through the Silk Market, Beijing, March 2011 Almost from its inception, software technology has been has been dogged by......

Words: 322 - Pages: 2

Free Essay

Information Technology

...Software piracy, define as the unauthorized use, distribution, duplication or sale of commercially available software, has become a global issue. In fact, almost one-third of all installed software is pirated (Jansma, 2004). Software pirates are responsible for over $10 billion in lost revenue (Hess, 2003). Each industry must protect its own intellectual property. The three most important aspects in helping to resolve piracy is knowing the processes and techniques in capturing piracy, identifying the motivating factors, and prevention. How do organizations capture pirates? There are three processes that can help software companies catch violators: monitoring, preserving evidence, and taking action. The first step is for companies to determine the extent of its piracy problem and monitor the online channels (Hess, 2003, p.4). Once the extent of the problem is identified, online monitoring should be implemented to discover the details. The two types of monitoring are in-house and outsourcing. The advantage of using the in-house monitoring program is that it saves money and the staff gains firsthand knowledge of the strategies that are used. Outsourcing the monitoring can be expensive, but the main advantage is that the service is extensive and uses systematic monitoring (Hess, 2003, p.5). Most pirated software is sold on auction websites, such as eBay, Yahoo! Auctions, and Amazon.com Auctions (Hess, 2003, p.5). Approximately, 60-90% of the software products offered in online......

Words: 1050 - Pages: 5

Free Essay

Pirating Isn't Pirating

...Stockholm, Sweden’s district court in the 2008-2009 case against The Pirate Bay for hosting a website people were using to (technically) only share the links to copyrighted material. When you think of an internet pirate, do you imagine someone taking the livelihood away from a rich Hollywood bigshot, robbing a human of their ability to live and take care of themself? Chances are that isn’t the image that comes to mind to the average American, nor the average Earth citizen. Now, the statement that “piracy is a victimless crime” isn’t completely wrong or completely wrong from my view. I can understand the side that says that it isn’t a victimless crime, because the creators of software or media do rely on that money to make a living in some situations. I see the other side too though. The side that says that piracy is a victimless crime. A great deal of available software and media have quite a few steps between the end user and the actual creator or whatever the digital good is. Movies have many production companies, including 20th Century Fox, DreamWorks, Metro-Goldwyn-Mayer, Columbia Pictures, and many, many other studios. These are the companies of which you see the logos before almost all movies. These studios are owned by the biggest wigs in town, whose pockets are lined with millions. Sony Pictures Entertainment claimed over...

Words: 1140 - Pages: 5

Free Essay

Is It Ethical to Download Illegally Movies from Internet: -

...Is It Ethical to download illegally movies from internet:- The circulation of movies has altered dramatically over the past ten years. Sales of substantial goods, CD’s and DVD’s, have dropped harshly since 2000 when diverse online groups were built to share and download pirated movies with each, conceiving conflict of interest and promise loss for the business. The movie industry is feeling the agony of online piracy, as sales of DVD’s in 2008 fallen to their smallest levels in five years. A lone video, “the Dark Knight” was downloaded at smallest seven million times around the world in 2008. This pattern of illegal downloading in the joined States is mirrored in other nations as well. In a latest study of Japanese Internet users, it was reported that between 2005 and 2008, the number of illegally downloaded movies and songs almost increase two-fold. Whereas the movie commerce has become more aggressive in their methods to stop illegal downloading, they appear to be battling an uphill battle. The tremendous rush in popularity throughout 2008 and 2009 of communal newspapers sites such as Facebook and Twitter has helped give illegal downloader’s another way to converse with like minded persons and find new ways to pirate videos. The theme of illegal downloading of copyrighted material extends to be of interest to the movie industry. Actual marketplace purchase/download demeanor is adversely affected by illegal document sharing. Without conceiving about the communal ethics,......

Words: 398 - Pages: 2

Free Essay

How Is Digital Piracy Hurting Modern Society?

...| How is Digital Piracy Hurting Modern Society? | | | Introduction Digital Piracy is a huge crime that is large hurting the entertainment business here in the United States and in other countries, but the question I ask myself is how digital piracy hurting modern society? What actions are our governments taking to stop people from downloading illegal music, movies, and software? How much of a profit loss is effecting the companies that are producing this digital material? If someone knows what the punishment is for downloading music, movies, and software would they still do it. This research will aim to understand what is digtal piracy is and why it is that people download illegal software, movies, and music. Literature review In the article Examine Digital Piracy: Self-Control, Punishment, and Self-Efficacy, the authors introduce what digital piracy is and how it changes on a constant basis. They show how the “United States government has been cooperating in the fight against digital piracy with the software, music and movie industries with the Digital Millennium Copyright Act (DCMA)” (Zhang, Smith, McDowell, 2009). They discuss how most people think that digital piracy is acceptable, it a soft crime and it does not hurt anyone, and most think that this information should be exchanged freely. The authors also did an online-survey study on college students who were taking Management Information Sciences (MIS) course at a public university in the southern......

Words: 1689 - Pages: 7

Premium Essay

Cooperative Maritime Security

...Man has turned to the Earth’s oceans, lakes, and rivers for different reasons for centuries. Over that time humans looked to the Earth’s waterways for sustenance, commerce, security, travel, and recreation. As civilizations developed, the oceans were used as a means for nations to establish territory, increase trade within its borders, and the oceans have helped develop a global economy by acting as the highways for international trade markets. (McNicholas, 2008) For as long as humans have been sailing on the seas, nations have been trying to provide a comprehensive set of rules and regulations for all maritime subjects. Due to the attacks on New York’s World Trade Center and the Pentagon, combating terrorism has been seen in a different perspective, and the U.S. has helped kick start a worldwide campaign. Recent events, primarily 9/11, have forced nations to re-evaluate their maritime security practices with regard to their place in the global economy. Safe transport of cargo and passengers along with the security of vessels, coastlines, and ports has become critically important with the increasing level of terrorist activity. (Yonah, 2008) With salt water covering two thirds of the Earth’s surface, more than 90 percent of the world’s trade transported by water, and the United States alone having over 12,000 miles of coastline terrorists not only have an easily accessible means of transport, but a wide array of potential targets. (Yonah, 2008) The Concept of......

Words: 1273 - Pages: 6

Free Essay

Captain Phillips

...Captain Phillips Captain Phillips was really an inspiring movie, considering the fact that it was based on true incident in 2009. I wasn’t aware about this incident before watching the movie. Captain Phillips was indeed brave and a true leader who held himself hostage in order to keep his crew and ship safe from the pirates and getting himself rescued in the end. After the movie and the class discussion, I got to learn some important learning which are important in day to day life of a leader. Captain Phillip’s anticipating and preparing himself before any incident took place ensuring the ship doors were locked and the crew was ready for any unseen event. This shows he learnt from his experience and prepared for the worst. Also staying calm and focused and not creating a panic is important during attacks and disaster. He inspired me how he was protective about his crew even though he dint knew everyone in person. This made him earn their trust. He also was smart to let the crew know where he was moving with the pirates in the ships and also giving them clues as to how the crew could fight with the pirates making their weakness as the crew’s strength. He let the pirates take him as hostage in order to make sure being a captain, his ship and crew would be safe. There were two leaders in the movie, one was Captain Phillip’s and other was Musa. Both were different kind of leaders. Captain Phillip’s was more planned and knew what he was doing. But, Musa was an aggressive......

Words: 673 - Pages: 3

Premium Essay

Pirates of the Silverland (Oil Piracy)

...Problem statement Quality and quantity of CPO delivered The root problem encountered in this case is the quality and quantity of the CPO delivered. Palm Haul Sdn Bhd’s (PHSB) major client Oilene Refineries Sdn Bhd is unhappy with their service mainly because the CPO delivered is either contaminated or short delivered. The CPO delivered to Oilene is contaminated with either sludge or water. This is due to unethical behavior of tanker drivers who involve in oil piracy by siphoning the CPO and selling them to syndicates. The CPO that is being siphoned is replaced with either water or sludge so the end user will not realize the theft. Further, this situation prevailed as the oil piracy during the time period of 2009 was robust with a record of approximately RM 325 million of CPO production lost annually. This hence triggered the tanker drivers to actively involved in this illegal activity. Apart from that, delivery of contaminated CPO has a negative impact on Oilene operation as they have to shut down the plant to clean the sludge almost every week and thus affects their delivery time and the quality of oil produce. Besides, the consignment from PHSB is causing more problem than other transporter which gives a competitive advantage over their rivals and might risk losing their contract to Oilene. Apart from that, the CPO delivered to Oilene does not match with the numbers in the delivery order; which means they are being short delivered. This has incurred a high cost in......

Words: 551 - Pages: 3

Premium Essay

Gun Viloence

...L.I.F.E Life plays a big part in gun violence. Life can be given and life can be taken. You take a life and go through the court system and may end up with life. In the US, guns are not just used for killing. Guns are used for protection as well (great grandma shoots at two men who tried to rob her on bus). Some would say more guns more homicides. No one wants to lose fights anymore. Guns are not hard to come by and conflicts are not easy to avoid. Taking away guns leaves others defenseless, adding kills. (Zimmerman shot Martin, who was unarmed during an altercation between the two). So do guns protect or harm? Guns have been a part of the US culture for centuries. Now more than ever guns are being used to hurt, harm, and kill “In 2010, guns took the lives of 31,076 Americans in homicides, suicides and unintentional shootings. This is the equivalent of more than 85 deaths each day”. Many people are for taking them away and can you blame them? That’s only going back four years. Taking them away however will only hurt the ones who cannot defend themselves, for example the handicap and elderly. Pregnant woman fatally shot, man uses his gun to protect two month old son from armed robber. From the examples, which are you for? Guns hurt and guns protect. What can be done to change this situation not knowing who will become criminals and who needs help make it harder to bare arms and crack down on those who are willing to uses them...

Words: 275 - Pages: 2