You are on page 1of 43

THE INDIAN INSTITUTE OF PLANNING AND MANAGEMENT

ADVERTISEMENT

PROJECT ON

―Reengineering Antipiracy Marketing in Global Markets‖

An inside report and cover story ahead

Submitted by
Aby Skaria,
Sec-B,
SS-07/09

Under the guidance of

Prof. Tareque Laskar


Declaration
I, the student of Indian Institute of Planning & Management, Spring-Summer
2007-09, Section-B, hereby declare that the details furnished in our project report
are true to best of our knowledge.

I confidently declare that this is not a duplicate of any other work already done.

Place: Cochin

Signed: Aby Skaria

Address: Plappillil House


38/2497 Kaloor P.O
Gandhinagar Cochin
Kerala INDIA
abyskaria@gmail.com
aby_skaria@hotmail.com
CERTIFICATE
This is to certify that project entitled ―Reengineering Antipiracy Marketing in
Global Markets‖ was conducted by Aby Skaria in partial fulfillment for the
academic requirements in 6th trimester project work during the academic year
2007-09. It is certified that all corrections/suggestions indicated for internal
assessment have been incorporated in the report deposited in the department
library. The project report has been approved as it satisfies the academic
requirement in respect of project work persuaded for the master degree.

Signature Signature

Prof. Tareque Laskar Prof. M. Jayachandran

Project Mentor Dean, IIPM.


TABLE OF CONTENTS

Sr. No. PAGE


CHAPTERS
No.

1. 01
SYNOPSIS

2. 03
INTRODUCTION

3. LITERATURE 12

4. RESEARCH METHODOLOGY 18

5. ANALYSIS OF MARKED-UP PRICE 22

6. LEGISTIMATE BARRIERS & NEW ENTRY 27

HOW MICROSOFT INITIATE WINDOWS 7 IN RUSSIA?

7. AN ENTREPRENEUR’S SPIRAL GROWTH 36

FORSEEING COLLECTIVE CARE IN ANTI PIRACY EMPOWERMENT

8. A MANAGER’S ETHICS & ANTI PIRACY 39


SOME GUIDELINES AND GENERAL EVIDENT ACCOUNTS
9. CONCLUSION 41

10. BIBLIOGRAPHY 42
SYNOPSIS

An applicability of various preferences across marketing counterfeit in a globally interweaved


market may not fully totally stimulate the cause. Imagine in such scenario will this turn around
will even workout when we have laws and some really lack of any source of earnings would try
to outsmart guidelines. These may not be set apart that these are violations without guidance.
Any such stimulus cannot be taken as a threat. In global market there can‘t be 100% security in
terms of capital or workplace consolidation. Only if we study, applicability of reversing the
downward trend sometimes done with public participation having long term benefiting the
market chart and domestic consumption pipeline can this be vibrant in a longer run track.

These guidelines if could sell superfluously even in our neighborhood can only be made
innovative in rethinking, achieving and experiencing if there is large scale participation favoring
the choices of beneficiaries, functional prominent involvement of demographic constraints,
fashionable time-constraint of the responsible practices, figures targeting strict generative
demand and focus of societal ring adding value-for-money experiences in our small world.

In addressing any factor of relevance, there is a serious counterweight. In this practicable


oriented informative sidelines, this project with workspace is oriented for allowing new entrance
in global marketing where anti piracy related guidelines has to be set and every day spring up
like one of the beneficiary in welfare economics like not substantially squealing off benefits from
the majority yet providing individual independence for empowering the scenario better than the
best. This is an account of responsive learning‘s by strict methodological research.

Here in this thesis ―Reengineering antipiracy marketing in global markets‖, I have focused
understandable constraints of the consumer and their evading popular unethical targets in
imparting the most precious gift of their eyesight within affordable financial limits, down-to-
earth decision roles and practicable behaviour variables in marketplace, market-space and meta-
markets.
Introduction
In this information age for every responsible business practices towards co-existence, the organization
process must identify, promote, enhance and distinctly meets core stimulus in an exchange process,
anticipating a fine balancing line tape of needs, wants with delight reengineering customers and
stakeholder‘s requirements profitably. In this human activity social, economic, business and managerial
create offerings that innovate, inventively add value benefits with others. As an entrepreneur, the base
neck of implications still exists even when there is a need backed by purchasing power as there is a
dynamic substantial parallel curb collaboratively to be laid on piracy for the people friendliness. Joining
such campaign in a global scenario can only be far seen made viable not only through selling what is
feasibly marketed in markets and consumers mindset but also delegating their wholesome interpretable
and substantial effective beneficiaries foremost in aftermarkets advanced against the value of affinity card
traded in the interest of marketers and empowered participants without direct intervention.

As entrepreneur, not as the sail of cruisers, the influential developments in strategic capabilities on
privileges capitalized within organizations improves strengths like penetration inside sensitive
personalized proactive partnership and relative accountability within the dealers and resellers of consumer
markets such as adopting planned process overdraft amongst alternative value, benefit denominations. On
the other hand, an enthusiastic entrepreneur looks around and insure by the embargo in any marketplace
or market space where the violation of any conglomeration of business linked together by cross-
shareholdings of a robust corporate structure. In just in time, expected elastic receivables and the overall
quantifiable market share make the base price of closing season may be invested in the analysis of insured
collaterals in a click away. This is the kind of reengineering focused even in progressive or rural
marketing in this study for eliminating antipiracy in the following areas:
 IT(Software/Hardware): Microsoft and others
 Pharmaceuticals: Fake medicines & violated counterfeiting

This thesis is not only a generalisable findings at corporate-level and international strategy largely where
the diversity is accountable and where the home markets has value-added activities. This significantly
analyses earnings across markets without exploitation. The reign of economic scale is made across
dimensions and I have considered selling sub-par with regards towards ethical reengineering of strategic
antipiracy marketing in global standards.
Literature
In present global market only through competitively reengineering marketing against
associative violations and barriers will make what can be marketed earn benefits and generate
revenues. When it comes for fighting piracy against infringer‘s ease of stealing undeserved
profit, this essentially mobilizes and reinforces everyone who despises the criminals who rip off
artists, companies and individual citizens by stealing their copyright property and counterfeiting
it for personal gain. Essentially one individual would additionally like more, why not reengineer
solutions catering fortunes for all desirably yet with less work.

This project thesis is towards a conductive marketing analysis of making decision process
vitally reusable. I have outlined influential segments boost major initiative on expected
aspirations on importance of younger emerging ethical conduct of business practices. The natural
initiative of better society as par with host of marketers significantly outline practices be made
ethically and responsibly safe.

Definition of Antipiracy
Anti-piracy is a term used by some to describe the attempt to prevent copyright infringement,
counterfeiting, and other violations of intellectual-property rights.
It includes, but is by no means limited to, the combined efforts of corporate associations (such as the
RIAA and MPAA), law enforcement agencies (such as the FBI and Interpol), and various world
governments to combat copyright infringement relating to various types of creative works, such as
software, music and films. These measures often come in the form of copy protection measures such as
DRM. Nearly 90% of college students download music illegally making them the group of people who
download music the most illegally.

Software Piracy - Affects & Effects


Executive Summary

According to the Fifth Annual BSA and IDC Global Software Piracy Study, by the end of 2007
there were more than one billion PCs installed around the world—nearly half of which contained
pirated software. Worldwide revenue losses due to software piracy were $48 billion that same
year, an increase of 20% from the preceding year. Whether intentional or not, a vast amount of
revenue is lost to piracy and diverted from software companies and local governments. Revenue
that otherwise would be reinvested in R&D to develop and improve legitimate software
programs simply does not reach software publishers. This paper discusses the causes and
consequences of software piracy, and presents software developers with a way to protect their
Intellectual Property and increase revenues, including guidelines for evaluating software digital
rights management (DRM) solutions.

What is Software Piracy?

Software piracy, also known as copyright infringement of software, is the unauthorized


duplication or distribution of copyrighted computer software. Although most computer users
today are aware that unauthorized use and duplication of software is illegal, many show a general
disregard for the importance of treating software as valuable Intellectual Property.

Types of Software Piracy


 CD-R Infringement: Illegally copying software using CD-R recording technology.
 Softlifting: Purchasing a single licensed copy of software and loading it onto several
computers in violation of license terms. An example of this would be sharing software
with friends, co-workers and others.
 Uploading and Downloading: Making unauthorized copies of copyrighted software
available to end users connected to online service providers and/or peer-to-peer networks
via the Internet.
 Unrestricted Client Access Infringement: Allowing clients of an organization to freely
access software on the organization‘s network server in violation of the terms of the
license agreement.
 Software Counterfeiting: Illegally duplicating and selling copyrighted software in a
form designed to make it appear legitimate.
 OEM Unbundling: Selling standalone software that was intended to be bundled with
specific accompanying hardware.
 Hard Disk Loading: Installing unauthorized copies of software onto the hard disks of
personal computers, often as an incentive for the end user to buy the hardware from that
particular hardware dealer.
 Renting: Unauthorized selling or viewing of software for temporary use.
 Commercial Use of Non-Commercial Software: Using educational or other
commercial-use-restricted software in violation of the software license.

Why Protect Your Software?

Piracy harms you and your customers.

Developing a software application involves a major investment of time, money and effort.
Software piracy (including illegal network licenses and unfulfilled upgrades) denies you the
revenue you deserve and harms your paying customers, who ultimately bear the cost of illegal
use of your products. Piracy limits your ability to be competitive, leading to higher-priced, less
advanced products for your customers.

The negative effects of piracy for end-users.

Copyright infringement not only hurts the software industry, it also has negative consequences
for the end user. Here are just a few of the common-sense reasons to avoid software piracy:
 No access to technical support
 Lack of product documentation and warranties
 Content may be incorrect or outdated and it can be difficult to assess necessity for
upgrade
 Software may contain viruses or be defective or corrupted
 Expensive lawsuits and/or significant penalties can be applied

Guarding Intellectual Property protects your competitive advantage.


Intellectual Property represents upwards of 80% of a typical software company‘s market value.
With industrial espionage becoming more and more common, protecting and maintaining your
competitive advantage must include guarding your Intellectual Property—your valuable code
and trade secrets—from reverse engineering. Software solutions not only consist of executables
and DLLs, they also contain data files which may be of even greater value than the software
applications themselves. In many cases, these data files contain highly sensitive information and
Intellectual Property (IP) which also must be secured against prying eyes, theft, and copycatting
by competitors. Obfuscation, encryption and access control are key security measures to take in
protecting your valuable IP.
Software protection increases revenues.
With increased revenues comes the opportunity to invest more in improving your product, the
ability to price it more competitively and the means to provide access to a broader customer
base.

Five Myths about Software Copy Protection

1. Software piracy is a victimless crime.


Nothing could be further from the truth. According to industry statistics, illegal software use
costs publishers worldwide nearly $48 billion a year in lost revenues, with more than $8 billion
lost in the North America alone. In Central and Eastern Europe, an average of 68% of the
software in use is illegal. In some Asian and Eastern European markets, over 88% of software is
unlicensed.

2. Software copy protection makes software more expensive.


On the contrary, the price publishers pay for software copy protection is negligible compared to
the losses they incur through the pirating of their software. In fact, the vast majority of cases
have shown that investment in protection is offset entirely by increased sales and profit. By
protecting their software and thereby increasing their revenues, publishers can afford to supply
better software at more competitive prices. True, not everyone who copies software today would
buy it tomorrow if it were available only in a protected format. But, the ensured quality, support
and functionality that comes with a manufacturer‘s copy is generally well worth an incremental
fee.

3. Software copy protection gets in the way of the legitimate user.


The new, more sophisticated types of software copy protection in no way hinder legitimate end-
users, but instead work to benefit them. One important reason for this is because protection
safeguards the integrity of the software; the end-user is assured that the software cannot be
tampered with in any way. Additionally, higher revenues for developers mean that down the line,
users will benefit from better, higher quality software. Large organizations are legally liable for
the software they purchase and have a clear interest in preventing the unauthorized distribution
of that software. Often, the users themselves request that the software be protected, to ensure that
it won‘t be used illegally, thus preventing future litigation.

4. Inexpensive software is not copied.


Some people attack the concept of software protection by arguing: ―Make software cheaper,
that‘s all. People don‘t copy inexpensive software, and you‘ll sell more copies of your product.‖
The argument is inherently false. People who are inclined to copy software will copy the
inexpensive as well as the expensive software programs. The same people that are saying, ―if
software were cheaper we would buy it,‖ are copying software that costs as little as $10. The
reality is that developing a software product requires a substantial investment of time and money,
and most software publishers simply cannot afford to lower their prices.

5. Any protection system can be cracked. Therefore, software copy protection is useless.
Only the first part of this myth is true: any software protection system can be cracked, just as any
lock can be picked or any door can be broken. However, the aim of software copy protection is
to provide protection for a reasonable period of time. Software cannot be protected forever, but it
can definitely be protected long enough (i.e., until the next version of the software product is
released). This new software version should again be protected, with a strong and field-proven
protection technology that has also been improved in parallel, thus ensuring a long and profitable
sales life for the protected software application.
Guidelines for Evaluating Software Digital Rights Management (DRM) Solutions

If you or your company has decided to implement a Software DRM solution, you are probably
faced with a number of options. Software DRM functionality includes several options: protecting
your software from piracy; securing the Intellectual Property (IP) that resides in your software
code and data files; and the ability to provide flexible licensing models for your software.
So, what are the key features and capabilities you should be looking for when comparing
Software DRM solutions? Today‘s Software DRM solutions incorporate a variety of elements.
Hardware-based protection keys or ―dongles‖ deliver very high levels of protection against illicit
copying as well as on-board memory for licensing, and other data. Software-based keys can also
be used for anti-piracy and to enforce licensing, but they rely on the end user‘s hardware to
―lock‖ your software in place. The methods used for protecting the software—automatic
wrapping and incorporating DRM API calls within the source code—deliver both flexibility in
your implementation and security for your IP.
When beginning the evaluation process for a Software DRM solution, we recommend that you
establish a benchmark for comparison based on the following criteria:
 Security: Make certain that software protection keys—whether ―dongles‖ or software-
based keys—incorporate security features that will be effective in protecting your
software products against piracy. You should look for solutions that employ standards-
based encryption, such as AES. Use of unique encryption keys to secure multiple
portions of the same software affords better security than using a single encryption key to
secure your software. For ―dongles‖, which must provide a communication channel with
the host computer, you should make certain that there is built-in protection against brute-
force attacks, as well as capture and emulation of the data passed between your product
and the hardware key.
 Product lifecycle support: In the past, Software DRM was viewed mainly as a function
of software development or engineering. Today, it more often than not must be
implemented by a variety of functions within your organization, such as Engineering,
Marketing, Sales, Order entry, Production and Support. You should look for a solution
that provides support across the entire software lifecycle. It should enable you to separate
tasks, while maintaining continuity, and providing a means for you to grant selective
access to functionality that will be implemented by different people within your
organization.
 IP protection: Intellectual Property represents upwards of 80% of a typical software
company‘s market value. It is critical then that the Software DRM solution you choose
provides comprehensive protection for your IP, including the proprietary algorithms and
other trade secrets you embed in your object code. The solution should provide a robust
automatic enveloping/wrapping technology that not only contains built-in anti-debugging
features but also includes code obfuscation and hard encryption mechanisms. This type of
IP protection is especially important if you use .NET or other code that runs on a virtual
machine, making it inherently susceptible to exposure. The Software DRM solution
should also allow you to protect library files as well as executables.
 Versatility: Check to make certain that the Software DRM solution provides the
flexibility and features required to support a variety of environments, platforms and
networks, including client and API types, operating system (OS) platforms and supported
network protocols. Additionally, you should make sure that the solution will allow you to
change licensing and distribution models–including the ability to move between dongle-
based and software-based protection keys to secure your software, without the need to re-
engineer the software code.
 Network support: Assess the functionality, features and ease-of-use of each software
DRM solution when used in a network environment, including license management and
end-user administrative control functions for centralized tracking of network licenses and
protection keys. A centralized administrative dashboard should provide a single view of
all licenses and license servers within the end-user organization--making it easy to
determine and resolve license availability and compliance issues.
 Licensing capabilities: Check that the Software DRM solution supports your business
needs and your customers‘ growing demands for more flexible, secure, and convenient
licensing and electronic software distribution options. Also look for the ability to
remotely update software licenses in the future. Updates need to be secure, and in the
case of dongles, as much of the licensing and update logic as possible should be
embedded in the hardware itself to maintain the highest level of security.
 Separation of protection from licensing: This is based upon the idea of protecting your
software only once to deliver many different software products. It enables you to
implement strong software security once, and then allows product management or
marketing the flexibility to implement the licensing models they choose, as often as they
choose and at any time during the software product lifecycle, without requiring R&D‘s
continued involvement.

At Glance
Finding ways to decrease software piracy has widespread benefits. The end user is assured that
the programs they use are as the publisher intended, and as such are afforded appropriate support
and warranties. The software industry is paid for producing quality products, stimulating a
competitive market and further product development. But halting piracy requires the combined
efforts of consumers, software producers and government. Some of the most successful efforts
involve educational programs coupled with enforcement which has been shown to work in North
America and Europe.

Beyond this, software publishers need to take proactive and positive steps in the form of
implementing Software DRM strategies to protect their products against illegal copying and IP
theft. Choosing the right Software DRM solution will not only protect your company from piracy
and reverse engineering, it will also enable you to enter new markets, increase revenues and
reduce operational costs.

Pharmaceuticals Products
The impact of globalization in the pharmaceutical industry has led to the increase of counterfeit
and substandard medicines. Arguably, a percentage of counterfeit and substandard medicines on
the market increases each year as manufacturing of active pharmaceutical ingredients (API) and
finished dosage forms (FDFs) shifts from developed to lesser developed markets. The extent of
counterfeiting is impossible to quantify, however, WHO estimates the number of incidents
detected in 2007 increased to over 1500 (average of 4 cases a day), roughly a 20% increase from
2006.
Industry Trends Impacting the Problem: Industry Trends Impacting the Problem:
Global API Manufacturing - 2004 Global API Manufacturing 2007

*Source: Newport Horizon Sourcing, October 2004 * Source: Newport Horizon Global Database, July 2007
Total Global Number of API Manufacturers Sites approximately Total Global Number of API Manufacturers Sites approximately
1,144

Industry Trends Impacting the Problem:


According to IMS Health report, India will dominate API production for the next 20 years, and
over the next 50 years China will take over as the predominant API supplier. Currently most API
manufacturing in India and China is for the generic drug market, but this will change over time
due to:
 lower development costs
 complex synthesis capabilities
 shifting pharmaceutical drug production
 regulatory compliance and adherence to GMP and GCP
 expanding consumption market
The generic production is growing at a faster rate than innovator drug production and a shift in
the global production of generic drugs has acclaimed that the Countries/Regions with significant
growth of generic production include: India, China, South East Asia, Brazil, Middle East, Russia,
and Mexico.
Industry Trends Impacting the Problem: Global Pharmaceutical Manufacturing
According to IMS, India is currently producing about 70% of the global generic medicines.
Apparent shift in API and FDF production away from the developed markets may have
contributed to the counterfeit and substandard medicines problem. The regulatory regimes and
standards in lesser developed markets are much weaker. Also Globalization has made trade in
counterfeit medical products much easier.

Counterfeit vs. Substandard Drugs


Counterfeit drugs are produced by criminals and meet the ―fraudulent and the deliberate‖ aspects
of the WHO definition of counterfeit medicines
 ―A drug that is deliberately mislabeled with respect to identity, history or source‖
 Applies to the container or other packaging or labeling information
 Applies to both brand and generic products
Substandard drugs are medicines manufactured below established standards of safety, quality
and efficacy.
A counterfeit drug or substandard medicines generally meet regulatory requirements such as
cGMPs, bioequivalence, or pharmaceutical equivalence. The public health impact of substandard
and counterfeit medicines is the same since both can have correct ingredients/components,
wrong ingredients/components, without active ingredients, with incorrect amount of active
ingredients or with fake packaging. The consequences of the use of either counterfeit or
substandard medicines can be dramatic
 Direct harm to patients
 Therapeutic failure
 Weakens public confidence in health system(s)
 Affects reputation of manufacturers, pharmacists, doctors, private organizations and
government institutions
 Counterfeit products have been detected in most of WHO‘s Member States and in all its
regions
 The substandard and counterfeit medicines problem varies significantly among countries
and regions
 Countries and regions with weak regulatory oversight are more suspect to substandard
and counterfeit medicines

DOC Involvement / Activities


 DOC/FDA lead Anti-Counterfeiting Task Force
 APEC Life Science Innovation Forum Activities, such as anti-counterfeit medical
product Asia and Latin America seminars (with USFDA)
 U.S. - China Pharmaceutical and Medical Devices JCCT Subgroup
 U.S.- India HTCG Biotechnology and Life Sciences Working Group
 ASEAN activities
 STOP!: Strategy Targeting Organized Piracy – 1-866-999-HALT or www.Stopfakes.gov
 WHO International Medical Products Anti-Counterfeiting Taskforce (IMPACT)

DOC Focus
Identify and understand scope and breadth of problem
 Work with industry, regulators and other stakeholders
 Facilitate information exchange and education

Potential Solutions
A. Counterfeit Drugs
 WHO IMPACT initiative
 The growth of counterfeit medicines is a global problem that requires global cooperation
among health regulators, customs, law enforcement and industry to regulate and to stop
the flow of pharmaceutical ingredients
 Risk of doing nothing – prevalence of counterfeit medicines will continue to grow
 Protect supply chain integrity
 ―Partnership for Safe Medicines‖ is a coalition of patients, physicians, pharmacists,
universities, industry, and other professional organizations, committed to protecting the
public from counterfeit medicines -- Avoid – Detect –
Report
 SafeMeds Alert System: www.safemedicines.org
 Countries can sign up to participate
o Anti-counterfeiting Trade Agreement (ACTA)
B. Substandard Medicines
This is an issue we have only recently started working on so we are at a very early stage
 Regulatory training
 Expansion of ICH activities
 FDA foreign field offices

 Continue global harmonization efforts (e.g., training, standards…)


 Global cooperation on facility inspections and audits
 Manufacturer responsibility for product QC
 Encourage implementation of technologies such as track and trace, verification of
ingredient programs, authentication…
 Continue regional dialogues – APEC, ASEAN, PAHO, WHO, PANDRA, etc.
 Enforcement of regulatory standards
Inside European Union:-

Worldwide officially authorized legal institutions, organizations, associations and


pharmaceutical companies all agree on the fact that a uniform solution for the security and
traceability of medicinal products needs to be found in the very near future. The damage for
Companies and consumers caused by counterfeited drugs is immense.

Facts and Figures


The number of confiscated medicinal products at the EU borders has increased by a 51%
alarming rate in 2007. Not only lifestyle medicines are concerned, life-saving drugs are also
counterfeited more and more often. The European market is also frequently targeted by
counterfeiters. In its public consultation, the European Commission suggests the implementation
of a uniform security and traceability concept, at least for the European pharmaceutical industry.
Time is short, as not only pharmaceutical companies but also counterfeiters adjust to the
technical state of the art. Many security features are copied nearly as quickly as they enter the
market for the protection of medicines.

The German 3S Simons Security Systems GmbH now offers a tailor-made solution for the
pharmaceutical industry. The combination of micro colour-code particles SECUTAG® and
traceability codes provide product security and traceability in one single system.

This is where the concept of 3S Simons Security Systems GmbH sets in: With its innovative
combination, the company offers pharmaceutical producers the possibility to sustainably secure
their primary or secondary packaging, the package inserts and the traceability codes against
counterfeiting. The worldwide smallest micro colour-code particles SECUTAG® are accepted as
evidence by international courts and are practically inimitable due to the huge technical
production barriers. Combined with an RFID or data-matrix code, the traceability of the entire
delivery or of the single packages is also ensured. The pharmaceutical products can be identified
and checked for authenticity in existing databases worldwide. This industry-specific solution
decisively minimizes the risk of counterfeited medicines entering the supply chain. Verification
of the merchandise is easily accomplished for producers and suppliers as well as for customs, the
police and end consumers
Following the slogan ―your code for safety‖,
SECUTAG® marks the genuine products with colour-
code particles, which enable unambiguous distinction
between branded goods and counterfeits. Industrial
production of the smallest micro colour-code particles
worldwide requires up to 40 production steps and
special technical products. The process is protected by patents all over the globe and has proven
to be forgery-proof for more than ten years. The colour codes are accepted as decisive evidence
by international courts, serving global defense of industrial property rights and supporting the
fight against unjustified damage claims respectively product liability claims. In this respect, the
product security system acts as deterrent against counterfeiters, while simultaneously protecting
and promoting the image of brand-owners as guarantors of high-quality goods. This in turn can
be transformed into a sales argument by the company. Every manufacturer gets his individual
company code. The system‘s flexible application renders it suitable for a broad range of
products. Integration into any kind of production line is easily accomplished without costly
modifications in the manufacturing process.
SECUTAG® is used by companies active in the most diverse industries worldwide. The anti-
counterfeit system has proven its reliability, evidence is furnished by the numerous prizes that
have been awarded in recent years, for example by the „World Packaging Organization―, the
„Salon International des Inventions― or the ―Interpack― trade fair.

Conclusions
 Arguably, one of the byproducts of the globalization of the pharmaceutical industry is an
increase in counterfeit and substandard medicines
 Notably, the global shift in the production of API and FDFs adds to the global
counterfeit and substandard medicines problem
 Any meaningful solution requires cooperation and coordination among various
stakeholders, including customs, regulators, law enforcement, and industry
RESEARCH METHODOLOGY

Every kind of study has its own ways to collect the relevant data and information to
make the study successful with the results. The method of collecting data is dependent upon the
nature of external factors. The research plan for the project was drawn up keeping in mind the
advantage of both primary and secondary data.

The main objective of the Project is to Study the feasibility analysis of reengineering
Market Potential in viable anti piracy marketing strategy for IT and Pharmaceutical Economical
sectors. The methodology adopted for this Project Survey of Customers and Internet Surveys.
The Customers include youngsters who are 18+ who used Computers or have been reasonably
aware of the cause. The survey is done with the help of Questionnaire, which are Opened Ended
and Closed Ended. In each peer to peer interaction it has been taken care for relevant
participation in online study groups and interactive Personal Interviews of Each and Every one
who use Computers or have filled the questionnaire.

The Questionnaire is designed by keeping in mind the following:

 Customer‘s Lifeline Value.


 Existing Points-Of-Difference.
 Total yield of Choices.
 Price paid for the Product of Existing Advantage.
 Integrated marketing activities involved.
 Service provided by Existing Segments in your region.
 Individual Problems faced with genuine existing Product or
Services.
There are lots of online forums and chat oriented websites and their associated links
in internet. Out of them, I have designed a rocket survey with easier interactions for participating
in live discussions with day-to-day process of maximizing result oriented basics. So, I have taken
Personal Interview of them all. So, the Methodology that was used for the Project is “Online
Survey Method.”

All items in any field of inquiry constitute a ‗Universe‘ of ‗Population‘. A complete


enumeration of all items in the ‗Population‘ is known as a Census Inquiry. It can be presumed
that that in such an inquiry, when all items are covered, no element of chance is left and highest
accuracy is obtained. But in practice this may not be true. Even the slightest element of bias or
its extent except through a resurvey or use of sample checks. Besides, this type of inquiry
involves a great deal of time, money, and energy. Therefore, when the field of inquiry is large,
this method becomes difficult to adopt because of the resources involved. At times, this method
is practically beyond the reach of ordinary researchers. Perhaps, government is the only
institution, which can get the complete enumeration carried out. Even the government adopts
this in very rare cases such as Population Census conducted once in a decade. Further, many a
time it is not possible to examine every item in the population, and sometimes it is possible to
obtain sufficiently accurate results by studying only a part of total population. In such cases
there is no utility of Census Surveys.

However, it needs to be emphasized that when the Universe is a small one, it is no use
resorting to a Sample Survey. When field studies are undertaken in practical life, considerations
of time and cost almost invariably lead to a selection of respondents i.e., selection of only a few
items. The respondents selected should be as representative of the total population as possible in
order to produce a miniature cross-section. The selected respondents constitute what is
technically called a ‗Sample‘ and the selection process is called ‗Sampling Technique‘. The
survey so conducted is known as ‗Sample Survey‘. Algebraically, let the population size be N
and if a part of size n (which is<N) of this population is selected according to some rule for
studying some characteristic of the population, the group consisting of these n units is known as
‗Sample‘ design for his study i.e., he must plan how a sample should be selected and of what size
a Sample would be.

Steps considered in the research:


1. Identification of research objectives:
The study was aimed at finding out the market potential, feasibility, the relative
marketing tactics and strategy for intelligently combating antipiracy. This helps to find out the
perspective market vulnerabilities that would affect the sales and market share.

2. Designing a primary research study:


The design of a research study is based on the purposes of the study; if description
information is needed, then a quantitative study is likely to be undertaken; if the purpose is to get
new ideas, then a qualitative study is likely to be carried out. A combination of both the
approaches may be undertaken based on the situation, which is prevailing. Primary research
design includes methods of data collection, sample design, and the type of data collection
instrument being used. Now each method will be discussed in detail to understand the
methodology undertaken during this study.

 Data collection methods include three basic ways to collect primary data in quantitative
based research such as observing behavior, experimentation or by the way of surveys.
 Observation is an important method of research because marketers recognize that the best
way to gain an in depth understanding of the relationship between people and products is
by watching the in the process of buying and using the product.
 Questionnaires were distributed to the concerned retailers and they were requested to give
their unbiased information. The questionnaires were collected after 3 days of giving.
 A brief personal interview was conducted along with the questionnaire.

3. Data collection:
The data may be primary or secondary depending on the sources from where it has been
collected and the nature of data.
The Primary Data is the data that is being collected by the researcher himself and whose
validity and correctness is more as compared to secondary data. There are various methods of
collecting primary data viz. questionnaires, observation, personal interviews, etc the selection of
the methods to be used depends upon the purpose of the research and the time available to him
and various other parameters which act as constraints for the researcher.

The Secondary Data is one that is already been collected by some other person or source
and is being used by the researcher for satisfying his purpose. This data so collected may be
internal or external information collected by different purposes. This information may be in the
form of annul reports, published journals, various subscriptions, magazines etc.

Collection of Primary Data:

As stated above there are various methods of data collection. For my purpose
questionnaires and personal interviews method was considered for the collection of primary data.
A questionnaire comprising 9 questions was designed. A questionnaire may contain questions
like - direct questions, indirect questions, open ended questions, close-ended questions,
dichotomous questions, multiple questions, rating scale etc. The questionnaire was designed on
the basis of the objective of my study so as to gather as much information for satisfying the
purpose of the organization.

4. Tabulation of collected primary data:


The data so collected was in the quantitative form, which included different findings that
may or may not be relevant for the study and drawing conclusions so to get it in a qualitative
form it was tabulated and well formulated for easy and better understanding.

5. Analysis of data and presentation:


The process of research is incomplete until and unless the data so collected is being
analyzed using various tools and techniques that are available for the purpose of drawing certain
findings in terms of facts and figures.
ANALYSIS OF MARKED-UP PRICE

Traditionally in order to carry any core business process in its start-ups, the entrepreneur

capitalize usually in more resource value chain that are pushed at a marginal cost, but this
situation is changing. Today many companies outsource less critical value derivable process
which can be sidelined on the newer lower cost, better quality or on the basis of strategic
alliances of acquisitions. These key areas are totally customer conscious efforts and the latter
sustainability can be achievable on some other criteria‘s too. On natural assessing of this
informational era which company departments creatively manage productive workspaces cannot
be sidelined on the spiral demographics, there are multiple methods of workspaces in a market.
However without accounting factors of supply and demand demographics those sustain market
need, want and demand in charge for a longer period of time when the right benefit of any of the
indirect revenue leading department(like R&D, Purchasing, Manufacturing, Marketing,
Logistics…) and direct revenue source like selling and donations cannot vent benefits, delight
effortlessly. Winning companies will be those that can meet customer needs economically, create
delightful linguistic boundaries productively, offer ethical standards in embracing what is
marketed and add updates for new measure of major significance daily. Let us distinguish
reengineering anti-piracy marketing with this perspective in global markets.

If we analyze the current trend, during the midst scale of annual marketable and accrued revenue
perspective in IT & Pharmaceutical industry, there has been a transitional scale according to
WSJ report. Unprecedented growth in both sectors cannot make up latest latent demands and
their earning had been slipped down on conservative base points. When the market bulls down
its making major share value was cut downed and major sectors needed to back-off research
initiatives from even the crucial initiatives like a major Swiss firm shutting down AIDS vaccine
research. Well sometimes without any reason things ever give up and that has lead towards
reengineering and gratifying growing need for convertible reinvestment with difference.

In cutting short loss in revenue accountability in rocket internet survey, I designed the following
questionnaire:-
1. You might know that cost always depends with time value scales. Even if you weren‘t
fortunate enough to start saving like Warren Buffet, you may once as student prefer paying
affordable cost for one autonomous intelligent decision software solution that can itself tailor
with all your professors needs within your budget. Would you prefer transferring that portable
solution and may add your involvement, own stimulus of genuine reengineering, and if the
license permits will you try to resell this product to others for a fixed price? If so what type of
marketing in your area would you go for? Would you even prefer looking for patented
copyrights if it is made easy?

Table No. 1

Opinion Answer of Respondent

YES 220

NO 980

TOTAL 1200

Graph No. 1.

18%

yes
82% No
Interpretation
‗Most of the respondents were unaware of this potentiality in making how marketing ingeniously
tailored products can develop intuition in learning and teaching group of younger college
graduates.‘ As this comment would apprise by a senior professor from my social network group,
reminds me the most novice did say that they would prefer the Amway and reorient, yet these
may add one more quote from being passionate can‘t always win, it means convincing the
promise by delivering the hot news. Well from my level would say over a period if solutions are
added to this chain and selling superfluously catering need, wants and demand at agreeable price
at the frontline is met, even this chain would add spiral marketing.

2. When you in a later stage feel you have been cheated by criminals, what awareness do you
like to incorporate in your next step ahead in doing so? Don‘t you think, if others were someone
who cannot afford buying the product at any cost, they can always work in online space, learn
step up listening and add you revenue through marketing your product by personal online selling.
What do you do towards stepping up this in third world nations?

Interpretation:
This was an open question was left with commendable options. Most of the respondent has
commented that generating revenue for the sustainability of new entrepreneurship would begin
with marketable trends adding towards proactive step without being cheated. Sometimes even
strict laws are not enforced and how would we cater the relevancy into third world nations? The
proportionate act would be being philanthropist. Would likely a genuine contribution in our
neighborhood may benefit the far never seen than in a niche market place? The genuine
contribution would be how Intel donated few laptops for poor children in Africa and they
benefited in learning and few were recruited on priority basis. In reengineering antipiracy would
this not only add legacy over their work that prevent the criminals if laws are made not to be
marketed but understandably why we are not only marketers but even charting license agreeably
as donationware in equal respect to the level of understanding.

3. With reference for your interest in healthcare, are you aware that fake medicines are there in
the larger space. Why can‘t we boost large scale production at cheaper cost for the consumer
making the patented products accountable under newer international convention like trading
strictly restricted along a brand seal in poorer sections for the revenue be met by donation by
respective government and such life saving brands be trademarked by WHO? Do you see this
become practice if youngsters in schools be made towards deploying in this effort marketing as
interns and under government bodies?

Interpretation:
―When borders are sealed under international laws and provocative guidelines are met for
earthen the root as well as the cause, will marketing econometrics serve justice‖, the recent
statement in the European Marketing Journal published as the team effort by few student group
online. This is relevant in healthcare marketing today. Even best medicines become fake (i.e.,
obsolete) if used after the due date and not stored properly as evident in many hospitals around
my country. The need can be only felt for patients if school going youngsters can benefit in this
health care mission as a part where the cost of opening a free clinic by best hospitals can be
viable but agreeable participation by students in this mission would rationally help their
neighborhood keep safe. It would also be wiser if some scholars in later part of their life benefit
unique practices promoting then as interns in good hospitals. ‗….transforming the assembly of
colors in national flag would mean much…‘ a statement our first Prime Minister Jawaharlal
Nehru stood for in a trace of his personal diaries.
4. Do you seek inexpensive healthcare insurance bonds viable in every Indian state and everyone
be entitled regular, ethical and affordable healthcare free of cost? Do you think in developing and
third world countries the usage for humans as guinea pig trials worthy as it bears zero cost since
in developed nations these test pay a huge price? What can be practically taken care for the
accounting new initiatives in this area without violation or counterfeiting ethics?

Interpretation:
Well most respondents admitted that these were true facts. Yet there were comments focused on
true initiatives never been before. There are strict guidelines of the procedures to be followed in
practices and when earning less may be beneficial for a human family to be supported, was the
argument passed once in a decade ago the case was busy with respect before BBC when their
true story of treating children being infected with AIDS was given doses of samples with
inhuman treatments. Does ethics do have anything to do with universalism was the question we
have to interpreted? Can violation of ethics be there before in the test and will antipiracy be a
part of the implications if medicines are given violating the rule of the treatment? What can be
accounted in this area? This was the discussion online with one high school student in London
through chat. The young student made a novice statement a part of which goes like this, ―Ethics
in healthcare would have been always been a debated issue. In making the effect of test groups
more enduring for competitive advantage and most prices cannot be efficient if we cannot boost
initiatives. The liability of test groups needed to be supported by socio-governmental insurance
bonds and strictly updated in WHO records. Any arbitraged suffered would be paid immediately
within a period of ten days. And in United Nation‘s chapter the latter was identified but is
restricted to few grounds as the pattern of solvency in these records are collected in the matter
not on the basis of one constitution across world bodies and their representatives but on
standards within compliance for humanitarian grounds. Sometimes ethics cannot be
compromised if exploitation is purposeful and within knowledge hemisphere. And in this case
we need strict vigilance where the dark matter of these research in all field be made environment
friendly.‖
5. Accordingly towards reengineering in global markets do you think that violating the basic
initiative of developmental assessment like anti piracy under any metrics is good or bad?

Table No. 2

Query Answer of Respondent

YES 198

NO 2

TOTAL 220

6. Which can be the future initiative that stands ahead in integrating today‘s holistic anti piracy
steps and worth investing another penny for the entrepreneur inside you?

Interpretation:
As the stem of recession made its way deep and job losses were accounted most, this question
was never been so easy. And as every resourceful investment spirited in the mindsets of new
motivators and spill away from bankrupts the key players stood had voted for newer team player
boosting the use of social networks in selling ad earnings and restructuring maximum selling at
quality with convenience and low cost. One true respondent even told if the bank can afford
towards cut short credit accreditation like paying at least government service person extended
due date without fine, my present initiative would take the risk of giving once a month every 20
family who buys FMCG products from my hypermarket with a show of the latest movie in the
nearby theater and also the live telecast of cultural programs in their respective channel for the
young minds who shops online through my website or by sending SMS for delivery of products.

7. Do you feel attempting the next step in peer-to-peer selling by the poor sections with their
initial bonuses by the industry would empower the larger section of the society? Can those
individuals be supportively benefited for larger section through guidelines of practices?
Interpretation:
One person working as a part of foreign affairs in Norway responded in this unusual manner and
would set apart in adopting guidelines worldwide. Some section in our population cannot be
living without drugs and we wanted to curtail the awareness that the drug addicts are also human
being. So with special guidance of government the health ministry of Norway opened up special
outlets where these people can live with supportable income that would give them lower doses of
drugs and sustain their life sometime longer. Marketing guidelines among film industry was done
perfectly balanced in Kerala with all because it supported income revenue for more than 1
million families both in India and abroad. These can change trends towards an inventive with
uniqueness.

8. Can we stop piracy through awareness, education, enforcement through law and other social
wing activities tackling benefits for all appreciably? What are your personal views?

Interpretation:

The best suitable response was we could promote, enhance and benefit the masses without greed,
exploitation and violating the ethical conduct of beneficiary.

Email link of the survey:


http://FreeOnlineSurveys.com/rendersurvey.asp?sid=rx3gwdca1jelsac590603
AN ENTREPRENEUR’S SPIRAL GROWTH

FORSEEING COLLECTIVE CARE IN ANTI PIRACY EMPOWERMENT

A literate in an emerging global scenario would look out for the spring of opportunities around.
Starting today finding a venture capitalist would require for larger projects around $5000 at the
snapshot for unexplored Alaskan region in USA. If Narayana Murthy would initiate this
initiative let us study the beginning like the ladder. Earlier an entrepreneur‘s life starts up project
guide estimate on planning team work with gathered resources and start up the initiative step
again in all new ways of looking beyond one step in balance. This would literally mean on
starting their business from the flash. Today an integrated business in any market space,
marketplace or meta-market would make sure that good initiative is on guidelines of ethical, eco-
friendly and boosting benefits for the enterprise as well as customer delight. Apparently the
easiness of online or stalling products anywhere within customer stimulus may not eventually
lead to revenue long term as additional service captivating uniqueness of these segments are to
be worked out as marketing strategy, research and struggle for clearly positioning the one and
adoptable solution always standing apart for customers choice with freedom within limits. I
would examine the real sorted out entrepreneurship in a nutshell taking care within a region
adopting unique the anti-piracy empowerment can be spread in these times.

Suppose along with my small team I carry out a market research near my area and find out that
wherever I buy goods at these recession period there only have been offers with price cuts and
serve legitimately uniqueness of product. I wouldn‘t have lots more new product to add yet
within my savings I spot a location with its factoring. As my team evaluates the plan we would
initiate customer sales in products that would follow the guidelines of government standards are
added in the list of being collective care in anti piracy empowerment. We would initially set up
KPO centre and send interns in every sector wise region of the district to study which type of the
market everyone would cater. Then we would add value for every day in our district. We would
initially meet every news paper and magazine agency in our district and why not the milkman.
Daily for legitimate products yellow pages will be delivered in their footsteps capturing ads and
some local beneficiary groups with considerable discount coupons with 1 month validity only if
recharged on the first day of delivery and monthly lotto guaranteeing huge prices also need to be
validated which need to be produced on delivery. Our major handwork would be that within city
limits all our beneficiaries would avail 24/7 free emergency and other city information with 5
lines down the service. We would like organize competition for kids and work out in helping the
infrastructural institutions in this city. The blueprint of every tag is home specific and kept with
utmost secrecy in our database that are governed by the law of the land.
LEGISTIMATE BARRIERS & NEW ENTRY

HOW MICROSOFT INITIATE WINDOWS 7 IN RUSSIA?

As Russia host one of the top anti-pirated software, multimedia and hardware online as well as
selling proportionately in the consumer market even borderless, it was once responded in a note
over the issue and the law minister strategically told that is entirely on the hands of the firm
finding solutions again. Well he may be critically not being wrong as that‘s what going around.
Let us put this in other words. Can we not put benchmark in improving this statement? There can
be two ways this issue can be dealt with at this right time.

Anti-piracy marketing guideline across frontiers can be traded in visibility of richness:-

1. Making online storehouse of every operating system. Let the key for free use of operating system be
internetworked through open systems online promoting transparency in ads revenue and bandwidth usage
making simplicity of standalone system only be made only for overfull demand. The transparency in trade
feature making outline be active and available especially when demanded.

Interpretation: -
As an entrepreneur in Russia I would outline this latent demand of a new outline beyond reasoning‘s of
comparison. People can share their software and make profits if they are willing to buy multiple
software/vendor specific renewable licenses for reasonable weekly online auctioned prices. Many songs
which can be made into playlist can be particularly shared outlined on its contents if it may be listened
over a particular artist or if you can buy ticket coupons of local branded products. This would promote
Russian culture and innovativeness of brand forming its selling guide.

2. Web multifaceted culture: - Going online and listening for personal choices may infringe piracy if
legally valid.

Interpretation:-
In college student for example who prefers the newer trends vitally significance may not be wrong if store
house of music listening through identical scenarios be relative and significantly be made true. They make
license agreement for listening through gadgets with all kind of few sharing by paying a small fee.
Marketing such experiential service is vital in any industry scenario.
3. Software designing platforms: - Administering in global business markets make seem identically
priceless. One simple solution can‘t always win and most usability is being turned down miserably.
System technology abundantly manages software reengineering yet there can‘t be sustainable markets in
void of competition and real asset of people at work are the leading facilitators.

Interpretation:-
Ethical use of sharing the genuinely of software imprints seen in real world among people have affected
the loss of revenue and made companies fall sick of being in business. The good examples of failed
marketing like the I-learn series have devoid them of opportunities and added vibrancy in closing down
their unit. Stricter licensing and failure from the operating system side for adjusting real time package at
failure towards essentially identification without customer support where the real segment wasn‘t targeted
ideally made its downfall.

These may require more system engineering than a regular student of B-School. Let us start
fighting collectively tracking down this issue productively. As promoting Russian culture
Microsoft Windows 7 redesigns its marketing initiatives. With maximum search gathered online
and with both downloads, uploads from the internet in respective web search engines like
live.com and google.ru, there would be an agreement that maximum ads clicked will reach the
value and revenue source for the customer‘s credit. How? Also starting with multi dimensional
sales with marketing on anti-piracy can be contained that there is also a possibility of unlimited
register ware downloads in schools that let children explore new frontiers of extensions that the
local administrative bodies may not allow anti piracy within their reach limits. Do no other
alternatives exist? In another spiral warfare we can tend to provide pirated downloads from
extended servers through auctioning some curbed licenses which the user would like to take part
in auctioning and there is a onetime registration fee for anyone hosting the website or their
corporate organization to sell back the licenses back with added benefit that any time that it may
last for only 5 years time. In the best effort towards upgrading the scenario of operating system
run time, enabling the same license is practicably valid if there is any subsequent improvement in
the service. In an age of virtualization this can be operated by a service personal office near
St.Petersberg and the senior manager working from home in Cochin. These are certain blogs
result available. Look into the side of reengineering marketing.
At St. Petersburg in Russia, Microsoft unveils its windows 7 for transgression plans in 2009 at
recession barrier. People wouldn‘t have been prepared to spend more for majority cases. Yet it
can be made productive in following cases.

A. Among students.

Where convenience meet and value of looking out the best reaching point make affordability…..
Can we make single license from shared serves download only specific to the present windows
software.… Well that won‘t boost sales in student community who like to spend less and make
out the maximum of their career? Then what is the feasibility of this solution. Let me say my
target might be selling 100 Windows7 per month among students.

1. Agreement to view ads online at every corner of starting with relevant response in their
feedback if the pc is used in night.

2. Can be only fully operational in the network within our own broadband use abilities like
feasibility

3. School going outsmarts getting a free scholarship plans*

4. Can download only beta products of w7 under the agreement.

Howsoever cracks can violate *.dll and yet be marginalized on revenue. Let us make some *.dll
the core of stability and any change of threads and always have millions of parallel execution
possible so that the change immediately corrupt the whole system.

But how would these boost the revenue of selling?

If I could sell at $100 a single version and at one brink when 1, 2 be marginalized and the
respondent can share this operating system with another 3 students people from his system
downloads only for marketing it for reasonable price within 6 months of purchase.

A ($100 initial purchase from ms online download)  3 person who download from system
downloads of A in online windows storage i.e., B gets it for 40$ who registers online and has to
pay registration fee of 20$ with a clause that B can renew the license by deductable of 20$ less
next purchase and has the liability to pay A $20 if and only if these three person are been sold
these product before the announcement of the next launch. Otherwise, A can get back on the
solutions 90% of the cost of initial purchase with the liability pay back $10 lucky dip or cash
equivalent of Forex exchange rates at the least. Suppose this A is a corporate body and the three
people are their employees in any solutions marketed within a nation, this entitlement can be
made productive on grounds well tailored in any situations.
A Manager‘s Ethics & Anti Piracy

In upbringing global markets outsourced in novice beginning with spread out reaches on
distribution, production and taking empowering sectors in channeling the level of all adverse
balance and coinciding growth potential in the stem root lining counting the chickens before
hatching. As a manager in positioning global cut rate in balancing cost and interest paid on
securing these competitive advantage, few ground realities which come to my mind as a British
archeologist transferred the guidelines of universalism, self respect of nativity and going global
within reasonable, agreeable means these are the few words as an senior journalist once reported
about modern Keynesian theory and participation to live and let live balancing outcomes.

In an diminishing global market of products trial in shopkeepers budget and closing down of
major business, the most evident step would have been the industry to go in an balancing line.
When MNC‘s and enterprises need to stand by at least what can be maintained without closing
down units, the major hurdle here would be whether we have give pink slip or melt down
expenses. However it can be flecked if govt. & relevant expenses could be tailored by donation.
Who would have their saving as money when goods have already been bought and should on the
basis of some loans? The financial meltdown should not affect the process ongoing and every
stimulus would checkup in a wall street that determined future options. Should we bear down the
rich or bull up the poor? Can we not balance their slip of methodological refinement for
upbringing credits on their pockets? How is this possible in NY which was once the financial
centre of the world and now one doesn‘t take apart but raise funds to keep going their living
standard and protocols accordingly…? At the bottom line a young Harvard business school
scholar asked his own teacher, can we look beyond one step ahead? This was the time narrated
by one of the chief scientist in British automobile asked the CEO we have found all the
inventions… that may have the need to be met. It may not be easy for taking the chance but as
narrated there is a deep sensibility of ethics, participation and every leader who have once been a
manager. It dates back to 2573BC in one shore, when we composed the pursuit of integrity, self-
respect and unity with respect to the guidelines of universalism with anti piracy (or violation
with respect to the supreme laws why constitutions are made to be obliged by law makers). The
vedic chapter as once I would have written and never ever gave the blueprint to our ethics
teacher in IIPM, Bangalore. It was told this would be summed up in one line when a sunrise
would occur somewhere. Let me brief that the orientation I would to give would be a renewal in
a butterfly that laid their arms in the NY not for 9/11 but out of the very stand that slowly as you
may read these again and again this one line would be the awakening of oneness as a global
citizenship.

―When we decide on brief as a human family bridging education, learning that are the true
wisdom, insight and knowledgeful for being the guidelines on hereditary, envirometrics and
experiential accustoms, over a period of these retainment in endeavoring the challenging times of
compacting recession, we need to cater why the market or customer behaviour patterns may not
shrink, comforts and luxurious meltdowns of the marked-up price may be unusual, on every
economy as the lifeline of immediately turning green eco-drive won‘t be so easy when govt‘s are
battered through media and effort on each symbolism be taken granted, the vision of an young
dreams would be fragile taking into these accounts our national ethics on reengineering
antipiracy viability empowerment may not betray standards nor sustainability for the global
society as one dream even the gangsters or pious would imagine that though duty devotion and
dignity towards our own existence may not be dear, people have stood for be dear, people have
stood for where they are with the goodness of an sector they believed passionately because the
vedic inscription would say we are the people, for the people and by our people for picturising
the need why we stood ahead in commitments, challenges, curtaining, why we can stalk down
the pursue of happiness, heartening lifes that may be benefited for the… duty why every
generation on this planet be wiser to live and let live balancing outcomes.‖
CONCLUSION

In software piracy an infringer gains an entirely undeserved profit through the use of unlicensed
software. Creating an Anti-Piracy Social ring is for everyone who despises the criminals who rip
off artists, companies and individual citizens by stealing their copyright property and
counterfeiting it for personal gain. If you want to make a stand against piracy of films music and
other copyright properties, please show your support on your online activities and immediately
associate your cooperation accordingly by reporting.

Any cost, closure or non-compliance towards violations like piracy would not be effective
tolerated as long as international guidelines wouldn‘t be efficiently enforced legally. Starting
from this basement, I would like to mention the sequence of events that misleads, de-motivate
inappropriately set apart the need of strict measures productively, providing provisions of
effective participation that industry set standoffs and takes measures with public participation
beneficially. This may be understood as 30:55:20 optimal welfare marketing measure by Prof.
Tareque Laskar that has reasonably initiated projective guidelines in a young scholar who looked
on the famous motivator Tony Buzan memory map and found three words yet so powerful in
administrative guidelines, YOU (30%), OR (55%) and WE (20%) that switch opportunities as
root and cause scenario in business life, practices formulae and reorienting reengineering anti-
piracy or safe practices marketing(i.e., meeting needs, catering wants and managing tactic desire
towards selling in markets, stimulating delight in consumer minds and sustainably captivating as
well as harvesting competitive advantage towards baseline strengths) where development (80%)
is not the final stage but the rest 20% actually create arbitrage leading to revenue. In this 20%
through reengineering marketing without piracy mainlines contribute, combine communication
and collectively secure not only GDP, GNP but also GHP (Gross Happiness Product by Govt. Of
Bhutan).
BIBLIOGRAPHY

1. 'Marketing Management'
12th Edition 2008.
By Philip Kotler

2. 'Research Methodology'
2nd Edition.
By C. R. Kothari

3. Reference Websites
www.ficci.com
www.nytimes.com
www.ndtv.com
www.manoramaonline.com
www.kerala.gov.in
india.gov.in
4. Broadcasts Online & Cable Network
NDTV New Delhi DD NEWS
BBC WORLD YOUTUBE
ASIANET LIVE.COM
KIRALI ORKUT
AMRITHA YAHOO
DW ….
TV18
CNN

You might also like