target
stringlengths
1
270
source
stringlengths
214
3.8k
Who takes different steps to allow infringement?
Context: Corporations and legislatures take different types of preventative measures to deter copyright infringement, with much of the focus since the early 1990s being on preventing or reducing digital methods of infringement. Strategies include education, civil & criminal legislation, and international agreements, as well as publicizing anti-piracy litigation successes and imposing forms of digital media copy protection, such as controversial DRM technology and anti-circumvention laws, which limit the amount of control consumers have over the use of products and content they have purchased.. Answer: {'text': [], 'answer_start': []}. Question:
Who never takes different steps to prevent infringement?
Context: Corporations and legislatures take different types of preventative measures to deter copyright infringement, with much of the focus since the early 1990s being on preventing or reducing digital methods of infringement. Strategies include education, civil & criminal legislation, and international agreements, as well as publicizing anti-piracy litigation successes and imposing forms of digital media copy protection, such as controversial DRM technology and anti-circumvention laws, which limit the amount of control consumers have over the use of products and content they have purchased.. Answer: {'text': [], 'answer_start': []}. Question:
What is the minor focus of these steps?
Context: Corporations and legislatures take different types of preventative measures to deter copyright infringement, with much of the focus since the early 1990s being on preventing or reducing digital methods of infringement. Strategies include education, civil & criminal legislation, and international agreements, as well as publicizing anti-piracy litigation successes and imposing forms of digital media copy protection, such as controversial DRM technology and anti-circumvention laws, which limit the amount of control consumers have over the use of products and content they have purchased.. Answer: {'text': [], 'answer_start': []}. Question:
What kinds of legislation aren't a strategy for preventing infringement?
Context: Corporations and legislatures take different types of preventative measures to deter copyright infringement, with much of the focus since the early 1990s being on preventing or reducing digital methods of infringement. Strategies include education, civil & criminal legislation, and international agreements, as well as publicizing anti-piracy litigation successes and imposing forms of digital media copy protection, such as controversial DRM technology and anti-circumvention laws, which limit the amount of control consumers have over the use of products and content they have purchased.. Answer: {'text': [], 'answer_start': []}. Question:
What doesn't DRM and anti-circumvention laws do?
Context: Corporations and legislatures take different types of preventative measures to deter copyright infringement, with much of the focus since the early 1990s being on preventing or reducing digital methods of infringement. Strategies include education, civil & criminal legislation, and international agreements, as well as publicizing anti-piracy litigation successes and imposing forms of digital media copy protection, such as controversial DRM technology and anti-circumvention laws, which limit the amount of control consumers have over the use of products and content they have purchased.. Answer: {'text': [], 'answer_start': []}. Question:
How have governments lowered infringement rates?
Context: Legislatures have reduced infringement by narrowing the scope of what is considered infringing. Aside from upholding international copyright treaty obligations to provide general limitations and exceptions, nations have enacted compulsory licensing laws applying specifically to digital works and uses. For example, in the U.S., the DMCA, an implementation of the 1996 WIPO Copyright Treaty, considers digital transmissions of audio recordings to be licensed as long as a designated copyright collective's royalty and reporting requirements are met. The DMCA also provides safe harbor for digital service providers whose users are suspected of copyright infringement, thus reducing the likelihood that the providers themselves will be considered directly infringing.. Answer: {'text': ['narrowing the scope of what is considered infringing'], 'answer_start': [42]}. Question:
Besides upholding international treaty, what else have countries done specifically to digital works and uses?
Context: Legislatures have reduced infringement by narrowing the scope of what is considered infringing. Aside from upholding international copyright treaty obligations to provide general limitations and exceptions, nations have enacted compulsory licensing laws applying specifically to digital works and uses. For example, in the U.S., the DMCA, an implementation of the 1996 WIPO Copyright Treaty, considers digital transmissions of audio recordings to be licensed as long as a designated copyright collective's royalty and reporting requirements are met. The DMCA also provides safe harbor for digital service providers whose users are suspected of copyright infringement, thus reducing the likelihood that the providers themselves will be considered directly infringing.. Answer: {'text': ['enacted compulsory licensing laws'], 'answer_start': [220]}. Question:
What law in the US considers digital transmission of audio to be licensed if certain conditions are met?
Context: Legislatures have reduced infringement by narrowing the scope of what is considered infringing. Aside from upholding international copyright treaty obligations to provide general limitations and exceptions, nations have enacted compulsory licensing laws applying specifically to digital works and uses. For example, in the U.S., the DMCA, an implementation of the 1996 WIPO Copyright Treaty, considers digital transmissions of audio recordings to be licensed as long as a designated copyright collective's royalty and reporting requirements are met. The DMCA also provides safe harbor for digital service providers whose users are suspected of copyright infringement, thus reducing the likelihood that the providers themselves will be considered directly infringing.. Answer: {'text': ['DMCA'], 'answer_start': [333]}. Question:
What else does this law provide to service providers?
Context: Legislatures have reduced infringement by narrowing the scope of what is considered infringing. Aside from upholding international copyright treaty obligations to provide general limitations and exceptions, nations have enacted compulsory licensing laws applying specifically to digital works and uses. For example, in the U.S., the DMCA, an implementation of the 1996 WIPO Copyright Treaty, considers digital transmissions of audio recordings to be licensed as long as a designated copyright collective's royalty and reporting requirements are met. The DMCA also provides safe harbor for digital service providers whose users are suspected of copyright infringement, thus reducing the likelihood that the providers themselves will be considered directly infringing.. Answer: {'text': ['safe harbor'], 'answer_start': [573]}. Question:
Who does this law target?
Context: Legislatures have reduced infringement by narrowing the scope of what is considered infringing. Aside from upholding international copyright treaty obligations to provide general limitations and exceptions, nations have enacted compulsory licensing laws applying specifically to digital works and uses. For example, in the U.S., the DMCA, an implementation of the 1996 WIPO Copyright Treaty, considers digital transmissions of audio recordings to be licensed as long as a designated copyright collective's royalty and reporting requirements are met. The DMCA also provides safe harbor for digital service providers whose users are suspected of copyright infringement, thus reducing the likelihood that the providers themselves will be considered directly infringing.. Answer: {'text': ['providers whose users are suspected of copyright infringement'], 'answer_start': [605]}. Question:
How have governments increased infringement rates?
Context: Legislatures have reduced infringement by narrowing the scope of what is considered infringing. Aside from upholding international copyright treaty obligations to provide general limitations and exceptions, nations have enacted compulsory licensing laws applying specifically to digital works and uses. For example, in the U.S., the DMCA, an implementation of the 1996 WIPO Copyright Treaty, considers digital transmissions of audio recordings to be licensed as long as a designated copyright collective's royalty and reporting requirements are met. The DMCA also provides safe harbor for digital service providers whose users are suspected of copyright infringement, thus reducing the likelihood that the providers themselves will be considered directly infringing.. Answer: {'text': [], 'answer_start': []}. Question:
Besides upholding international treaty, what else haven't countries done specifically to digital works and uses?
Context: Legislatures have reduced infringement by narrowing the scope of what is considered infringing. Aside from upholding international copyright treaty obligations to provide general limitations and exceptions, nations have enacted compulsory licensing laws applying specifically to digital works and uses. For example, in the U.S., the DMCA, an implementation of the 1996 WIPO Copyright Treaty, considers digital transmissions of audio recordings to be licensed as long as a designated copyright collective's royalty and reporting requirements are met. The DMCA also provides safe harbor for digital service providers whose users are suspected of copyright infringement, thus reducing the likelihood that the providers themselves will be considered directly infringing.. Answer: {'text': [], 'answer_start': []}. Question:
What law in the UN considers digital transmission of audio to be licensed if certain conditions are met?
Context: Legislatures have reduced infringement by narrowing the scope of what is considered infringing. Aside from upholding international copyright treaty obligations to provide general limitations and exceptions, nations have enacted compulsory licensing laws applying specifically to digital works and uses. For example, in the U.S., the DMCA, an implementation of the 1996 WIPO Copyright Treaty, considers digital transmissions of audio recordings to be licensed as long as a designated copyright collective's royalty and reporting requirements are met. The DMCA also provides safe harbor for digital service providers whose users are suspected of copyright infringement, thus reducing the likelihood that the providers themselves will be considered directly infringing.. Answer: {'text': [], 'answer_start': []}. Question:
What else doesn't this law provide to service providers?
Context: Legislatures have reduced infringement by narrowing the scope of what is considered infringing. Aside from upholding international copyright treaty obligations to provide general limitations and exceptions, nations have enacted compulsory licensing laws applying specifically to digital works and uses. For example, in the U.S., the DMCA, an implementation of the 1996 WIPO Copyright Treaty, considers digital transmissions of audio recordings to be licensed as long as a designated copyright collective's royalty and reporting requirements are met. The DMCA also provides safe harbor for digital service providers whose users are suspected of copyright infringement, thus reducing the likelihood that the providers themselves will be considered directly infringing.. Answer: {'text': [], 'answer_start': []}. Question:
Who doesn't this law target?
Context: Legislatures have reduced infringement by narrowing the scope of what is considered infringing. Aside from upholding international copyright treaty obligations to provide general limitations and exceptions, nations have enacted compulsory licensing laws applying specifically to digital works and uses. For example, in the U.S., the DMCA, an implementation of the 1996 WIPO Copyright Treaty, considers digital transmissions of audio recordings to be licensed as long as a designated copyright collective's royalty and reporting requirements are met. The DMCA also provides safe harbor for digital service providers whose users are suspected of copyright infringement, thus reducing the likelihood that the providers themselves will be considered directly infringing.. Answer: {'text': [], 'answer_start': []}. Question:
What do some copyright owners do by reducing the scope of infringement?
Context: Some copyright owners voluntarily reduce the scope of what is considered infringement by employing relatively permissive, "open" licensing strategies: rather than privately negotiating license terms with individual users who must first seek out the copyright owner and ask for permission, the copyright owner publishes and distributes the work with a prepared license that anyone can use, as long as they adhere to certain conditions. This has the effect of reducing infringement – and the burden on courts – by simply permitting certain types of uses under terms that the copyright owner considers reasonable. Examples include free software licenses, like the GNU General Public License (GPL), and the Creative Commons licenses, which are predominantly applied to visual and literary works.. Answer: {'text': ['employing relatively permissive, "open" licensing'], 'answer_start': [89]}. Question:
What must a user do under a prepared license?
Context: Some copyright owners voluntarily reduce the scope of what is considered infringement by employing relatively permissive, "open" licensing strategies: rather than privately negotiating license terms with individual users who must first seek out the copyright owner and ask for permission, the copyright owner publishes and distributes the work with a prepared license that anyone can use, as long as they adhere to certain conditions. This has the effect of reducing infringement – and the burden on courts – by simply permitting certain types of uses under terms that the copyright owner considers reasonable. Examples include free software licenses, like the GNU General Public License (GPL), and the Creative Commons licenses, which are predominantly applied to visual and literary works.. Answer: {'text': ['adhere to certain conditions'], 'answer_start': [405]}. Question:
Besides lessening the burden on the courts, what is the effect of this license?
Context: Some copyright owners voluntarily reduce the scope of what is considered infringement by employing relatively permissive, "open" licensing strategies: rather than privately negotiating license terms with individual users who must first seek out the copyright owner and ask for permission, the copyright owner publishes and distributes the work with a prepared license that anyone can use, as long as they adhere to certain conditions. This has the effect of reducing infringement – and the burden on courts – by simply permitting certain types of uses under terms that the copyright owner considers reasonable. Examples include free software licenses, like the GNU General Public License (GPL), and the Creative Commons licenses, which are predominantly applied to visual and literary works.. Answer: {'text': ['reducing infringement'], 'answer_start': [458]}. Question:
What is an example of a free software license?
Context: Some copyright owners voluntarily reduce the scope of what is considered infringement by employing relatively permissive, "open" licensing strategies: rather than privately negotiating license terms with individual users who must first seek out the copyright owner and ask for permission, the copyright owner publishes and distributes the work with a prepared license that anyone can use, as long as they adhere to certain conditions. This has the effect of reducing infringement – and the burden on courts – by simply permitting certain types of uses under terms that the copyright owner considers reasonable. Examples include free software licenses, like the GNU General Public License (GPL), and the Creative Commons licenses, which are predominantly applied to visual and literary works.. Answer: {'text': ['GNU General Public License'], 'answer_start': [661]}. Question:
What works do Creative Commons licenses generally apply to?
Context: Some copyright owners voluntarily reduce the scope of what is considered infringement by employing relatively permissive, "open" licensing strategies: rather than privately negotiating license terms with individual users who must first seek out the copyright owner and ask for permission, the copyright owner publishes and distributes the work with a prepared license that anyone can use, as long as they adhere to certain conditions. This has the effect of reducing infringement – and the burden on courts – by simply permitting certain types of uses under terms that the copyright owner considers reasonable. Examples include free software licenses, like the GNU General Public License (GPL), and the Creative Commons licenses, which are predominantly applied to visual and literary works.. Answer: {'text': ['visual and literary works'], 'answer_start': [765]}. Question:
What do some copyright owners do by increasing the scope of infringement?
Context: Some copyright owners voluntarily reduce the scope of what is considered infringement by employing relatively permissive, "open" licensing strategies: rather than privately negotiating license terms with individual users who must first seek out the copyright owner and ask for permission, the copyright owner publishes and distributes the work with a prepared license that anyone can use, as long as they adhere to certain conditions. This has the effect of reducing infringement – and the burden on courts – by simply permitting certain types of uses under terms that the copyright owner considers reasonable. Examples include free software licenses, like the GNU General Public License (GPL), and the Creative Commons licenses, which are predominantly applied to visual and literary works.. Answer: {'text': [], 'answer_start': []}. Question:
What mustn't a user do under a prepared license?
Context: Some copyright owners voluntarily reduce the scope of what is considered infringement by employing relatively permissive, "open" licensing strategies: rather than privately negotiating license terms with individual users who must first seek out the copyright owner and ask for permission, the copyright owner publishes and distributes the work with a prepared license that anyone can use, as long as they adhere to certain conditions. This has the effect of reducing infringement – and the burden on courts – by simply permitting certain types of uses under terms that the copyright owner considers reasonable. Examples include free software licenses, like the GNU General Public License (GPL), and the Creative Commons licenses, which are predominantly applied to visual and literary works.. Answer: {'text': [], 'answer_start': []}. Question:
Besides heightening the burden on the courts, what is the effect of this license?
Context: Some copyright owners voluntarily reduce the scope of what is considered infringement by employing relatively permissive, "open" licensing strategies: rather than privately negotiating license terms with individual users who must first seek out the copyright owner and ask for permission, the copyright owner publishes and distributes the work with a prepared license that anyone can use, as long as they adhere to certain conditions. This has the effect of reducing infringement – and the burden on courts – by simply permitting certain types of uses under terms that the copyright owner considers reasonable. Examples include free software licenses, like the GNU General Public License (GPL), and the Creative Commons licenses, which are predominantly applied to visual and literary works.. Answer: {'text': [], 'answer_start': []}. Question:
What is an example of a paid software license?
Context: Some copyright owners voluntarily reduce the scope of what is considered infringement by employing relatively permissive, "open" licensing strategies: rather than privately negotiating license terms with individual users who must first seek out the copyright owner and ask for permission, the copyright owner publishes and distributes the work with a prepared license that anyone can use, as long as they adhere to certain conditions. This has the effect of reducing infringement – and the burden on courts – by simply permitting certain types of uses under terms that the copyright owner considers reasonable. Examples include free software licenses, like the GNU General Public License (GPL), and the Creative Commons licenses, which are predominantly applied to visual and literary works.. Answer: {'text': [], 'answer_start': []}. Question:
What works do Creative Commons licenses generally not apply to?
Context: Some copyright owners voluntarily reduce the scope of what is considered infringement by employing relatively permissive, "open" licensing strategies: rather than privately negotiating license terms with individual users who must first seek out the copyright owner and ask for permission, the copyright owner publishes and distributes the work with a prepared license that anyone can use, as long as they adhere to certain conditions. This has the effect of reducing infringement – and the burden on courts – by simply permitting certain types of uses under terms that the copyright owner considers reasonable. Examples include free software licenses, like the GNU General Public License (GPL), and the Creative Commons licenses, which are predominantly applied to visual and literary works.. Answer: {'text': [], 'answer_start': []}. Question:
How long is a movie typically released in theaters for?
Context: To prevent piracy of films, the standard drill of film distribution is to have a movie first released through movie theaters (theatrical window), on average approximately 16 and a half weeks, before having it released to Blu-Ray and DVD (entering its video window). During the theatrical window, digital versions of films are often transported in data storage devices by couriers rather than by data transmission. The data can be encrypted, with the key being made to work only at specific times in order to prevent leakage between screens. Coded Anti-Piracy marks can be added to films to identify the source of illegal copies and shut them down. As a result of these measures, the only versions of films available for piracy during the theatrical window are usually "cams" made by video recordings of the movie screens, which are of inferior quality compared to the original film version.. Answer: {'text': ['approximately 16 and a half weeks'], 'answer_start': [157]}. Question:
During this time, how are digital versions of the movie transported in data storage devices?
Context: To prevent piracy of films, the standard drill of film distribution is to have a movie first released through movie theaters (theatrical window), on average approximately 16 and a half weeks, before having it released to Blu-Ray and DVD (entering its video window). During the theatrical window, digital versions of films are often transported in data storage devices by couriers rather than by data transmission. The data can be encrypted, with the key being made to work only at specific times in order to prevent leakage between screens. Coded Anti-Piracy marks can be added to films to identify the source of illegal copies and shut them down. As a result of these measures, the only versions of films available for piracy during the theatrical window are usually "cams" made by video recordings of the movie screens, which are of inferior quality compared to the original film version.. Answer: {'text': ['by couriers'], 'answer_start': [368]}. Question:
What can be done to a movie to only allow it to show at certain times?
Context: To prevent piracy of films, the standard drill of film distribution is to have a movie first released through movie theaters (theatrical window), on average approximately 16 and a half weeks, before having it released to Blu-Ray and DVD (entering its video window). During the theatrical window, digital versions of films are often transported in data storage devices by couriers rather than by data transmission. The data can be encrypted, with the key being made to work only at specific times in order to prevent leakage between screens. Coded Anti-Piracy marks can be added to films to identify the source of illegal copies and shut them down. As a result of these measures, the only versions of films available for piracy during the theatrical window are usually "cams" made by video recordings of the movie screens, which are of inferior quality compared to the original film version.. Answer: {'text': ['encrypted'], 'answer_start': [430]}. Question:
What can be coded to films to find the source of illegal copies?
Context: To prevent piracy of films, the standard drill of film distribution is to have a movie first released through movie theaters (theatrical window), on average approximately 16 and a half weeks, before having it released to Blu-Ray and DVD (entering its video window). During the theatrical window, digital versions of films are often transported in data storage devices by couriers rather than by data transmission. The data can be encrypted, with the key being made to work only at specific times in order to prevent leakage between screens. Coded Anti-Piracy marks can be added to films to identify the source of illegal copies and shut them down. As a result of these measures, the only versions of films available for piracy during the theatrical window are usually "cams" made by video recordings of the movie screens, which are of inferior quality compared to the original film version.. Answer: {'text': ['Anti-Piracy marks can be added'], 'answer_start': [547]}. Question:
What inferior versions of movies are available for piracy during the theatrical run of a movie called?
Context: To prevent piracy of films, the standard drill of film distribution is to have a movie first released through movie theaters (theatrical window), on average approximately 16 and a half weeks, before having it released to Blu-Ray and DVD (entering its video window). During the theatrical window, digital versions of films are often transported in data storage devices by couriers rather than by data transmission. The data can be encrypted, with the key being made to work only at specific times in order to prevent leakage between screens. Coded Anti-Piracy marks can be added to films to identify the source of illegal copies and shut them down. As a result of these measures, the only versions of films available for piracy during the theatrical window are usually "cams" made by video recordings of the movie screens, which are of inferior quality compared to the original film version.. Answer: {'text': ['"cams" made by video recordings of the movie screens'], 'answer_start': [768]}. Question:
How long is a movie atypically released in theaters for?
Context: To prevent piracy of films, the standard drill of film distribution is to have a movie first released through movie theaters (theatrical window), on average approximately 16 and a half weeks, before having it released to Blu-Ray and DVD (entering its video window). During the theatrical window, digital versions of films are often transported in data storage devices by couriers rather than by data transmission. The data can be encrypted, with the key being made to work only at specific times in order to prevent leakage between screens. Coded Anti-Piracy marks can be added to films to identify the source of illegal copies and shut them down. As a result of these measures, the only versions of films available for piracy during the theatrical window are usually "cams" made by video recordings of the movie screens, which are of inferior quality compared to the original film version.. Answer: {'text': [], 'answer_start': []}. Question:
During this time, how aren't digital versions of the movie transported in data storage devices?
Context: To prevent piracy of films, the standard drill of film distribution is to have a movie first released through movie theaters (theatrical window), on average approximately 16 and a half weeks, before having it released to Blu-Ray and DVD (entering its video window). During the theatrical window, digital versions of films are often transported in data storage devices by couriers rather than by data transmission. The data can be encrypted, with the key being made to work only at specific times in order to prevent leakage between screens. Coded Anti-Piracy marks can be added to films to identify the source of illegal copies and shut them down. As a result of these measures, the only versions of films available for piracy during the theatrical window are usually "cams" made by video recordings of the movie screens, which are of inferior quality compared to the original film version.. Answer: {'text': [], 'answer_start': []}. Question:
What can't be done to a movie to only allow it to show at certain times?
Context: To prevent piracy of films, the standard drill of film distribution is to have a movie first released through movie theaters (theatrical window), on average approximately 16 and a half weeks, before having it released to Blu-Ray and DVD (entering its video window). During the theatrical window, digital versions of films are often transported in data storage devices by couriers rather than by data transmission. The data can be encrypted, with the key being made to work only at specific times in order to prevent leakage between screens. Coded Anti-Piracy marks can be added to films to identify the source of illegal copies and shut them down. As a result of these measures, the only versions of films available for piracy during the theatrical window are usually "cams" made by video recordings of the movie screens, which are of inferior quality compared to the original film version.. Answer: {'text': [], 'answer_start': []}. Question:
What can be coded to films to find the source of legal copies?
Context: To prevent piracy of films, the standard drill of film distribution is to have a movie first released through movie theaters (theatrical window), on average approximately 16 and a half weeks, before having it released to Blu-Ray and DVD (entering its video window). During the theatrical window, digital versions of films are often transported in data storage devices by couriers rather than by data transmission. The data can be encrypted, with the key being made to work only at specific times in order to prevent leakage between screens. Coded Anti-Piracy marks can be added to films to identify the source of illegal copies and shut them down. As a result of these measures, the only versions of films available for piracy during the theatrical window are usually "cams" made by video recordings of the movie screens, which are of inferior quality compared to the original film version.. Answer: {'text': [], 'answer_start': []}. Question:
What superior versions of movies are available for piracy during the theatrical run of a movie called?
Context: To prevent piracy of films, the standard drill of film distribution is to have a movie first released through movie theaters (theatrical window), on average approximately 16 and a half weeks, before having it released to Blu-Ray and DVD (entering its video window). During the theatrical window, digital versions of films are often transported in data storage devices by couriers rather than by data transmission. The data can be encrypted, with the key being made to work only at specific times in order to prevent leakage between screens. Coded Anti-Piracy marks can be added to films to identify the source of illegal copies and shut them down. As a result of these measures, the only versions of films available for piracy during the theatrical window are usually "cams" made by video recordings of the movie screens, which are of inferior quality compared to the original film version.. Answer: {'text': [], 'answer_start': []}. Question:
What 2010 body found how difficult it is to accurately report the financial impact of infringement?
Context: The U.S. GAO's 2010 findings regarding the great difficulty of accurately gauging the economic impact of copyright infringement was reinforced within the same report by the body's research into three commonly cited estimates that had previously been provided to U.S. agencies. The GAO report explained that the sources – a Federal Bureau of Investigation (FBI) estimate, a Customs and Border Protection (CBP) press release and a Motor and Equipment Manufacturers Association estimate – "cannot be substantiated or traced back to an underlying data source or methodology.". Answer: {'text': ['U.S. GAO'], 'answer_start': [4]}. Question:
How many commanly cited estimates did the body report on?
Context: The U.S. GAO's 2010 findings regarding the great difficulty of accurately gauging the economic impact of copyright infringement was reinforced within the same report by the body's research into three commonly cited estimates that had previously been provided to U.S. agencies. The GAO report explained that the sources – a Federal Bureau of Investigation (FBI) estimate, a Customs and Border Protection (CBP) press release and a Motor and Equipment Manufacturers Association estimate – "cannot be substantiated or traced back to an underlying data source or methodology.". Answer: {'text': ['three'], 'answer_start': [194]}. Question:
What did the FBI use as a source?
Context: The U.S. GAO's 2010 findings regarding the great difficulty of accurately gauging the economic impact of copyright infringement was reinforced within the same report by the body's research into three commonly cited estimates that had previously been provided to U.S. agencies. The GAO report explained that the sources – a Federal Bureau of Investigation (FBI) estimate, a Customs and Border Protection (CBP) press release and a Motor and Equipment Manufacturers Association estimate – "cannot be substantiated or traced back to an underlying data source or methodology.". Answer: {'text': ['estimate'], 'answer_start': [361]}. Question:
What report said the data could not be substantiated or traced to a reliable data source?
Context: The U.S. GAO's 2010 findings regarding the great difficulty of accurately gauging the economic impact of copyright infringement was reinforced within the same report by the body's research into three commonly cited estimates that had previously been provided to U.S. agencies. The GAO report explained that the sources – a Federal Bureau of Investigation (FBI) estimate, a Customs and Border Protection (CBP) press release and a Motor and Equipment Manufacturers Association estimate – "cannot be substantiated or traced back to an underlying data source or methodology.". Answer: {'text': ['GAO report'], 'answer_start': [281]}. Question:
What 2010 body found how easy it is to accurately report the financial impact of infringement?
Context: The U.S. GAO's 2010 findings regarding the great difficulty of accurately gauging the economic impact of copyright infringement was reinforced within the same report by the body's research into three commonly cited estimates that had previously been provided to U.S. agencies. The GAO report explained that the sources – a Federal Bureau of Investigation (FBI) estimate, a Customs and Border Protection (CBP) press release and a Motor and Equipment Manufacturers Association estimate – "cannot be substantiated or traced back to an underlying data source or methodology.". Answer: {'text': [], 'answer_start': []}. Question:
What 2010 body found how difficult it is to inaccurately report the financial impact of infringement?
Context: The U.S. GAO's 2010 findings regarding the great difficulty of accurately gauging the economic impact of copyright infringement was reinforced within the same report by the body's research into three commonly cited estimates that had previously been provided to U.S. agencies. The GAO report explained that the sources – a Federal Bureau of Investigation (FBI) estimate, a Customs and Border Protection (CBP) press release and a Motor and Equipment Manufacturers Association estimate – "cannot be substantiated or traced back to an underlying data source or methodology.". Answer: {'text': [], 'answer_start': []}. Question:
How many uncommonly cited estimates did the body report on?
Context: The U.S. GAO's 2010 findings regarding the great difficulty of accurately gauging the economic impact of copyright infringement was reinforced within the same report by the body's research into three commonly cited estimates that had previously been provided to U.S. agencies. The GAO report explained that the sources – a Federal Bureau of Investigation (FBI) estimate, a Customs and Border Protection (CBP) press release and a Motor and Equipment Manufacturers Association estimate – "cannot be substantiated or traced back to an underlying data source or methodology.". Answer: {'text': [], 'answer_start': []}. Question:
What didn't the FBI use as a source?
Context: The U.S. GAO's 2010 findings regarding the great difficulty of accurately gauging the economic impact of copyright infringement was reinforced within the same report by the body's research into three commonly cited estimates that had previously been provided to U.S. agencies. The GAO report explained that the sources – a Federal Bureau of Investigation (FBI) estimate, a Customs and Border Protection (CBP) press release and a Motor and Equipment Manufacturers Association estimate – "cannot be substantiated or traced back to an underlying data source or methodology.". Answer: {'text': [], 'answer_start': []}. Question:
What report said the data could be substantiated or traced to a reliable data source?
Context: The U.S. GAO's 2010 findings regarding the great difficulty of accurately gauging the economic impact of copyright infringement was reinforced within the same report by the body's research into three commonly cited estimates that had previously been provided to U.S. agencies. The GAO report explained that the sources – a Federal Bureau of Investigation (FBI) estimate, a Customs and Border Protection (CBP) press release and a Motor and Equipment Manufacturers Association estimate – "cannot be substantiated or traced back to an underlying data source or methodology.". Answer: {'text': [], 'answer_start': []}. Question:
Who did a study in 2007 regarding the five countries with the highest rates of software piracy?
Context: According to a 2007 BSA and International Data Corporation (IDC) study, the five countries with the highest rates of software piracy were: 1. Armenia (93%); 2. Bangladesh (92%); 3. Azerbaijan (92%); 4. Moldova (92%); and 5. Zimbabwe (91%). According to the study's results, the five countries with the lowest piracy rates were: 1. U.S. (20%); 2. Luxembourg (21%); 3. New Zealand (22%); 4. Japan (23%); and 5. Austria (25%). The 2007 report showed that the Asia-Pacific region was associated with the highest amount of loss, in terms of U.S. dollars, with $14,090,000, followed by the European Union, with a loss of $12,383,000; the lowest amount of U.S. dollars was lost in the Middle East/Africa region, where $2,446,000 was documented.. Answer: {'text': ['BSA and International Data Corporation'], 'answer_start': [20]}. Question:
Which country had the lowest rate of software piracy?
Context: According to a 2007 BSA and International Data Corporation (IDC) study, the five countries with the highest rates of software piracy were: 1. Armenia (93%); 2. Bangladesh (92%); 3. Azerbaijan (92%); 4. Moldova (92%); and 5. Zimbabwe (91%). According to the study's results, the five countries with the lowest piracy rates were: 1. U.S. (20%); 2. Luxembourg (21%); 3. New Zealand (22%); 4. Japan (23%); and 5. Austria (25%). The 2007 report showed that the Asia-Pacific region was associated with the highest amount of loss, in terms of U.S. dollars, with $14,090,000, followed by the European Union, with a loss of $12,383,000; the lowest amount of U.S. dollars was lost in the Middle East/Africa region, where $2,446,000 was documented.. Answer: {'text': ['U.S.'], 'answer_start': [331]}. Question:
Which region had the highest loss?
Context: According to a 2007 BSA and International Data Corporation (IDC) study, the five countries with the highest rates of software piracy were: 1. Armenia (93%); 2. Bangladesh (92%); 3. Azerbaijan (92%); 4. Moldova (92%); and 5. Zimbabwe (91%). According to the study's results, the five countries with the lowest piracy rates were: 1. U.S. (20%); 2. Luxembourg (21%); 3. New Zealand (22%); 4. Japan (23%); and 5. Austria (25%). The 2007 report showed that the Asia-Pacific region was associated with the highest amount of loss, in terms of U.S. dollars, with $14,090,000, followed by the European Union, with a loss of $12,383,000; the lowest amount of U.S. dollars was lost in the Middle East/Africa region, where $2,446,000 was documented.. Answer: {'text': ['Asia-Pacific'], 'answer_start': [456]}. Question:
How much did the EU lose?
Context: According to a 2007 BSA and International Data Corporation (IDC) study, the five countries with the highest rates of software piracy were: 1. Armenia (93%); 2. Bangladesh (92%); 3. Azerbaijan (92%); 4. Moldova (92%); and 5. Zimbabwe (91%). According to the study's results, the five countries with the lowest piracy rates were: 1. U.S. (20%); 2. Luxembourg (21%); 3. New Zealand (22%); 4. Japan (23%); and 5. Austria (25%). The 2007 report showed that the Asia-Pacific region was associated with the highest amount of loss, in terms of U.S. dollars, with $14,090,000, followed by the European Union, with a loss of $12,383,000; the lowest amount of U.S. dollars was lost in the Middle East/Africa region, where $2,446,000 was documented.. Answer: {'text': ['$12,383,000'], 'answer_start': [615]}. Question:
Where was the lowest amount of U.S. dollars lost?
Context: According to a 2007 BSA and International Data Corporation (IDC) study, the five countries with the highest rates of software piracy were: 1. Armenia (93%); 2. Bangladesh (92%); 3. Azerbaijan (92%); 4. Moldova (92%); and 5. Zimbabwe (91%). According to the study's results, the five countries with the lowest piracy rates were: 1. U.S. (20%); 2. Luxembourg (21%); 3. New Zealand (22%); 4. Japan (23%); and 5. Austria (25%). The 2007 report showed that the Asia-Pacific region was associated with the highest amount of loss, in terms of U.S. dollars, with $14,090,000, followed by the European Union, with a loss of $12,383,000; the lowest amount of U.S. dollars was lost in the Middle East/Africa region, where $2,446,000 was documented.. Answer: {'text': ['Middle East/Africa region'], 'answer_start': [678]}. Question:
Who did a study in 2000 regarding the five countries with the highest rates of software piracy?
Context: According to a 2007 BSA and International Data Corporation (IDC) study, the five countries with the highest rates of software piracy were: 1. Armenia (93%); 2. Bangladesh (92%); 3. Azerbaijan (92%); 4. Moldova (92%); and 5. Zimbabwe (91%). According to the study's results, the five countries with the lowest piracy rates were: 1. U.S. (20%); 2. Luxembourg (21%); 3. New Zealand (22%); 4. Japan (23%); and 5. Austria (25%). The 2007 report showed that the Asia-Pacific region was associated with the highest amount of loss, in terms of U.S. dollars, with $14,090,000, followed by the European Union, with a loss of $12,383,000; the lowest amount of U.S. dollars was lost in the Middle East/Africa region, where $2,446,000 was documented.. Answer: {'text': [], 'answer_start': []}. Question:
Who did a study in 2007 regarding the five cities with the highest rates of software piracy?
Context: According to a 2007 BSA and International Data Corporation (IDC) study, the five countries with the highest rates of software piracy were: 1. Armenia (93%); 2. Bangladesh (92%); 3. Azerbaijan (92%); 4. Moldova (92%); and 5. Zimbabwe (91%). According to the study's results, the five countries with the lowest piracy rates were: 1. U.S. (20%); 2. Luxembourg (21%); 3. New Zealand (22%); 4. Japan (23%); and 5. Austria (25%). The 2007 report showed that the Asia-Pacific region was associated with the highest amount of loss, in terms of U.S. dollars, with $14,090,000, followed by the European Union, with a loss of $12,383,000; the lowest amount of U.S. dollars was lost in the Middle East/Africa region, where $2,446,000 was documented.. Answer: {'text': [], 'answer_start': []}. Question:
Which country had the highest rate of hardware piracy?
Context: According to a 2007 BSA and International Data Corporation (IDC) study, the five countries with the highest rates of software piracy were: 1. Armenia (93%); 2. Bangladesh (92%); 3. Azerbaijan (92%); 4. Moldova (92%); and 5. Zimbabwe (91%). According to the study's results, the five countries with the lowest piracy rates were: 1. U.S. (20%); 2. Luxembourg (21%); 3. New Zealand (22%); 4. Japan (23%); and 5. Austria (25%). The 2007 report showed that the Asia-Pacific region was associated with the highest amount of loss, in terms of U.S. dollars, with $14,090,000, followed by the European Union, with a loss of $12,383,000; the lowest amount of U.S. dollars was lost in the Middle East/Africa region, where $2,446,000 was documented.. Answer: {'text': [], 'answer_start': []}. Question:
Which region had the highest gain?
Context: According to a 2007 BSA and International Data Corporation (IDC) study, the five countries with the highest rates of software piracy were: 1. Armenia (93%); 2. Bangladesh (92%); 3. Azerbaijan (92%); 4. Moldova (92%); and 5. Zimbabwe (91%). According to the study's results, the five countries with the lowest piracy rates were: 1. U.S. (20%); 2. Luxembourg (21%); 3. New Zealand (22%); 4. Japan (23%); and 5. Austria (25%). The 2007 report showed that the Asia-Pacific region was associated with the highest amount of loss, in terms of U.S. dollars, with $14,090,000, followed by the European Union, with a loss of $12,383,000; the lowest amount of U.S. dollars was lost in the Middle East/Africa region, where $2,446,000 was documented.. Answer: {'text': [], 'answer_start': []}. Question:
How much did the EU gain?
Context: According to a 2007 BSA and International Data Corporation (IDC) study, the five countries with the highest rates of software piracy were: 1. Armenia (93%); 2. Bangladesh (92%); 3. Azerbaijan (92%); 4. Moldova (92%); and 5. Zimbabwe (91%). According to the study's results, the five countries with the lowest piracy rates were: 1. U.S. (20%); 2. Luxembourg (21%); 3. New Zealand (22%); 4. Japan (23%); and 5. Austria (25%). The 2007 report showed that the Asia-Pacific region was associated with the highest amount of loss, in terms of U.S. dollars, with $14,090,000, followed by the European Union, with a loss of $12,383,000; the lowest amount of U.S. dollars was lost in the Middle East/Africa region, where $2,446,000 was documented.. Answer: {'text': [], 'answer_start': []}. Question:
Who else did the BSA issues a report in 2011 with?
Context: In its 2011 report, conducted in partnership with IDC and Ipsos Public Affairs, the BSA stated: "Over half of the world's personal computer users – 57 percent – admit to pirating software." The ninth annual "BSA Global Software Piracy Study" claims that the "commercial value of this shadow market of pirated software" was worth US$63.4 billion in 2011, with the highest commercial value of pirated PC software existent in the U.S. during that time period (US$9,773,000). According to the 2011 study, Zimbabwe was the nation with the highest piracy rate, at 92%, while the lowest piracy rate was present in the U.S., at 19%.. Answer: {'text': ['IDC and Ipsos Public Affairs'], 'answer_start': [50]}. Question:
What percentage of people admit to pirating software?
Context: In its 2011 report, conducted in partnership with IDC and Ipsos Public Affairs, the BSA stated: "Over half of the world's personal computer users – 57 percent – admit to pirating software." The ninth annual "BSA Global Software Piracy Study" claims that the "commercial value of this shadow market of pirated software" was worth US$63.4 billion in 2011, with the highest commercial value of pirated PC software existent in the U.S. during that time period (US$9,773,000). According to the 2011 study, Zimbabwe was the nation with the highest piracy rate, at 92%, while the lowest piracy rate was present in the U.S., at 19%.. Answer: {'text': ['57 percent'], 'answer_start': [148]}. Question:
What was the commercial value of pirated software in 2011?
Context: In its 2011 report, conducted in partnership with IDC and Ipsos Public Affairs, the BSA stated: "Over half of the world's personal computer users – 57 percent – admit to pirating software." The ninth annual "BSA Global Software Piracy Study" claims that the "commercial value of this shadow market of pirated software" was worth US$63.4 billion in 2011, with the highest commercial value of pirated PC software existent in the U.S. during that time period (US$9,773,000). According to the 2011 study, Zimbabwe was the nation with the highest piracy rate, at 92%, while the lowest piracy rate was present in the U.S., at 19%.. Answer: {'text': ['US$63.4 billion'], 'answer_start': [329]}. Question:
What nation had the higest piracy rate?
Context: In its 2011 report, conducted in partnership with IDC and Ipsos Public Affairs, the BSA stated: "Over half of the world's personal computer users – 57 percent – admit to pirating software." The ninth annual "BSA Global Software Piracy Study" claims that the "commercial value of this shadow market of pirated software" was worth US$63.4 billion in 2011, with the highest commercial value of pirated PC software existent in the U.S. during that time period (US$9,773,000). According to the 2011 study, Zimbabwe was the nation with the highest piracy rate, at 92%, while the lowest piracy rate was present in the U.S., at 19%.. Answer: {'text': ['Zimbabwe'], 'answer_start': [501]}. Question:
What was the U.S.'s piracy rate?
Context: In its 2011 report, conducted in partnership with IDC and Ipsos Public Affairs, the BSA stated: "Over half of the world's personal computer users – 57 percent – admit to pirating software." The ninth annual "BSA Global Software Piracy Study" claims that the "commercial value of this shadow market of pirated software" was worth US$63.4 billion in 2011, with the highest commercial value of pirated PC software existent in the U.S. during that time period (US$9,773,000). According to the 2011 study, Zimbabwe was the nation with the highest piracy rate, at 92%, while the lowest piracy rate was present in the U.S., at 19%.. Answer: {'text': ['19%'], 'answer_start': [620]}. Question:
Who else did the BSA issues a report in 2001 with?
Context: In its 2011 report, conducted in partnership with IDC and Ipsos Public Affairs, the BSA stated: "Over half of the world's personal computer users – 57 percent – admit to pirating software." The ninth annual "BSA Global Software Piracy Study" claims that the "commercial value of this shadow market of pirated software" was worth US$63.4 billion in 2011, with the highest commercial value of pirated PC software existent in the U.S. during that time period (US$9,773,000). According to the 2011 study, Zimbabwe was the nation with the highest piracy rate, at 92%, while the lowest piracy rate was present in the U.S., at 19%.. Answer: {'text': [], 'answer_start': []}. Question:
What percentage of people admit to pirating hardware?
Context: In its 2011 report, conducted in partnership with IDC and Ipsos Public Affairs, the BSA stated: "Over half of the world's personal computer users – 57 percent – admit to pirating software." The ninth annual "BSA Global Software Piracy Study" claims that the "commercial value of this shadow market of pirated software" was worth US$63.4 billion in 2011, with the highest commercial value of pirated PC software existent in the U.S. during that time period (US$9,773,000). According to the 2011 study, Zimbabwe was the nation with the highest piracy rate, at 92%, while the lowest piracy rate was present in the U.S., at 19%.. Answer: {'text': [], 'answer_start': []}. Question:
What was the commercial value of pirated hardware in 2011?
Context: In its 2011 report, conducted in partnership with IDC and Ipsos Public Affairs, the BSA stated: "Over half of the world's personal computer users – 57 percent – admit to pirating software." The ninth annual "BSA Global Software Piracy Study" claims that the "commercial value of this shadow market of pirated software" was worth US$63.4 billion in 2011, with the highest commercial value of pirated PC software existent in the U.S. during that time period (US$9,773,000). According to the 2011 study, Zimbabwe was the nation with the highest piracy rate, at 92%, while the lowest piracy rate was present in the U.S., at 19%.. Answer: {'text': [], 'answer_start': []}. Question:
What nation had the lowest nonpiracy rate?
Context: In its 2011 report, conducted in partnership with IDC and Ipsos Public Affairs, the BSA stated: "Over half of the world's personal computer users – 57 percent – admit to pirating software." The ninth annual "BSA Global Software Piracy Study" claims that the "commercial value of this shadow market of pirated software" was worth US$63.4 billion in 2011, with the highest commercial value of pirated PC software existent in the U.S. during that time period (US$9,773,000). According to the 2011 study, Zimbabwe was the nation with the highest piracy rate, at 92%, while the lowest piracy rate was present in the U.S., at 19%.. Answer: {'text': [], 'answer_start': []}. Question:
What was the U.N.'s piracy rate?
Context: In its 2011 report, conducted in partnership with IDC and Ipsos Public Affairs, the BSA stated: "Over half of the world's personal computer users – 57 percent – admit to pirating software." The ninth annual "BSA Global Software Piracy Study" claims that the "commercial value of this shadow market of pirated software" was worth US$63.4 billion in 2011, with the highest commercial value of pirated PC software existent in the U.S. during that time period (US$9,773,000). According to the 2011 study, Zimbabwe was the nation with the highest piracy rate, at 92%, while the lowest piracy rate was present in the U.S., at 19%.. Answer: {'text': [], 'answer_start': []}. Question:
Who reported that piracy took $12.5 billion from the U.S. economy?
Context: In 2007, the Institute for Policy Innovation (IPI) reported that music piracy took $12.5 billion from the U.S. economy. According to the study, musicians and those involved in the recording industry are not the only ones who experience losses attributed to music piracy. Retailers have lost over a billion dollars, while piracy has resulted in 46,000 fewer production-level jobs and almost 25,000 retail jobs. The U.S. government was also reported to suffer from music piracy, losing $422 million in tax revenue.. Answer: {'text': ['Institute for Policy Innovation'], 'answer_start': [13]}. Question:
How much money have retailers lost?
Context: In 2007, the Institute for Policy Innovation (IPI) reported that music piracy took $12.5 billion from the U.S. economy. According to the study, musicians and those involved in the recording industry are not the only ones who experience losses attributed to music piracy. Retailers have lost over a billion dollars, while piracy has resulted in 46,000 fewer production-level jobs and almost 25,000 retail jobs. The U.S. government was also reported to suffer from music piracy, losing $422 million in tax revenue.. Answer: {'text': ['over a billion dollars'], 'answer_start': [291]}. Question:
How many production-level jobs were lost?
Context: In 2007, the Institute for Policy Innovation (IPI) reported that music piracy took $12.5 billion from the U.S. economy. According to the study, musicians and those involved in the recording industry are not the only ones who experience losses attributed to music piracy. Retailers have lost over a billion dollars, while piracy has resulted in 46,000 fewer production-level jobs and almost 25,000 retail jobs. The U.S. government was also reported to suffer from music piracy, losing $422 million in tax revenue.. Answer: {'text': ['46,000'], 'answer_start': [344]}. Question:
Which government lost $422 million in potential tax money?
Context: In 2007, the Institute for Policy Innovation (IPI) reported that music piracy took $12.5 billion from the U.S. economy. According to the study, musicians and those involved in the recording industry are not the only ones who experience losses attributed to music piracy. Retailers have lost over a billion dollars, while piracy has resulted in 46,000 fewer production-level jobs and almost 25,000 retail jobs. The U.S. government was also reported to suffer from music piracy, losing $422 million in tax revenue.. Answer: {'text': ['U.S. government'], 'answer_start': [414]}. Question:
Who reported that piracy gained $12.5 billion for the U.S. economy?
Context: In 2007, the Institute for Policy Innovation (IPI) reported that music piracy took $12.5 billion from the U.S. economy. According to the study, musicians and those involved in the recording industry are not the only ones who experience losses attributed to music piracy. Retailers have lost over a billion dollars, while piracy has resulted in 46,000 fewer production-level jobs and almost 25,000 retail jobs. The U.S. government was also reported to suffer from music piracy, losing $422 million in tax revenue.. Answer: {'text': [], 'answer_start': []}. Question:
How much money have retailers made?
Context: In 2007, the Institute for Policy Innovation (IPI) reported that music piracy took $12.5 billion from the U.S. economy. According to the study, musicians and those involved in the recording industry are not the only ones who experience losses attributed to music piracy. Retailers have lost over a billion dollars, while piracy has resulted in 46,000 fewer production-level jobs and almost 25,000 retail jobs. The U.S. government was also reported to suffer from music piracy, losing $422 million in tax revenue.. Answer: {'text': [], 'answer_start': []}. Question:
How many production-level jobs were gained?
Context: In 2007, the Institute for Policy Innovation (IPI) reported that music piracy took $12.5 billion from the U.S. economy. According to the study, musicians and those involved in the recording industry are not the only ones who experience losses attributed to music piracy. Retailers have lost over a billion dollars, while piracy has resulted in 46,000 fewer production-level jobs and almost 25,000 retail jobs. The U.S. government was also reported to suffer from music piracy, losing $422 million in tax revenue.. Answer: {'text': [], 'answer_start': []}. Question:
How many production-level jobs weren't lost?
Context: In 2007, the Institute for Policy Innovation (IPI) reported that music piracy took $12.5 billion from the U.S. economy. According to the study, musicians and those involved in the recording industry are not the only ones who experience losses attributed to music piracy. Retailers have lost over a billion dollars, while piracy has resulted in 46,000 fewer production-level jobs and almost 25,000 retail jobs. The U.S. government was also reported to suffer from music piracy, losing $422 million in tax revenue.. Answer: {'text': [], 'answer_start': []}. Question:
Which government made $422 million in potential tax money?
Context: In 2007, the Institute for Policy Innovation (IPI) reported that music piracy took $12.5 billion from the U.S. economy. According to the study, musicians and those involved in the recording industry are not the only ones who experience losses attributed to music piracy. Retailers have lost over a billion dollars, while piracy has resulted in 46,000 fewer production-level jobs and almost 25,000 retail jobs. The U.S. government was also reported to suffer from music piracy, losing $422 million in tax revenue.. Answer: {'text': [], 'answer_start': []}. Question:
What book did Professor Aram Sinnreich write?
Context: Professor Aram Sinnreich, in his book The Piracy Crusade, states that the connection between declining music sails and the creation of peer to peer file sharing sites such as Napster is tenuous, based on correlation rather than causation. He argues that the industry at the time was undergoing artificial expansion, what he describes as a "'perfect bubble'—a confluence of economic, political, and technological forces that drove the aggregate value of music sales to unprecedented heights at the end of the twentieth century".. Answer: {'text': ['The Piracy Crusade'], 'answer_start': [38]}. Question:
What did Sinnreich call the link between lower music sales and peer-to-peer sharing site?
Context: Professor Aram Sinnreich, in his book The Piracy Crusade, states that the connection between declining music sails and the creation of peer to peer file sharing sites such as Napster is tenuous, based on correlation rather than causation. He argues that the industry at the time was undergoing artificial expansion, what he describes as a "'perfect bubble'—a confluence of economic, political, and technological forces that drove the aggregate value of music sales to unprecedented heights at the end of the twentieth century".. Answer: {'text': ['tenuous'], 'answer_start': [186]}. Question:
What was the industry going through?
Context: Professor Aram Sinnreich, in his book The Piracy Crusade, states that the connection between declining music sails and the creation of peer to peer file sharing sites such as Napster is tenuous, based on correlation rather than causation. He argues that the industry at the time was undergoing artificial expansion, what he describes as a "'perfect bubble'—a confluence of economic, political, and technological forces that drove the aggregate value of music sales to unprecedented heights at the end of the twentieth century".. Answer: {'text': ['artificial expansion'], 'answer_start': [294]}. Question:
What does he call the merging of economic, political and technological forces that drove the music industry?
Context: Professor Aram Sinnreich, in his book The Piracy Crusade, states that the connection between declining music sails and the creation of peer to peer file sharing sites such as Napster is tenuous, based on correlation rather than causation. He argues that the industry at the time was undergoing artificial expansion, what he describes as a "'perfect bubble'—a confluence of economic, political, and technological forces that drove the aggregate value of music sales to unprecedented heights at the end of the twentieth century".. Answer: {'text': ['perfect bubble'], 'answer_start': [341]}. Question:
What book did Professor Aram Sinnreich read?
Context: Professor Aram Sinnreich, in his book The Piracy Crusade, states that the connection between declining music sails and the creation of peer to peer file sharing sites such as Napster is tenuous, based on correlation rather than causation. He argues that the industry at the time was undergoing artificial expansion, what he describes as a "'perfect bubble'—a confluence of economic, political, and technological forces that drove the aggregate value of music sales to unprecedented heights at the end of the twentieth century".. Answer: {'text': [], 'answer_start': []}. Question:
What book didn't Professor Aram Sinnreich write?
Context: Professor Aram Sinnreich, in his book The Piracy Crusade, states that the connection between declining music sails and the creation of peer to peer file sharing sites such as Napster is tenuous, based on correlation rather than causation. He argues that the industry at the time was undergoing artificial expansion, what he describes as a "'perfect bubble'—a confluence of economic, political, and technological forces that drove the aggregate value of music sales to unprecedented heights at the end of the twentieth century".. Answer: {'text': [], 'answer_start': []}. Question:
What didn't Sinnreich call the link between lower music sales and peer-to-peer sharing site?
Context: Professor Aram Sinnreich, in his book The Piracy Crusade, states that the connection between declining music sails and the creation of peer to peer file sharing sites such as Napster is tenuous, based on correlation rather than causation. He argues that the industry at the time was undergoing artificial expansion, what he describes as a "'perfect bubble'—a confluence of economic, political, and technological forces that drove the aggregate value of music sales to unprecedented heights at the end of the twentieth century".. Answer: {'text': [], 'answer_start': []}. Question:
What wasn't the industry going through?
Context: Professor Aram Sinnreich, in his book The Piracy Crusade, states that the connection between declining music sails and the creation of peer to peer file sharing sites such as Napster is tenuous, based on correlation rather than causation. He argues that the industry at the time was undergoing artificial expansion, what he describes as a "'perfect bubble'—a confluence of economic, political, and technological forces that drove the aggregate value of music sales to unprecedented heights at the end of the twentieth century".. Answer: {'text': [], 'answer_start': []}. Question:
What doesn't he call the merging of economic, political and technological forces that drove the music industry?
Context: Professor Aram Sinnreich, in his book The Piracy Crusade, states that the connection between declining music sails and the creation of peer to peer file sharing sites such as Napster is tenuous, based on correlation rather than causation. He argues that the industry at the time was undergoing artificial expansion, what he describes as a "'perfect bubble'—a confluence of economic, political, and technological forces that drove the aggregate value of music sales to unprecedented heights at the end of the twentieth century".. Answer: {'text': [], 'answer_start': []}. Question:
What was the estimated total value of pirated software in 2010?
Context: The 2011 Business Software Alliance Piracy Study Standard, estimates the total commercial value of illegally copied software to be at $59 billion in 2010, with emerging markets accounting for $31.9 billion, over half of the total. Furthermore, mature markets for the first time received less PC shipments than emerging economies in 2010, making emerging markets now responsible for more than half of all computers in use worldwide. In addition with software infringement rates of 68 percent comparing to 24 percent of mature markets, emerging markets thus possess the majority of the global increase in the commercial value of counterfeit software. China continues to have the highest commercial value of such software at $8.9 billion among developing countries and second in the world behind the US at $9.7 billion in 2011. In 2011, the Business Software Alliance announced that 83 percent of software deployed on PCs in Africa has been pirated (excluding South Africa).. Answer: {'text': ['$59 billion'], 'answer_start': [134]}. Question:
Who accounted for over half the total?
Context: The 2011 Business Software Alliance Piracy Study Standard, estimates the total commercial value of illegally copied software to be at $59 billion in 2010, with emerging markets accounting for $31.9 billion, over half of the total. Furthermore, mature markets for the first time received less PC shipments than emerging economies in 2010, making emerging markets now responsible for more than half of all computers in use worldwide. In addition with software infringement rates of 68 percent comparing to 24 percent of mature markets, emerging markets thus possess the majority of the global increase in the commercial value of counterfeit software. China continues to have the highest commercial value of such software at $8.9 billion among developing countries and second in the world behind the US at $9.7 billion in 2011. In 2011, the Business Software Alliance announced that 83 percent of software deployed on PCs in Africa has been pirated (excluding South Africa).. Answer: {'text': ['emerging markets'], 'answer_start': [160]}. Question:
What did the established markets receive for the first time?
Context: The 2011 Business Software Alliance Piracy Study Standard, estimates the total commercial value of illegally copied software to be at $59 billion in 2010, with emerging markets accounting for $31.9 billion, over half of the total. Furthermore, mature markets for the first time received less PC shipments than emerging economies in 2010, making emerging markets now responsible for more than half of all computers in use worldwide. In addition with software infringement rates of 68 percent comparing to 24 percent of mature markets, emerging markets thus possess the majority of the global increase in the commercial value of counterfeit software. China continues to have the highest commercial value of such software at $8.9 billion among developing countries and second in the world behind the US at $9.7 billion in 2011. In 2011, the Business Software Alliance announced that 83 percent of software deployed on PCs in Africa has been pirated (excluding South Africa).. Answer: {'text': ['less PC shipments than emerging economies'], 'answer_start': [287]}. Question:
What country has the highest retail value of software?
Context: The 2011 Business Software Alliance Piracy Study Standard, estimates the total commercial value of illegally copied software to be at $59 billion in 2010, with emerging markets accounting for $31.9 billion, over half of the total. Furthermore, mature markets for the first time received less PC shipments than emerging economies in 2010, making emerging markets now responsible for more than half of all computers in use worldwide. In addition with software infringement rates of 68 percent comparing to 24 percent of mature markets, emerging markets thus possess the majority of the global increase in the commercial value of counterfeit software. China continues to have the highest commercial value of such software at $8.9 billion among developing countries and second in the world behind the US at $9.7 billion in 2011. In 2011, the Business Software Alliance announced that 83 percent of software deployed on PCs in Africa has been pirated (excluding South Africa).. Answer: {'text': ['China'], 'answer_start': [649]}. Question:
What percentage of software in Africa is illegal?
Context: The 2011 Business Software Alliance Piracy Study Standard, estimates the total commercial value of illegally copied software to be at $59 billion in 2010, with emerging markets accounting for $31.9 billion, over half of the total. Furthermore, mature markets for the first time received less PC shipments than emerging economies in 2010, making emerging markets now responsible for more than half of all computers in use worldwide. In addition with software infringement rates of 68 percent comparing to 24 percent of mature markets, emerging markets thus possess the majority of the global increase in the commercial value of counterfeit software. China continues to have the highest commercial value of such software at $8.9 billion among developing countries and second in the world behind the US at $9.7 billion in 2011. In 2011, the Business Software Alliance announced that 83 percent of software deployed on PCs in Africa has been pirated (excluding South Africa).. Answer: {'text': ['83 percent'], 'answer_start': [880]}. Question:
What was the estimated total value of pirated software in 2000?
Context: The 2011 Business Software Alliance Piracy Study Standard, estimates the total commercial value of illegally copied software to be at $59 billion in 2010, with emerging markets accounting for $31.9 billion, over half of the total. Furthermore, mature markets for the first time received less PC shipments than emerging economies in 2010, making emerging markets now responsible for more than half of all computers in use worldwide. In addition with software infringement rates of 68 percent comparing to 24 percent of mature markets, emerging markets thus possess the majority of the global increase in the commercial value of counterfeit software. China continues to have the highest commercial value of such software at $8.9 billion among developing countries and second in the world behind the US at $9.7 billion in 2011. In 2011, the Business Software Alliance announced that 83 percent of software deployed on PCs in Africa has been pirated (excluding South Africa).. Answer: {'text': [], 'answer_start': []}. Question:
What was the known total value of pirated software in 2010?
Context: The 2011 Business Software Alliance Piracy Study Standard, estimates the total commercial value of illegally copied software to be at $59 billion in 2010, with emerging markets accounting for $31.9 billion, over half of the total. Furthermore, mature markets for the first time received less PC shipments than emerging economies in 2010, making emerging markets now responsible for more than half of all computers in use worldwide. In addition with software infringement rates of 68 percent comparing to 24 percent of mature markets, emerging markets thus possess the majority of the global increase in the commercial value of counterfeit software. China continues to have the highest commercial value of such software at $8.9 billion among developing countries and second in the world behind the US at $9.7 billion in 2011. In 2011, the Business Software Alliance announced that 83 percent of software deployed on PCs in Africa has been pirated (excluding South Africa).. Answer: {'text': [], 'answer_start': []}. Question:
Who accounted for less than half the total?
Context: The 2011 Business Software Alliance Piracy Study Standard, estimates the total commercial value of illegally copied software to be at $59 billion in 2010, with emerging markets accounting for $31.9 billion, over half of the total. Furthermore, mature markets for the first time received less PC shipments than emerging economies in 2010, making emerging markets now responsible for more than half of all computers in use worldwide. In addition with software infringement rates of 68 percent comparing to 24 percent of mature markets, emerging markets thus possess the majority of the global increase in the commercial value of counterfeit software. China continues to have the highest commercial value of such software at $8.9 billion among developing countries and second in the world behind the US at $9.7 billion in 2011. In 2011, the Business Software Alliance announced that 83 percent of software deployed on PCs in Africa has been pirated (excluding South Africa).. Answer: {'text': [], 'answer_start': []}. Question:
What did the established markets receive for the last time?
Context: The 2011 Business Software Alliance Piracy Study Standard, estimates the total commercial value of illegally copied software to be at $59 billion in 2010, with emerging markets accounting for $31.9 billion, over half of the total. Furthermore, mature markets for the first time received less PC shipments than emerging economies in 2010, making emerging markets now responsible for more than half of all computers in use worldwide. In addition with software infringement rates of 68 percent comparing to 24 percent of mature markets, emerging markets thus possess the majority of the global increase in the commercial value of counterfeit software. China continues to have the highest commercial value of such software at $8.9 billion among developing countries and second in the world behind the US at $9.7 billion in 2011. In 2011, the Business Software Alliance announced that 83 percent of software deployed on PCs in Africa has been pirated (excluding South Africa).. Answer: {'text': [], 'answer_start': []}. Question:
What country has the lowest retail value of software?
Context: The 2011 Business Software Alliance Piracy Study Standard, estimates the total commercial value of illegally copied software to be at $59 billion in 2010, with emerging markets accounting for $31.9 billion, over half of the total. Furthermore, mature markets for the first time received less PC shipments than emerging economies in 2010, making emerging markets now responsible for more than half of all computers in use worldwide. In addition with software infringement rates of 68 percent comparing to 24 percent of mature markets, emerging markets thus possess the majority of the global increase in the commercial value of counterfeit software. China continues to have the highest commercial value of such software at $8.9 billion among developing countries and second in the world behind the US at $9.7 billion in 2011. In 2011, the Business Software Alliance announced that 83 percent of software deployed on PCs in Africa has been pirated (excluding South Africa).. Answer: {'text': [], 'answer_start': []}. Question:
What is the most common Christian denomination in Thuringia?
Context: Since the Protestant Reformation, the most prominent Christian denomination in Thuringia has been Lutheranism. During the GDR period, church membership was discouraged and has continued shrinking since the reunification in 1990. Today over two thirds of the population is non-religious. The Protestant Evangelical Church in Germany has had the largest number of members in the state, adhered to by 24.0% of the population in 2009. Members of the Catholic Church formed 7.8% of the population, while 68.2% of Thuringians were non-religious or adhere to other faiths. The highest Protestant concentrations are in the small villages of southern and western Thuringia, whereas the bigger cities are even more non-religious (up to 88% in Gera). Catholic regions are the Eichsfeld in the northwest and parts of the Rhön Mountains around Geisa in the southwest. Protestant church membership is shrinking rapidly, whereas the Catholic Church is somewhat more stable because of Catholic migration from Poland, Southern Europe and West Germany. Other religions play no significant role in Thuringia. There are only a few thousand Muslims (largely migrants) and about 750 Jews (mostly migrants from Russia) living in Thuringia. Furthermore, there are some Orthodox communities of Eastern European migrants and some traditional Protestant Free churches in Thuringia without any societal influence.. Answer: {'text': ['Lutheranism'], 'answer_start': [98]}. Question:
How much of the Thuringia population is non-religious?
Context: Since the Protestant Reformation, the most prominent Christian denomination in Thuringia has been Lutheranism. During the GDR period, church membership was discouraged and has continued shrinking since the reunification in 1990. Today over two thirds of the population is non-religious. The Protestant Evangelical Church in Germany has had the largest number of members in the state, adhered to by 24.0% of the population in 2009. Members of the Catholic Church formed 7.8% of the population, while 68.2% of Thuringians were non-religious or adhere to other faiths. The highest Protestant concentrations are in the small villages of southern and western Thuringia, whereas the bigger cities are even more non-religious (up to 88% in Gera). Catholic regions are the Eichsfeld in the northwest and parts of the Rhön Mountains around Geisa in the southwest. Protestant church membership is shrinking rapidly, whereas the Catholic Church is somewhat more stable because of Catholic migration from Poland, Southern Europe and West Germany. Other religions play no significant role in Thuringia. There are only a few thousand Muslims (largely migrants) and about 750 Jews (mostly migrants from Russia) living in Thuringia. Furthermore, there are some Orthodox communities of Eastern European migrants and some traditional Protestant Free churches in Thuringia without any societal influence.. Answer: {'text': ['Today over two thirds of the population'], 'answer_start': [229]}. Question:
Which church in the state has the largest amount of members?
Context: Since the Protestant Reformation, the most prominent Christian denomination in Thuringia has been Lutheranism. During the GDR period, church membership was discouraged and has continued shrinking since the reunification in 1990. Today over two thirds of the population is non-religious. The Protestant Evangelical Church in Germany has had the largest number of members in the state, adhered to by 24.0% of the population in 2009. Members of the Catholic Church formed 7.8% of the population, while 68.2% of Thuringians were non-religious or adhere to other faiths. The highest Protestant concentrations are in the small villages of southern and western Thuringia, whereas the bigger cities are even more non-religious (up to 88% in Gera). Catholic regions are the Eichsfeld in the northwest and parts of the Rhön Mountains around Geisa in the southwest. Protestant church membership is shrinking rapidly, whereas the Catholic Church is somewhat more stable because of Catholic migration from Poland, Southern Europe and West Germany. Other religions play no significant role in Thuringia. There are only a few thousand Muslims (largely migrants) and about 750 Jews (mostly migrants from Russia) living in Thuringia. Furthermore, there are some Orthodox communities of Eastern European migrants and some traditional Protestant Free churches in Thuringia without any societal influence.. Answer: {'text': ['The Protestant Evangelical Church in Germany'], 'answer_start': [287]}. Question:
How much of the Thuringia population are Catholic?
Context: Since the Protestant Reformation, the most prominent Christian denomination in Thuringia has been Lutheranism. During the GDR period, church membership was discouraged and has continued shrinking since the reunification in 1990. Today over two thirds of the population is non-religious. The Protestant Evangelical Church in Germany has had the largest number of members in the state, adhered to by 24.0% of the population in 2009. Members of the Catholic Church formed 7.8% of the population, while 68.2% of Thuringians were non-religious or adhere to other faiths. The highest Protestant concentrations are in the small villages of southern and western Thuringia, whereas the bigger cities are even more non-religious (up to 88% in Gera). Catholic regions are the Eichsfeld in the northwest and parts of the Rhön Mountains around Geisa in the southwest. Protestant church membership is shrinking rapidly, whereas the Catholic Church is somewhat more stable because of Catholic migration from Poland, Southern Europe and West Germany. Other religions play no significant role in Thuringia. There are only a few thousand Muslims (largely migrants) and about 750 Jews (mostly migrants from Russia) living in Thuringia. Furthermore, there are some Orthodox communities of Eastern European migrants and some traditional Protestant Free churches in Thuringia without any societal influence.. Answer: {'text': ['7.8% of the population'], 'answer_start': [469]}. Question:
How many Jews live in Thuringia?
Context: Since the Protestant Reformation, the most prominent Christian denomination in Thuringia has been Lutheranism. During the GDR period, church membership was discouraged and has continued shrinking since the reunification in 1990. Today over two thirds of the population is non-religious. The Protestant Evangelical Church in Germany has had the largest number of members in the state, adhered to by 24.0% of the population in 2009. Members of the Catholic Church formed 7.8% of the population, while 68.2% of Thuringians were non-religious or adhere to other faiths. The highest Protestant concentrations are in the small villages of southern and western Thuringia, whereas the bigger cities are even more non-religious (up to 88% in Gera). Catholic regions are the Eichsfeld in the northwest and parts of the Rhön Mountains around Geisa in the southwest. Protestant church membership is shrinking rapidly, whereas the Catholic Church is somewhat more stable because of Catholic migration from Poland, Southern Europe and West Germany. Other religions play no significant role in Thuringia. There are only a few thousand Muslims (largely migrants) and about 750 Jews (mostly migrants from Russia) living in Thuringia. Furthermore, there are some Orthodox communities of Eastern European migrants and some traditional Protestant Free churches in Thuringia without any societal influence.. Answer: {'text': ['750 Jews'], 'answer_start': [1157]}. Question:
What is the least common Secular denomination in Thuringia?
Context: Since the Protestant Reformation, the most prominent Christian denomination in Thuringia has been Lutheranism. During the GDR period, church membership was discouraged and has continued shrinking since the reunification in 1990. Today over two thirds of the population is non-religious. The Protestant Evangelical Church in Germany has had the largest number of members in the state, adhered to by 24.0% of the population in 2009. Members of the Catholic Church formed 7.8% of the population, while 68.2% of Thuringians were non-religious or adhere to other faiths. The highest Protestant concentrations are in the small villages of southern and western Thuringia, whereas the bigger cities are even more non-religious (up to 88% in Gera). Catholic regions are the Eichsfeld in the northwest and parts of the Rhön Mountains around Geisa in the southwest. Protestant church membership is shrinking rapidly, whereas the Catholic Church is somewhat more stable because of Catholic migration from Poland, Southern Europe and West Germany. Other religions play no significant role in Thuringia. There are only a few thousand Muslims (largely migrants) and about 750 Jews (mostly migrants from Russia) living in Thuringia. Furthermore, there are some Orthodox communities of Eastern European migrants and some traditional Protestant Free churches in Thuringia without any societal influence.. Answer: {'text': [], 'answer_start': []}. Question:
How much of the Thuringia population is gone?
Context: Since the Protestant Reformation, the most prominent Christian denomination in Thuringia has been Lutheranism. During the GDR period, church membership was discouraged and has continued shrinking since the reunification in 1990. Today over two thirds of the population is non-religious. The Protestant Evangelical Church in Germany has had the largest number of members in the state, adhered to by 24.0% of the population in 2009. Members of the Catholic Church formed 7.8% of the population, while 68.2% of Thuringians were non-religious or adhere to other faiths. The highest Protestant concentrations are in the small villages of southern and western Thuringia, whereas the bigger cities are even more non-religious (up to 88% in Gera). Catholic regions are the Eichsfeld in the northwest and parts of the Rhön Mountains around Geisa in the southwest. Protestant church membership is shrinking rapidly, whereas the Catholic Church is somewhat more stable because of Catholic migration from Poland, Southern Europe and West Germany. Other religions play no significant role in Thuringia. There are only a few thousand Muslims (largely migrants) and about 750 Jews (mostly migrants from Russia) living in Thuringia. Furthermore, there are some Orthodox communities of Eastern European migrants and some traditional Protestant Free churches in Thuringia without any societal influence.. Answer: {'text': [], 'answer_start': []}. Question:
Which church in the state has the smallest amount of members?
Context: Since the Protestant Reformation, the most prominent Christian denomination in Thuringia has been Lutheranism. During the GDR period, church membership was discouraged and has continued shrinking since the reunification in 1990. Today over two thirds of the population is non-religious. The Protestant Evangelical Church in Germany has had the largest number of members in the state, adhered to by 24.0% of the population in 2009. Members of the Catholic Church formed 7.8% of the population, while 68.2% of Thuringians were non-religious or adhere to other faiths. The highest Protestant concentrations are in the small villages of southern and western Thuringia, whereas the bigger cities are even more non-religious (up to 88% in Gera). Catholic regions are the Eichsfeld in the northwest and parts of the Rhön Mountains around Geisa in the southwest. Protestant church membership is shrinking rapidly, whereas the Catholic Church is somewhat more stable because of Catholic migration from Poland, Southern Europe and West Germany. Other religions play no significant role in Thuringia. There are only a few thousand Muslims (largely migrants) and about 750 Jews (mostly migrants from Russia) living in Thuringia. Furthermore, there are some Orthodox communities of Eastern European migrants and some traditional Protestant Free churches in Thuringia without any societal influence.. Answer: {'text': [], 'answer_start': []}. Question: