1,612 research outputs found
Dynamic analysis of an institutional conflict within the music industry
Peer-to-peer technology has made massive music piracy possible, which, in turn, has arguably had a significant economic impact on the recording industry. Record labels have responded to online piracy with litigation and are also considering self-help measures. It is currently not obvious whether or not these counter-piracy strategies will ultimately stifle online file sharing in the long term. With this paper we attempt to add to our understanding of the conflict within the institution that is the commercial music industry. We conduct an institutional analysis of the industry in transition and extend the traditional pattern modeling methodology with a formal resource-based model of a representative online music network. The model accounts for complex causal interactions between resources, private provision of common goods, free riding and membership dynamics. The numerical implementation of the model is the basis of a decision support system, which is used in a series of computer experiments that emulate anti-piracy scenarios. We show that a peer-to-peer system may be quite resilient to outside disturbances. The experiments also demonstrate that policies rank differently in their effectiveness based on a selected yardstick.Peer-to-peer (P2P) networks; Online File Sharing; Copyright; Simulation
The trust management framework for peer-to-peer networks
Popularity of peer-to-peer (P2P) networks exposed a number of security vulnerabilities. Among those is a problem of finding reliable communication partners. In this thesis, we present an integrated trust framework for peer-to-peer networks that quantifies the trustworthiness of a peer via reputation-based trust mechanism and anomaly detection techniques. As opposed to other known techniques in P2P networks, our trust management schema is fully decentralized and does not rely on the co-operation of peers. Furthermore, the reputation computation is based on traffic coming from other peers. We also describe an anomaly detection procedure that analyses peer activity on the network and flags potentially malicious behavior by detecting deviation from peer profile. We present integration of our anomaly detection to trust management scheme and study the performance of reputation-based approach using implementation and performance of trust framework through simulation
The Effect of P2P File Sharing on Music Markets: A SurvivalAnalysisofAlbums on Ranking Charts
Recent technological and market forces have profoundly impacted the
music industry. Emphasizing threats from peer-to-peer (P2P)
technologies, the industry continues to seek sanctions against
individuals who offer significant number of songs for others to copy.
Yet there is little rigorous empirical analysis of the impacts of online
sharing on the success of music products. Combining data on the
performance of music albums on the Billboard charts with file sharing
data from a popular network, we: 1) assess the impact of recent
developments related to the music industry on survival of music albums
on the charts, and 2) evaluate the specific impact of P2P sharing on an
album's survival on the charts. In the post P2P era, we find
significantly reduced chart survival. The second phase of our study
isolates the impact of file sharing on album survival. We find that
sharing does not seem to hurt the survival of albums
Command & Control: Understanding, Denying and Detecting - A review of malware C2 techniques, detection and defences
In this survey, we first briefly review the current state of cyber attacks,
highlighting significant recent changes in how and why such attacks are
performed. We then investigate the mechanics of malware command and control
(C2) establishment: we provide a comprehensive review of the techniques used by
attackers to set up such a channel and to hide its presence from the attacked
parties and the security tools they use. We then switch to the defensive side
of the problem, and review approaches that have been proposed for the detection
and disruption of C2 channels. We also map such techniques to widely-adopted
security controls, emphasizing gaps or limitations (and success stories) in
current best practices.Comment: Work commissioned by CPNI, available at c2report.org. 38 pages.
Listing abstract compressed from version appearing in repor
Interest-Based Self-Organizing Peer-to-Peer Networks: A Club Economics Approach
Improving the information retrieval (IR) performance of peer-to-peer
networks is an important and challenging problem. Recently, the computer
science literature has attempted to address this problem by improving IR
search algorithms. However, in peer-to-peer networks, IR performance is
determined by both technology and user behavior, and very little
attention has been paid in the literature to improving IR performance
through incentives to change user behavior. We address this gap by
combining the club goods economics literature and the IR literature to
propose a next generation file sharing architecture. Using the popular
Gnutella 0.6 architecture as context, we conceptualize a Gnutella
ultrapeer and its local network of leaf nodes as a "club" (in
economic terms). We specify an information retrieval-based utility model
for a peer to determine which clubs to join, for a club to manage its
membership, and for a club to determine to which other clubs they should
connect. We simulate the performance of our model using a unique
real-world dataset collected from the Gnutella 0.6 network. These
simulations show that our club model accomplishes both performance
goals. First, peers are self-organized into communities of interest - in
our club model peers are 85% more likely to be able to obtain content
from their local club than they are in the current Gnutella 0.6
architecture. Second, peers have increased incentives to share content -
our model shows that peers who share can increase their recall
performance by nearly five times over the performance offered to
free-riders. We also show that the benefits provided by our club model
outweigh the added protocol overhead imposed on the network for the most
valuable peers
Antecedents and consequences of co-creation value with a resolution of complex P2P relationships
Purpose
This research addresses three questions: (i) What are the main factors influencing co-creation behaviour among peers in a peer-to-peer (P2P) platform? (ii) What are the key consequences of such behaviour? (iii) What are the main factors that positively influence a sense of commitment among peers in a P2P platform?
Design
This study used a positivist paradigm (quantitative method) to scrutinise the causal associations among the scale validation and causal configurations of influential factors by employing fsQCA (fuzzy set qualitative comparative analysis).
Findings
The findings reveal the significance of co-creation behaviour in enhancing the sense of commitment in a P2P platform. Important implications for hospitality managers and researchers are highlighted.
Practical Implication
The findings of this research provide interesting insights for peer providers in a peer platform on how to enhance co-creation. They also offer guidelines on how to build a positive sense of commitment in the peer platform.
Originality
This research offers a unique theoretical contribution by investigating the antecedents and consequences of co-creation behaviour at the peer level. Drawing on complexity theory, the research also proposes two tenets supporting the managerial contribution by identifying and clarifying how co-creation behaviour and related constructs can lead to a sense of commitment between peers in a P2P platform
- …