1,612 research outputs found

    Dynamic analysis of an institutional conflict within the music industry

    Get PDF
    Peer-to-peer technology has made massive music piracy possible, which, in turn, has arguably had a significant economic impact on the recording industry. Record labels have responded to online piracy with litigation and are also considering self-help measures. It is currently not obvious whether or not these counter-piracy strategies will ultimately stifle online file sharing in the long term. With this paper we attempt to add to our understanding of the conflict within the institution that is the commercial music industry. We conduct an institutional analysis of the industry in transition and extend the traditional pattern modeling methodology with a formal resource-based model of a representative online music network. The model accounts for complex causal interactions between resources, private provision of common goods, free riding and membership dynamics. The numerical implementation of the model is the basis of a decision support system, which is used in a series of computer experiments that emulate anti-piracy scenarios. We show that a peer-to-peer system may be quite resilient to outside disturbances. The experiments also demonstrate that policies rank differently in their effectiveness based on a selected yardstick.Peer-to-peer (P2P) networks; Online File Sharing; Copyright; Simulation

    The trust management framework for peer-to-peer networks

    Get PDF
    Popularity of peer-to-peer (P2P) networks exposed a number of security vulnerabilities. Among those is a problem of finding reliable communication partners. In this thesis, we present an integrated trust framework for peer-to-peer networks that quantifies the trustworthiness of a peer via reputation-based trust mechanism and anomaly detection techniques. As opposed to other known techniques in P2P networks, our trust management schema is fully decentralized and does not rely on the co-operation of peers. Furthermore, the reputation computation is based on traffic coming from other peers. We also describe an anomaly detection procedure that analyses peer activity on the network and flags potentially malicious behavior by detecting deviation from peer profile. We present integration of our anomaly detection to trust management scheme and study the performance of reputation-based approach using implementation and performance of trust framework through simulation

    The Effect of P2P File Sharing on Music Markets: A SurvivalAnalysisofAlbums on Ranking Charts

    Get PDF
    Recent technological and market forces have profoundly impacted the music industry. Emphasizing threats from peer-to-peer (P2P) technologies, the industry continues to seek sanctions against individuals who offer significant number of songs for others to copy. Yet there is little rigorous empirical analysis of the impacts of online sharing on the success of music products. Combining data on the performance of music albums on the Billboard charts with file sharing data from a popular network, we: 1) assess the impact of recent developments related to the music industry on survival of music albums on the charts, and 2) evaluate the specific impact of P2P sharing on an album's survival on the charts. In the post P2P era, we find significantly reduced chart survival. The second phase of our study isolates the impact of file sharing on album survival. We find that sharing does not seem to hurt the survival of albums

    An Incentive Compatible Reputation Model for P2P Networks

    Full text link

    Command & Control: Understanding, Denying and Detecting - A review of malware C2 techniques, detection and defences

    Full text link
    In this survey, we first briefly review the current state of cyber attacks, highlighting significant recent changes in how and why such attacks are performed. We then investigate the mechanics of malware command and control (C2) establishment: we provide a comprehensive review of the techniques used by attackers to set up such a channel and to hide its presence from the attacked parties and the security tools they use. We then switch to the defensive side of the problem, and review approaches that have been proposed for the detection and disruption of C2 channels. We also map such techniques to widely-adopted security controls, emphasizing gaps or limitations (and success stories) in current best practices.Comment: Work commissioned by CPNI, available at c2report.org. 38 pages. Listing abstract compressed from version appearing in repor

    Interest-Based Self-Organizing Peer-to-Peer Networks: A Club Economics Approach

    Get PDF
    Improving the information retrieval (IR) performance of peer-to-peer networks is an important and challenging problem. Recently, the computer science literature has attempted to address this problem by improving IR search algorithms. However, in peer-to-peer networks, IR performance is determined by both technology and user behavior, and very little attention has been paid in the literature to improving IR performance through incentives to change user behavior. We address this gap by combining the club goods economics literature and the IR literature to propose a next generation file sharing architecture. Using the popular Gnutella 0.6 architecture as context, we conceptualize a Gnutella ultrapeer and its local network of leaf nodes as a "club" (in economic terms). We specify an information retrieval-based utility model for a peer to determine which clubs to join, for a club to manage its membership, and for a club to determine to which other clubs they should connect. We simulate the performance of our model using a unique real-world dataset collected from the Gnutella 0.6 network. These simulations show that our club model accomplishes both performance goals. First, peers are self-organized into communities of interest - in our club model peers are 85% more likely to be able to obtain content from their local club than they are in the current Gnutella 0.6 architecture. Second, peers have increased incentives to share content - our model shows that peers who share can increase their recall performance by nearly five times over the performance offered to free-riders. We also show that the benefits provided by our club model outweigh the added protocol overhead imposed on the network for the most valuable peers

    Antecedents and consequences of co-creation value with a resolution of complex P2P relationships

    Get PDF
    Purpose This research addresses three questions: (i) What are the main factors influencing co-creation behaviour among peers in a peer-to-peer (P2P) platform? (ii) What are the key consequences of such behaviour? (iii) What are the main factors that positively influence a sense of commitment among peers in a P2P platform? Design This study used a positivist paradigm (quantitative method) to scrutinise the causal associations among the scale validation and causal configurations of influential factors by employing fsQCA (fuzzy set qualitative comparative analysis). Findings The findings reveal the significance of co-creation behaviour in enhancing the sense of commitment in a P2P platform. Important implications for hospitality managers and researchers are highlighted. Practical Implication The findings of this research provide interesting insights for peer providers in a peer platform on how to enhance co-creation. They also offer guidelines on how to build a positive sense of commitment in the peer platform. Originality This research offers a unique theoretical contribution by investigating the antecedents and consequences of co-creation behaviour at the peer level. Drawing on complexity theory, the research also proposes two tenets supporting the managerial contribution by identifying and clarifying how co-creation behaviour and related constructs can lead to a sense of commitment between peers in a P2P platform
    • …
    corecore