193 research outputs found

    Digital piracy : theory

    Get PDF
    This article reviews recent theoretical contributions on digital piracy. It starts by elaborating on the reasons for intellectual property protection, by reporting a few facts about copyright protection, and by examining reasons to become a digital pirate. Next, it provides an exploration of the consequences of digital piracy, using a base model and several extensions (with consumer sampling, network effects, and indirect appropriation). A closer look at market-structure implications of end-user piracy is then taken. After a brief review of commercial piracy, additional legal and private responses to end-user piracy are considered. Finally, a quick look at emerging new business models is taken.information good, piracy, copyright, IP protection, internet, peer-to-peer, software, music

    Digital Piracy: Theory

    Get PDF
    This article reviews recent theoretical contributions on digital piracy. It starts by elaborating on the reasons for intellectual property protection, by reporting a few facts about copyright protection, and by examining reasons to become a digital pirate. Next, it provides an exploration of the consequences of digital piracy, using a base model and several extensions (with consumer sampling, network effects, and indirect appropriation). A closer look at market-structure implications of end-user piracy is then taken. After a brief review of commercial piracy, additional legal and private responses to end-user piracy are considered. Finally, a quick look at emerging new business models is taken.information good, piracy, copyright, IP protection, internet, peer-to-peer, software, music

    An Analysis of incentives mechanisms and evaluation on BitTorrent

    Get PDF
    Since the first peer-to-peer communities appeared, their number of users has increased considerably owing to the benefits they offer compared to their alternative architectures in the sharing and distribution of multimedia content. However, due to its distributed nature, they can suffer an important problem of misuse: free-riding. Free-riding consists on users consuming resources without contributing to the system. Such behaviour not only is not fair for the rest of the users, but also threatens the success of this type of nets. With the motivation to avoid free-riding, the mechanisms of incentives were born. They provide the system with a method to motivate the nodes and make them share their resources with the other users. In one word, they provide the net with the needed fairness to achieve a good performance for all users. This thesis is organised in two main parts. In the first part there is a comprehensive study of the state of the art regarding the incentive mechanisms, resulting in a classification depending on the characteristics of the studied algorithms. That study provides the reader with a first sight of the strengths and weaknesses of each algorithm. In the second part there is a test scenario based in the virtualization of machines that was useful to evaluate empirically some of the studied algorithms. Finally, a series of experiments were carried out in order to compare some characteristics of these algorithms and thus verify or deny the conclusions resulted in the study of the state of the art

    A framework for the dynamic management of Peer-to-Peer overlays

    Get PDF
    Peer-to-Peer (P2P) applications have been associated with inefficient operation, interference with other network services and large operational costs for network providers. This thesis presents a framework which can help ISPs address these issues by means of intelligent management of peer behaviour. The proposed approach involves limited control of P2P overlays without interfering with the fundamental characteristics of peer autonomy and decentralised operation. At the core of the management framework lays the Active Virtual Peer (AVP). Essentially intelligent peers operated by the network providers, the AVPs interact with the overlay from within, minimising redundant or inefficient traffic, enhancing overlay stability and facilitating the efficient and balanced use of available peer and network resources. They offer an “insider‟s” view of the overlay and permit the management of P2P functions in a compatible and non-intrusive manner. AVPs can support multiple P2P protocols and coordinate to perform functions collectively. To account for the multi-faceted nature of P2P applications and allow the incorporation of modern techniques and protocols as they appear, the framework is based on a modular architecture. Core modules for overlay control and transit traffic minimisation are presented. Towards the latter, a number of suitable P2P content caching strategies are proposed. Using a purpose-built P2P network simulator and small-scale experiments, it is demonstrated that the introduction of AVPs inside the network can significantly reduce inter-AS traffic, minimise costly multi-hop flows, increase overlay stability and load-balancing and offer improved peer transfer performance

    Five essays on copyright in the digital era

    Get PDF
    This dissertation aims to give a detailed view of how well copyright law is working in the digital environment and how its future looks. The work starts by giving the reader a primer on two central topics in the dissertation, i.e., an overview of technological developments that have changed once again the environment of copyright law work and the economic background of copyright and IPRs. Different methodological approaches are also discussed e.g. how behavioral law and economics and public choice theory should be utilized pertaining to copyright regulation. The main research questions, which are covered in the five original articles, are: Do technical protection measures (TPMs) help to solve the impending demise of copyright? Is the legal enforcement of copyright possible in current or future digital environments? What is the role of social norms in the future of copyright? Regarding the first question, the dissertation argues that the once-prevailing vision of copyright that was based on the belief that without legally technological protection measures, right holders would not release their content to digital distribution has not really turned out to be true. In the contrary, the opposition from the users and profound technical problems have marginalized TPMs in music stores in more advanced markets (i.e. USA) and same development is likely to happen in other categories of works. The answer to second question indicates a more profound problem if the copyright holders cannot prevent unlicensed use of their works, the economic rationale of copyright disappears. The dissertation argues that the foreseeable technical development in digital communication and storage technologies will lead to that result with very high likelihood at least among more consumer-oriented works (music, video), which are typically consumed in the privacy of homes. At the same time the development will make current levy-based systems infeasible general tax for technology. The final question continues from the point where enforcement stops. Social norms may substitute legal norms, which are based on strong enforcement. The dissertation argues that there are positive examples from open source development that which indicate that this approach may be feasible for copyright

    Trinity Tripod, 2002-10-15

    Get PDF

    A Critical Engagement with Piratical Opinion

    Get PDF
    A study of the intellectual property crime commonly known as ‘file sharing’ using the file sharing websites on which users display their activity and post comments. As a guide I will use a meta-theoretical framework first developed by Roger Sibeon and then expanded by Tim Owen to help focus the research through a post-postmodern return to sociological and criminological theory. This research also acknowledges a physical/biological component to all intangibility, internet and computer related activity and tries to build further a relationship between the physical and intangible spheres of existence. It is acknowledged here that individuals are not predetermined to commit certain actions because they are biologically programmed to do so, rather that genes can influence behaviour and behaviour can influence genes
    • 

    corecore