62,824 research outputs found

    BitTorrent Sync: Network Investigation Methodology

    Full text link
    The volume of personal information and data most Internet users find themselves amassing is ever increasing and the fast pace of the modern world results in most requiring instant access to their files. Millions of these users turn to cloud based file synchronisation services, such as Dropbox, Microsoft Skydrive, Apple iCloud and Google Drive, to enable "always-on" access to their most up-to-date data from any computer or mobile device with an Internet connection. The prevalence of recent articles covering various invasion of privacy issues and data protection breaches in the media has caused many to review their online security practices with their personal information. To provide an alternative to cloud based file backup and synchronisation, BitTorrent Inc. released an alternative cloudless file backup and synchronisation service, named BitTorrent Sync to alpha testers in April 2013. BitTorrent Sync's popularity rose dramatically throughout 2013, reaching over two million active users by the end of the year. This paper outlines a number of scenarios where the network investigation of the service may prove invaluable as part of a digital forensic investigation. An investigation methodology is proposed outlining the required steps involved in retrieving digital evidence from the network and the results from a proof of concept investigation are presented.Comment: 9th International Conference on Availability, Reliability and Security (ARES 2014

    An investigation of the intention to share files over P2P Networks

    Get PDF
    In this research we take a comprehensive view of file-sharing over peer-to-peer (P2P) networks in order to develop a model of the intention to share files. P2P file-sharing once consisted largely of music files which, when downloaded, were an infringement of copyrights. For this reason models of file-sharing intentions often included factors and constructs representing ethical concerns. However, these models did not produce a broad agreement about whether or not those ethical concerns had significant effects on intentions. Furthermore, files now shared over P2P networks represent a significant portion of both legitimate and non-infringing files. The model we propose applies to P2P file-sharing of all files, regardless of media type, and regardless of whether they are shared legally or illegally. Lastly we present the factors from the model that were suggested to be significant from an initial pilot study

    Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases using P2P Networks

    Get PDF
    The utility of Behavioural Evidence Analysis (BEA) has gained attention in the field of Digital Forensics in recent years. It has been recognized that, along with technical examination of digital evidence, it is important to learn as much as possible about the individuals behind an offence, the victim(s) and the dynamics of a crime. This can assist the investigator in producing a more accurate and complete reconstruction of the crime, in interpreting associated digital evidence, and with the description of investigative findings. Despite these potential benefits, the literature shows limited use of BEA for the investigation of cases of the possession and dissemination of Sexually Exploitative Imagery of Children (SEIC). This paper represents a step towards filling this gap. It reports on the forensic analysis of 15 SEIC cases involving P2P filesharing networks, obtained from the Dubai Police. Results confirmed the predicted benefits and indicate that BEA can assist digital forensic practitioners and prosecutors

    Digital Piracy of MP3s: Consumer and Ethical Predispositions

    Get PDF
    Purpose – Illegal downloading of music has become an inexorable and rampant activity particularly among college students who have been little deterred by industry legal actions. The purpose of this research is to examine the present state of downloading and how ethical orientation and attitudes towards MP3 piracy impact such activities. The paper also aims to use ethical scenarios as a way of understanding the ethical reasoning in illegal downloading. Design/methodology/approach – Key research questions are proposed that are related to illegal downloading. A sample of 364 university students was used to examine each research question. Statistical results are reported. Findings – The results clearly show that downloading continues at a high rate today driven by a strong belief that it is not ethically wrong. Ethical orientation was found to be positively associated with awareness of the social cost of downloading, consequences of downloading, and ethical belief in downloading. Ethical scenarios show that ethical orientation is also associated with downloading activities and with stealing. Other results indicate that respondents believe that their peers are more prone to stealing music and downloading MP3s illegally. Fear of consequences does seem to have an impact on the propensity to download illegally. Practical implications – The paper contributes to inform industry representatives that appeals to ethics or guilt are not likely to deter illegal downloading measurably. The use of punishment for downloaders may have a short-term effect but other (more positive) measures are required. Originality/value – No research has examined downloading of MP3s in the manner developed in this paper. The paper contributes to a better understanding of consumer behavior among those who download. The results provide insight into a serious problem in the recording industry that is likely to persist in the distant future unless sound measures are developed

    Hail to the thief: a tribute to Kazaa

    Get PDF
    THIS PAPER CONSIDERS THE ONGOING LITIGATION against the peer-to-peer network KaZaA. Record companies and Hollywood studios have faced jurisdictional and legal problems in suing this network for copyright infringement. As Wired Magazine observes: “The servers are in Denmark. The software is in Estonia. The domain is registered Down Under, the corporation on a tiny island in the South Pacific. The users—60 million of them—are everywhere around the world.” In frustration, copyright owners have launched copyright actions against intermediaries—like against Internet Service Providers such as Verizon. They have also embarked on filing suits against individual users of file-sharing programs. In addition, copyright owners have called for domestic- and international-law reform with respect to digital copyright. The Senate Committee on Government Affairs of the United States Congress has reviewed the controversial use of subpoenas in suits against users of file-sharing peer-to-peer networks. The United States has encouraged other countries to adopt provisions of the Digital Millennium Copyright Act 1998 in bilateral and regional free-trade agreements

    Understanding Music Sharing Behavior in China: Development of an Instrument

    Get PDF
    In this paper we propose a research model, set of constructs, and instrument for collecting data in China to investigate online behavior in the usage of file sharing technologies by music consumers. Recent studies associated with music download were focused, for the most part, on highly infrastructure-developed countries. Since technology maturity, market conditions, and economical situations in developing countries are different from those of developed countries; we developed a model for investigation online behavior in Chinese music consumers. As a pilot study to test the constructs in our model and its suitability for use in China, we surveyed 152 people the United States. We found the constructs robust for further investigation. The instrument was revised based upon the results of factor analysis and reliability testing and translated into Chinese. Data was further collected from 439 people in China. Results show that the constructs satisfy the reliability testing as well as preliminary regression analysis for the Chinese sample

    Understanding information needs of Australian business organisations

    Get PDF
    Over the past decade, universities have used repositories as channels to create access to research outputs. Increasingly government and universities are seeking to optimise the impact of their research, particularly to improve public policy. This study looks at the impact of access to research from the perspective of business associations and researchers. It finds that business organisations value trusted timely, relevant research. Accessibility and peer-reviewed research outputs are highly valued but little used. Barriers to use of the research include availability (material not openly accessible), discoverability (ranking on search engines) and knowledge by trusted mediators and connectivity (presentation as part of a cohort of scholarly knowledge). Barriers for researchers include lack of rewards and recognition for research outputs focused on these organisations. The theories used in the study include triple helix, Kautto-Koivula and Huhtaniemi’s model for knowledge and competence management and actor network theory. The study concludes that significant work is required to improve the accessibility and discoverability of research. In particular, the search paradigm is insufficient to provide optimal awareness of and impact of research.Australian Library and Information Associatio

    Online Peer-to-peer Communities: An Empirical Investigation of a Music Sharing Network as a Dynamic Two-sided Network

    Get PDF
    Online peer-to-peer communities and online social networks have become increasingly popular. In particular, the recent boost of online peer-to-peer communities leads to exponential growth in sharing of user-contributed content which have brought profound changes to business and economic practices. Understanding the formation and sustainability of such peer-to-peer communities has important implications for businesses. We develop a dynamic two-sided network model that relates growth of communities to interactions between contribution and consumption of resources in online sharing activities. Using online music sharing data collected from a popular IRC music sharing service over five years, we empirically apply the model to identify dynamics in the music sharing community. We find that the music sharing community demonstrates distinctive characteristics of a two-sided network. Contribution in the community leads to more consumption and consumption leads to more contribution, creating positive network effects in the community. Moreover, we find significant negative externalities among consumption activities and among contribution activities. The combination of the positive and negative externalities drives the underlying dynamics and growth of online sharing communities. Using the dynamic model, we quantify equilibrium growth rate of the community. We find that the equilibrium growth rate changes over time, possibly as a result of legal actions taken by the music industry. Our study provides a first glimpse into the mechanism through which peer-to-peer communities sustain and thrive in a constantly changing environment

    Mapping South African internet user's opinions about the use of peer-to-peer file sharing technology to infringe on copyrighted films and/or television series content

    Get PDF
    The aim of this study was to investigate the various reasons consumers continue to infringe on copyrighted content, specifically in the South African context, even if the law forbids it. This investigation is two-fold since it also recognises that there are many individuals who do not infringe on copyrighted content even though they have access to peer-to-peer file sharing technology. This information could prove valuable since it can then be used to find comprehensive market-led solutions to the problem that targets the end-user. This study adopted a mixed method approach in order to cross validate findings and to reveal aspects of empirical reality. The target population for this study consisted of 100 adult South Africans who have access to the internet. Data was collected through an online, self-administered questionnaire. Quantitative data was analysed through descriptive statistics, while qualitative data was analysed through thematic analysis. The results show that there are variety of factors that influence respondents’ attitudes towards copyright infringement of films and/or television series through peer-to-peer file sharing technology, each of which is discussed in detail. The study concluded by identifying 24 factors that favourably influence people’s attitudes towards copyright infringement, including high prices of legitimate goods, historical inequality in South Africa, and perceived low risk of being caught and punished. Based on the conclusion above, the study recommends that policy makers such as government officials, boards of directors, managers, committees, and executives use the results of the study when making decisions and determining policies, especially in the South African context.Communication ScienceM.A. (Communication Science
    • …
    corecore