Sharing Music Files: Tactics of a Challenge to the Industry Brian Martin University of Wollongong, [email protected]
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Will Sci-Hub Kill the Open Access Citation Advantage and (At Least for Now) Save Toll Access Journals?
Will Sci-Hub Kill the Open Access Citation Advantage and (at least for now) Save Toll Access Journals? David W. Lewis October 2016 © 2016 David W. Lewis. This work is licensed under a Creative Commons Attribution 4.0 International license. Introduction It is a generally accepted fact that open access journal articles enjoy a citation advantage.1 This citation advantage results from the fact that open access journal articles are available to everyone in the word with an Internet collection. Thus, anyone with an interest in the work can find it and use it easily with no out-of-pocket cost. This use leads to citations. Articles in toll access journals on the other hand, are locked behind paywalls and are only available to those associated with institutions who can afford the subscription costs, or who are willing and able to purchase individual articles for $30 or more. There has always been some slippage in the toll access journal system because of informal sharing of articles. Authors will usually send copies of their work to those who ask and sometime post them on their websites even when this is not allowable under publisher’s agreements. Stevan Harnad and his colleagues proposed making this type of author sharing a standard semi-automated feature for closed articles in institutional repositories.2 The hashtag #ICanHazPDF can be used to broadcast a request for an article that an individual does not have access to.3 Increasingly, toll access articles are required by funder mandates to be made publically available, though usually after an embargo period. -
Piracy of Scientific Papers in Latin America: an Analysis of Sci-Hub Usage Data
Developing Latin America Piracy of scientific papers in Latin America: An analysis of Sci-Hub usage data Juan D. Machin-Mastromatteo Alejandro Uribe-Tirado Maria E. Romero-Ortiz This article was originally published as: Machin-Mastromatteo, J.D., Uribe-Tirado, A., and Romero-Ortiz, M. E. (2016). Piracy of scientific papers in Latin America: An analysis of Sci-Hub usage data. Information Development, 32(5), 1806–1814. http://dx.doi.org/10.1177/0266666916671080 Abstract Sci-Hub hosts pirated copies of 51 million scientific papers from commercial publishers. This article presents the site’s characteristics, it criticizes that it might be perceived as a de-facto component of the Open Access movement, it replicates an analysis published in Science using its available usage data, but limiting it to Latin America, and presents implications caused by this site for information professionals, universities and libraries. Keywords: Sci-Hub, piracy, open access, scientific articles, academic databases, serials crisis Scientific articles are vital for students, professors and researchers in universities, research centers and other knowledge institutions worldwide. When academic publishing started, academies, institutions and professional associations gathered articles, assessed their quality, collected them in journals, printed and distributed its copies; with the added difficulty of not having digital technologies. Producing journals became unsustainable for some professional societies, so commercial scientific publishers started appearing and assumed printing, sales and distribution on their behalf, while academics retained the intellectual tasks. Elsevier, among the first publishers, emerged to cover operations costs and profit from sales, now it is part of an industry that grew from the process of scientific communication; a 10 billion US dollar business (Murphy, 2016). -
Practical Anonymous Networking?
gap – practical anonymous networking? Krista Bennett Christian Grothoff S3 lab and CERIAS, Department of Computer Sciences, Purdue University [email protected], [email protected] http://www.gnu.org/software/GNUnet/ Abstract. This paper describes how anonymity is achieved in gnunet, a framework for anonymous distributed and secure networking. The main focus of this work is gap, a simple protocol for anonymous transfer of data which can achieve better anonymity guarantees than many traditional indirection schemes and is additionally more efficient. gap is based on a new perspective on how to achieve anonymity. Based on this new perspective it is possible to relax the requirements stated in traditional indirection schemes, allowing individual nodes to balance anonymity with efficiency according to their specific needs. 1 Introduction In this paper, we present the anonymity aspect of gnunet, a framework for secure peer-to-peer networking. The gnunet framework provides peer discovery, link encryption and message-batching. At present, gnunet’s primary application is anonymous file-sharing. The anonymous file-sharing application uses a content encoding scheme that breaks files into 1k blocks as described in [1]. The 1k blocks are transmitted using gnunet’s anonymity protocol, gap. This paper describes gap and how it attempts to achieve privacy and scalability in an environment with malicious peers and actively participating adversaries. The gnunet core API offers node discovery, authentication and encryption services. All communication between nodes in the network is confidential; no host outside the network can observe the actual contents of the data that flows through the network. Even the type of the data cannot be observed, as all packets are padded to have identical size. -
Resource-Sharing Computer Communications Networks
PROCEEDISGS OF THE IEEE, VOL. 60, NO. 11, NOVEMBER 1972 1397 ington. D. C.: Spartan, 1970, pp. 569-579. [47] L. G. Roberts and B. Wessler, “The ARP.4 computer network de- [34] D. Klejtman,“Methods of investigatingconnectivity of large velopmentto achieve resource sharing, in Spring Joint Compztfer graphs, IEEE Trans.Circuit Theory (Corresp.),vol. CT-16, pp. Conf., AFIPS Conf. Proc., 1970, pp. 543-519. 232-233, May 1969. [48] --, “The ARPA computer network,” in Computer Communication [35] P. Krolak, IV. Felts,and G. Marble,“A man-machine approach Networks, F. Kuo and X. .‘\bramson, Eds.Iiew York: Prentice- towardsolving the traveling salesman problem,’! Commun.Ass. Hall, 1973, to be published. Comput. Mach., vol. 14, pp. 327-335, May 1971. [49] B. Rothfarb and M. Goldstein, ‘The one terminal Telpak problem,” [36] S. Lin,“Computer solutions of thetraveling salesman problem,” Oper. Res., vol. 19, pp. 156-169, Jan.-Feb. 1971. Bell Sysf. Tech. J., vol. 44, pp. 2245-2269, 1965. [SO] R. L. Sharma and M.T. El Bardai, “Suboptimal communications [37] T. Marilland L. G. Roberts, “Toward a cooperative netwotk of network synthesis,” in Proc. Int. Conf. Communications, vol. 7, pp. time-shared computers,” in Fall Joint Computer Conf.?AFIPS Conf. 19-11-19-16, 1970. Proc. Washington, D.C.: Spartan, 1966. ..[Sl] K. Steiglitz, P. Weiner, and D.J. Kleitman, “The design of minimum [38] B. Meister,H. R. Muller, and H. R.Rudin, “Sew optimization cost survivable networks,’! IEEE Trans. Circuit Theory, vol. CT-16, criteriafor message-switching networks,’ IEEE Trans.Commun. pp. 455-260, Nov. -
Steal These Policies: Strategies for Reducing Digital Piracy
THE INFORMAtiON TECHNOLOGY & INNOVAtiON FOUNDAtiON Steal These Policies: Strategies for Reducing Digital Piracy BY DANIEL CASTRO, RICHARD BENNETT AND SCOTT ANDES | DECEMBER 2009 We need to open a broad Executive Summary dialogue that engages all stakeholders, including he rise of broadband Internet access and cheap storage, along government, content with the growth of digital content, has enabled digital pi- owners, website racy to flourish around the world. Piracy enables the unau- operators, technolog y T thorized distribution of music, movies, television programs, software, developers, and ISPs video games, books, photos, and periodicals quickly and easily, to the and other intermediaries, detriment of creative artists and legitimate rights holders. These prac- on how to improve the global response to piracy. tices threaten not only the robust production of digital content in the future, but U.S. jobs in the present. Unfortunately, many advocates, believing that information should be free, would have government not only turn a blind eye to digital piracy, but actively tie the hands of companies who seek to limit digital piracy. This report makes the case that digital piracy is a serious problem with significant ramifica- tions for the U.S. economy, that a number of approaches, including technical solutions such as content identification, are needed to reduce piracy, and that governments should support legitimate industry ef- forts to reduce digital piracy, including those that focus on the revenue streams of those engaging in piracy. There is no “silver bullet” that will solve controls such as locks, closed-circuit the piracy problem—no single technical TV, and anti-theft packaging as well or legislative proposal will completely as a government-funded system of law solve such a complex issue—but there enforcement, digital piracy requires a are many “lead bullets” that can help coordinated approach. -
Measuring Freenet in the Wild: Censorship-Resilience Under Observation
Measuring Freenet in the Wild: Censorship-resilience under Observation Stefanie Roosy, Benjamin Schillerz, Stefan Hackerz, Thorsten Strufey yTechnische Universität Dresden, <firstname.lastname>@tu-dresden.de zTechnische Universität Darmstadt, <lastname>@cs.tu-darmstadt.de Abstract. Freenet, a fully decentralized publication system designed for censorship-resistant communication, exhibits long delays and low success rates for finding and retrieving content. In order to improve its perfor- mance, an in-depth understanding of the deployed system is required. Therefore, we performed an extensive measurement study accompanied by a code analysis to identify bottlenecks of the existing algorithms and obtained a realistic user model for the improvement and evaluation of new algorithms. Our results show that 1) the current topology control mechanisms are suboptimal for routing and 2) Freenet is used by several tens of thousands of users who exhibit uncharacteristically long online times in comparison to other P2P systems. 1 Introduction Systems that allow users to communicate anonymously, and to publish data without fear of retribution, have become ever more popular in the light of re- cent events1. Freenet [1–3] is a widely deployed completely decentralized system focusing on anonymity and censorship-resilience. In its basic version, the Open- net mode, it provides sender and receiver anonymity but establishes connections between the devices of untrusted users. In the Darknet mode, nodes only con- nect to nodes of trusted parties. Freenet aims to achieve fast message delivery over short routes by arranging nodes in routable small-world network. However, Freenet’s performance has been found to be insufficient, exhibiting long delays and frequent routing failures [4]. -
An Introductory Historical Contextualization of Online Creation Communities for the Building of Digital Commons: the Emergence of a Free Culture Movement
An Introductory Historical Contextualization of Online Creation Communities for the Building of Digital Commons: The Emergence of a Free Culture Movement Mayo Fuster Morell Autonomous University of Barcelona [email protected] Abstract. Online Creation Communities (OCCs) are a set of individ- uals that communicate, interact and collaborate; in several forms and degrees of participation which are eco-systemically integrated; mainly via a platform of participation on the Internet, on which they depend; and aiming at knowledge-making and sharing. The paper will first pro- vide an historical contextualization OCCs. Then, it will show how the development of OCCs is fuelled by and contributes to, the rise of a free culture movement defending and advocating the creation of digital com- mons, and provide an empirically grounded definition of free culture movement. The empirical analyses is based content analysis of 80 in- terviews to free culture practitioners, promoters and activists with an international background or rooted in Europe, USA and Latino-America and the content analysis of two seminar discussions. The data collection was developed from 2008 to 2010. 1 Introduction Online Creation Communities (OCCs) are a set of individuals that communicate, interact and collaborate; in several forms and degrees of participation which are eco-systemically integrated; mainly via a platform of participation on the In- ternet, on which they depend; and aiming at knowledge-making and sharing (Fuster Morell, 2010). OCCs based on certain governance conditions result on the building of a digital commons. Digital commons are defined as an informa- tion and knowledge resources that are collectively created and owned or shared between or among a community and that tend to be non-exclusivedible, that is, be (generally freely) available to third parties. -
The Impact of Digital File Sharing on the Music Industry: an Empirical Analysis
Topics in Economic Analysis & Policy Volume 6, Issue 1 2006 Article 18 The Impact of Digital File Sharing on the Music Industry: An Empirical Analysis Norbert J. Michel∗ ∗Nicholls State University, [email protected] Copyright c 2006 The Berkeley Electronic Press. All rights reserved. The Impact of Digital File Sharing on the Music Industry: An Empirical Analysis∗ Norbert J. Michel Abstract The first file-sharing software, Napster, was shut down in 2001, but the copying technology’s impact on the music industry is still passionately debated. This paper uses micro-level data from the Consumer Expenditure Survey to examine the impact of Internet file sharing on music sales. Music industry representatives argue that the practice decreases CD sales, while supporters of file-sharing allege the practice could actually increase sales. Using household-level data from the Consumer Expenditure Survey, we find support for the claim that file-sharing has decreased sales. KEYWORDS: file sharing, copyright, music industry ∗This paper is based on Chapter 6 of my Ph.D. dissertation (University of New Orleans, Dept. of Economics and Finance). I thank my co-chairs, Arja Turunen-Red and Oscar Varela, as well as Gerald Whitney, Stan Liebowitz, and my committee members for their helpful suggestions and comments. I also thank Tracy Foertsch and several anonymous referees. Any errors are solely my responsibility. Norbert J. Michel, Nicholls State University, 310 B Powell, Thibodaux, LA. 70310, [email protected] , 985-448-4223. Michel: The Impact of Digital File Sharing on the Music Industry INTRODUCTION The impact of new copying technology on the music industry has been hotly debated since the launch of the first file-sharing software, Napster, in 1999. -
Sharing Files on Peer-To-Peer Networks Based on Social Network
Sharing Files on Peer-to-Peer Networks based on Social Network Fabrice Le Fessant INRIA Saclay-Île de France 23 Février 2009 1 / 14 Social networks are less vulnerable to attacks by spies ) peer-to-peer network + social network ) less vulnerable to censorship... maybe Fighting Censorship Standard peer-to-peer networks are vulnerable ! Spies can locate content providers States and Big Companies already have spies on P2P networks 2 / 14 Fighting Censorship Standard peer-to-peer networks are vulnerable ! Spies can locate content providers States and Big Companies already have spies on P2P networks Social networks are less vulnerable to attacks by spies ) peer-to-peer network + social network ) less vulnerable to censorship... maybe 3 / 14 Peer-to-Peer + Social Network Each user allows his computer to connect only to his friends' computers What can we do with such a network ? 4 / 14 My main requirement: • Content providers should remain unknown • while Links (friends) are not hidden • ISP must share such information with spies File-Sharing Three main operations: Resource discovery: nd which resources exist Resource localization: nd which resources are available and where Resource access: download the resources 5 / 14 File-Sharing Three main operations: Resource discovery: nd which resources exist Resource localization: nd which resources are available and where Resource access: download the resources My main requirement: • Content providers should remain unknown • while Links (friends) are not hidden • ISP must share such information with -
Privacy-Preserving P2P Data Sharing with Oneswarm
Privacy-Preserving P2P Data Sharing with OneSwarm Tomas Isdal Michael Piatek Arvind Krishnamurthy Thomas Anderson University of Washington ABSTRACT On one side, protocols like BitTorrent are high performance and Privacy—the protection of information from unauthorized disclo- robust, but participants are easily monitored by anyone who cares sure—is increasingly scarce on the Internet. The lack of privacy to look [33, 30, 29]. On the other, anonymization networks (e.g., is particularly true for popular peer-to-peer data sharing applica- Tor [14] and Freenet [12]) emphasize privacy, but offer compara- tions such as BitTorrent where user behavior is easily monitored by tively poor performance. third parties. Anonymizing overlays such as Tor and Freenet can In this paper, we explore a new design point in this tradeoff be- improve user privacy, but only at a cost of substantially reduced tween privacy and performance. We describe the design and imple- performance. Most users are caught in the middle, unwilling to mentation of a file-sharing protocol called OneSwarm, intended to sacrifice either privacy or performance. provide much better performance than Tor and Freenet, and much In this paper, we explore a new design point in this tradeoff be- better privacy than BitTorrent. Our goal is to provide good enough tween privacy and performance. We describe the design and imple- performance that users turn on privacy by default for all of their mentation of a new P2P data sharing protocol, called OneSwarm, non-public data sharing. To this end, data objects shared via One- that provides users much better privacy than BitTorrent and much Swarm are located and transferred using disposable, temporary ad- better performance than Tor or Freenet. -
The Borderless Torrents: Infringing the Copyright Laws Around the World
∗ ABSTRACT The problem of copyright infringement has always been one of the most difficult issues to solve in our society. Recent years have seen an increase in the number of copyright infringement occurring through the medium of internet. Software, such as BitTorrent, have routed the ways for infringers to download copyrighted content through them without the fear of being caught. Courts of nations, such as the United States and the European Union, have no unified laws for determining whether providers of such software are liable for secondary copyright infringement. While the providers of the BitTorrent software claim it is a simple file sharing medium, authors around the world have criticized it as “a technology responsible for doing more harm than good.” Lawmakers, therefore, have started considering the legitimacy of the BitTorrent software and the continuing role of its providers in contributing to the mass copyright anarchy. This article intends to propose a theory that clarifies the liability of the providers of the BitTorrent software for copyright infringement. This article argues that the providers of BitTorrent software should be made liable for infringing copyrights of people under certain specific © Vaibhav H. Vora ∗ IP L.L.M Graduate (International Intellectual Property), IIT–Chicago Kent College of Law. For their valuable comments and suggestions, I would like to thank the Professors of the, IIT–Chicago Kent College of Law. conditions. This article proposes the insertion of a separate clause in the TRIPs Agreement defining the minimum liability standards for the BitTorrent software providers. The proposed clause in the article focuses on the element of “knowledge” and goes on to provide five conditions under which the providers of the BitTorrent software shall be held liable for copyright infringement. -
The Gnunet System Christian Grothoff
The GNUnet System Christian Grothoff To cite this version: Christian Grothoff. The GNUnet System. Networking and Internet Architecture [cs.NI]. Université de Rennes 1, 2017. tel-01654244 HAL Id: tel-01654244 https://hal.inria.fr/tel-01654244 Submitted on 3 Dec 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License 1 Th`esed'habilitation `adiriger des recherches Universit´eede Rennes 1 Mention: Informatique The GNUnet System Christian Grothoff Soutenue le 10 octobre 2017 devant le jury compos´ede Messieurs les Professeurs: Anne-Marie Kermarrec (Universit´ede Rennes 1) Tanja Lange (Technische Universiteit Eindhoven) George Danezis (University College London) Joe Cannataci (University of Groningen) Saddek Bensalem (University of Grenoble) Au vu des rapports de Messieurs les Professeurs: Tanja Lange (Technische Universiteit Eindhoven) George Danezis (University College London) Saddek Bensalem (University of Grenoble) Revision 1.0 2 Abstract GNUnet is an alternative network stack for building secure, decentralized and privacy-preserving distributed applications. Our goal is to replace the old inse- cure Internet protocol stack. Starting from an application for secure publication of files, it has grown to include all kinds of basic protocol components and ap- plications towards the creation of a GNU internet.