PART III Criminological Perspectives on Cyber Crime

Total Page:16

File Type:pdf, Size:1020Kb

PART III Criminological Perspectives on Cyber Crime M14_SCHM8860_01_SE_C14.QXD 2/1/08 6:07 PM Page 281 PART III Criminological Perspectives on CyberJ Crime O H N S O N , O L I V I A 9 1 1 0 M14_SCHM8860_01_SE_C14.QXD 2/1/08 6:07 PM Page 282 J O H N S O N , O L I V I A 9 1 1 0 M14_SCHM8860_01_SE_C14.QXD 2/1/08 6:07 PM Page 283 Chapter 14 Space Transition Theory of Cyber Crimes J K. Jaishankar O Manonmaniam Sundaranar University, India H Dr. K. Jaishankar is a lecturer in the DepartmentN of Criminology and Criminal Justice, Manonmaniam Sundaranar University, Tirunelveli, India. He is the founding editor-in-chief of the International Journal of Cyber Criminology and the founding editorS of Crime and Justice Perspective—the official organ of the Criminal Justice Forum (CJF), India, and Othe founding managing editor of the International Journal of Criminal Justice Sciences. He serves in the international editorial boards of Journal of Social Change (U.S.), Electronic Journal of Sociology (Canada),N Crime, Punishment and Law: An International Journal (U.S.), Journal of Physical Security (U.S.),, and Graduate Journal of Social Science (UK). He is the National Focal point for India for the International Police Executive Symposium’s working paper series and expert of world police database at www.coginta.com. He is a co-investigator of the interna- tional project on cyber bullying funded by SSHRC, Canada, involving eight countries, along with the principal investigator Dr. Shaheen Shariff, McGillO University. He is a pioneer in developing the new field “cyber criminology,” and is the proponentL of Space Transition Theory, which gives an explanation for the criminal behavior in cyberspace. He is a recognized expert in the field of cyber criminology and invited by various universities in United StatesI to deliver lectures on his space transition theory of cyber crimes. He is a member of the UNODC (UnitedV Nations Office on Drugs and Crime) Core group of experts on identity-related crime. His areas of academic competence are cyber criminology, crime map- ping, GIS, communal violence, victimology,I policing, and crime prevention. A Abstract Some researchers have tried to explain cyber crimes with traditional theories such as social learning theory (Skinner and Fream 1997;9 Rogers 1999, 2001), Kohlberg’s moral develop- ment theory and differential reinforcement theory (Rogers 2001), Cohen’s strain theory (O’Connor 2003), deindividuation theory1 (Demetriou and Silke 2003), Gottfredson and Hirschi’s general theory of crime (Foster1 2004), routine activities theory (Adamski 1998; McKenzie 2000; Grabosky 2001; Pease0 2001; Yar 2005a) and multiple theories (McQuade 2005; Taylor et al. 2005; Walker, Brock, and Stuart 2006). However, those theoretical justifi- cations have proved to be inadequate as an overall explanation for the phenomenon of cyber The author wish to express his profound gratitude to Professors Susan Brenner, Eric Suler, Keith Harries, and Eric Lambert for reviewing this chapter on request and for their wise comments and constructive criticisms which enabled to improve the quality of this chapter. The author also sincerely thanks Prof. Dipika Halder for editing and proofreading the theoretical propositions. 283 M14_SCHM8860_01_SE_C14.QXD 2/1/08 6:07 PM Page 284 284 Chapter 14 Space Transition Theory of Cyber Crimes crimes. To fill the gap in explaining cyber crimes, the space transition theory has been devel- oped. This theory is presented and discussed in this chapter. INTRODUCTION The Internet has become a powerful force in today’s world (Burney 2001). The access of the Internet into the everyday lives of millions of population across the world has begun to trans- form many different aspects of life. Some of the transformations have occurred because of the manner in which Internet users are directed toJ negotiate their relationship with the real and vir- tual spaces they now inhabit (Mitra and Schwartz 2001). In the past five years, the number of Internet users has skyrocketed from 0.5 millionO to 6.5 million—a 13-fold increase. In the process, an entirely new universe has been created—theH world of cyberspace. Cyberspace is a virtual space that has become as prominent as real space for business, politics, and communities. The term cyberspace is sometimes treatedN as a synonym for the Internet, but is actually a broader concept. The term cyberspace emphasizesS that it can be treated as a place (Byassee 1995). The word cyberspace (a portmanteauO of cybernetics and space) was coined by William Gibson, a Canadian science fiction writer, when he sought a term to explain his vision of a global computer network, linking all people,N machines, and sources of information in the world, and through which one could move or, navigate as through a virtual space (Heylighen 1994), in 1982 in his novelette Burning Chrome in Omni magazine and was subsequently popularized in his novel Neuromancer. In the early 1980s, Gibson observed youngO players in video game parlors and extrapolated a future of communication and control through game-like globally linked graphical computer systems. His space is “consensually hallucinated,”L not real (a “nonspace of the mind”), but effec- tive and dominant (Aarseth 1998). In his novelI Neuromancer (1984), Gibson invented the notion of cyberspace as a computer-available location where all the existing information in the world was collected. Later, John Perry Barlow describedV the real world of connected computers using exactly the same term as Gibson used. In 1990,I Barlow first applied the science-fiction term cyberspace to the Internet (or precisely, as Barlow states on his Web site, to the “already-existing global electronic social space now in most instancesA referred to by that name”). Until his citing it, it had not been considered any sort of place (Barlow 1991). Some claim, therefore, that cyber- space, as it exists today, should be called “Barlovian cyberspace” in order to distinguish it from the fictional “Gibsonian cyberspace” of cyberpunk literature (Jordan 1999). In this chapter, the concept of cyberspace means the global aggregate9 of digital, interactive, electronic communica- tion networks; cyberspace thus includes the 1constituent networks comprising the global inter- network (the “Internet”) as well as the Internet itself as a separate, emergent phenomenon. Suler (2005) has accentuated that the1 term cyberspace has been hackneyed and overly commercialized. He explains that the experience0 created by computers and computer networks can in many ways be understood as a psychological “space.” Many users who have connected to a remote computer or explored World Wide Web will describe the experience as “travelling” or “going someplace.” On an even deeper psychological level, users often describe how their com- puter is an extension of their mind and personality—a “space” that reflects their tastes, attitudes, and interests. In psychoanalytic terms, computers and cyberspace may become a type of transi- tional space that is an extension of the individual’s intrapsychic world. It may be experienced as an intermediate zone between self and other that is part self and part other (Suler 2005). M14_SCHM8860_01_SE_C14.QXD 2/1/08 6:07 PM Page 285 Criminal Behavior in Cyberspace 285 Mitra (2003) has clearly examined the two significant differences between the physical space and cyberspace, as well as brought out a new space that he calls as “cybernetic space,” which is an intersecting space of physical and cyber (Mitra and Schwartz 2001). The first dif- ference between the physical space and cyberspace is that cyberspace defies boundaries. The second component of the cyberspace is its discursive nature which suggests that experience of space moves away from the realm of the sensory to an interpretation of texts, images, and sounds. Simply put, it is not possible to “touch” the virtual but it is only possible to “read” the virtual. Cyberspace, within a modernistic epistemology, does not exist, but can only be inter- preted (Tyner 1998; Mitra 2003). Brenner (2004a) has provided another two important differ- ences between the cyberspace and the realJ space, that is, absences of physical constraints and lack of hierarchical constraints. Lessig (1998) brings the very important difference between physical space and cyberspace, anonymity.O Menthe (1998) argued that, for jurisdictional analysis, cyberspace should be treated asH a fourth international space along with other three international spaces, Antarctica, outer space, and the high seas. However, these three physical spaces are nothing at all like cyberspace,N which is a nonphysical space (Menthe 1998; Mann and Sutton 1998) and is perfectly differentS from physical space (Lessig 1998). The cyberspace presents an environmentO in which both healthy and pathological behav- iors may be pursued (Suler 1999, 2004; Suler and Phillips 1998). Joinson (1998, 2003), in a thoughtful review, examined how modernN electronic tools have valuable, positive aspects for people’s advancement and success, as well, as destructive, negative aspects that humiliate, ter- rorize, and block social progress. Cyberspace at the new millennium resembles the frontier at the beginning of the eighteenth century: bullies and criminals swagger electronically through the commons, stealing what they want,O breaking what they don’t, and interfering with peo- ple’s activities (Kabay 2005). In the present chapter, an effort is madeL to construct a theory that explains the criminal behavior in the cyberspace. This chapterI is structured in the following way. Firstly, a brief description of the criminal behavior of cyberspace is provided that includes cyber crime def- inition, typology of cyber crime, definitionV and typology of cyber criminal, and the differ- ences between the crimes of physical spaceI and cyberspace. Secondly, the need for a new theory for the criminal behavior in cyberspace is emphasized. Thirdly, the space transition theory of cyber crime is established and,A discussed. CRIMINAL BEHAVIOR IN CYBERSPACE 9 The vast majority of people in our society1 are productive, law-abiding citizens, including when they are on the Internet (Danda 2001).
Recommended publications
  • Šta Znače Oznake CAM, WP, TS, SCR, TC, R5, DVDRIP, HDTV?
    Šta znače oznake CAM, WP, TS, SCR, TC, R5, DVDRIP, HDTV? Ako vas zanima šta tačno označavaju skraćenice za kvalitet filmskog snimka: CAM, WP, TS, SCR, TC, R5, DVDRIP, HDTV, itd., pročitajte ovaj članak. Slijedi tabela kvaliteta filmskih snimaka, koja govori sa kog fizickog medija (kino snimak kamerom, original vhs kaseta, original dvd, itd) je film kopiran, u smjeru od najlošijeg kvaliteta ka najboljem. Tip Oznaka Rasprostranjenost Dosta čest format, mada se sve ređe Cam "CAM" pojavljuje, zbog postojanja DVD rip formata koji je daleko kvalitetniji Snimak filma napravljen kamerom u kinu, a zvuk je dobijen pomoću mikrofona na kameri, tako da se često vide i čuju i gledaoci u bioskopu. Ovaj kvalitet snimka se obično pojavi odmah nakon prve premijere filma u kinima Kvalitet video i audio zapisa je najčešće veoma loš. "WP" Workprint Vrlo rijedak "WORKPRINT" Kopija napravljena od nedovršene verzije filma. Uglavnom fale mnogi efekti i film može da se skroz razlikuje od konačne verzije filma. "TS" Telesync Vrlo čest "TELESYNC" Nasuprot popularnom vjerovanju, kvalitet kod TS video snimka ne mora da bude bolji od kvaliteta CAM snimka. Naziv Telesync ne označava bolji kvalitet VIDEO zapisa, nego bolji kvalitet AUDIO zapisa. Uglavnom je video snimak isti kao i CAM, a audio snimak bolji. Zbog toga se CAM veoma često brka sa TS. R5 "R5" Vrlo čest R5 Line je DVD verzija za region 5. Region 5 čine Istočna Evropa, (bivši SSSR), Indija, Afrika, Severna Koreja i Mongolija. Kvalitet R5 snimka se razlikuje od kvaliteta normalnog DVD-a po tome što je video snimak odličnog kvaliteta (kopiran sa DVD-a), a audio snimak je lošeg kvaliteta (kopiran sa Telecyne snimka, da bi se dobio zvuk originala, pošto je R5 DVD verzija obično prilagođena/sinhronizovana na jezik nekog od tih 5 regiona).
    [Show full text]
  • A Dissertation Submitted to the Faculty of The
    A Framework for Application Specific Knowledge Engines Item Type text; Electronic Dissertation Authors Lai, Guanpi Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 25/09/2021 03:58:57 Link to Item http://hdl.handle.net/10150/204290 A FRAMEWORK FOR APPLICATION SPECIFIC KNOWLEDGE ENGINES by Guanpi Lai _____________________ A Dissertation Submitted to the Faculty of the DEPARTMENT OF SYSTEMS AND INDUSTRIAL ENGINEERING In Partial Fulfillment of the Requirements For the Degree of DOCTOR OF PHILOSOPHY In the Graduate College THE UNIVERSITY OF ARIZONA 2010 2 THE UNIVERSITY OF ARIZONA GRADUATE COLLEGE As members of the Dissertation Committee, we certify that we have read the dissertation prepared by Guanpi Lai entitled A Framework for Application Specific Knowledge Engines and recommend that it be accepted as fulfilling the dissertation requirement for the Degree of Doctor of Philosophy _______________________________________________________________________ Date: 4/28/2010 Fei-Yue Wang _______________________________________________________________________ Date: 4/28/2010 Ferenc Szidarovszky _______________________________________________________________________ Date: 4/28/2010 Jian Liu Final approval and acceptance of this dissertation is contingent
    [Show full text]
  • Warez All That Pirated Software Coming From?
    Articles http://www.informit.com/articles/printerfriendly.asp?p=29894 Warez All that Pirated Software Coming From? Date: Nov 1, 2002 By Seth Fogie. Article is provided courtesy of Prentice Hall PTR. In this world of casual piracy, many people have forgotten or just never realized where many software releases originate. Seth Fogie looks at the past, present, and future of the warez industry; and illustrates the simple fact that "free" software is here to stay. NOTE The purpose of this article is to provide an educational overview of warez. The author is not taking a stance on the legality, morality, or any other *.ality on the issues surrounding the subject of warez and pirated software. In addition, no software was pirated, cracked, or otherwise illegally obtained during the writing of this article. Software piracy is one of the hottest subjects in today's computerized culture. With the upheaval of Napster and the subsequent spread of peer-to-peer programs, the casual sharing of software has become a world-wide pastime. All it takes is a few minutes on a DSL connection, and KazaA (or KazaA-Lite for those people who don't want adware) and any 10-year-old kid can have the latest pop song hit in their possession. As if deeply offending the music industry isn't enough, the same avenues taken to obtain cheap music also holds a vast number of software games and applications—some worth over $10,000. While it may be common knowledge that these items are available online, what isn't commonly known is the complexity of the process that many of these "releases" go through before they hit the file-sharing mainstream.
    [Show full text]
  • Index Images Download 2006 News Crack Serial Warez Full 12 Contact
    index images download 2006 news crack serial warez full 12 contact about search spacer privacy 11 logo blog new 10 cgi-bin faq rss home img default 2005 products sitemap archives 1 09 links 01 08 06 2 07 login articles support 05 keygen article 04 03 help events archive 02 register en forum software downloads 3 security 13 category 4 content 14 main 15 press media templates services icons resources info profile 16 2004 18 docs contactus files features html 20 21 5 22 page 6 misc 19 partners 24 terms 2007 23 17 i 27 top 26 9 legal 30 banners xml 29 28 7 tools projects 25 0 user feed themes linux forums jobs business 8 video email books banner reviews view graphics research feedback pdf print ads modules 2003 company blank pub games copyright common site comments people aboutus product sports logos buttons english story image uploads 31 subscribe blogs atom gallery newsletter stats careers music pages publications technology calendar stories photos papers community data history arrow submit www s web library wiki header education go internet b in advertise spam a nav mail users Images members topics disclaimer store clear feeds c awards 2002 Default general pics dir signup solutions map News public doc de weblog index2 shop contacts fr homepage travel button pixel list viewtopic documents overview tips adclick contact_us movies wp-content catalog us p staff hardware wireless global screenshots apps online version directory mobile other advertising tech welcome admin t policy faqs link 2001 training releases space member static join health
    [Show full text]
  • Movie Tags & Meaning of It
    Movie Tags & meaning of it Original Sources CAM - A cam is a theater rip usually done with a digital video camera. A mini tripod is sometimes used, but a lot of the time this wont be possible, so the camera make shake. Also seating placement isn't always idle, and it might be filmed from an angle. If cropped properly, this is hard to tell unless there's text on the screen, but a lot of times these are left with triangular borders on the top and bottom of the screen. Sound is taken from the onboard microphone of the camera, and especially in comedies, laughter can often be heard during the film. Due to these factors picture and sound quality are usually quite poor, but sometimes we're lucky, and the theater will be fairly empty and a fairly clear signal will be heard. TELESYNC (TS) - A telesync is the same spec as a CAM except it uses an external audio source (most likely an audio jack in the chair for hard of hearing people). A direct audio source does not ensure a good quality audio source, as a lot of background noise can interfere. A lot of the times a telesync is filmed in an empty cinema or from the projection booth with a professional camera, giving a better picture quality. Quality ranges drastically, check the sample before downloading the full release. A high percentage of Telesyncs are CAMs that have been mislabeled. TELECINE (TC) - A telecine machine copies the film digitally from the reels. Sound and picture should be very good, but due to the equipment involved and cost telecines are fairly uncommon.
    [Show full text]
  • Scene Releases | for Your Daily Scene and P2P Releases Page 1
    Scene Releases | For your daily Scene and P2P releases Page 1 Scene Releases For your daily Scene and P2P releases Home Forum About Affiliates Apply for Editor Disclaimer DMCA FAQ SGL xXx Website Rules IRC Links Contact Subscribe to Rss Feed WikiRebels - The Documentary The Tourist 2010 Cam XviD – iLLUSiON (Kingdom-Release) AnthraX (1252)December 18th, 2010 | 1:11 pm or 13:11 GMTMovies, Movies - Cam Release Info Release Group: iLLUSiON (Kingdom-Release) ( P2P ) Release Name: The Tourist 2010 Cam XviD – iLLUSiON (Kingdom-Release) Release Date: 18th Dec , 2010 Filename: The Tourist 2010 Cam XviD – iLLUSiON (Kingdom-Release).avi Source: CAM Size: 697.029 MB (730,888,226 bytes) Genre: Action | Drama | Thriller Video: 704 x 302 | 873 Kbps Audio: English | 128 Kbps | 2 ch | Mp3 Subtitles: None Runtime: 1h 35mn IMDB Rating: 6.0/10 RT Critics: 4.3/10 ( 136 reviews) Directed By: Florian Henckel von Donnersmarck Starring: Johnny Depp, Angelina Jolie and Paul Bettany Release Description Revolves around Frank, an American tourist visiting Italy to mend a broken heart. Elise is an extraordinary woman who deliberately crosses his path. Release Quality Associated Links Homepage - Trailer - IMDB - RT - NFO - Search (TPB, Torrent, NZB) Download Links http://scenereleases.info/ 18-12-2010 12:50:02 Scene Releases | For your daily Scene and P2P releases Page 2 Download Single Link ( Hotfile ) ( Fileserve ) ( Duckload ) Online Streaming – Sample 12 Comments Call of Duty Black Ops Update 4 Read Nfo-SKIDROW RuSH (288)December 18th, 2010 | 12:06 pm or 12:06 GMTGames Release Info Release Group: SKIDROW Release Name: Call.of.Duty.Black.Ops.Update.4.Read.Nfo-SKIDROW Release Date: 18th Dec , 2010 Filename: Call.of.Duty.Black.Ops.Update.4.exe Size: 71 MB Genre: First-Person Shooter Published by: Activision Developed by: Treyarch Online Play: 18 Versus/ 4 Co-op Release Description Hear the call of duty once again with this seventh entry in this blockbuster first-person shooter franchise.
    [Show full text]
  • Pirates of the Oscars: Trends in Piracy Among Oscar Nominated Films Rachel Chiu, Yanli Gao, James Rigby
    Pirates of the Oscars: Trends in Piracy Among Oscar Nominated Films Rachel Chiu, Yanli Gao, James Rigby Introduction Relationship Between First Leak and Box Office Temporal Trends Gross With the 83rd annual Academy Awards just around the corner, we sought to • Not surprisingly, the movies that make more money at the box office • Prior to 2008, all nominated study the piracy trends in movies that have received Oscar nominations in (presumably the more popular ones) tend to be leaked faster than those movies had their retail DVD’s the years since 2003. With slightly over thirty films nominated each year, our that don’t do as well, which is likely due to the higher public demand leaked before Oscar Night for data set gave us 245 movies. The following are the types of leaks we associated with these films. several years in a row. studied: • Despite this trend, the movies that are leaked before they even reach • 2007 seems to have been the • R5: Low quality screener theaters tend to be the ones that don’t make as much money when they peak in number of leaks per • Cam: Video camera in movie theater are released (maybe because people have already seen them?). year, of all types, and since • Telesync (TS): Same as Cam recording but sound is directly connected to then there has been a steady source downward trend of that ratio. • Screener: Pre DVD sent to critics and other professionals prior to release • Steady decline in ratio of leaks • Retail DVD: Final product may be effective intervention Data on the part of the government or perhaps the film studios.
    [Show full text]
  • NO COPY Ist Unter Der Creative Commons Lizenz Als E‐Book Frei Kopierbar
    Das Buch NO COPY ist unter der Creative Commons Lizenz als e‐Book frei kopierbar. >> BESTELLEN Creative Commons Namensnennung ‐ Nicht‐kommerziell ‐Keine Bearbeitung 2.0 Den kompletten Creative Commons Lizenzvertrag finden Sie am Ende des eBooks oder unter http://www.no‐copy.org/cc-buch.html Lizenzbeschreibung Kurzfassung Sie dürfen den Textinhalt vervielfältigen, verbreiten und öffentlich aufführen, zu den folgenden Bedingungen: 1. Namensnennung: Sie müssen den Namen der Autoren Evrim Sen und Jan Krömer nennen, sowie die Website http://www.no‐copy.org hinzufügen (bei Webauftritten mit einer funktionalen cc – carbon copy books no. 24 Verlinkung). 1. Auflage 2006 2. Keine kommerzielle Nutzung 2. Auflage als eBook 2007 Dieser Inhalt darf nicht für kommerzielle Zwecke verwendet 2007 Tropen Verlag werden www.tropen‐verlag.de 3. Keine Bearbeitung Gestaltung und Satz: Tropen Studios, Leipzig Der Inhalt darf nicht bearbeitet oder in anderer Weise Gesamtherstellung: Fuldaer Verlagsagentur verändert werden. Im Falle einer Verbreitung müssen Sie Printed in Germany anderen die Lizenzbedingungen, unter die dieser Inhalt fällt, mitteilen. Jede dieser Bedingungen kann nach schriftlicher Einwilligung des Rechtsinhabers aufgehoben werden. ISBN 3‐932170‐82‐2 Jan Krömer, geb. 1979, besaß bereits im Alter von dreizehn Jahren den legendären Computer »Amiga«, der ihn erstmals mit den Themen Raubkopie und Untergrund- szene in Berührung brachte. Später arbeitete er bei einem Marktforschungsunter- nehmen und bei SternTV. Derzeit ist er für ein IT-Beratungsunternehmen tätig. Evrim Sen, geb. 1975, programmierte schon im Alter von zehn Jahren und war Mit- glied in verschiedenen »Hacker«-Szenegruppen. Er ist Autor der Kultbücher Hacker- land und Hackertales. Als Journalist publizierte er zahlreiche Artikel zur Cyberkultur in Computermagazinen.
    [Show full text]
  • The Growing Threat of Internet Piracy in the Movie Industry: the Effect of Rapid Pirated Leaks on Motion Picture Revenues
    The Growing Threat of Internet Piracy in the Movie Industry: The Effect of Rapid Pirated Leaks on Motion Picture Revenues An Honors Thesis for the Department of Economics Nicholas Henning Tufts University, 2009 Abstract In 2005, the MPAA claimed that worldwide losses to movie piracy amounted to about $18.2 billion, with $6.1 billion of that missing revenue accounted for by MPAA affiliates alone. The difficulty in measuring piracy is that it is obviously illegal, making data collection and participant surveys skewed in results. In addition, the movie industry is a complex system, and any given movie has a large variability of success factors which amount to unpredictability in the expected revenue of motion pictures. This paper seeks to investigate how the speed of internet piracy affects industry revenues by creating a model for film revenue regressed against the number of days from theatrical release to first piracy leak, first screener leak, and first DVD leak, amongst several control variables. When including control variables, the impact of piracy is found to be negligible, particularly in comparison to the production budget variable. Without these controls, significance is found for days until first piracy leak and screener leak, implying the more days until first piracy leak the lower revenues will be and that more days until first screener leak leads to higher revenues, t(124)=-2.91, p<.01, and t(124)=3.05, p<.01. Finally, scatter plots of the data find that most films which end up making high worldwide revenues are pirated within the first week after theatrical release.
    [Show full text]
  • And “Fall” of the Mp3scene: a Global and Virtual Organization
    The “rise” and “fall” of the MP3scene: A Global and Virtual Organization An organizational, social relational and technological analysis Research thesis June 2009 Student: Jan Adriaan van der Wal Study: Information Science Mentor: dr. Ard Huizing Abstract. The scene, a synonym for the ‘Warez’1 scene, is a global and virtual organization where people copy, crack and distribute copyrighted digital material. The scene is split up into different areas, each with its own specific organizational structure, genre and practice. Amongst these areas are the games, MP3 (music), movies and software scene. The scene is a quite closed and fairly unknown organization that operates on the Internet. Unique organizational structures and many complex social relational and technological processes make this organisation an interesting phenomenon to study. This research is aimed at the MP3scene and describes the development and evolution from the start until its state today from an academic point of view. The objective of this research is to gain more insights in the ongoing organizational, social relational and technological processes within a global and virtual organization like the MP3scene. Acknowledgement. Individuals: Ard H., Steven G., Paul G., Bart B., Lir, D.H., xenner, toma, ktaakt. Groups: MS, MiM, SE Keywords: community, practice, emerging, structure-agency, complex global microstructures, sociality, institutionalizing, engagement, identity, social learning, passion and anarchy Author: J.A. van der Wal, [email protected] 1 ‘Warez’ is a term to define pirated material. Tetzlaf, D. (2000). Yo-Ho-Ho and a Server of Warez: Internet Software Piracy and the New Global Information Economy. In A. Herman, & T.
    [Show full text]
  • Software Piracy Exposed.Pdf
    323_Sof_Pir_FM.qxd 8/30/05 2:19 PM Page i Register for Free Membership to [email protected] Over the last few years, Syngress has published many best-selling and critically acclaimed books, including Tom Shinder’s Configuring ISA Server 2004, Brian Caswell and Jay Beale’s Snort 2.1 Intrusion Detection, and Angela Orebaugh and Gilbert Ramirez’s Ethereal Packet Sniffing. One of the reasons for the success of these books has been our unique [email protected] program. Through this site, we’ve been able to provide readers a real time extension to the printed book. As a registered owner of this book, you will qualify for free access to our members-only [email protected] program. Once you have registered, you will enjoy several benefits, including: ■ Four downloadable e-booklets on topics related to the book. Each booklet is approximately 20-30 pages in Adobe PDF format. They have been selected by our editors from other best-selling Syngress books as providing topic coverage that is directly related to the coverage in this book. ■ A comprehensive FAQ page that consolidates all of the key points of this book into an easy-to-search web page, pro- viding you with the concise, easy-to-access data you need to perform your job. ■ A “From the Author” Forum that allows the authors of this book to post timely updates and links to related sites, or additional topic coverage that may have been requested by readers. Just visit us at www.syngress.com/solutions and follow the simple registration process.
    [Show full text]
  • Bittorrent Search Engines Are an Unlawful Avenue
    Case 2:06-cv-05578-SVW-JC Document 391 Filed 12/21/2009 Page 1 of 46 1 2 3 4 5 6 7 UNITED STATES DISTRICT COURT 8 CENTRAL DISTRICT OF CALIFORNIA 9 10 COLUMBIA PICTURES INDUSTRIES, ) CV 06-5578 SVW (JCx) 11 INC., et al., ) ) ORDER GRANTING PLAINTIFFS’ 12 Plaintiffs, ) MOTION FOR SUMMARY JUDGMENT ON ) LIABILITY [249] 13 v. ) ) 14 GARY FUNG, et al., ) ) 15 Defendants. ) ) 16 17 18 19 I. INTRODUCTION 20 21 In September 2006, Plaintiffs1 filed a Complaint alleging copyright 22 infringement against Defendant Gary Fung (“Fung”). [Doc. No. 1.] 23 Plaintiffs’ Complaint contends that Fung operated a file-sharing 24 service as well as related computer servers as a part of an ongoing 25 file-sharing network that profits from alleged copyright infringement 26 1 27 The Plaintiffs in this action are: Columbia Pictures Industries, Inc.; Disney Enterprises, Inc.; Paramount Pictures Corporation; 28 Tristar Pictures, Inc.; Twentieth Century Fox Film Corporation; Universal City Studios LLLP; Universal City Studios Productions LLLP; and Warner Bros. Entertainment, Inc. Case 2:06-cv-05578-SVW-JC Document 391 Filed 12/21/2009 Page 2 of 46 1 by its users. Plaintiffs then filed a First Amended Complaint adding 2 Defendants Isohunt Web Technologies, Inc. (“Isohunt, Inc.”) and Does 1 3 through 10. [Doc. No. 13.]. (The Court refers to Fung and Isohunt, 4 Inc. collectively as “Defendants.”) 5 Plaintiffs now bring this Motion for Summary Judgment [Doc. No. 6 249] on the grounds that Defendants’ users have infringed their 7 copyrights and are liable under theories of inducement, contributory 8 infringement, and vicarious infringement.
    [Show full text]