104 resultados para File-sharing

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The continuous growth of the users pool of Social Networking web sites such as Facebook and MySpace, and their incessant augmentation of services and capabilities will in the future, meet and compare in contrast with today's Content distribution Networks (CDN) and Peer-to-Peer File sharing applications such as Kazaa and BitTorrent, but how can these two main streams applications, that already encounter their own security problems cope with the combined issues, trust for Social Networks, content and index poisoning in CDN? We will address the problems of Social Trust and File Sharing with an overlay level of trust model based on social activity and transactions, this can be an answer to enable users to increase the reliability of their online social life and also enhance the content distribution and create a better file sharing example. The aim of this research is to lower the risk of malicious activity on a given Social Network by applying a correlated trust model, to guarantee the validity of someone's identity, privacy and trustfulness in sharing content.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

The sharing of music files has been the focus of a massive struggle between representatives of major record companies and artists in the music industry, on one side, and peer-to-peer (p2p) file-sharing services and their users, on the other. This struggle can be analysed in terms of tactics used by the two sides, which can be classified into five categories: cover-up versus exposure, devaluation versus validation, interpretation versus alternative interpretation, official channels versus mobilisation, and intimidation versus resistance. It is valuable to understand these tactics because similar ones are likely to be used in ongoing struggles between users of p2p services and representatives of the content industries.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Now days, the online social networks (OSN) have gained considerable popularity. More and more people use OSN to share their interests and make friends, also the OSN helps users overcome the geographical barriers. With the development of OSN, there is an important problem users have to face that is trust evaluation. Before user makes friends with a stranger, the user need to consider the following issues: Can a stranger be trusted? How much the stranger can be trusted? How to measure the trust of a stranger? In this paper, we take two factors, Degree and Contact Interval into consideration, which produce a new trust evaluation model (T-OSN). T-OSN is aimed to solve how to evaluate the trust value of an OSN user, also which is more efficient, more reliable and easy to implement. Base on our research, this model can be used in wide range, such as online social network (OSN) trust evaluation, mobile network message forwarding, ad hoc wireless networking, routing message on Internet and peer-to-peer file sharing network. The T-OSN model has following obvious advantages compare to other trust evaluate methods. First of all, it is not base on features of traditional social network, such as, distance and shortest path. We choose the special features of OSN to build up the model, that is including numbers of friends(Degree) and contact frequency(Contact Interval). These species features makes our model more suitable to evaluate OSN users trust value. Second, the formulations of our model are quite simple but effective. That means, to calculate the result by using our formulations will not cost too much resources. Last but not least, our model is easy to implement for an OSN website, because of the features that we used in our model, such as numbers of friends and contact frequency are easy to obtain. To sum up, our model is using a few resources to obtain a valuable trust value that can help OSN users to solve an important security problem, we believe that will be big step - or development of OSN.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Systems and technologies used for unauthorised file sharing have received little attention in the Information Systems literature. This paper attempts to fill this gap by presenting a critical, qualitative study on the motivations for using unauthorised file sharing systems. Based on 30 interviews with music consumers, musicians, and the music industry, this paper reports on the decision of music consumers to ‘pirate or purchase’. This paper highlights file sharing from multiple perspectives of users, musicians, and representatives from the music recording industry. Three main themes emerged on the cost, convenience and choice as motivators for unauthorised file sharing.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In early 2012, 76 heavily armed police conducted a raid on a house in Auckland, New Zealand. The targets were Kim Dotcom, a German national with a NZ residency visa, and several colleagues affiliated with Megaupload, an online subscription-based peer-to-peer (P2P) file sharing facility. The alleged offences involved facilitating unlawful file sharing and United States federal criminal copyright violations. Following the raid, several court cases provide valuable insights into emerging ‘global policing’ practices (Bowling and Sheptycki 2012) based on communications between sovereign enforcement agencies. This article uses these cases to explore the growth of ‘extraterritorial’ police powers that operate ‘across borders’ (Nadelmann 1993) as part of several broader transformations of global policing in the digital age.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Micro-payment systems are an important part of peer-to-peer (P2P) networks and address the "free-rider" problem in most existing content sharing systems. To address this issue, the authors have developed a new micro-payment system for content sharing in P2P networks called P2P-Netpay. This is an offline, debit based protocol that provides a secure, flexible, usable and reliable credit service. This article compares micro-payment with non-micro-payment credit systems for file sharing applications and finds that this approach liberates the "free-rider" problem. The authors analyse the heuristic evaluation performed by a set of evaluators and present directions for research aiming to improve the overall satisfaction and efficiency of the proposed model.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The existing sharable file searching methods have at least one of the following disadvantages: (1) they are applicable only to certain topology patterns, (2) suffer single point failure, or (3) incur prohibitive maintenance cost. These drawbacks prevent their effective application in unstructured Peer-to-peer (P2P) systems (where the system topologies are changed time to time due to peers' frequently entering and leaving the systems), despite the considerable success of sharing file search in conventional peer-to-peer systems. Motivated by this, we develop several fully dynamic algorithms for searching sharing files in unstructured peer to peer systems. Our solutions can handle any topology pattern with small search time and computational overhead. We also present an in-depth analysis that provides valuable insight into the characteristics of alternative effective search strategies and leads to precision guarantees. Extensive experiments validate our theoretical findings and demonstrate the efficiency of our techniques in practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Exploration with formal design systems comprises an iterative process of specifying problems, finding plausible and alternative solutions, judging the validity of solutions relative to problems and reformulating problems and solutions. Recent advances in formal generative design have developed the mathematics and algorithms to describe and perform conceptual design tasks. However, design remains a human enterprise: formalisms are part of a larger equation comprising human computer interaction. To support the user in designing with formal systems, shared representations that interleave initiative of the designer and the design formalism are necessary. The problem of devising representational structures in which initiative is sometimes taken by the designer and sometimes by a computer in working on a shared design task is reported in this paper. To address this problem, the requirements, representation and
implementation of a shared interaction construct, the feature node, is
described. The feature node facilitates the sharing of initiative in formulating and reformulating problems, generating solutions, making
choices and navigating the history of exploration.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter considers the importance of information-sharing techniques and strategies employed by industry sectors. Well-developed supply chain management often brings with it improved buyer-supplier communication processes, and we consider the impact of these not only from an intersector point of view, but also from a cross-sector viewpoint. The particular perspectives of the small business within a supply chain structure and of the supply chain customer are examined in detail. We conclude that information sharing is a critical component of business success both inside and outside the supply chain structure. However, while globally and at the large business level, both development and implementation of such technologies have mushroomed, smaller enterprises have tended to be left behind to cope as best they can with multiple pressures to conform.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we address the problem of file replica placement in Data Grids given a certain traffic pattern. We propose a new file replica placement algorithm and compare its performance with a standard replica placement algorithm using simulation. The results show that file replication improve the performance of the data access but the gains depend on several factors including where the file replicas are located, burstness of the request arrival, packet loses and file sizes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The main problem in data grids is how to provide good and timely access to huge data given the limited number and size of storage devices and high latency of the interconnection network. One approach to address this problem is to cache the files locally such that remote access overheads are avoided. Caching requires a cache-replacement algorithm, which is the focus of this paper. Specifically, we propose a new replacement policy and compare it with an existing policy using simulations. The results of the simulation show that the proposed policy performs better than the baseline policy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Managers and researchers alike have sought new ways to address the challenges of sharing dispersed knowledge in modern business environments. Careful consideration by sharers of receivers' knowledge needs and behaviours may improve the effectiveness of knowledge sharing. This research examines how sharers react to their perceptions of receivers' knowledge needs and behaviours when making choices relating to sharing knowledge. The focus of this article is to propose and empirically explore a theoretical framework for a study of the role of the receiver in knowledge sharing--receiver-based theory. Data collected from two case studies highlight a key role played by perceived receiver knowledge needs and behaviours in shaping sharer choices when explicit knowledge is shared. A set of receiver influences on knowledge sharing is provided that highlights key receiver and sharer issues. The paper concludes that companies should develop better ways to connect potential sharers with receivers' real knowledge needs. Further, the findings suggest that sharing on a need-to-know basis hinders change in organisational power structures, and prevents the integration of isolated pockets of knowledge that may yield new value.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Development of commercial web systems is laborious, lengthy and costly. This is partly due to the fact that the methods of their development can hardly cope with the complexity of provided services. Such services may need to be distributed and collaborative, require sophisticated software architecture, be rich in form, content and interactivity, and have a wide range of potentially casual users. While web development methodologies are slowly emerging from research methodologies, their adoption is far from wide-spread. To improve this situation, the authors propose an approach based on the observed practices of professional web developers, who openly share and reuse their web development experience, while guarding their development workproducts. To this end, we suggest to enhance web development methods, by collecting problem-solving experience of web developers, packaging it into a reusable form, and providing a navigable decision structure assisting developers in identifying proven expert solutions suitable for a given problem context.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although intranets appear to be ideal environments for employees to share knowledge quickly and efficiently, usage in practice appears limited. We report findings from two case studies that highlight three key issues limiting intranet utilisation for knowledge sharing: organisational structures and strategies, the impact of the receiver on sharer choices, and the availability of alternative channels for knowledge sharing. This study suggests that for companies to obtain more effective intranets, they need to better align organisational structures and strategies with intranet objectives, develop a comprehensive corporate communication plan, and find new ways to better link sharers with receivers’ knowledge needs.