272 resultados para P2P piracy


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Content providers from the music industry argue that peer-to-peer (P2P) networks such as KaZaA, Morpheus, iMesh, or Audiogalaxy are an enormous threat to their business. They furthermore blame these networks for their recent decline in sales figures. For this reason, an empirical investigation was conducted during a period of 6 weeks on one of the most popular files-sharing systems, in order to determine the quantity and quality of pirated music songs shared. We present empirical evidence as to what extent and in which quality music songs are being shared. A number of hypotheses are outlined and were tested. We studied, among other things, the number of users online and the number of flies accessible on such networks, the free riding problem, and the duration per search request. We further tested to see if there are any differences in the accessibility of songs based on the nationality of the artist, the language of the song, and the corresponding chart position. Finally, we outline the main hurdles users may face when downloading illegal music and the probability of obtaining high quality music tracks on such peer-to-peer networks.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Australian Federal Government has recently passed reforms to the shipping industry. These reforms are aimed at removing barriers to investment in Australian shipping, fostering global competitiveness and securing a stable maritime skills base. The shipping reform package adopts a two pronged approach designed to achieve its stated goals by providing both a ‘stick’ and ‘carrot’ to industry participants. First, the ‘stick’ is delivered via the provision of tighter regulation of coastal trading operations through a new licencing system, along with the introduction of a civil penalty regime and an increase in existing penalties. Second, the ‘carrot’ is delivered via taxation incentives available to vessels registered in Australia where the registrant meets certain specified criteria. These incentives, introduced through amendments to the Income Tax Assessment Act 1997 and the Income Tax Assessment Act 1936 and contained in the Tax Laws Amendment (Shipping Reform) Act 2012, provide five key tax incentives to the shipping industry. From 1 July 2012, amendments give effect to an income tax exemption for qualifying ship operators, accelerated depreciation of vessels, roll-over relief from income tax on the sale of a vessel, an employer refundable tax offset, and an exemption from royalty withholding tax for payments made for the lease of certain shipping vessels.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Maritime terrorism is a serious threat to global security. A major debate in this regard is the treating of acts of maritime terrorism as piracy by some scholars and a rejection of this view by others. Moreover, the international law of maritime terrorism suffers from fundamental definitional issues, much like the international law of terrorism. This article examines the current international law of maritime terrorism with a particular emphasis on the debate regarding the applicability of the international law of piracy in the case of maritime terrorism. It argues that the international law of piracy is not applicable in the enforcement and prosecution of maritime terrorists on the high seas. International treaties on terrorism and the post-September 11 developments relating to international laws on terrorism have created a workable international legal framework for combating maritime terrorism, despite some bottlenecks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Australian Government has proposed Internet Service Providers (ISPs) monitor and punish Australians who download and infringe copyright. In a discussion paper circulated by Attorney-General George Brandis, and leaked by Crikey last Friday, the government proposes a sweeping change to Australian copyright law. If implemented, it would force ISPs to take steps to prevent Australians from infringing copyright. What these steps might be is very vague. They could include blocking peer-to-peer traffic, slowing down internet connections, passing on warnings from industry groups, and handing over subscriber details to copyright owners.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Christmas has come early for copyright owners in Australia. The film company, Roadshow, the pay television company Foxtel, and Rupert Murdoch's News Corp and News Limited--as well as copyright industries--have been clamoring for new copyright powers and remedies. In the summer break, the Coalition Government has responded to such entreaties from its industry supporters and donors, with a new package of copyright laws and policies. There has been significant debate over the proposals between the odd couple of Attorney-General George Brandis and the Minister for Communications, Malcolm Turnbull. There have been deep, philosophical differences between the two Ministers over the copyright agenda. The Attorney-General George Brandis has supported a model of copyright maximalism, with strong rights and remedies for the copyright empires in film, television, and publishing. He has shown little empathy for the information technology companies of the digital economy. The Attorney-General has been impatient to press ahead with a copyright regime. The Minister for Communications, Malcolm Turnbull, has been somewhat more circumspect, recognizing that there is a need to ensure that copyright laws do not adversely impact upon competition in the digital economy. The final proposal is a somewhat awkward compromise between the discipline-and-punish regime preferred by Brandis, and the responsive regulation model favored by Turnbull. In his new book, Information Doesn't Want to Be Free: Laws for the Internet Age, Cory Doctorow has some sage advice for copyright owners: Things that don't make money: Complaining about piracy. Calling your customers thieves. Treating your customers like thieves. In this context, the push by copyright owners and the Coalition Government to have a copyright crackdown may well be counter-productive to their interests.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The possibility of commercially exploiting plant, animal and human genetic resources unlocked by biotechnology has given rise to a wide range of cultural, environmental, ethical and economic conflicts. While supporters describe this activity as bioprospecting, critics refer to it as biopiracy. According to this latter view, international legal agreements and treaties have disregarded opposition and legalized the possibility of appropriating genetic resources and their derivative products through the use of patents. The legal framework that permits the appropriation of natural genetic products in Colombia also criminalizes aspects of traditional ways of life and enables a legally approved but socially harmful land-grabbing process. The article describes these processes and impact in terms of the inversion of justice and the erosion of environmental sustainability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile P2P technology provides a scalable approach for content delivery to a large number of users on their mobile devices. In this work, we study the dissemination of a single item of content (e. g., an item of news, a song or a video clip) among a population of mobile nodes. Each node in the population is either a destination (interested in the content) or a potential relay (not yet interested in the content). There is an interest evolution process by which nodes not yet interested in the content (i.e., relays) can become interested (i.e., become destinations) on learning about the popularity of the content (i.e., the number of already interested nodes). In our work, the interest in the content evolves under the linear threshold model. The content is copied between nodes when they make random contact. For this we employ a controlled epidemic spread model. We model the joint evolution of the copying process and the interest evolution process, and derive joint fluid limit ordinary differential equations. We then study the selection of parameters under the content provider's control, for the optimization of various objective functions that aim at maximizing content popularity and efficient content delivery.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Peer to peer networks are being used extensively nowadays for file sharing, video on demand and live streaming. For IPTV, delay deadlines are more stringent compared to file sharing. Coolstreaming was the first P2P IPTV system. In this paper, we model New Coolstreaming (newer version of Coolstreaming) via a queueing network. We use two time scale decomposition of Markov chains to compute the stationary distribution of number of peers and the expected number of substreams in the overlay which are not being received at the required rate due to parent overloading. We also characterize the end-to-end delay encountered by a video packet received by a user and originated at the server. Three factors contribute towards the delay. The first factor is the mean shortest path length between any two overlay peers in terms of overlay hops of the partnership graph which is shown to be O (log n) where n is the number of peers in the overlay. The second factor is the mean number of routers between any two overlay neighbours which is seen to be at most O (log N-I) where N-I is the number of routers in the internet. Third factor is the mean delay at a router in the internet. We provide an approximation of this mean delay E W]. Thus, the mean end to end delay in New Coolstreaming is shown to be upper bounded by O (log E N]) (log N-I) E (W)] where E N] is the mean number of peers at a channel.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

O uso de Internet para a distribuição de fluxos de vídeo tem se mostrado uma tendência atual e traz consigo grandes desafios. O alicerce sobre qual a Internet está fundamentada, comutação por pacotes e arquitetura cliente-servidor, não proporciona as melhores condições para este tipo de serviço. A arquitetura P2P (peer-to-peer) vem sendo considerada como infraestrutura para a distribuição de fluxos de vídeo na Internet. A idéia básica da distribuição de vídeo com o suporte de P2P é a de que os vários nós integrantes da rede sobreposta distribuem e encaminham pedaços de vídeo de forma cooperativa, dividindo as tarefas, e colocando à disposição da rede seus recursos locais. Dentro deste contexto, é importante investigar o que ocorre com a qualidade do serviço de distribuição de vídeo quando a infraestrutura provida pelas redes P2P é contaminada por nós que não estejam dispostos a cooperar, já que a base desta arquitetura é a cooperação. Neste trabalho, inicialmente é feito um estudo para verificar o quanto a presença de nós não-cooperativos pode afetar a qualidade da aplicação de distribuição de fluxo de vídeo em uma rede P2P. Com base nos resultados obtidos, é proposto um mecanismo de incentivo à cooperação para que seja garantida uma boa qualidade de vídeo aos nós cooperativos e alguma punição aos nós não-cooperativos. Os testes e avaliações foram realizados utilizando-se o simulador PeerSim.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

随着P2P网络的迅猛发展,P2P网络的安全性问题受到越来越多的关注。由于P2P网络先天的开放性、匿名性等特点,信任问题已经成为制约P2P网络发展的瓶颈。信任模型的出现为P2P网络提供了一套有效的安全机制,理论和实践证明P2P信任模型在提高P2P网络安全性和健壮性方面效果显著。但是,P2P信任模型自身的安全性成为另一个需要关注的问题,尤其是共谋团体攻击对P2P信任模型造成的安全威胁最为严重。如何有效抵制共谋团体的攻击、提高P2P网络的安全性成为当前亟需解决的问题。本文针对P2P信任模型中的共谋团体问题进行研究,取得了一系列成果: (1) 针对P2P信任模型中节点的评价行为提出了基于节点行为向量的共谋团体识别方法。通过对节点之间的行为相似度进行聚类分析,可以有效识别网络中存在的共谋团体,在提高信任模型安全性方面具有明显效果。 (2) 基于节点行为的复杂性和模糊性,提出了基于模糊逻辑的共谋团体识别方法。该方法扩展了对节点行为的描述范围,并利用模糊逻辑分析节点行为的相似度,充分考虑了节点评价的模糊特性,更加有利于对共谋团体的识别。 (3) 受恶意代码检测技术的启发,提出基于行为轮廓的共谋团体检测方法。通过构建节点和节点集合的行为轮廓,对节点和节点集合的行为进行了更加全面深入的描述,在此基础上通过分析行为轮廓相似度识别共谋团体。同时,通过引入集合行为轮廓的概念,降低了传统聚类过程中的计算开销,使节点之间的共谋行为更加容易识别。 总的来说,本文针对P2P信任模型中的共谋团体,通过分析共谋团体的行为特征,提出了一系列基于行为相似的共谋团体识别方法,适应当前现实网络环境的需要,可以有效地识别网络中存在的共谋团体,大大提高了P2P信任模型对共谋团体攻击的抵制能力。