Dimensions of P2P and digital piracy in a university campus

نویسندگان

  • Alexandre M. Mateus
  • Jon M. Peha
چکیده

This article presents findings from the first large-scale quantitative assessment of Peer-to-Peer (P2P) exchanges of copyrighted material on a college campus based on actual observation. Through passive monitoring and deep packet inspection (DPI), we assess the extent to which P2P is used to transfer copyrighted material. We also characterize the demographics of P2P users, the relative popularity of the material, and how the burden on the campus network varies over time. We found that at least 51% of students living on campus engaged in P2P, at least 42% attempted to transfer copyrighted material, and the mean number of copyrighted media titles whose transfer is attempted per week was at least 6 per monitored student. Some students use P2P legally, e.g. to transfer Linux software or non-copyrighted adult material, but we found no evidence that large numbers of students use P2P for these legal purposes and not to transfer copyrighted material. Students of all genders, ages, classes and majors engaged in file sharing, to the extent that demographics were not helpful in identifying likely file-sharers so as to target interventions. This study also provides lessons for those who would use DPI technology to reduce illegal use of P2P. If given enough weeks to observe, current technology is effective at identifying users who attempt to transfer copyrighted material, provided that their traffic is identifiable as P2P. Thus, DPI can be used to estimate the extent of piracy, and to notify individuals who may be violating copyright law. However, encryption is available and can be easily activated in most P2P clients. Once turned on, encryption prevents DPI from detecting whether transferred material is copyrighted, rendering it ineffective. If DPI is used for copyright enforcement that includes imposition of penalties, then P2P users or P2P developers may have the incentive to use encryption as a way of evading detection. 1 Corresponding author: Alexandre M. Mateus, Ph.D. Candidate, Department of Engineering & Public Policy, Carnegie Mellon University, [email protected], www.andrew.cmu.edu/~amateus 2 Jon M. Peha, Associate Director of the Center for Wireless & Broadband Networking, Professor in the Department of Engineering & Public Policy and the Department of Electrical & Computer Engineering, Carnegie Mellon University, [email protected], www.ece.cmu.edu/~peha

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Demand and Supply-side Dynamics of Piracy Diffusion in P2P Networks

Digital piracy, the sharing files of music on peer-to-peer (P2P) networks has been cited as the key threat to the music industry by distorting promoting plans of albums (Billboard.biz, 2009). To combat widespread digital piracy on file-sharing networks, the content industries have employed diverse anti-piracy strategies including pollution technologies and stronger copyright legislation for mus...

متن کامل

Graduated Response Policy and the Behavior of Digital Pirates: Evidence from the French Three-strike (Hadopi) Law

Most developed countries have tried to restrain digital piracy by strengthening laws against copyright infringement. In 2009, France implemented the Hadopi law. Under this law individuals receive a warning the first two times they are detected illegally sharing content through peer to peer (P2P) networks. Legal action is only taken when a third violation is detected. We analyze the impact of th...

متن کامل

A Robust Digital Watermarking System Adopting 2D Barcode against Digital Piracy on P2P Network

Due to the proliferation of the P2P network, digital content can be easily shared without any restriction, and P2P network permits a great amount of digital piracy. Though a lot of DRM architectures have been announced, those can not show any effective method against digital piracy on P2P community. To resolve the point issues, a novel robust digital audio watermarking scheme is presented to su...

متن کامل

P2P Users: Important dimensions for changing to legal online music stores

P2P services made music sharing popular. Users got used to get the songs they want for free, and use it freely, without restrictions. With some years of delay, online music retailers started to sell legal digital song files, mainly with DRM protection. Recent studies shows that P2P networks continue to grow, attracting more and more users. In this scenario, this work is dedicated to find out so...

متن کامل

Investigating Cybercrimes that Occur on Documented P2P Networks

The popularity of Peer-to-Peer (P2P) Internet communication technologies being exploited to aid cybercrime is ever increasing. P2P systems can be used or exploited to aid in the execution of a large number of online criminal activities, e.g., copyright infringement, fraud, malware and virus distribution, botnet creation, and control. P2P technology is perhaps most famous for the unauthorised di...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008