scholarly journals Sharing music files: Tactics of a challenge to the industry

Author(s):  
Brian Martin ◽  
Chris Moore ◽  
Colin Salter

The sharing of music files has been the focus of a massive struggle between representatives of major record companies and artists in the music industry, on one side, and peer-to-peer (p2p) file-sharing services and their users, on the other. This struggle can be analysed in terms of tactics used by the two sides, which can be classified into five categories: cover-up versus exposure, devaluation versus validation, interpretation versus alternative interpretation, official channels versus mobilisation, and intimidation versus resistance. It is valuable to understand these tactics because similar ones are likely to be used in ongoing struggles between users of p2p services and representatives of the content industries.

2014 ◽  
Vol 5 (1) ◽  
pp. 37-44
Author(s):  
Kobra Elahifar

Peer-to-peer (P2P) file-sharing technologies have impacted the music industry, including its strategies for the distribution of the musical products, for more than a decade now. As a result, music labels have delayed full digitization of their industry in fear of “online music piracy”. The present paper reviews the historical context of the evolution of the music industry from 1999 to 2012. Using Actor-Network theory, the paper examines the strategies that helped the music industry to translate new actors’ effect in order to sustain music labels’ business on their path to digitize music distribution. I will discuss the impact of new digital policies and methods of governing online behavior including the business concept of “entrepreneurship” as they may potentially affect the future of public domain within the framework of consumer rights.


Author(s):  
S. H. Kwok ◽  
Y. M. Cheung ◽  
K. Y. Chan

A recent survey revealed that 18 millions American Internet users, or approximately 14% of total American Internet population have peer-to-peer (P2P) file-sharing applications running on their computers (Rainie & Madden, 2004). Not surprisingly, P2P applications have become common tools for information sharing and distribution since the appearance of Napster (Napster, 2003) in 1999. P2P systems are the distributed systems in which all nodes are equal in terms of functionality and able to directly communicate with each other without the coordination of a powerful server. Anonymity, scalability, fault resilience, decentralization and self-organization are the distinct characteristics of P2P computing (Milojicic et al., 2002) compared with the traditional client-server computing. P2P computing is believed to be capable of overcoming limitations of the computing environment placed by the client-server computing model. Milojicic et al. (2002), for example, suggested that P2P computing is capable of providing improved scalability by eliminating the limiting factor, the centralized server existing in the client-server computing. In the past few years, P2P computing and its promised characteristics have caught the attention of researchers who have studied the existing P2P networks, and the advantages and disadvantage of P2P systems. Important findings include the excessive network traffic caused by flooding-based searching mechanism that must be tackled in order to fully utilize the improved scalability of P2P systems (Matei, Iamnitchi, & Foster, 2002; Portmann & Seneviratne, 2002). There were proposed efficient searching techniques targeted for both structured and unstructured P2P systems. Other research projects were conducted to study, and were intended to complement, the drawbacks brought by distinct characteristics of P2P systems. For example, the P2P users’ free-riding behavior is generally attributed to the anonymity of such form of communication (Adar & Huberman, 2000). Recent research projects have shifted to a new line of investigation of P2P networks from the economic perspective and applications of P2P systems in workplaces (Kwok & Gao, 2004; Tiwana, 2003).


Electronics ◽  
2020 ◽  
Vol 9 (10) ◽  
pp. 1610 ◽  
Author(s):  
Li-Yuan Hou ◽  
Tsung-Yi Tang ◽  
Tyng-Yeu Liang

BitTorrent (BT) is the most popular peer-to-peer file-sharing system. According to official BT information, more than 100 million active users use BT for file transfers every month. However, BT mainly relies on either a central tracker (tracker) or distributed hash table (DHT) for locating file seeders while it runs a risk of a single point of failure or cyber-attacks such as Sybil and Eclipses. To attack this problem, we proposed a Peer-to-Peer (P2P) file-sharing system called IOTA-BT by integrating BitTorrent with IOTA in this paper. The advantages of IOTA over blockchain include scalability for high throughput, compatibility with Internet of Things (IoT) footprints, zero transaction fees, partition-tolerant, and quantum-resistant cryptography. The autopeering and neighbor selection of the Coordicide of IOTA is aimed at defending a Sybil or Eclipse attack. IOTA-BT inherits these advantages from IOTA. Moreover, our experimental results have shown that the cost of executing BT functions, such as releasing torrent files and retrieving seeder information on IOTA-BT, is acceptable for improving the security of BT. IOTA-BT can indeed efficiently provide users with a P2P file-sharing environment of higher security.


2006 ◽  
Vol 7 (2) ◽  
pp. 1-1 ◽  
Author(s):  
D. Hughes ◽  
J. Walkerdine ◽  
G. Coulson ◽  
S. Gibson

Author(s):  
Ricci S.C. Ieong ◽  
Pierre K.Y. Lai ◽  
K. P. Chow ◽  
Michael Y.K. Kwan ◽  
Frank Y.W. Law

The community of peer-to-peer (P2P) file-sharing networks has been expanding swiftly since the appearance of the very first P2P application (Napster) in 2001. These networks are famous for their excellent file transfer rates and adversely, the flooding of copyright-infringed digital materials. Recently, a number of documents containing personal data or sensitive information have been shared in an unbridled manner over the Foxy network (a popular P2P network in Chinese regions). These incidents have urged the authors to develop an investigation model for tracing suspicious P2P activities. Unfortunately, hindered by the distributed design and anonymous nature of these networks, P2P investigation can be practically difficult and complicated. In this chapter, the authors briefly review the characteristics of current P2P networks. By observing the behaviors of these networks, they propose some heuristic rules for identifying the first uploader of a shared file. Also, the rules have been demonstrated to be applicable to some simulated cases. The authors believe their findings provide a foundation for future development in P2P file-sharing networks investigation.


Author(s):  
Jerald Hughes ◽  
Karl Reiner Lang

In 1999, exchanges of digital media objects, especially files of music, came to constitute a significant portion of Internet traffic thanks to a new set of technologies known as peer-to-peer (P2P) file-sharing systems. The networks created by software applications such as Napster and Kazaa have made it possible for millions of users to gain access to an extraordinary range of multimedia files, which, by virtue of their purely digital form, have the desirable characteristics of portability and replicability, which pose great challenges for businesses that have in the past controlled images and sound recordings.


2013 ◽  
Vol 2 (3) ◽  
pp. 105-119 ◽  
Author(s):  
Darren Palmer ◽  
Ian J Warren

In early 2012, 76 heavily armed police conducted a raid on a house in Auckland, New Zealand. The targets were Kim Dotcom, a German national with a NZ residency visa, and several colleagues affiliated with Megaupload, an online subscription-based peer-to-peer (P2P) file sharing facility. The alleged offences involved facilitating unlawful file sharing and United States federal criminal copyright violations. Following the raid, several court cases provide valuable insights into emerging ‘global policing’ practices (Bowling and Sheptycki 2012) based on communications between sovereign enforcement agencies.  This article uses these cases to explore the growth of ‘extraterritorial’ police powers that operate ‘across borders’ (Nadelmann 1993) as part of several broader transformations of global policing in the digital age.


2016 ◽  
Vol 26 (3) ◽  
pp. 707-719 ◽  
Author(s):  
Shiyong Li ◽  
Wei Sun ◽  
Cheng-Guo E ◽  
Lina Shi

Abstract Peer-to-peer (P2P) networks offer a cost-effective and easily deployable framework for sharing content. However, P2P file-sharing applications face a fundamental problem of unfairness. Pricing is regarded as an effective way to provide incentives to peers to cooperate. In this paper we propose a pricing scheme to achieve reasonable resource allocation in P2P file-sharing networks, and give an interpretation for the utility maximization problem and its sub-problems from an economic point of view. We also deduce the exact expression of optimal resource allocation for each peer, and confirm it with both simulation and optimization software. In order to realize the optimum in a decentralized architecture, we present a novel price-based algorithm and discuss its stability based on Lyapunov stability theory. Simulation results confirm that the proposed algorithm can attain an optimum within reasonable convergence times.


Sign in / Sign up

Export Citation Format

Share Document