file sharing
Recently Published Documents


TOTAL DOCUMENTS

1246
(FIVE YEARS 126)

H-INDEX

39
(FIVE YEARS 2)

Webology ◽  
2021 ◽  
Vol 18 (2) ◽  
pp. 1379-1391
Author(s):  
Hayder A. Jawdhari ◽  
Alharith A. Abdullah

Blockchain is one of the technologies provided by the global distribution of computing power. Simply put, the blockchain is the digital ledger in which transactions are recorded. It all started with a desire to see a new form of security system for transferring confidential files. It aims to achieve many goals like decreasing the process time for transferring files to the other party, and reducing the overall expenses as the files are only transferred across the blockchain network with no need for the files to be uploaded and downloaded to the drive. More effective applications have the ability to share files via the technology of Blockchain. The great challenge is to build a private blockchain environment to send files and distribute them securely between parties, such as military institutions and others. In this paper, a private blockchain is built to overcome the side of the security through a secured file-sharing network. This private Blockchain can be utilized at various institutions. A high scale of security is obtained through using an important algorithm that takes into consideration a critical part of the field of cryptography to robustly encrypt the files. The latter ensures that no individual except for the receiver has the ability to access the files. As well, a sufficient speed was obtained when transferring the files, as compared to Ethereum with FTP. Finally, smart contracts have been designed to suit the transfer of files between nodes.


Author(s):  
Nagesh Rajendra Salunke

Abstract: The concept of cloud computing becomes more popular in latest years. Data storage is very important and valuable research field in cloud computing. Cloud based file sharing is a file sharing security in cloud. The required security from unauthorized access of the file in the cloud is provided by the encryption and decryption function. The admin can provide file access option to the authorized users. This facility limits the number and time of access of the shared files by the admin for the authorized user. Cloud data storage technology is the core area in cloud computing and solves the data storage mode of cloud environment. This project introduces the concept of cloud computing and cloud storage as well as the architecture of cloud storage firstly. Then we analyze the cloud data storage technology amazon web services, wasabi, Digital Ocean etc. We will improve the traditional file storage method and we will make a platform which will get more privileges. Keywords: Cloud, Storage, AWS, Wasabi, File Management, Files Storage, Files Sharing, DMS, CMS, Drive store, Private Cloud.


Author(s):  
I. Lisetska ◽  
N. Shovkova ◽  
A. Kovalishin ◽  
V. Habchuk

The digital technologies in all spheres of life, including education are now a hallmark of our modern identity; they shape how we live today. They enable applying new opportunities, for instance, distance learning, which is quite relevant today. Ivano Frankivsk National Medical University has the site "Office 365 Cloud Services", which is accessible to all teachers and students and thus creates a single digital environment. Practical classes and lectures on pediatric therapeutic dentistry during quarantine are conducted in an online conference format in Microsoft Teams, a teamwork centre in Office 365, which is a simplified version of learning management systems; it enables communicating, file sharing, etc. between the group members. The program is convenient because it combines everything in a common work environment, including chat for discussion, file sharing and corporate programs. Students pass on each topic of the test tasks in the system, which were posted on pmk.ifnmu.edu.ua or tests.if.ua. The teacher converts the test result into scores according to the evaluation criteria. Delivering theoretical themes and checking their comprehension is organized by means of video communication. During the online lesson, the teacher interviews the topic, corrects the answer, and explains the points that might be discussible or unclear, using pre-loaded visuals or other materials, e.g. presentations, videos, photos, radiographs and orthopantomograms. For future dentists it is extremely important to master practical skills, work with real patients, practice manual and communication skills. Digital technologies help during distance learning at least partially to master the practical aspect of the discipline by creating multimedia presentations, which consists of tasks, three to four questions for each task, a clinical case, if possible video. The use of digital technologies, especially during distance education can and should take its place in the education system, because with its proper organization it can provide quality education that meets the requirements of modern society.


2021 ◽  
Author(s):  
◽  
James Carter

<p>This paper examines strict liability within the Copyright (Infringing File Sharing Amendment Act 2011. Prior to the act, enforcing copyright infringement by file sharing was unrealistic due to detection, evidentiary and authorisation problems. The Act resolved these problems by imposing strict liability in the form of vicarious liability and evidentiary presumptions. First, it explores the decision to hold account holders vicariously liable for end user infringements in relation to policy considerations and fact patterns arising in Copyright Tribunal decisions. In doing so, it highlights ways in which injustice may be avoided. Second, it explores the evidentiary presumptions, the underlying policy rationale for their inclusion and the Copyright Tribunal’s application of them. Ultimately, it argues that there is good reason to remove the evidentiary presumptions.</p>


2021 ◽  
Author(s):  
◽  
James Carter

<p>This paper examines strict liability within the Copyright (Infringing File Sharing Amendment Act 2011. Prior to the act, enforcing copyright infringement by file sharing was unrealistic due to detection, evidentiary and authorisation problems. The Act resolved these problems by imposing strict liability in the form of vicarious liability and evidentiary presumptions. First, it explores the decision to hold account holders vicariously liable for end user infringements in relation to policy considerations and fact patterns arising in Copyright Tribunal decisions. In doing so, it highlights ways in which injustice may be avoided. Second, it explores the evidentiary presumptions, the underlying policy rationale for their inclusion and the Copyright Tribunal’s application of them. Ultimately, it argues that there is good reason to remove the evidentiary presumptions.</p>


Author(s):  
Lorenz Graf-Vlachy ◽  
Tarun Goyal ◽  
Yannick Ouardi ◽  
Andreas König

AbstractThere is a lack of clarity in information systems research on which factors lead people to use or not use technologies of varying degrees of perceived legality. To address this gap, we use arguments from the information systems and political ideology literatures to theorize on the influence of individuals’ political ideologies on online media piracy. Specifically, we hypothesize that individuals with a more conservative ideology, and thus lower openness to experience and higher conscientiousness, generally engage in less online media piracy. We further hypothesize that this effect is stronger for online piracy technology that is legally ambiguous. Using clickstream data from 3873 individuals in the U.S., we find that this effect in fact exists only for online media piracy technologies that are perceived as legally ambiguous. Specifically, more conservative individuals, who typically have lower ambiguity intolerance, use (legal but ambiguously perceived) pirated streaming websites less, while there is no difference for the (clearly illegal) use of pirated file sharing websites.


Author(s):  
Jann-Michael Greenburg

Custom arrangements are: (a) derivative works, generally musical arrangements, based upon preexisting copyrighted musical works, (b) reproduced in the form of sheet music copies, and (c) distributed to specific third-party performance ensembles. Arrangers who create custom arrangements are able to utilize software and Internet services to create such arrangements physically and digitally and distribute them physically and via file sharing. This chapter explores the legal framework and justification for custom arrangement licensing under American law, with a focus on the reproduction, derivative work, distribution, and display rights afforded to copyright owners. Differences between physical and digital sheet music are noted where relevant. The chapter also addresses both practical and normative arguments encountered in the world of custom arrangement licensing and concludes with brief commentary on the custom arrangement licensing process.


Author(s):  
Felipe K. Shiraishi ◽  
Vitor H. Perles ◽  
Hector K. Yassuda ◽  
Leonardo T. Kimura ◽  
Ewerton R. Andrade ◽  
...  

We propose Torrente, a distributed file-sharing solution with economic incentives. Its implementation is built as an extension of BitTorrent protocol, in such a manner that user access to file-sharing swarms is controlled by peers that verify micropayments receipts in a blockchain-based ledger. In addition, by using payment commitments, Torrente facilitates off-chain transactions for faster content sharing. The solution is created as a tool to enhance Amazon Biobank application security, but can be used isolated in cases such as file sharing with monetary incentives.


2021 ◽  
Vol 6 (42) ◽  
pp. 01-13
Author(s):  
Mat Rahimi Yusof ◽  
Yahya Don ◽  
Mohd Faiz Mohd Yaakob ◽  
M.S. Omar-Fauzee ◽  
Lai Chaw Pang

The worldwide Covid-19 pandemic has significantly changed the leadership style of Malaysian school leaders. To balance the current leadership challenges of the pandemic and the rapidity of technology, school leaders must think ahead and infuse new ones in leadership styles. As a result, the purpose of this study was to identify the functions and behaviours of new leadership styles of school leaders. The results of the questionnaire analysis collected from 103 respondents (principals=74) and (headmasters=29) school leaders using SEM AMOS successfully identified and validated nine functions and 42 behaviours in the new school leadership style. These functions are virtual meetings, virtual forums or discussions, sharing of new information, file sharing, virtual communication, supervision of digital technology-assisted teaching, monitoring student performance with digital technology, promoting development and professionalism. These functions include virtual meetings, virtual forums or discussions, the dissemination of new information, file sharing, virtual communication, the supervision of digital technology-assisted teaching, the monitoring of student performance with digital technology, and the promotion of development and professionalism. This study is expected to have a significant impact on school leaders' use of new leadership styles in the school.


2021 ◽  
Author(s):  
Shuai Su ◽  
Fangyuan Yuan ◽  
Yulin Yuan ◽  
Li Zeng ◽  
Chi Chen
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document