Premium Essay

File Sharing - Case Study

In:

Submitted By Jofrank
Words 7679
Pages 31
“File Sharing: Educational Information Distribution”

I. Objectives * This case study aims to complete the following:

* General Objective * To create an online informative webpage that discusses File Sharing.

* Specific Objectives A. To describe the nature and description of File Sharing. B. To discuss the importance of File Sharing in the Internet World. C. To give the disadvantage and advantage of File Sharing. D. To discuss the benefits of File Sharing. E. To give instances in File Sharing.

II. Scope and Limitation * This study will cover the File Sharing around the Internet about Educational Information distribution (Academic information). This will not cover other file sharing that includes movie, music and other entertainment files. Also, this study will not include the price of certain files to be share (incase it is not free). III. Significance of the study * This case study is significantly important or helpful to the following:

* To the students: * To educate them how to use file sharing as a reliable source of their studies. Also, to make them know all possibilities wherein they can use file sharing in a good way. * To the instructors: * To inform them how east learning process could be, for both instructors and students, through the use of file sharing. * To the parents: * To inform them that internet, through the use of file sharing, is a wide resource of information which can help their children with their studies. * To the out of school youth: * To educate them that education can also exist outside the school. For them to have knowledge that through the internet, they can still learn many things that will uplift their mental capacity.

Webpage
Codes

HTML folder contents: * * 1.html * 2.html * A.html * B.html * C.html *

Similar Documents

Free Essay

Mr Pip

...who have different feelings about issues. Content sharing, File sharing, or Piracy; whatever you want to call this issue. I have studied many ways and resources in this topic. I have looked at many articles on this issue. There is much to be discussed on the topic and things can get pretty heated about it. My view on file sharing is that we should be allowed to do what we want with the information we provide. I feel very strongly about this issue and I like to make my voice be heard on the topic whenever it may come up. Well I want to start off and give the opposite view of what people who are against my file sharing have to say. People say that file sharing is stealing and liken it to steal a physical piece of property (Mossberg, 2013). Artist are often hate file sharing because they feel they lose money from people sharing there cd and other property. Even artists have declared war on file sharing and claim they have lost money because of it (Smith, 2013). There are also big companies that have formed to and try and combat file sharing or “piracy”. Companies like the RIAA and MPAA have vowed and have worked with congress to end piracy. RIAA has what their view of file sharing is and how it hurts their industry. File sharing is not just an issue among certain media, software, and gaming industries. Many countries have very strict laws against file sharing. Countries like Sweden are very strict against file sharing (Healey, 2013). Iran is probably one of countries...

Words: 1065 - Pages: 5

Premium Essay

The Private Bay

...Unit 1 – Case Study – The Private Bay The World’s Most Resilient Copyright Infringer? Kinjal Mistry California Intercontinental University Dated: 21st Feb 16 Author Note Kinjal R Mistry, California Intercontinental University Correspondence concerning this article should be addressed to Kinjal R Mistry, 1913 Key St, Maumee OH-43537 Contact Email – kinjalm17@gmail.com Contact Phone – 631-394-7810 Abstract The international administration of laws which can be combines with the risk of fines and imprisonment is not enough to dissuade the Pirate Bay from encouraging, boosting and helping copyright infringement. In some companies, file sharing services are provided to generate business revenue stream and sometimes these services are illegal and still used to advertise “clue chips brand”, (Andersen, B, 2010). So far there is enough potential for the business to be made, file sharing will sustain its existence in the global internet market. This papers focuses on the legal and social issues brought up by peer-to-peer sharing of files and copyrighted information on the websites. Companies argue that limitation against file sharing will pause the technology innovation. On the other side, it is certain that file sharing may break IP protections that Pirate bay knowingly exploits these protections. Research shows that the music industry has justification to shut down peer...

Words: 1558 - Pages: 7

Premium Essay

Innovative Models for Doing Business in the Music Industry

...Models for Doing Business in the Music Industry Table of Contents 1 Introduction 1 2 Reasons for Changes in Consumer Thinking 2 2.1 New Technology Changes the Way Consumers Experience Media 3 2.2 Development of P2P File Sharing 3 2.2.1 Generation 1: Napster 3 2.2.2 Generation 2: The Pirate Bay 4 3 Company Attitudes Towards Changing Business Climate 5 3.1 The Industry Reaction on File Sharing 5 3.2 Technologial Countermeasures 6 3.3 Taking Chances with the New Climate 7 4 Analysis of Different Business Models and Market Conditions 9 4.1 A New Business Model – A Good Business Model? 10 4.1.1 Streaming Media Services 11 4.1.1.1 Spotify 12 4.1.2 Single-song Download Services – Online Music Stores 13 4.1.3 Music Rental Services 14 4.2 Study Case: Tip-Jar - The Radiohead Business Model 15 4.3 Study Case: CD-giveaway - The Prince Business Model 16 5 Conclusions 18 References 19 Introduction The emergence of new media, digital technology, and changing consumer expectations has given the music industry the challenging task of scrutinizing their own business models and methods, forcing companies to revise their business structure and adopt new sources of revenue for the twenty-first century. The main goal of this study was to find out the trends which have affected the industry past years and shaped it towards the present state, reveal how the current climate is, and point out some possible future success factors and new models of business that...

Words: 7711 - Pages: 31

Premium Essay

Illegal Downloading Research Background

...Sandra Richardson 090713457 Illegal digital downloads and piracy: What effect is this having on the entertainment industry and is there a solution to the problem? Background. The entertainment industry felt their first blow in 1999 when a student developed Napster, a software program allowing millions of users to illegally download and share music files; sparking the beginning of the hundreds of entertainment sharing websites around the world today. Although shut down due to the Recording Industry Association Of America filing a lawsuit because of copyright infringement and suppressed record sales, this did not stop the development of more sophisticated file sharing softwares able to manipulate copyright laws around the world. Downloading films became possible due to increased storage and memory space available on computers, enabling users to download multiple movies in a matter of hours, even before released in cinemas. Currently, Mass media storage devices are available that hold thousands of music and film files on a small box, transferred from the users computer. So what effect is all this having? Has the popularity of illegal downloading affected the profits and jobs of the entertainment industry? Is there a correlation between entertainment stores losing revenue or even going out of business because of suppressed sales and illegal downloads? Does this have a negative effect on the economy through job loss, reduced income tax, fewer artists growing and is there...

Words: 1113 - Pages: 5

Free Essay

File Sharing: What and How Effects on Music Sales.

...File Sharing: what and how Effects on music sales. Abstract File sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multimedia(audio, images and video), documents or electronic books. It may be implemented through a variety of ways.In this paper we are discuss common methods of storage, transmission and dispersion include manual sharing utilizing removable media, centralized servers on computer networks,World Wide Web-based hyperlinked documents, and the use of distributed peer-to-peer networking.We consider the specific case of file sharing and it’s effects on legal sales of music . 1. Introduction Files were first exchanged on removable media.Computers were able to accessremotefilesusing filesystem mounting and FTP servers.The mp3 encoding, which was standardized in 1991 and which substantially reduced the size of audio files, grew to widespread use in the late 1990s. In 1998, MP3.com and Audiogalaxy were established, The Digital Millennium Copyright Act was unanimously passed, and the first mp3 player devices were launched. In June 1999, Napster was released as an unstructured centralized peer-to-peer system, requiring a central server for indexing and peer discovery. It is generally credited as being the first peer-to-peer file sharing system. Gnutella, released in March, was the first decentralized file sharing network. In the gnutella network, all connecting software was considered equal...

Words: 1877 - Pages: 8

Premium Essay

Security Aspects of Peer-to-Peer Computing

... May 9, 2014 It is important to enable peers to represent and update their trust in other peers in open networks for sharing files, and especially services. A trust model and a method for building reputation based on recommendations in peer-to-peer networks. Since trust is multifaceted, peers need to develop differentiated trust in aspects of other peers’ capability. The peer’s needs are different in different situations. Depending on the situation, a peer may need to consider it’s trust in a specific aspect of another peer’s capability or in multiple aspects. There are networks that provide a flexible method to present differentiated trust and combine different aspects of trust. The evaluation of the model using a simulation shows that the system where peers communicate their experiences outperforms the system where peers do not share recommendations with each other and that a differentiated trust adds to the performance in terms of percentage of successful interactions. Currently, a new and highly interesting paradigm for communication on the Internet, known as Peer-to-Peer (P2P), is emerging. Although originally designed exclusively for pragmatic file swapping applications, Peer-to-Peer mechanisms can be used to access any kind of distributed resources and may offer new possibilities for Internet based applications. Computer and network security, or cybersecurity, are...

Words: 2656 - Pages: 11

Premium Essay

Final Paper

...live in a system and a mindset that has not been updated in over 100 years. This group has not adapted to the changing times. On the other side of this picture you have individual people that what to experience what artist of music, movie and software present to the world. What I am presenting to you is world around illegal downloading of copyrighted material. The question I present to you is this, how can we bring both sides of this picture together with both sides being able to get what they want? To begin lets go back a few years to around 1998. I am sure most of you have heard of Napster. For those that didn’t think was a new file sharing program that was able to download copyright material digitally. The processed worked by taking small parts of the overall file from multiple sources and piecing them back together on your end as a whole file. This was a huge problem to the recording industry and as such saw their record sales fall. Instead of the recording industry trying to work with the leaders of Napster and other programs to come up with a solution, the recording industry along with some artist sued Napster for lost revenue. In the end Napster lost their court battle, but this was not the end of illegal downloading of copyrighted material. Since this time the recording, movie, software and pornographic industries have seen their profits continue to fall due to broadband internet becoming the norm. These industries have not changed their business model to adapt, but...

Words: 2563 - Pages: 11

Free Essay

Stuff

...This is a solution to iiNet Case Study and goes through a stakeholder analysis. The iiNet case created widespread interest among the public in Australia, as well as abroad, due to its benchmark setting and ruling that was handed down by Justice Cowdroy, declaring that the internet service provider (ISP) did not authorise the infringements of copyright of its users. The use of the BitTorrent system for sharing large files relates to the speed of data transfer available to users on the internet. Where large files are concerned, it is harder for these to be shared if the regular transfer speeds are utilised and the normal system are the medium used to complete the transfer. Hence, the developers of the BitTorrent system devised a program that could be used to allow users to share these large resources with ease. The case in the Federal Court was to decide the responsible authority allowing users to share resources that are copyrighted by third parties. In essence, the primary concern was the sharing of movies that were owned by large film production companies like Sony, Universal and Warner Brothers, as well as the piracy of original prints which cause a loss of revenue for all parties concerned with the industry. The other key player in court representing all those affected by the copyright violation was AFACT, which provided a consolidated representation of over 50,000 Australian involved in the entertainment business. Both AFACT and the production companies held iiNet, one...

Words: 836 - Pages: 4

Premium Essay

Graduated Response Plan

...Benefits and Alternative approach Anik K Singh 8/11/2012 The Graduated Response System INTRODUCTION The growth of internet and its ever increasing pervasiveness has caused extensive digitization of copyrighted content not limited to a single format and subsequently an increase in online piracy. This combined with the advent of P2P file sharing mechanisms as a massive means of infringement practice has led to a paradigm shift in the approach to copyright infringement. Where unauthorized copying of a work was earlier considered a means of increasing a work’s market by stimulating its network effects, it is today seen as an unfair practice, a hindrance to the content owners and artists creative and financial viability. This shift has seen associations like RIAA (Recording Industry Association of America) and MPAA (Motion Picture Association of America) take desperate measures to curb illegal file sharing, the latest means of which is the “Three Strikes Rule” also known as The Graduated Response Plan. This paper starts with a brief overview on why copyright laws are important to content owners and discusses illegal file sharing, its history and the various means used for it. We then discuss the various approaches that representative bodies like RIAA have taken in the past and why the transition to the Graduate Response Plan, how it operates, its relative advantages and disadvantages to the various set of people involved in the copy right system and finally some...

Words: 5226 - Pages: 21

Premium Essay

A a a a a

...Additional Case Studies Case 4a Marketing music products alongside emerging digital music channels Esmée had been working in the music industry as a marketing director for a small and successful independent record label for over fifteen years before deciding to study at university. She had witnessed many changes in the music industry over her career, the most significant of which was the transition from selling cassettes, vinyl records and CDs at retail to selling digital music online. She had observed that the music industry had not taken much notice of the potential for marketing and distributing digital music online until Shawn Fanning developed his peer-to-peer (P2P) file trading application, Napster, in 1999. While the music industry focused on shutting the service down, Napster became even more popular with music fans and consumers who were interested in discovering and sharing new music and creating custom compilations or playlists without having to buy entire albums. Early on, Esmée had decided that she needed to understand why Napster was so popular and consumers so enthusiastic about sharing music online. She decided to download the Napster application and was surprised to find older songs that were no longer available at retail, previously unreleased recordings, alternative studio versions and bootleg recordings made at live concerts. While searching for and downloading music, Esmée also began to interact with communities focused around their file trading...

Words: 1033 - Pages: 5

Premium Essay

Mobile Devices

...Case I Study: Mobile Devices Ditty A. Kone Dr. Alaba Oluyomi CIS 333 Networking Security Fundamentals April 17, 2012 Case I Study: Mobile Devices Ditty A. Kone Dr. Alaba Oluyomi CIS 333 Networking Security Fundamentals April 17, 2012 Nowadays, wireless communication and devices are very flexible, convenient, and easy to use everywhere. With the introduction of wireless local area network (WLAN) many users find it very flexible to move laptops from one place to another within the office while maintaining connectivity with the network, sharing data and applications with network system and other users with compatible devices without been tied to printer cables and other peripheral device connection. This is very important in a doctor’s office because patients and doctors move from room to room depends on the type of test they are doing. Risks inherent in the use of wireless and mobile technologies Having mobile device makes it easier for them to do their jobs easier and it can even help cut wiring costs. In the other hand there are many risks inherent in using wireless and mobile technologies. Each wireless device, such as a laptop or PDA, that is equipped with a wireless card and is turned on is constantly sending out signals called "probes," indicating that it is seeking to "hook up" with a nearby access point. This probe automatically detects the nearest access point, called a hot spot. A screen is then displayed to instruct the user on how to...

Words: 789 - Pages: 4

Premium Essay

Atlantic Computers

...Atlantic Computers Case Study Analysis: A Bundle of Pricing Options Margaret Bednarowicz MKT 520: Marketing Management Morris Graduate School of Management Robert Morris University Mr. William Briner January 29, 2011 Case Background Atlantic Computer is a company which specializes in high performance servers and high tech products. With its Radia server, the company is considered to be one of the most important competitors in the high performance server market. Market trends are showing, however, that basic server market is steadily growing, and faster than the high performance server market. The company’s objective is to enter the basic server market by introducing their new basic server called “Tronn. This new server will be combined with the PESA software which would allow the Tronn to improve its overall performance so it can successfully compete against the leader of the market, Ontario Computer, and their basic server “Zink. Problem Statement The key problem of this case is competition. Currently, the basic server market is dominated by Ontario Computer. This competitor holds 50% revenue market share of the basic server market. Ontario Computer has achieved this with cutting pricing and utilizing a flexible and innovative supply chain strategy. Besides competition, the following concerns need to be addressed when determining a pricing strategy such as:  Price of the Tronn server is higher than Zink. The Zink server costs $1...

Words: 801 - Pages: 4

Free Essay

Dsadsa

...Introduction and Abstract Copyright(c), 1984, Fred Cohen - All Rights Reserved This paper defines a major computer security problem called a virus. The virus is interesting because of its ability to attach itself to other programs and cause them to become viruses as well. There are two spellings for the plural of virus; 'virusses', and 'viruses'. We use the one found in Webster's 3rd International Unabridged Dictionary Given the wide spread use of sharing in current computer systems, the threat of a virus carrying a Trojan horse [Anderson72] [Linde75] is significant. Although a considerable amount of work has been done in implementing policies to protect from the illicit dissemination of information [Bell73] [Denning82], and many systems have been implemented to provide protection from this sort of attack [McCauley79] [Popek79] [Gold79] [Landwehr83], little work has been done in the area of keeping information entering an area from causing damage [Lampson73] [Biba77]. There are many types of information paths possible in systems, some legitimate and authorized, and others that may be covert [Lampson73], the most commonly ignored one being through the user. We will ignore covert information paths throughout this paper. The general facilities exist for providing provably correct protection schemes [Feiertag79], but they depend on a security policy that is effective against the types of attacks being carried out. Even some quite simple protection systems cannot be proven 'safe' [Harrison76]...

Words: 8970 - Pages: 36

Premium Essay

Mg650 Managing Info. Tech. Enterprise

...web sites for social networking and microblogging such as twitter, LinkedIn, face book, and Instagram. With social media you share and exchange information, ideas, pictures, and videos. The electronic communication strengthens both our personal and professional relationship and all these communications need privacy. Normally privacy can be define as the condition or quality of being private from the occurrence of others. In our days, internet has face different challenges to protect the privacy of its customers. Information passes in different computer systems before reaches the ending target. And every each systems is required to be monitored, capture, and store communications that go by through it. For example there are tiny files set down on a computer called cookies. When a user visits certain website it recognize the visitor. Cookies and other web monitoring tools closely track the activities of the web site visitors. Internet technology has posed new challenges for the protection of individual privacy. Information sent over this vast network of networks may pass through many different computer systems before it reaches its final destination. Each of these systems is capable of monitoring, capturing, and storing communications that pass through it. . It is potential to record all online activities of factually a few millions of people...

Words: 2199 - Pages: 9

Premium Essay

Media Piracy

...Many viewpoints on media piracy exist, and although strong arguments present viable information for each side there is no clear cut answer. The difference in opinion between artists, producers, record labels, and listeners spans across the world. Listeners tend to take free music for granted nowadays as tunes can be acquired easily from various sources. Many state this takes value away from the hard work dedicated to producing albums, while others disagree arguing that the availability of music in today’s day in age is vital to up and coming artists trying to make a name for themselves in the music industry. In a recent study done on 1,000 of the most recent artists to break into the industry over 50 percent of artists stated that they believed media piracy helps make their work known, while a mere 15 percent were against it. Regardless of one’s opinion, the framework of the music industry is ever changing as artists begin to shift their focus towards increased concert appearances, released singles, mix-tapes, and featuring themselves in fellow artists’ songs. All attempts to stay in the spotlight they worked so hard to attain. The shift in genre, radio, widespread internet, and the increase in media piracy has begun a downward spiral for the sale of albums. As you can see, music was at its peak in 1999 before the technology boom truly took off, creating a lapse in the need to buy hard copies on one’s favorite artists’ album. Since 2000, sales have steadily fallen...

Words: 740 - Pages: 3