阴毛的作用是什么| 爸爸的妈妈叫什么| 阴部痒是什么原因| 生产周期是什么意思| 冠周炎吃什么药| 养老金什么时候可以领取| 打耳洞需要注意什么| 桑葚不能和什么一起吃| 稷是什么作物| 寄生树有什么功效作用| 夹心饼干是什么意思| 医学上cr是什么意思| 三星堆遗址在什么地方| 土中金是什么数字| 牛皮癣用什么药膏| 倒立对身体有什么好处| 料酒是什么| 狐臭手术挂什么科室| 狗生小狗前有什么征兆| 59岁生日有什么讲究| XXJ什么意思| 雪媚娘是什么| 1月15日什么星座| 吃大虾不能吃什么| 腿肿是什么原因引起的| 基药是什么意思| 西瓜不可以和什么同食| 宁夏古代叫什么| 牛骨煲汤搭配什么最好| 桃花是指什么生肖| 老鼠最怕什么气味驱赶| 伏天是什么时候| 吃什么对胃好| 皇太极叫什么名字| 身上起红点是什么病| 电解水是什么水| 肌酐低是什么问题| 不安腿是什么症状| 黄芪丹参山楂泡水有什么功效| 30号来的月经什么时候是排卵期| bp是什么意思| 男子精少吃什么药可以生精| 蛇为什么怕鹅| 清晨醒来口苦是什么原因| 2022年属什么生肖| 孕妇吃葡萄对胎儿有什么好处| 18k金和24k金有什么区别| 吃什么补气补血最见效| 一什么鼻子| 为什么不建议光子嫩肤| 法国的货币叫什么| 刘备是什么样的人| 早晨起来口干口苦是什么原因| 熬夜吃什么对身体好| 腋下属于什么科| 硒是什么意思| 五月二十一是什么星座| 巨蟹男和什么座最配| 什么是生源地| 二月二是什么节| 龟奴是什么| 民政局是干什么的| 卧室放什么驱虫最好| 空调自动关机什么原因| 补血吃什么药| 胡萝卜什么颜色| 下巴长痘痘是什么原因引起的| hi什么意思| 两个菱形是什么牌子| nuxe是什么牌子护肤品| 一般什么人容易得甲亢| 第一次见面送女生什么花| 亚玛病是什么病| 膝盖背面叫什么| 脾胃不好吃什么| 6月2日是什么星座| 讲义是什么| 心衰竭吃什么药效果好| 十月三十号什么星座| 7月6号是什么星座| 毓字五行属什么| 谁的尾巴有什么作用| 放疗后不能吃什么| 电灯泡是什么意思| 桂花树施什么肥| 蓝天白云是什么意思| 尿潜血阴性什么意思| 我用什么留住你| 脑动脉硬化是什么意思| 毛主席什么时候死的| 床上什么虫子夜间咬人| 逃之夭夭是什么意思| 棕色是什么颜色| 芹菜和什么菜搭配最好| 手掌很红是什么原因| 什么食物含维生素b| max什么意思| 天公作美什么意思| luxury是什么牌子| 上天是什么意思| 羊肚是羊的什么部位| 11月15日什么星座| 胃不好吃什么好消化又有营养| 头晕流鼻血是什么原因| 20年是什么年| 为什么要军训| 永字五行属什么| ccu是什么意思| 葫芦鸡为什么叫葫芦鸡| 后援会是什么意思| hr什么意思| 马来西亚有什么特产| 如来佛祖叫什么名字| 颈椎病用什么药膏| rhubarb是什么意思| 尿浑浊是什么病的前兆| 什么生肖| 西洋菜俗称叫什么| 木是什么颜色| 堂是什么意思| 肝郁气滞吃什么中成药| 痛风什么引起的原因有哪些| espresso什么意思| 指甲弯曲是什么原因| 垂体泌乳素高是什么原因| 喜用神是什么意思| 黄精有什么功效和作用| 国家电网是什么编制| 沉甸甸的爱是什么意思| 镜里观花是什么生肖| 退行性改变是什么意思| 二甲双胍什么时候吃最好| 黄金有什么作用| 滑石是什么| 姝字五行属什么的| 做完核磁共振后需要注意什么| 怀孕两周有什么症状| rh血型D阳性是什么意思| mpv是什么意思| 拉肚子不能吃什么食物| 下午7点是什么时辰| 中元节会开什么生肖| 水泊梁山什么意思| ost什么意思| 什么时候开始数伏| 拉肚子拉水吃什么药| 7月14什么星座| 印度为什么用手吃饭| 半月板是什么部位| 早上起床腰疼是什么原因| 起风疹了用什么快速方法能解决| 皮肤痒是什么病的前兆| 老人吃什么水果对身体好| 可乐喝多了有什么危害| 莫非的近义词是什么| 前列腺实质回声欠均匀什么意思| 草莓是什么形状| 胃不舒服喝什么| 打一个喷嚏代表什么| 陆地上最大的动物是什么| 科目三为什么这么难| 孕妇为什么会水肿| 手心脚心发热是什么原因引起的| 长乘宽乘高算的是什么| 什么叫末法时代| 增强免疫力的针叫什么| 糖类抗原CA125高是什么意思| 栀子花什么时候开| 多吃醋有什么好处和坏处| 办什么厂比较好| 炎症有什么症状| 不能晒太阳是什么病| rush什么意思| 尿酸偏低是什么原因| 流清水鼻涕吃什么药| 九月23日是什么星座| 宫颈囊肿是什么原因| 吃什么补血| 痞子是什么意思| 血滴子是什么意思| flair是什么意思| 金鱼可以吃什么| 荡是什么意思| 咳嗽吃什么食物好| 莲蓬什么时候成熟| a血型和o血型生出宝宝是什么血型| 新零售是什么意思| 射手后面的星座是什么| 多多益善的意思是什么| 假酒喝了有什么症状| 送镜子代表什么意思| 喝咖啡不能吃什么食物| 公开遴选公务员是什么意思| 少将相当于什么级别| 什么大河| hp值是什么意思| 伤口恢复吃什么好得快| 女生安全期是什么意思| 亢奋什么意思| 身上有白斑块是什么原因造成的| 乙肝检查挂什么科| scr是什么| 脾胃虚吃什么水果好| 钓鱼执法是什么意思| 下午4点多是什么时辰| 沅字的寓意是什么| 砧木是什么意思| 游走是什么意思| 什么是类风湿性关节炎| 骨密度检查是查什么| 早泄吃什么药见效| 分泌物多是什么原因| 电导率低是什么意思| 痔疮很痒是什么原因| 美人尖是什么| 南瓜与什么食物相克| 百合花什么时候开花| 谷维素是什么| 空腹不能吃什么水果| 梅毒是什么| 草头是什么菜| 梦见鹦鹉是什么征兆| 人绒毛膜促性腺激素是查什么的| 仲夏什么意思| 小处男是什么意思| 开水冲鸡蛋有什么好处| 爱出汗的人是什么原因| 拉肚子去医院挂什么科| gms是什么意思| 送命题是什么意思| 92年出生属什么生肖| 灯红酒绿是什么意思| 什么药去湿气最好最快| 黄精吃了有什么好处| 女人送男人打火机代表什么| 杀阴虱用什么药最好| 十月什么星座| 打火机里的液体是什么| 女人太瘦吃什么增肥| 肠梗阻是什么病| 什么颜色可以调成紫色| 吃什么水果减肥| 石斛什么价格| 江西有什么好玩的| 减肥吃什么肉| 白眼球有红血丝是什么原因| 医学ac是什么意思| 津津有味的意思是什么| ganni是什么牌子| 什么情况下不能献血| 什么是华盖| 女人眼角有痣代表什么| 脚底板痛什么原因| 艾滋病什么症状| 71年什么时候退休| 圣女是什么生肖| dhea是什么药| ehe是什么牌子| lsp是什么意思| 知天命是什么意思| 妊娠高血压对胎儿有什么影响| 空腹打嗝是什么原因引起的| 土耳其浴是什么意思| 老鼠疣长什么样子图片| 百度Jump to content

南京交院共有8个项目获得2013年全国优秀规划设计

From Wikipedia, the free encyclopedia
百度 从借款端数据来看,该平台的人均借款金额为万元,相比2016年更加小额分散。

Peer-to-peer file sharing is the distribution and sharing of digital media using peer-to-peer (P2P) networking technology. P2P file sharing allows users to access media files such as books, music, movies, and games using a P2P software program that searches for other connected computers on a P2P network to locate the desired content.[1] The nodes (peers) of such networks are end-user computers and distribution servers (not required).

The early days of file-sharing were done predominantly by client-server transfers from web pages, FTP and IRC before Napster popularised a Windows application that allowed users to both upload and download with a freemium style service. Record companies and artists called for its shutdown and FBI raids followed. Napster had been incredibly popular at its peak, spawning a grass-roots movement following from the mixtape scene of the 80's and left a significant gap in music availability with its followers. After much discussion on forums and in chat rooms, it was decided that Napster had been vulnerable due to its reliance on centralised servers and their physical location and thus competing groups raced to build a decentralised peer-to-peer system.

Peer-to-peer file sharing technology has evolved through several design stages from the early networks like Gnutella, which popularized the technology in several iterations that used various front ends such as Kazaa, Limewire and WinMX before Edonkey then on to later models like the BitTorrent protocol. Microsoft uses it for Update distribution (Windows 10) and online video games use it as their content distribution network for downloading large amounts of data without incurring the dramatic costs for bandwidth inherent when providing just a single source.

Several factors contributed to the widespread adoption and facilitation of peer-to-peer file sharing. These included increasing Internet bandwidth, the widespread digitization of physical media, and the increasing capabilities of residential personal computers. Users are able to transfer one or more files from one computer to another across the Internet through various file transfer systems and other file-sharing networks.[1]

Timeline of peer-to-peer software

History

[edit]

The central index server indexed the users and their shared content. When someone searched for a file, the server searched all available copies of that file and presented them to the user. The files would be transferred directly between private computers (peers/nodes). A limitation was that only music files could be shared.[2] Because this process occurred on a central server, however, Napster was held liable for copyright infringement and shut down in July 2001. It later reopened as a pay service.[3]

After Napster was shut down, peer-to-peer services were invented such as Gnutella and Kazaa. These services also allowed users to download files other than music, such as movies and games.[2]

Technology evolution

[edit]

Napster and eDonkey2000 both used a central server-based model. These systems relied on the operation of the respective central servers, and thus were susceptible to centralized shutdown. Their demise led to the rise of networks like Limewire, Kazaa, Morpheus, Gnutella, and Gnutella2, which are able to operate without any central servers, eliminating the central vulnerability by connecting users remotely to each other. However, these networks still relied on specific, centrally distributed client programs, so they could be crippled by taking legal action against a sufficiently large number of publishers of the client programs. Sharman Networks, the publisher of Kazaa, has been inactive since 2006. StreamCast Networks, the publisher of Morpheus, shut down on April 22, 2008. Limewire LLC was shut down in late 2010 or early 2011. This cleared the way for the dominance of the Bittorrent protocol, which differs from its predecessors in two major ways. The first is that no individual, group, or company owns the protocol or the terms "Torrent" or "Bittorrent", meaning that anyone can write and distribute client software that works with the network. The second is that Bittorrent clients have no search functionality of their own. Instead, users must rely on third-party websites like Isohunt or The Pirate Bay to find "torrent" files, which function like maps that tell the client how to find and download the files that the user actually wants. These two characteristics combined offer a level of decentralization that makes Bittorrent practically impossible to shut down. File-sharing networks are sometimes organized into three "generations" based on these different levels of decentralization.[4][5] Darknets, including networks like Freenet, are sometimes considered to be third-generation file-sharing networks.[6]

Peer-to-peer file sharing is also efficient in terms of cost.[7] The system administration overhead is smaller because the user is the provider and usually the provider is the administrator as well. Hence each network can be monitored by the users themselves. At the same time, large servers sometimes require more storage and this increases the cost since the storage has to be rented or bought exclusively for a server. However, usually peer-to-peer file sharing does not require a dedicated server.[8]

Economic impact

[edit]

There are ongoing discussion about the economic impact of P2P file sharing. Norbert Michel, a policy analyst at The Heritage Foundation, said that studies had produced "disparate estimates of file sharing's impact on album sales".[9]

In the book The Wealth of Networks, Yochai Benkler states that peer-to-peer file sharing is economically efficient and that the users pay the full transaction cost and marginal cost of such sharing even if it "throws a monkey wrench into the particular way in which our society has chosen to pay musicians and re-cording executives. This trades off efficiency for longer-term incentive effects for the recording industry. However, it is efficient within the normal meaning of the term in economics in a way that it would not have been had Jack and Jane used subsidized computers or network connections".[10]

A calculation example:

with peer to peer file sharing:

with casual content delivery networks:

Music industry

[edit]

The economic effect of copyright infringement through peer-to-peer file sharing on music revenue has been controversial and difficult to determine. Unofficial studies found that file sharing had a negative impact on record sales.[11][12][13][14][15] It has proven difficult to untangle the cause and effect relationships among a number of different trends, including an increase in legal online purchases of music; illegal file-sharing; drop in the prices of compact disks; and the closure of many independent music stores with a concomitant shift to sales by big-box retailers.[16]

Film industry

[edit]

The Motion Picture Association (MPAA) reported that American studios lost $2,373 billion in 2005 (equivalent to $3,820 billion in 2024) representing approximately one third of the total cost of film piracy in the United States.[17] The MPAA's estimate was doubted by commentators since it was based on the assumption that one download was equivalent to one lost sale, and downloaders might not purchase the movie if illegal downloading was not an option.[18][19][20] Due to the private nature of the study, the figures could not be publicly checked for methodology or validity.[21][22][23] In January 2008, as the MPAA was lobbying for a bill which would compel Universities to crack down on piracy, it was admitted by MPAA that its figures on piracy in colleges had been inflated by up to 300%.[24][25]

A 2010 study, commissioned by the International Chamber of Commerce and conducted by independent Paris-based economics firm TERA, estimated that unlawful downloading of music, film and software cost Europe's creative industries several billion dollars in revenue each year.[26] A further TERA study predicted losses due to piracy reaching as much as 1.2 million jobs and €240 billion in retail revenue by 2015 if the trend continued.[citation needed] Researchers applied a substitution rate of ten percent to the volume of copyright infringements per year. This rate corresponded to the number of units potentially traded if unlawful file sharing were eliminated and did not occur.[27] Piracy rates for popular software and operating systems have been common, even in regions with strong intellectual property enforcement, such as the United States or the European Union.[28]

Public perception and usage

[edit]

In 2004, an estimated 70 million people participated in online file sharing.[29] According to a CBS News poll, nearly 70 percent of 18- to 29-year-olds thought file sharing was acceptable in some circumstances and 58 percent of all Americans who followed the file sharing issue considered it acceptable in at least some circumstances.[30] In January 2006, 32 million Americans over the age of 12 had downloaded at least one feature-length movie from the Internet, 80 percent of whom had done so exclusively over P2P. Of the population sampled, 60 percent felt that downloading copyrighted movies off the Internet did not constitute a very serious offense, however 78 percent believed taking a DVD from a store without paying for it constituted a very serious offense.[31]

In July 2008, 20 percent of Europeans used file sharing networks to obtain music, while 10 percent used paid-for digital music services such as iTunes.[32] In February 2009, a survey undertaken by Tiscali in the UK found that 75 percent of the English public polled were aware of what was legal and illegal in relation to file sharing, but there was a divide as to where they felt the legal burden should be placed: 49 percent of people believed P2P companies should be held responsible for illegal file sharing on their networks and 18 percent viewed individual file sharers as the culprits.[33]

According to an earlier poll, 75 percent of young voters in Sweden (18-20) supported file sharing when presented with the statement: "I think it is OK to download files from the Net, even if it is illegal." Of the respondents, 38 percent said they "adamantly agreed" while 39 percent said they "partly agreed".[34] An academic study among American and European college students found that users of file-sharing technologies were relatively anti-copyright and that copyright enforcement created backlash, hardening pro-file sharing beliefs among users of these technologies.[35]

Communities in P2P file sharing networks

[edit]

Communities have a prominent role in many peer to peer networks and applications, such as BitTorrent, Gnutella and DC++. There are different elements that contribute to the formation, development and the stability of these communities, which include interests, user attributes, cost reduction, user motivation and the dimension of the community.[citation needed]

Interest attributes

[edit]

Peer communities are formed on the basis of common interests. For Khambatti, Ryu and Dasgupta common interests can be labelled as attributes "which are used to determine the peer communities in which a particular peer can participate".[36] There are two ways in which these attributes can be classified: explicit and implicit attributes.

Explicit values are information that peers provide about themselves to a specific community, such as their interest in a subject or their taste in music. With implicit values, users do not directly express information about themselves, albeit, it is still possible to find information about that specific user by uncovering his or her past queries and research carried out in a P2P network. Khambatti, Ryu and Dasgupta divide these interests further into three classes: personal, claimed and group attributes.[36]

A full set of attributes (common interests) of a specific peer is defined as personal attributes, and is a collection of information a peer has about him or herself. Peers may decide not to disclose information about themselves to maintain their privacy and online security. It is for this reason that the authors specify that "a subset of...attributes is explicitly claimed public by a peer", and they define such attributes as "claimed attributes".[36] The third category of interests is group attributes, defined as "location or affiliation oriented" and are needed to form a...basis for communities", an example being the "domain name of an internet connection" which acts as an online location and group identifier for certain users.

Cost reduction

[edit]

Cost reduction influences the sharing component of P2P communities. Users who share do so to attempt "to reduce...costs" as made clear by Cunningham, Alexander and Adilov.[37] In their work Peer-to-peer File Sharing Communities, they explain that "the act of sharing is costly since any download from a sharer implies that the sharer is sacrificing bandwidth".[37] As sharing represents the basis of P2P communities, such as Napster, and without it "the network collapses", users share despite its costs in order to attempt to lower their own costs, particularly those associated with searching, and with the congestion of internet servers.[37]

User motivation and size of community

[edit]

User motivation and the size of the P2P community contribute to its sustainability and activity. In her work Motivating Participation in Peer to Peer Communities, Vassileva studies these two aspects through an experiment carried out in the University of Saskatchewan (Canada), where a P2P application (COMUTELLA) was created and distributed among students. In her view, motivation is "a crucial factor" in encouraging users to participate in an online P2P community, particularly because the "lack of a critical mass of active users" in the form of a community will not allow for a P2P sharing to function properly.[38]

Usefulness is a valued aspect by users when joining a P2P community. The specific P2P system must be perceived as "useful" by the user and must be able to fulfil his or her needs and pursue his or her interests. Consequently, the "size of the community of users defines the level of usefulness" and "the value of the system determines the number of users".[38] This two way process is defined by Vassileva as a feedback loop, and has allowed for the birth of file-sharing systems like Napster and KaZaA. However, in her research Vassileva has also found that "incentives are needed for the users in the beginning", particularly for motivating and getting users into the habit of staying online.[38] This can be done, for example, by providing the system with a wide amount of resources or by having an experienced user provide assistance to a less experienced one.

User classification

[edit]

Users participating in P2P systems can be classified in different ways. According to Vassileva, users can be classified depending on their participation in the P2P system. There are five types of users to be found: users who create services, users who allow services, users who facilitate search, users who allow communication, users who are uncooperative and free ride.[38]

In the first instance, the user creates new resources or services and offers them to the community. In the second, the user provides the community with disk space "to store files for downloads" or with "computing resources" to facilitate a service provided by another users.[38] In the third, the user provides a list of relationships to help other users find specific files or services. In the fourth, the user participates actively in the "protocol of the network", contributing to keeping the network together. In the last situation, the user does not contribute to the network, downloads what he or she needs but goes immediately offline once the service is not needed anymore, thus free-riding on the network and community resources.[38]

Tracking

[edit]

Corporations continue to combat the use of the internet as a tool to illegally copy and share various files, especially that of copyrighted music. The Recording Industry Association of America (RIAA) has been active in leading campaigns against infringers. Lawsuits have been launched against individuals as well as programs such as Napster in order to "protect" copyright owners.[39] One effort of the RIAA has been to implant decoy users to monitor the use of copyrighted material from a firsthand perspective.[40]

Risks

[edit]

In early June 2002, Researcher Nathaniel Good at HP Labs demonstrated that user interface design issues could contribute to users inadvertently sharing personal and confidential information over P2P networks.[41][42][43]

In 2003, Congressional hearings before the House Committee of Government Reform (Overexposed: The Threats to Privacy & Security on File Sharing Networks)[44] and the Senate Judiciary Committee (The Dark Side of a Bright Idea: Could Personal and National Security Risks Compromise the Potential of P2P File-Sharing Networks?) [45] were convened to address and discuss the issue of inadvertent sharing on peer-to-peer networks and its consequences to consumer and national security.

Researchers have examined potential security risks including the release of personal information, bundled spyware, and viruses downloaded from the network.[46][47] Some proprietary file sharing clients have been known to bundle malware, though open source programs typically have not. Some open source file sharing packages have even provided integrated anti-virus scanning.[48]

Since approximately 2004 the threat of identity theft had become more prevalent, and in July 2008 there was another inadvertent revealing of vast amounts of personal information through P2P sites. The "names, dates of birth, and Social Security numbers of about 2,000 of (an investment) firm's clients" were exposed, "including [those of] Supreme Court Justice Stephen Breyer."[49] A drastic increase in inadvertent P2P file sharing of personal and sensitive information became evident in 2009 at the beginning of President Obama's administration when the blueprints to the helicopter Marine One were made available to the public through a breach in security via a P2P file sharing site. Access to this information has the potential of being detrimental to US security.[49] Furthermore, shortly before this security breach, the Today show had reported that more than 150,000 tax returns, 25,800 student loan applications and 626,000 credit reports had been inadvertently made available through file sharing.[49]

The United States government then attempted to make users more aware of the potential risks involved with P2P file sharing programs[50] through legislation such as H.R. 1319, the Informed P2P User Act, in 2009.[51] According to this act, it would be mandatory for individuals to be aware of the risks associated with peer-to-peer file sharing before purchasing software with informed consent of the user required prior to use of such programs. In addition, the act would allow users to block and remove P2P file sharing software from their computers at any time,[52] with the Federal Trade Commission enforcing regulations. US-CERT also warns of the potential risks.[53]

[edit]

The act of file sharing is not illegal per se and peer-to-peer networks are also used for legitimate purposes. The legal issues in file sharing involve violating the laws of copyrighted material. Most discussions about the legality of file sharing are implied to be about solely copyright material. Many countries have fair use exceptions that permit limited use of copyrighted material without acquiring permission from the rights holders. Such documents include commentary, news reporting, research and scholarship. Copyright laws are territorial- they do not extend beyond the territory of a specific state unless that state is a party to an international agreement. Most countries today are parties to at least one such agreement.

In the area of privacy, recent court rulings seem to indicate that there can be no expectation of privacy in data exposed over peer-to-peer file-sharing networks. In a 39-page ruling released November 8, 2013, US District Court Judge Christina Reiss denied the motion to suppress evidence gathered by authorities without a search warrant through an automated peer-to-peer search tool.[54]

Curtailing the sharing of copyrighted materials

[edit]

Media industries have made efforts to curtail the spread of copyrighted materials through P2P systems. Initially, the corporations were able to successfully sue the distribution platforms such as Napster and have them shut down. Additionally, they litigated users who prominently shared copyrighted materials en masse. However, as more decentralized systems such as FastTrack were developed, this proved to be unenforceable. There are also millions of users worldwide who use P2P systems illegally, which made it impractical to seek widespread legal action. One major effort involves distributing polluted files into the P2P network. For instance, one may distribute unrelated files that has the metadata of a copyrighted media. This way, users who downloads the media would receive something unrelated to what they have been expecting.[55]

See also

[edit]

References

[edit]
  1. ^ a b Carmack, Carman (March 26, 2005). "How Bit Torrent Works". computer.howstuffworks.com/. Archived from the original on August 7, 2011. Retrieved May 21, 2011.
  2. ^ a b Tyson, Jeff (October 30, 2000). "How the Old Napster Worked". howstuffworks.com. Archived from the original on August 25, 2011. Retrieved May 21, 2011.
  3. ^ "Copyright and Peer-To-Peer Music File Sharing: The Napster Case and the Argument Against Legislative Reform". murdoch.edu.au. March 2004. Archived from the original on July 9, 2010. Retrieved May 21, 2011.
  4. ^ Gong, Yiming. "Identifying P2P users using traffic analysis". Symantec. Archived from the original on December 7, 2014. Retrieved December 8, 2014.
  5. ^ Watson, Stephanie (February 10, 2005). "How Kazaa Works". computer.howstuffworks.com. Archived from the original on August 15, 2011. Retrieved May 21, 2011.
  6. ^ Peer-to-peer systems and applications. Steinmetz, Ralf., Wehrle, Klaus, 1972-. Berlin. November 3, 2005. ISBN 9783540320470. OCLC 262681429.{{cite book}}: CS1 maint: location missing publisher (link) CS1 maint: others (link)
  7. ^ "Archived copy" (PDF). Archived from the original (PDF) on March 3, 2016. Retrieved December 25, 2013.{{cite web}}: CS1 maint: archived copy as title (link)
  8. ^ Winkelman, Dr. Roy. "Software". Florida Center for Instructional Technology College of Education, University of South Florida. Archived from the original on January 12, 2013. Retrieved February 6, 2013.
  9. ^ J. Michel, Norbert. Internet File Sharing and The Evidence So far[unfit], heritage.org, August 23, 2004.
  10. ^ Yochai Benkler (2006). Wealth of Networks. Yale University Press. ISBN 978-0300127232. benkler.
  11. ^ Strumpf, Koleman; Oberholzer, Felix (March 2004). "The Effect of File Sharing on Record Sales An Empirical Analysis" (PDF). University of North Carolina. Archived from the original (PDF) on December 31, 2005.
  12. ^ Liebowitz, Stan J. (2006). "File Sharing: Creative Destruction or Just Plain Destruction?". The Journal of Law & Economics. 49 (1): 1–28. CiteSeerX 10.1.1.320.601. doi:10.1086/503518. JSTOR 10.1086/503518. S2CID 6000126.
  13. ^ Rob, Rafael; Waldfogel, Joel (2006). "Piracy on the High C's: Music Downloading, Sales Displacement, and Social Welfare in a Sample of College Students". The Journal of Law & Economics. 49 (1): 29–62. CiteSeerX 10.1.1.505.4843. doi:10.1086/430809. JSTOR 10.1086/430809.
  14. ^ Zentner, Alejandro (2006). "Measuring the Effect of File Sharing on Music Purchases". The Journal of Law & Economics. 49 (1): 63–90. CiteSeerX 10.1.1.571.6264. doi:10.1086/501082. JSTOR 10.1086/501082. S2CID 154353570.
  15. ^ Stan J. Liebowitz in a series of papers (2005, 2006)
  16. ^ Smith, Ethan. March 21, 2007. "Sales of Music, Long in Decline, Plunge Sharply: Rise in Downloading Fails to Boost Industry; A Retailing Shakeout" Archived 2025-08-05 at the Wayback Machine, The Wall Street Journal Website
  17. ^ "SWEDISH AUTHORITIES SINK PIRATE BAY: Huge Worldwide Supplier of Illegal Movies Told No Safe Harbors for Facilitators of Piracy!" (PDF). MPAA. May 31, 2006. Archived from the original (PDF) on October 3, 2009. Retrieved May 3, 2020.
  18. ^ Gross, Daniel (November 21, 2004). "Does a Free Download Equal a Lost Sale?". The New York Times. Archived from the original on October 12, 2007. Retrieved July 16, 2007.
  19. ^ Oberholzer, Felix; Strumpf, Koleman (March 2004). "The Effect of File Sharing on Record Sales: An Empirical Analysis" (PDF). University of North Carolina. UNC Chapel Hill. Archived from the original (PDF) on June 13, 2008. Retrieved September 11, 2010.
  20. ^ Schwartz, John (April 5, 2004). "A Heretical View of File Sharing". The New York Times. Archived from the original on January 3, 2008. Retrieved July 16, 2007.
  21. ^ Fisher, Ken (May 5, 2006). "The problem with MPAA's shocking piracy numbers". Ars Technica. Archived from the original on June 13, 2007. Retrieved July 15, 2007.
  22. ^ "Movie Piracy Cost 6.1 Billion". Torrent Freak. May 3, 2006. Archived from the original on September 30, 2007. Retrieved July 16, 2007.
  23. ^ "Hollywood study examines costs of film piracy". ZDNet (Reuters). May 3, 2006. Archived from the original on April 17, 2007. Retrieved July 16, 2007.
  24. ^ Anderson, Nate (January 22, 2008). "MPAA admits college piracy numbers grossly inflated". Ars Technica. Archived from the original on May 9, 2012. Retrieved June 14, 2017.
  25. ^ Anderson, Nate (January 15, 2008). "2008 shaping up to be "Year of Filters" at colleges, ISPs". Ars Technica. Archived from the original on September 13, 2011. Retrieved June 14, 2017.
  26. ^ Mundell, Ian. Piracy in Europe costs $13.7 billion, Variety. March 18, 2010.
  27. ^ Geoffron, Patrice. Building a Digital Economy Archived 2025-08-05 at the Wayback Machine, iccwbo.org, March 17, 2010.
  28. ^ Moisés Naím (2007). Illicit: How smugglers, traffickers and copycats are hijacking the global economy, p. 15. Arrow Books, London. ISBN 1-4000-7884-9.
  29. ^ Delgado, Ray. Law professors examine ethical controversies of peer-to-peer file sharing Archived 2025-08-05 at the Wayback Machine. Stanford Report, March 17, 2004.
  30. ^ Poll: Young Say File Sharing OK CBS News, Bootie Cosgrove-Mather, 2025-08-05
  31. ^ "Solutions Research Group - Movie File-Sharing Booming: Study" (PDF). Archived from the original (PDF) on February 17, 2012.
  32. ^ 17:41 GMT, Thursday, 3 July 2008 18:41 UK. Technology: "Warning letters to 'file-sharers'" Archived 2025-08-05 at the Wayback Machine, BBC NEWS.
  33. ^ MarkJ - 24 February 2009 (1:46 PM). "Tiscali UK Survey Reveals Illegal File Sharing Attitudes" Archived 2025-08-05 at the Wayback Machine, ISPreview UK News.
  34. ^ TT/Adam Ewing. 8 Jun 06 09:54 CET. "Young voters back file sharing" Archived 2025-08-05 at the Wayback Machine, The Local.
  35. ^ Ben Depoorter et al. " Copyright Backlash" Archived 2025-08-05 at the Wayback Machine, Southern California Law Review, 2011.
  36. ^ a b c Khambatti, Mujtaba; Ryu, Kyung Dong; Dasgupta, Partha (2004). "Structuring Peer-to-Peer Networks Using Interest-Based Communities". Databases, Information Systems, and Peer-to-Peer Computing. Lecture Notes in Computer Science. Vol. 2944. pp. 48–63. doi:10.1007/978-3-540-24629-9_5. ISBN 978-3-540-20968-3.
  37. ^ a b c Cunningham, Brendan; Alexander, Peter; Adilov, Nodir (October 28, 2003). "Peer-to-peer file sharing communities". Information Economics and Policy. Archived from the original on March 4, 2016. Retrieved December 16, 2015.
  38. ^ a b c d e f Vassileva, Julita (2003). "Motivating Participation in Peer to Peer Communities". Engineering Societies in the Agents World III. Lecture Notes in Computer Science. Vol. 2577. pp. 141–155. doi:10.1007/3-540-39173-8_11. ISBN 978-3-540-14009-2.
  39. ^ "Case Study: A&M Records, Inc. v. Napster, Inc". Washington University in St. Louis School of Law. August 1, 2013. Archived from the original on May 31, 2020. Retrieved April 10, 2023.
  40. ^ Banerjee, Anirban; Faloutsos, Michalis; Bhuyan, Laxmi (April 2008). "The P2P war: Someone is monitoring your activities". Computer Networks. 52 (6): 1272–1280. CiteSeerX 10.1.1.76.9451. doi:10.1016/j.comnet.2008.01.011.
  41. ^ Good, Nathaniel; Aaron Krekelberg (June 5, 2002). "Usability and privacy: a study of Kazaa P2P file- sharing". HP Labs Tech Report. Archived from the original on October 15, 2013. Retrieved October 15, 2013.
  42. ^ Good, Nathaniel S.; Krekelberg, Aaron (2003). "Usability and privacy". Proceedings of the conference on Human factors in computing systems - CHI '03. p. 137. doi:10.1145/642611.642636. ISBN 1581136307. S2CID 14850483.
  43. ^ Markoff, John (June 7, 2002). "Security Hole Found in KaZaA File-Sharing Service". New York Times. Archived from the original on November 13, 2013. Retrieved October 15, 2013.
  44. ^ Overexposed: the threats to privacy and security on filesharing networks (PDF). U.S. Government Printing Office. 2003. ISBN 978-0-16-070566-3. Archived (PDF) from the original on June 16, 2013. Retrieved October 15, 2013.[page needed]
  45. ^ "The Dark Side of a Bright Idea: Could Personal and National Security Risks Compromise the Potential of P2P File-Sharing Networks?". Archived from the original on December 19, 2012. Retrieved October 15, 2013.
  46. ^ Johnson, M. Eric; McGuire, Dan; Willey, Nicholas D. (2008). "The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for Users". Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008). p. 383. doi:10.1109/HICSS.2008.436. S2CID 15137757.
  47. ^ H?vard Vegge, Finn Michael Halvorsen and Rune Wals? Nerg?rd (2009). "Where Only Fools Dare to Tread: An Empirical Study on the Prevalence of Zero-day Malware". 2009 Fourth International Conference on Internet Monitoring and Protection. {{cite journal}}: Cite journal requires |journal= (help)
  48. ^ "Torrent Server | TurnKey GNU/Linux". www.turnkeylinux.org. Archived from the original on January 16, 2022. Retrieved February 5, 2022.
  49. ^ a b c Greg Sandoval. April 21, 2009 10:41 AM PDT. "Congress to probe P2P sites over 'inadvertent sharing'" Archived 2025-08-05 at the Wayback Machine, CNET News
  50. ^ "P2P File-Sharing Risks". OnGuardOnLine.gov. September 24, 2011. Archived from the original on January 28, 2013. Retrieved January 25, 2013.
  51. ^ "Hearing on Barrow P2P Legislation Held on Tuesday". Congressman John Barrow. May 2009. Archived from the original on October 7, 2010. Retrieved September 11, 2010.
  52. ^ "Text of H.R. 1319: Informed P2P User Act" Archived 2025-08-05 at the Wayback Machine, GovTrack.us
  53. ^ "Risks of File-Sharing Technology". US-CERT. Archived from the original on January 26, 2013. Retrieved January 25, 2013.
  54. ^ ComputerWorld.[1] Archived 2025-08-05 at the Wayback Machine " Don't expect data on P2P networks to be private, judge rules".
  55. ^ Jian Liang, Kumar, R., Yongjian Xi, & Ross, K. W. (n.d.). Pollution in P2P file sharing systems. Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies. doi:10.1109/infcom.2005.1498344
香薰是什么 石家庄古代叫什么名字 什么水果含维生素b 毕业送什么礼物给老师 心灵鸡汤是什么意思
柚子什么时候成熟 幽门螺旋杆菌是什么症状 缱绻旖旎是什么意思 中年男人遗精是什么原因 毫无违和感什么意思
不惑是什么意思 胃疼是什么感觉 什么是爬虫 鹤是什么生肖 戴玉手镯有什么好处
癣是什么原因引起的 盐酸左氧氟沙星片治什么病 羊肚是羊的什么部位 男性睾丸疼痛什么原因 ella是什么意思
是什么品牌hcv9jop7ns5r.cn 吃什么防止脱发掉发hcv7jop9ns8r.cn 血糖高吃什么hcv8jop0ns0r.cn 当律师需要什么条件hcv7jop5ns4r.cn 月经推迟什么原因bjhyzcsm.com
男人气虚吃什么补得快xinmaowt.com 腹股沟淋巴结肿大挂什么科hcv8jop5ns2r.cn 艾滋病通过什么途径传播hcv9jop0ns9r.cn 及什么意思zsyouku.com 为什么屁股上会长痘hcv7jop5ns4r.cn
七月十三什么星座naasee.com 盛情款待是什么意思hanqikai.com 为什么泡完脚后非常痒hcv8jop3ns2r.cn 脾胃虚弱吃什么药好hcv7jop9ns7r.cn 连续放屁是什么原因呢hcv9jop7ns2r.cn
如花似玉是什么生肖hcv9jop2ns5r.cn 舟可是什么字0297y7.com ib是什么单位hcv9jop1ns8r.cn 忌廉是什么东西hcv9jop3ns4r.cn 今天生猪什么价hcv7jop7ns1r.cn
百度