Preview

File Sharing and Peer-to-Peer Networking

Best Essays
Open Document
Open Document
2852 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
File Sharing and Peer-to-Peer Networking
Today, computers and access to the Internet are a gateway to endless information. People can find just about anything on the Internet with the click of just a few buttons. File sharing was introduced in the late 70’s and since then, has continued to grow. It boomed in the 90’s with the introduction of mp3 files. There are millions of people who use file sharing in legal ways. However, that number is masked by the amount of people who abuse the concept of file sharing and downloaded copyrighted material such as music or movies.
This topic is very controversial in today’s day and age due to copyright laws. A large portion of the world’s population can relate to this topic, especially college students and individuals in lower age groups. Over the past decade, file sharing has spread throughout the world and is used by all age groups both legally and illegally. Whether it’s for business, or simply personal reasons, it’s used in everyday life, such as entertainment and corporate communication. Many people use file sharing quite often and are still not completely familiar with the way it works. Understanding more in depth about how file sharing works and the legality behind the controversy, intrigues many people who use file sharing. The background of the software and programming that is involved in file sharing is something that really caught my attention and motivated me to write this paper. File sharing has also had a strong impact on the economy within the past few years. It has been the basis of many legal controversies involving copyright infringement. Sharing files cannot only get you into trouble legally, but it can also have an affect on your computer’s security. Viruses can be attached to these downloaded files and steal your personal information from your computer. The complex systems involved in file sharing exist at multiple levels. They occur at large networking levels, corporate levels, and as low as individual computers within



References: A Nation Online. (n/d). National Telecommunications and Information Administration. Retrieved November 20, 2009, from http://www.ntia.doc.gov/ntiahome/dn/html/anationonline2.htm Athow, D. (2008, May 12). MPAA aims at taking The Pirate Bay down with $15.4m lawsuit. IT ProPortal. Retrieved November 20, 2009, from http://www.itproportal.com/portal/news/article/2008/5/12/mpaa-aims-taking-pirate-bay-down-154m-lawsuit/ Barkai, D. (2002). Peer-to-Peer Computing: Technologies for Sharing and Collaborating on the Net. Santa Clara: Intel Press. Gardner, S., & Krug, K. (2005). BitTorrent For Dummies. New York: For Dummies. Michel, N. J. (n/d). Internet File Sharing: The Evidence So Far and What It Means for the Future. The Heritage Foundation - Conservative Policy Research and Analysis. Retrieved November 20, 2009, from http://www.heritage.org/research/internetandtechnology/bg1790.cfm Navy Releases New Information On Presidential Security Leak - News Story - WPXI Pittsburgh. (n/d). WPXI. Retrieved November 20, 2009, from http://www.wpxi.com/news/18818589/detail.html Oram, A. (2001). Peer-to-Peer : Harnessing the Power of Disruptive Technologies. Sebastopol: O 'Reilly Media, Inc.. P2P file sharing: Know the risks. (n/d). Microsoft Corporation. Retrieved November 20, 2009, from http://www.microsoft.com/protect/data/downloadfileshare/filesharing.aspx Park, D. J. (2007). Conglomerate Rock: The Music Industry 's Quest to Divide Music and Conquer Wallets. New York: Lexington Books. Wang, W. (2004). Steal This File Sharing Book. San Francisco: No Starch Press.

You May Also Find These Documents Helpful

  • Powerful Essays

    8. NILL, A., SCHIBROWSKY, J., & PELTIER, J. W. (2010). Factors That Influence Software Piracy: A View from Germany.Communications Of The ACM, 53(6), 131-134. doi:10.1145/1743546.1743581…

    • 4860 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Wk1 Dq 1

    • 729 Words
    • 3 Pages

    The current conflict between the recording industry and a portion of its customers who are involved in illicit copying of music files arose from innovations involving the compression and electronic distribution of files over the internet. Some of the ethical challenges associated with responses that threaten further innovation, ultimately reduce the chances of finding solutions that hold appeal for all parties. Today’s world of the online web has provided new opportunities for both the creators and the consumers of media such as music. The digital aspect of the web allows for wonderful innovations such as MP3 players but ethical personal use must…

    • 729 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Cis 324 Computer Ethics

    • 2262 Words
    • 10 Pages

    In the short time that computers and internet have existed in the modern era, the world has seen a complete 360 degree turn and in the various forms of electronic entertainment that people all over the world are now using. In the days before CD’s, DVD’s and the internet, not much was said if a vinyl album (remember these?), VHS cassette (or these?) or an audio cassette was loaned to a friend for their listening / viewing pleasure, but today with the availability of sending an email with three or four megabytes (mb) of information, one can enjoy a borrowed song but is assumed that it is piracy or stealing. Is this a fair assumption? This Author will not give his opinion but rather discuss both sides of the Peer to Peer (P2P) downloading and sharing issues and let the reader form their own opinions.…

    • 2262 Words
    • 10 Pages
    Better Essays
  • Good Essays

    Software piracy and illegal file shares is becoming a bigger issue in modern day society, more likely with the youth of society. All computers now come with burn-ware technologies in which the user can take a product and create copies of that software. Originally, this process was created in order to provide methods of backing up a person’s computer files, in case of hardware crashing and system reboots. However, the situation has changed. People are now able to copy any type of media file (DVDs, CDs, operation systems, etc) and give out these products, free of charge. Do you like that CD that your friend bought the other day? Ask him to burn you a copy, then you can have it too. Did your latest version of Microsoft Windows crash…

    • 2160 Words
    • 9 Pages
    Good Essays
  • Better Essays

    With the advent of modern technology bypassing check-and-balance systems that are in place to keep people honest have become extremely easy to bypass; for example, in the 1980’s individuals would borrow VHS cassettes and copy them; however, technology has changed and advanced since then, and with more advanced technology more people are using technology to cheat. An example of using modern technology to bypass a check-and-balance system is Napster. Napster began as a service that allowed people to download music for free without purchasing the CD; bypassing the copyright on the music. There were students who copied the music from Napster, who said “everyone else is doing it why can’t I”. (Jones, 2008). Most people who copied VCR tapes, along with those who copied music from Napster, usually did not think that what they were doing was cheating, or stealing; however, by definition it was.…

    • 1766 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Music Piracy

    • 2100 Words
    • 9 Pages

    "File-Sharing: It 's Music to our Ears: Making P2P Legal." EFF. 28 Apr. 2006. Electronic Frontier Foundation. 1 May 2006 .…

    • 2100 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    From the mid 1990s when Sir Tim Berners-Lee created the World Wide Web and the Internet grew dramatically, it has progressively dominated our lives. The vast volume of information that is now available to us and the ease at which our ideas and documents can be shared, has transformed the way in which we find material and communicate. It has also had a huge impact on business, particularly retail. However, these huge changes inevitably bring with them some negative consequences, particularly those to do with illegal file sharing and risks to privacy.…

    • 1113 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Peer to Peer File Sharing

    • 321 Words
    • 2 Pages

    Every day, millions of computer users share files online. Whether it is music, games, or software, file-sharing can give people access to a wealth of information. You simply download special software that connects your computer to an informal network of other computers running the same software. Millions of users could be connected to each other through this software at one time. The software often is free and easily accessible.…

    • 321 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    While the participants of illegal file sharing do not directly hurt another person, they cause loss of profits for companies. By downloading music, videos and illegal programs, the respective industries are losing profits. Although one user will not make a big difference, if all consumers started downloading illegal files, soon the industry could no longer function and the industry would collapse. Also, when companies realize a large majority of consumers are using illegal files, they lose their incentive to create and improve their products. Even though file sharing does not immediately hurt the user, in the long run not only the industry is affected by the illegal file sharing, but also those who use the illegal files, since the industry will stop improving and producing products.…

    • 1139 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    The Music Industry’s dramatic business model change from physical sales to digital downloads, how much the record labels are affected by internet piracy and how to regulate it.…

    • 4459 Words
    • 18 Pages
    Best Essays
  • Better Essays

    The creation and development of computers is one of the most amazing technological advances our society has made. The amount of potential that computers and computing devices whether they 're desktops, laptops, or even mobile smart phones is nearly, if not, infinite. Because of said possibilities, almost anything, good and bad can come from the use of computer technology. Computers in today 's society, with current technological advances, provide us with countless benefits. However, despite these benefits, there are also a wide array of consequences associated with their use. Two of the biggest issues our society faces today in modern-day computing includes the invasion of privacy of individuals and their information by big corporations and the government and copyright infringement of intellectual property, also known as piracy.…

    • 1339 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Peer to peer (P2P) computing, which is a specific implementation of distributed computing, has been described as a most promising technology since it can be applied to many fields and it has made great contributions. P2P file sharing, or P2P file exchanging, is one typical application of P2P and one caused great debates as well. In this paper, I will introduce the general theory of P2P file sharing, the features and drawbacks of P2P file sharing and the current situation of piracy via P2P networks. In the end, I will present possible solutions to help solve the piracy problem caused by P2P file sharing.…

    • 2238 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Peer to Peer

    • 297 Words
    • 2 Pages

    In a peer-to-peer (P2P) network, every machine plays the role of client and server at the same time. Although a P2P network has a number of advantages over the traditional client-server model in terms of efficiency and fault-tolerance, additional security threats can be introduced. Users and IT administrators need to be aware of the risks from propagation of malicious code, the legality of downloaded content, and vulnerabilities within peer-to-peer software. Security and preventative measures should be implemented to protect from any potential leakage of sensitive information and possible security breaches. Within corporate networks, system administrators need to ensure that peer-to-peer traffic complies with the corporate security policy. In addition, they should only open a minimal set of firewall ports to allow for such traffic. For end-users and/or home users, precautions must also be taken to avoid the possible spread of viruses over peer-to-peer networks.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    THE peer-to-peer (P2P) paradigm has become very popular for storing and sharing information in a totally decentralized manner. Typically, a P2P system is a distributed environment formed by autonomous peers that operate in an independent manner. Each peer stores a part of the available information and maintains links (indexes) to other peers. P2P systems…

    • 784 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Complete Listing of Chapter Opening Cases, Insight Cases, E-commerce in Action Cases, and Case Studies CHAPTER 1 THE REVOLUTION IS JUST BEGINNING Opening Case: Pinterest: A Picture Is Worth a Thousand Words Insight on Technology: Will Apps Make the Web Irrelevant? Insight on Business: Start-Up Boot Camp Insight on Society: Facebook and the Age of Privacy Case Study: The Pirate Bay: Searching for a Safe Haven CHAPTER 2 E-COMMERCE BUSINESS MODELS AND CONCEPTS Opening Case: Twitter’s Business Model…

    • 65839 Words
    • 331 Pages
    Powerful Essays

Related Topics