Criteria A:
In April 2007 a survey was conducted amongst college students nationwide on the issue of illegal downloading, an estimated 67 percent of the student body do not care about illegal downloading. Even if the Recording Industry Association of America (RIAA) gets involved. (Hynes). It seems this problem does not just arouse with college students, a large number of people world wide are not bothered with illegal downloading habits, though a survey conducted by Microsoft shows that students between seventh and 10th grade are less likely to download illegally if they are informed of the laws about sharing and downloading content online.(Redmond) A report done by the International Federation of Phonographic Industry (IFPI) stated that ninety-five per cent of music is illegally downloaded online. (BBC)
In the past when people still bought vinyl records at record stores, piracy and illegal downloading was not a problem, and even if people though of copying them it would have been hard to achieve. A few bootleg records were made from live performances but that was as far as it went and therefore record companies were not worried. When sound were made digital by CDs record companies began to become worried since this gave people the opportunity to rip off tracks by CD burners and then put them onto personal computers and give them to their peers. Over the internet people were quickly able to reproduce and illegally share music with an unlimited amount of people.
Then came the problem of copyright, the digital revolution that gave users the chance to use digital content in creative new ways has made it impossible for copyright holders to control the distribution of music.
Criteria B:
The Internet has become widespread around the world, and therefore a large number of people have access to it. The Internet has become a utility and so has music, it no longer is a product (Kusek). The change in the Music Industry came through the impact of technology; advances were made in digital technology that have caused this rapid change. Personal computers, digital recorders, the Internet and illegal p2p (peer to peer) services are the cause of this change. P2p networks and other computer based systems, allow individual computers to connect to and share music files over the internet, for free illegally. Proxy servers are used to access web pages created by other computers, and since proxy servers store information from a web site you have already accessed on the proxy server the next time we access the page it does not have to load again since the information has already been cached.
There are both legal and illegal ways to download music through legal and illegal digital distribution services. The recording industry is trying to figure out a way to stop the music leakage, since CD sales have dropped a great deal. The industry has attempted to boost the sales by dropping CD prices and filling-lawsuits against Internet users who share music files. (Kusek) The problem with p2p file-sharing programs is that there is no central server where information would be stored to indicate what files are commonly downloaded and shared.
The p2p market plays a large role in changing the music industry it has a large variety of music that is available for music fans on the Internet database. This fast file- sharing software has been embrassed by millions of people regardless of its legality. It has been supported faster than any other technology even the telephone, personal computers and even the Internet.
Illegal downloads continue to be made on a daily basis, files are being downloaded through p2p file sharing programs in a month, more than what the music industry makes in a year. People are willing to pay for music if it’s the right price over the Internet and therefore for that very reason legitimate downloads are still being made (Kusek).
Bit Torrent is a program which is different than any other peer-to –peer method of downloading. It has a tracker which is it’s central server where all the file tracking works, in order to be able to download files from its server you have to share this principle is referred to as ‘tit-for-tat’. Bram Cohen’s who is one of Bit Torrents developer found a way to stop the trafficking and to make the transmission easier the way he did this was to increase the speed of downloading for users so in order to receive files you have to give them the more files you share the faster your downloads are likely to complete. Once the download has completed onto your computer it becomes a seed which means that when another user begins to download the same file it is seeding off of your computer. Another way to increase the speed of the download is to have a mass storage on your computer becomes when space runs out files that you are attempting to download gets blocked.
Thursday, February 12, 2009
Thursday, January 22, 2009
Illegal/Legal Music downloads -Dana Al thani
Criteria A:
In April 2007 a survey was conducted amongst college students nationwide on the issue of illegal downloading, an estimated 67 percent of the student body do not care about illegal downloading. Even if the Association of America (RIAA) gets involved. (Hynes). It seems this problem does not just arouse with college students, a large number of people world wide are not bothered with illegal downloading habits, though a survey conducted by Microsoft shows that students between seventh and 10th grade are less likely to download illegally if they are informed of the laws about sharing and downloading content online.(Redmond) A report done by the International Federation of Phonographic Industry (IFPI) stated that ninety-five per cent of music is illegally downloaded online. (BBC)
In the past when people still bought vinyl records at record stores, piracy and illegal downloading was not a problem, and even if people though of copying them it would have been hard to achieve. A few bootleg records were made from live performances but that was as far as it went and therefore record companies were not worried. When sound were made digital by CDs record companies began to become worried since this gave people the opportunity to rip off tracks by CD burners and then put them onto personal computers and give them to their peers. Over the internet people were quickly able to reproduce and illegally share music with an unlimited amount of people.
Then came the problem of copyright, the digital revolution that gave users the chance to use digital content in creative new ways has made it impossible for copyright holders to control the distribution of music.
Criteria B:
The Internet has become widespread around the world, and therefore a large number of people have access to it. The Internet has become a utility and so has music, it no longer is a product (Kusek). The change in the Music Industry came through the impact of technology; advances were made in digital technology that have caused this rapid change. Personal computers, digital recorders, the Internet and illegal p2p (peer to peer) services are the cause of this change. P2p networks and other computer based systems, allow individual computers to connect to and share music files over the internet, for free illegally.
There are both legal and illegal ways to download music through legal and illegal digital distribution services. The recording industry is trying to figure out a way to stop the music leakage, since CD sales have dropped a great deal. The industry has attempted to boost the sales by dropping CD prices and filling-lawsuits against Internet users who share music files. (Kusek) The problem with p2p file-sharing programs is that there is no central server where information would be stored to indicate what files are commonly downloaded and shared.
The p2p market plays a large role in changing the music industry it has a large variety of music that is available for music fans on the Internet database. This fast file- sharing software has been embrassed by millions of people regardless of its legality. It has been supported faster than any other technology even the telephone, personal computers and even the Internet.
Illegal downloads continue to be made on a daily basis, files are being downloaded through p2p file sharing programs in a month, more than what the music industry makes in a year. People are willing to pay for music if it’s the right price over the Internet and therefore for that very reason legitimate downloads are still being made (Kusek).
In April 2007 a survey was conducted amongst college students nationwide on the issue of illegal downloading, an estimated 67 percent of the student body do not care about illegal downloading. Even if the Association of America (RIAA) gets involved. (Hynes). It seems this problem does not just arouse with college students, a large number of people world wide are not bothered with illegal downloading habits, though a survey conducted by Microsoft shows that students between seventh and 10th grade are less likely to download illegally if they are informed of the laws about sharing and downloading content online.(Redmond) A report done by the International Federation of Phonographic Industry (IFPI) stated that ninety-five per cent of music is illegally downloaded online. (BBC)
In the past when people still bought vinyl records at record stores, piracy and illegal downloading was not a problem, and even if people though of copying them it would have been hard to achieve. A few bootleg records were made from live performances but that was as far as it went and therefore record companies were not worried. When sound were made digital by CDs record companies began to become worried since this gave people the opportunity to rip off tracks by CD burners and then put them onto personal computers and give them to their peers. Over the internet people were quickly able to reproduce and illegally share music with an unlimited amount of people.
Then came the problem of copyright, the digital revolution that gave users the chance to use digital content in creative new ways has made it impossible for copyright holders to control the distribution of music.
Criteria B:
The Internet has become widespread around the world, and therefore a large number of people have access to it. The Internet has become a utility and so has music, it no longer is a product (Kusek). The change in the Music Industry came through the impact of technology; advances were made in digital technology that have caused this rapid change. Personal computers, digital recorders, the Internet and illegal p2p (peer to peer) services are the cause of this change. P2p networks and other computer based systems, allow individual computers to connect to and share music files over the internet, for free illegally.
There are both legal and illegal ways to download music through legal and illegal digital distribution services. The recording industry is trying to figure out a way to stop the music leakage, since CD sales have dropped a great deal. The industry has attempted to boost the sales by dropping CD prices and filling-lawsuits against Internet users who share music files. (Kusek) The problem with p2p file-sharing programs is that there is no central server where information would be stored to indicate what files are commonly downloaded and shared.
The p2p market plays a large role in changing the music industry it has a large variety of music that is available for music fans on the Internet database. This fast file- sharing software has been embrassed by millions of people regardless of its legality. It has been supported faster than any other technology even the telephone, personal computers and even the Internet.
Illegal downloads continue to be made on a daily basis, files are being downloaded through p2p file sharing programs in a month, more than what the music industry makes in a year. People are willing to pay for music if it’s the right price over the Internet and therefore for that very reason legitimate downloads are still being made (Kusek).
Thursday, November 27, 2008
Digital film: Ask the industry
This article talks about how the movie industry is being changed rapidly, it is transforming the entertainment industry, movies and DVD's in the past did not have the "piracy its a crime" advertisement at the beginning of the movie which you can not skip, because piracy was not being committed, the BBC has assembled a group of film executives to answer questions that readers might have and are answering it. The questions are related to how the movie and entertainment industry is handling the new movement of technology. Like are 'film companies making movies available in the right ways? How well are they dealing with piracy? Is the box office destined to be eclipsed by download stores? '
http://news.bbc.co.uk/2/hi/entertainment/4653534.stm
http://news.bbc.co.uk/2/hi/entertainment/4653534.stm
Sunday, November 2, 2008
Portfolio
Criteria A
This article talks about identity theft, money theft and fraud on a huge scale. An international group of highly technical thieves hacked into networks of several high volume stores and stole vital credit card and debit card numbers along with their pin numbers that were stored there in the system. With this information, they were able to imprint the stolen numbers on the magnetic stripes of other stolen card blanks and were able to withdraw money from ATMs. Once taken, the information was moved to high-powered computers in the United States, Latvia and the Ukraine. In addition, they were sealing the card and pin number information over the Internet to make the identity theft even more widespread.
The identity theft ring was composed of members from several different countries including the United States, Estonia, Ukraine, China, and Belarus. IT was widespread and of such an international scope that it makes finding, identifying, and capturing the criminals much more difficult. One of the men who where responsible for selling card numbers on the black market had already been arrested in Turkey in 2007 and has been awaiting trial there. The US has asked to have him moved to the US so he can be charged with the other members of the ring.
Criteria B
Wireless networks move through the air and therefore it is difficult to secure them since there are no wires to secure them together. The thieves were driving around these stores testing their wireless networks to find security ‘holes’ that they could hack into. This is called ‘war driving’ where someone drives the neighborhood surrounding high volume retail outlets looking for weaknesses in the network security. Once the holes are discovered programs called sniffers are uploaded into the retailers system. Once installed, the sniffer program locate information that has been stored within the retailer system such as credit cards and debit card numbers and their associated pins. On the outside, the criminals who have installed the sniffer programs collect the information as the program sends it. This information is then moved to highly sophisticated computers and held there until they are either sold over the Internet or used to create false accounts/cards.
The I.T issue is how do you keep wireless networks secure? How do you better trace hackers or people that abuse the weakness of the network? With credit card and debit card use so widespread in our economies we are forced to depend on wireless networking. The idea of cabling for all of this activity is overwhelming and impossible. The only answer seems to be developing stronger security within wireless networking.
Criteria C
There are millions of dollars of trade that is done over the Internet. Consumers trust that whenever they do transactions or do business within a retail outlet, they are using secure information that only they have access to. The entire global retail market is built on this trust between the consumers and the retailers. If customers become afraid to use their credit cards or stop trusting certain retailers with their private information and money, the damage that could be created in our economy would be devastating. Trust between consumers and retailers has to be maintained and assured.
Consumers are innocent victims of these identity thefts criminals. Most consumers probably do not understand the idea of wireless networking; yet they rely on it and trust it. They certainly do not think that their personal information is at risk every time they use their credit card. Unless the technical world is able to fix this problem then retail stores remain at risk. In a global economy, that is based on credit and debit card use this can be catastrophic if this is not controlled. If this cannot be controlled then the whole process of business has to be changed.
Criteria D
There is no easy solution to this problem. It has many levels therefore it needs to be attacked on many levels. Obviously, wireless technology needs to be improved and include greater security. If criminal can find the holes and take advantage of them, then wireless security need to find this problem and fix it first. Wireless networks need to develop sniffer programs of their own that cans immediately detect not only whenever their networks have been breached but also when criminal sniffer programs have been installed.
When criminals are caught like the ones mentioned in this article, the penalties should be harsh and difficult to get out of. One of the ironies of the article was that the primary person involved had already been caught several years earlier for the same kind of activities. However, instead of being in prison where he belonged, he was let go and became an informant to the government. Unfortunately the same time he was working for the government he was continuing his criminal activities on the side. The seriousness of this type of crime needs to be elevated and controlled with strong punishments and dedicated personnel tracking and fighting it. These eleven men need to become examples of the severity of the punishment surrounding financial and business crimes against the entire global economy.
This article talks about identity theft, money theft and fraud on a huge scale. An international group of highly technical thieves hacked into networks of several high volume stores and stole vital credit card and debit card numbers along with their pin numbers that were stored there in the system. With this information, they were able to imprint the stolen numbers on the magnetic stripes of other stolen card blanks and were able to withdraw money from ATMs. Once taken, the information was moved to high-powered computers in the United States, Latvia and the Ukraine. In addition, they were sealing the card and pin number information over the Internet to make the identity theft even more widespread.
The identity theft ring was composed of members from several different countries including the United States, Estonia, Ukraine, China, and Belarus. IT was widespread and of such an international scope that it makes finding, identifying, and capturing the criminals much more difficult. One of the men who where responsible for selling card numbers on the black market had already been arrested in Turkey in 2007 and has been awaiting trial there. The US has asked to have him moved to the US so he can be charged with the other members of the ring.
Criteria B
Wireless networks move through the air and therefore it is difficult to secure them since there are no wires to secure them together. The thieves were driving around these stores testing their wireless networks to find security ‘holes’ that they could hack into. This is called ‘war driving’ where someone drives the neighborhood surrounding high volume retail outlets looking for weaknesses in the network security. Once the holes are discovered programs called sniffers are uploaded into the retailers system. Once installed, the sniffer program locate information that has been stored within the retailer system such as credit cards and debit card numbers and their associated pins. On the outside, the criminals who have installed the sniffer programs collect the information as the program sends it. This information is then moved to highly sophisticated computers and held there until they are either sold over the Internet or used to create false accounts/cards.
The I.T issue is how do you keep wireless networks secure? How do you better trace hackers or people that abuse the weakness of the network? With credit card and debit card use so widespread in our economies we are forced to depend on wireless networking. The idea of cabling for all of this activity is overwhelming and impossible. The only answer seems to be developing stronger security within wireless networking.
Criteria C
There are millions of dollars of trade that is done over the Internet. Consumers trust that whenever they do transactions or do business within a retail outlet, they are using secure information that only they have access to. The entire global retail market is built on this trust between the consumers and the retailers. If customers become afraid to use their credit cards or stop trusting certain retailers with their private information and money, the damage that could be created in our economy would be devastating. Trust between consumers and retailers has to be maintained and assured.
Consumers are innocent victims of these identity thefts criminals. Most consumers probably do not understand the idea of wireless networking; yet they rely on it and trust it. They certainly do not think that their personal information is at risk every time they use their credit card. Unless the technical world is able to fix this problem then retail stores remain at risk. In a global economy, that is based on credit and debit card use this can be catastrophic if this is not controlled. If this cannot be controlled then the whole process of business has to be changed.
Criteria D
There is no easy solution to this problem. It has many levels therefore it needs to be attacked on many levels. Obviously, wireless technology needs to be improved and include greater security. If criminal can find the holes and take advantage of them, then wireless security need to find this problem and fix it first. Wireless networks need to develop sniffer programs of their own that cans immediately detect not only whenever their networks have been breached but also when criminal sniffer programs have been installed.
When criminals are caught like the ones mentioned in this article, the penalties should be harsh and difficult to get out of. One of the ironies of the article was that the primary person involved had already been caught several years earlier for the same kind of activities. However, instead of being in prison where he belonged, he was let go and became an informant to the government. Unfortunately the same time he was working for the government he was continuing his criminal activities on the side. The seriousness of this type of crime needs to be elevated and controlled with strong punishments and dedicated personnel tracking and fighting it. These eleven men need to become examples of the severity of the punishment surrounding financial and business crimes against the entire global economy.
Saturday, November 1, 2008
Monday, October 20, 2008
Subscribe to:
Posts (Atom)