Purpose The purpose of this study is to better understand online anonymity in the global file-sharing community in the context of social norms and copyright law. The study describes the respondents in terms of use of Virtual Private Networks (VPNs) or similar services with respect to age, gender, geographical location, as well as analysing the correlation with file-sharing frequencies. Design/methodology/approach This study, to a large extent, collected descriptive data through a web-based survey. This was carried out in collaboration with the BitTorrent tracker The Pirate Bay (TPB), which allowed us to link the survey from the main logo of their site. In 72 hours, we received over 75,000 responses, providing the opportunity to compare use ...
The current study empirically demonstrates the widely discussed gap between copyright law and social...
P2P file-sharing networks such as Kazaa, eDonkey, and Limewire boast millions of users. Because of s...
The culture of online sharing of information on the Internet extends to unauthorised sharing of copy...
The European Union directive on Intellectual Property Rights Enforcement (IPRED) was implemented in ...
This paper inquires into the demographical characteristics, recent changes in frequencies as well as...
This report is the result of study that was performed in January and February 2009. It was presented...
The sharing of computer programs, movies and music over the Internet marks an all time high in the p...
This chapter is, in part, about law and legal change. Law – especially intellectual property law – i...
Music and movie industries are worried about the negative effects that the popularity of P2P file s...
The purpose of this thesis was to study file sharing in its many forms, focusing on the services and...
File sharing in peer–to–peer (p2p) networks is a popular pastime for millions of Internet users and ...
Combatting piracy is one of the central topics in 21st century amid the development of new informati...
Whenever we navigate the Web, we leave a trace through our IP address, which can in turn be used to ...
Purpose – The purpose of this paper is to develop a novel approach for the ethical analysis of data ...
Recent decades have witnessed a swift development in network structures like Peer-to-Peer (P2P) syst...
The current study empirically demonstrates the widely discussed gap between copyright law and social...
P2P file-sharing networks such as Kazaa, eDonkey, and Limewire boast millions of users. Because of s...
The culture of online sharing of information on the Internet extends to unauthorised sharing of copy...
The European Union directive on Intellectual Property Rights Enforcement (IPRED) was implemented in ...
This paper inquires into the demographical characteristics, recent changes in frequencies as well as...
This report is the result of study that was performed in January and February 2009. It was presented...
The sharing of computer programs, movies and music over the Internet marks an all time high in the p...
This chapter is, in part, about law and legal change. Law – especially intellectual property law – i...
Music and movie industries are worried about the negative effects that the popularity of P2P file s...
The purpose of this thesis was to study file sharing in its many forms, focusing on the services and...
File sharing in peer–to–peer (p2p) networks is a popular pastime for millions of Internet users and ...
Combatting piracy is one of the central topics in 21st century amid the development of new informati...
Whenever we navigate the Web, we leave a trace through our IP address, which can in turn be used to ...
Purpose – The purpose of this paper is to develop a novel approach for the ethical analysis of data ...
Recent decades have witnessed a swift development in network structures like Peer-to-Peer (P2P) syst...
The current study empirically demonstrates the widely discussed gap between copyright law and social...
P2P file-sharing networks such as Kazaa, eDonkey, and Limewire boast millions of users. Because of s...
The culture of online sharing of information on the Internet extends to unauthorised sharing of copy...