Digital Privacy and Security: A Survey on the Modern Threat on the Digitization
Keywords:
Piracy, factors, types, peer-to-peer applications, BitTorrentAbstract
Today‟s software industry is operating on loses because of a modern threat known as Digital Piracy. Not only the software industry, various sectors of the industry like the cinematography, authors, inventers and discoverers are facing a threat wherein their work may attain a global attention without bringing them anything. A recent studies has shown that due to recent craze of digitization and the socio-economic condition, people are more inclined towards acquiring everything without even giving it time and money. This is becoming a threat to the intellectual property owners. This paper is all about understanding the factors affecting digital piracy, the types of digital piracy and the various steps and measures needed to stop the digital piracy from spreading its wings.
References
[1] Sulaiman Al-Rafee, Timothy Paul Cronan, “Digital Piracy: Factors that Influence Attitude Toward Behaviour”, 2006
[2] Paul Kocher, Joshua Jaffe, Benjamin Jun, Carter Laren, Nate Lawson, “Self-Protecting Digital Content”,2003
[3] B. Srinivas, Dr. Koduganti Venkata Rao, Dr. P. Suresh Varma, “Piracy Detection and Prevention using SIFT Based On Earth Mover’s Distance”, 2012
[4] K.P. Chow, K.Y. Cheng, L.Y. Man, Pierre K.Y. Lai, Lucas C.K. Hui, C.F. Chong, K.H. Pun, W.W. Tsang, H.W. Chan, S.M. Yiu, “BTM – An Automated Rule-based BT Monitoring System for Piracy Detection”, 2007
[5] A. Parker, Peer-to-Peer in 2005, CacheLogic Research, available at http://www.cachelogic.com/home/pages/studies/ 2005_01.php
[6] BitTorrent Protocol, BitTorrent.org, available at http://www.bit torrent.org/protocol.html
[7] Yawei Zhang, Lei Jin, Xiaojun Ye, “Software Piracy Prevention: Splitting on Client”, IEEE International Conference on Security Technology, December 13-15, 2008
[8] H. Chang and M. Atallah. Protecting software code by guards. Security and Privacy in Digital Rights Management,LNC S, 2320:160–175, 2002.
[9] George Coulouris, Jean Dollimore & Tim Kindberg. Election Algorithm, Bully Algo & Ring based algo. In Distributed Systems, 2006
[10] A. G., Galletta, D. F., & Thong, J. Y. L. “Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems”, 2003
[11] Leugimap, Why “Free Software” is better than “Open Source”, http://www.gnu.org/philosophy/freesoftware-forfreedom.html Free Software Foundation. October 6, 2004.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
