Digital Privacy and Security: A Survey on the Modern Threat on the Digitization

Authors

  • Soumee Maschatak Dept. of Computer Science and Engineering, East West Institute of Technology, VTU, Bangalore, India
  • Chandan Raj BR Dept. of Computer Science and Engineering, East West Institute of Technology, VTU, Bangalore, India

Keywords:

Piracy, factors, types, peer-to-peer applications, BitTorrent

Abstract

Today‟s software industry is operating on loses because of a modern threat known as Digital Piracy. Not only the software industry, various sectors of the industry like the cinematography, authors, inventers and discoverers are facing a threat wherein their work may attain a global attention without bringing them anything. A recent studies has shown that due to recent craze of digitization and the socio-economic condition, people are more inclined towards acquiring everything without even giving it time and money. This is becoming a threat to the intellectual property owners. This paper is all about understanding the factors affecting digital piracy, the types of digital piracy and the various steps and measures needed to stop the digital piracy from spreading its wings.

References

[1] Sulaiman Al-Rafee, Timothy Paul Cronan, “Digital Piracy: Factors that Influence Attitude Toward Behaviour”, 2006

[2] Paul Kocher, Joshua Jaffe, Benjamin Jun, Carter Laren, Nate Lawson, “Self-Protecting Digital Content”,2003

[3] B. Srinivas, Dr. Koduganti Venkata Rao, Dr. P. Suresh Varma, “Piracy Detection and Prevention using SIFT Based On Earth Mover’s Distance”, 2012

[4] K.P. Chow, K.Y. Cheng, L.Y. Man, Pierre K.Y. Lai, Lucas C.K. Hui, C.F. Chong, K.H. Pun, W.W. Tsang, H.W. Chan, S.M. Yiu, “BTM – An Automated Rule-based BT Monitoring System for Piracy Detection”, 2007

[5] A. Parker, Peer-to-Peer in 2005, CacheLogic Research, available at http://www.cachelogic.com/home/pages/studies/ 2005_01.php

[6] BitTorrent Protocol, BitTorrent.org, available at http://www.bit torrent.org/protocol.html

[7] Yawei Zhang, Lei Jin, Xiaojun Ye, “Software Piracy Prevention: Splitting on Client”, IEEE International Conference on Security Technology, December 13-15, 2008

[8] H. Chang and M. Atallah. Protecting software code by guards. Security and Privacy in Digital Rights Management,LNC S, 2320:160–175, 2002.

[9] George Coulouris, Jean Dollimore & Tim Kindberg. Election Algorithm, Bully Algo & Ring based algo. In Distributed Systems, 2006

[10] A. G., Galletta, D. F., & Thong, J. Y. L. “Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems”, 2003

[11] Leugimap, Why “Free Software” is better than “Open Source”, http://www.gnu.org/philosophy/freesoftware-forfreedom.html Free Software Foundation. October 6, 2004.

Downloads

Published

2025-11-26

How to Cite

[1]
S. Maschatak and C. B. Raj, “Digital Privacy and Security: A Survey on the Modern Threat on the Digitization”, Int. J. Comp. Sci. Eng., vol. 7, no. 15, pp. 339–343, Nov. 2025.