2013
DOI: 10.1007/978-3-642-41284-4_19
|View full text |Cite
|
Sign up to set email alerts
|

Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters

Abstract: Abstract. According to copyright holders, One-Click Hosters (OCHs) such as Megaupload are frequently used to host and distribute copyright infringing content. This has spurred numerous initiatives by legislators, law enforcement and content producers. Due to a lack of representative data sets that properly capture private uses of OCHs (such as sharing holiday pictures among friends), to date, there are no reliable estimates of the proportion of legitimate and infringing files being uploaded to OCHs. This situa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…There is strong indication that a large portion of the files hosted on these systems are unauthorised copies of copyrighted material [4]. The distribution of content was also found to be similar to that available on other systems such as BitTorrent [5].…”
Section: Introductionmentioning
confidence: 90%
See 2 more Smart Citations
“…There is strong indication that a large portion of the files hosted on these systems are unauthorised copies of copyrighted material [4]. The distribution of content was also found to be similar to that available on other systems such as BitTorrent [5].…”
Section: Introductionmentioning
confidence: 90%
“…However, the most duplicated URL had up to 940 reposts but appeared to be spam. 4 This specific URL was pointing to a dead page at the time we manually checked it.…”
Section: B General Considerationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Authentication-wise, the security model of online meeting services is the following: anyone with an account on the platform and who knows the meeting ID can join the meeting. This is not dissimilar to other security sensitive services that have been studied by the community in the past, from online document editing [18] to file download platforms [19]. To prevent anyone knowing the meeting ID from joining a room, Zoom, Webex, GotoMeeting, and Blue-jeans allow hosts to specify a password participants need to provide upon joining.…”
Section: B Online Meeting Servicesmentioning
confidence: 99%
“…Despite several anti-piracy efforts through the injection of fake content on BitTorrent portals [14,15,17,30] and the shutdown of file hosters services [34], about 90% of files shared using BitTorrent protocol are judged to be infringing [40,57]. Furthermore, 80% of files shared through file hosters are also in the same category [33]. Ibosiola et al measured the availability of illegal content on streaming cyberlockers [27].…”
Section: Related Workmentioning
confidence: 99%