• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Science Coursework Merit Essay: The Social Aspect of Computing --- How has the online sharing of information, such as film and music, changed western buying habits?

Extracts from this document...

Introduction

How has the online sharing of information, such as film and music, changed western buying habits? Record shops, cinemas, radio stations, video rental stores and even libraries are losing customers to the global trend that is OIS (Online Information Sharing - the official MPAA and RIAA term for internet piracy). It once used to be a common sight to see small record shops filled with teens picking their favourite artists' new records from the well stacked shelves, paying at the desk, discussing music with others and making new discoveries. It was not uncommon for people to buy or rent VHS tapes or sit at home listening to the radio. Piracy of course was alive here, the market for pirate radio, pirate tapes and pirated videos was enormous, the difference between then and today? Equipment. Nearly every person below 40 has a computer in MEDCs and also has the knowledge to 'share' everything they want from their media collection with others. The most significant difference between the days of pirate radio and the days of worldwide networking is that you no longer need to know how it works to do it; millions of parents mindlessly expose their young kids to P2P networks such as KaZaA and LimeWire which are full of adult content, viruses and include open chat programs which might allow sexual predators access to their children. The first consumer P2P (peer-to-peer) ...read more.

Middle

In efforts to decentralize and avoid federal prosecution, modern networks designed for file sharing are de-centralized, often encrypted and use proxies to disguise IP addresses, for these reasons modern networks make it much less likely for a user to be discovered and served with a court order or other legal reprimand. A de-centralized system does not have a server which holds the files but instead a server that indexes a list of all available files rather than storing them. Most modern p2p systems also use (as mentioned previously) a process of encryption and proxy servers to make them untraceable. The servers often do not ask uploaders and downloaders of content to register accounts as they have previously done, this prevents user name linking: a process that the CIA reportedly used wherein they would search a napster username through a series of websites trying to gain personal data on a pirate in order to find and prosecute them. Another security feature of modern P2P protocols is the streaming swarm structure which works on a 'rarest first' basis, splitting files into multiple 'parts' and downloading these parts (to be reconstructed into a usable file on the leech (downloading) computer) rather than an actual file. As none of these individual parts is usable as the intended finished product on it's own Swedish law allows the redistribution under it's own piracy laws - for this reason, the most prolific pirating groups are based in the country. ...read more.

Conclusion

Back in the early 1980s, piracy (albeit not online) was rife amongst office workers and the computer competent, these early criminals would exchange software through floppy disk and share records between each other. As the 90s started and the first networks were being created within offices, the stealing only increased as files could be copied between computer terminals via cable rather than by hand. Now, with the age of the internet: it is estimated that over 300 million of the world's population routinely steal information and data over the internet with millions more borrowing DVDs and books from each other, whether or not these people are stealing more or less because of the internet is unquestionable, with our ability to access millions and millions of people we are able to share and steal far more than we previously could have done and this only provides incentive to give and take more than we would normally have done in a spirit of world community that is evoked by groups that exist in this sphere such as piratgruppen and the piratbyran. ?? ?? ?? ?? [1] English Wikipedia 18:06 - 18:09February 7th 2008 Pages on: Peer to peer file sharing, torrent, napster, audiogalaxy, warez, piratbyran or piratgruppen all saved complete to maintain coherence throughout the essay [2] Piratgruppen.org, Piratbyran or The Pirate Bay Blog, all saved complete to maintain coherence throughout the essay as of 18:17 - 18:23 February 7th 2008 Page|1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Data is safe, secure and quick when it is transmitted between two computers. WAN can also be used to connect different types of networks together for example a WAN network connected to a LAN networks. The reason behind this is that it is AppleTalk.

  2. Computing Project

    in the field lbledfilmtitle insert this into the field filmtitle in the access table ADOFilms ['genre']:=CBgenre.Text; whatever is in the field cbgenre insert this into the field genre in the access table ADOFilms ['Length']:=lbledLength.Text; whatever is in the field lbledlength insert this into the field length in the access table

  1. 140 Computing A-Level Revision Questions

    What are they? 87. Explain the difference between absolute and relocatable programs. 88. Explain Simplex, Duplex and Half-Duplex transmission. 89. Describe, with the aid of an example, the use of batch and hash totals in batch processing. 90. Describe three actions carried out by the control unit.

  2. I have been given the task of creating a system for a hospital to ...

    also included n/a in the menu as home loans are also a possibility. * Patient Equipment - This is also a drop down list, to prevent errors and stop patients loaning equipment that is not available. * Loan Duration - I have set a validation rule on this cell to only allow positive integers.

  1. LAN & WAN Protocols

    It uses link-state routing algorithm. OSPF is most widely used IGP in large networks. OSPF is an important protocol because it is completely based off destination IP addresses found in IP packets. It is designed to support variable-length subnet masking.

  2. CSA & Networking.

    The company will have at least one server in each location of the two offices and all the workstations will be linked together with the help of these two servers. MODEMS Modems are used to link the computers with the internet with the help of a telephone line .These modems

  1. I have been given the task to design a database for a company called ...

    One-to-one, e.g. relationship between Person and National Insurance number which is unique to every person. 2. One -to-many, e.g. relationship between Customer and Parcel Order. 3. Many-to-many, relationship between Customer and parcel. Below are examples of data entities, which are relevant to my system.

  2. A2Z Travel UK Ltd A2Z Travel Uk Ltd Company Structure ...

    Mohammed Zafreen is charge of checking if the all transport coaches are safe to drive on roads and all the paper work is up to date for example MOT, Car Tax before they are let out. Mohammed Zafreen also deals with daily maintenance for vehicles when he has the time to do so.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work