• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Science Coursework Merit Essay: The Social Aspect of Computing --- How has the online sharing of information, such as film and music, changed western buying habits?

Extracts from this document...

Introduction

How has the online sharing of information, such as film and music, changed western buying habits? Record shops, cinemas, radio stations, video rental stores and even libraries are losing customers to the global trend that is OIS (Online Information Sharing - the official MPAA and RIAA term for internet piracy). It once used to be a common sight to see small record shops filled with teens picking their favourite artists' new records from the well stacked shelves, paying at the desk, discussing music with others and making new discoveries. It was not uncommon for people to buy or rent VHS tapes or sit at home listening to the radio. Piracy of course was alive here, the market for pirate radio, pirate tapes and pirated videos was enormous, the difference between then and today? Equipment. Nearly every person below 40 has a computer in MEDCs and also has the knowledge to 'share' everything they want from their media collection with others. The most significant difference between the days of pirate radio and the days of worldwide networking is that you no longer need to know how it works to do it; millions of parents mindlessly expose their young kids to P2P networks such as KaZaA and LimeWire which are full of adult content, viruses and include open chat programs which might allow sexual predators access to their children. The first consumer P2P (peer-to-peer) ...read more.

Middle

In efforts to decentralize and avoid federal prosecution, modern networks designed for file sharing are de-centralized, often encrypted and use proxies to disguise IP addresses, for these reasons modern networks make it much less likely for a user to be discovered and served with a court order or other legal reprimand. A de-centralized system does not have a server which holds the files but instead a server that indexes a list of all available files rather than storing them. Most modern p2p systems also use (as mentioned previously) a process of encryption and proxy servers to make them untraceable. The servers often do not ask uploaders and downloaders of content to register accounts as they have previously done, this prevents user name linking: a process that the CIA reportedly used wherein they would search a napster username through a series of websites trying to gain personal data on a pirate in order to find and prosecute them. Another security feature of modern P2P protocols is the streaming swarm structure which works on a 'rarest first' basis, splitting files into multiple 'parts' and downloading these parts (to be reconstructed into a usable file on the leech (downloading) computer) rather than an actual file. As none of these individual parts is usable as the intended finished product on it's own Swedish law allows the redistribution under it's own piracy laws - for this reason, the most prolific pirating groups are based in the country. ...read more.

Conclusion

Back in the early 1980s, piracy (albeit not online) was rife amongst office workers and the computer competent, these early criminals would exchange software through floppy disk and share records between each other. As the 90s started and the first networks were being created within offices, the stealing only increased as files could be copied between computer terminals via cable rather than by hand. Now, with the age of the internet: it is estimated that over 300 million of the world's population routinely steal information and data over the internet with millions more borrowing DVDs and books from each other, whether or not these people are stealing more or less because of the internet is unquestionable, with our ability to access millions and millions of people we are able to share and steal far more than we previously could have done and this only provides incentive to give and take more than we would normally have done in a spirit of world community that is evoked by groups that exist in this sphere such as piratgruppen and the piratbyran. ?? ?? ?? ?? [1] English Wikipedia 18:06 - 18:09February 7th 2008 Pages on: Peer to peer file sharing, torrent, napster, audiogalaxy, warez, piratbyran or piratgruppen all saved complete to maintain coherence throughout the essay [2] Piratgruppen.org, Piratbyran or The Pirate Bay Blog, all saved complete to maintain coherence throughout the essay as of 18:17 - 18:23 February 7th 2008 Page|1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    The reason behind this is that it is AppleTalk. It is a cheap LAN architecture which is a standard model built for all Apple Macintosh computers and laser printers. It also supports Apple LocalTalk cabling scheme as well as Ethernet and IBM token ring. AppleTalk can connect to standard computers which do not have AppleTalk.

  2. Computing Project

    in the field lbledfilmtitle insert this into the field filmtitle in the access table ADOFilms ['genre']:=CBgenre.Text; whatever is in the field cbgenre insert this into the field genre in the access table ADOFilms ['Length']:=lbledLength.Text; whatever is in the field lbledlength insert this into the field length in the access table

  1. 140 Computing A-Level Revision Questions

    What are they? 87. Explain the difference between absolute and relocatable programs. 88. Explain Simplex, Duplex and Half-Duplex transmission. 89. Describe, with the aid of an example, the use of batch and hash totals in batch processing. 90. Describe three actions carried out by the control unit.

  2. LAN & WAN Protocols

    dynamic port number which is used to listen over the control stream and waits for the connection from the FTP server. File Transfer File transfer is a method of transmitting files over a computer network and the Internet. There are many methods and protocols which allow transmission of files over networks.

  1. I have been given the task to design a database for a company called ...

    I will use validation rules to make sure that on every parcel record there will be checks to makes sure the size and weight of each parcel has a: * maximum weight of 30 Kg * minimum weight of 1 Kg * maximum length of 150 cm * maximum total

  2. Social Issue Essay

    It is not for the scientific researcher to question the possible repercussions that they may receive for their technological advances, it is their job to explore the boundaries of science to their full and break down the walls of our complicated and still largely understood world.

  1. Free essay

    Setting up and E-Commerce Site

    The good thing about doing this is that the internet has a large percentage of users and we therefore maximise the amount of people that use our site for a smaller price. To be honest, I believe local free ads and shops to be another good idea, these are smaller price and used by customers daily.

  2. Smart Card System

    It also contain technical support that allow the user to contact the developers in case of any problems occurs to the system. (b) Client Application Design I. Smart Card Verification In this feature, the system would be able to verify whether the smart card that has been entered by the user is valid or not.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work