• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Science Coursework Merit Essay: The Social Aspect of Computing --- How has the online sharing of information, such as film and music, changed western buying habits?

Extracts from this document...


How has the online sharing of information, such as film and music, changed western buying habits? Record shops, cinemas, radio stations, video rental stores and even libraries are losing customers to the global trend that is OIS (Online Information Sharing - the official MPAA and RIAA term for internet piracy). It once used to be a common sight to see small record shops filled with teens picking their favourite artists' new records from the well stacked shelves, paying at the desk, discussing music with others and making new discoveries. It was not uncommon for people to buy or rent VHS tapes or sit at home listening to the radio. Piracy of course was alive here, the market for pirate radio, pirate tapes and pirated videos was enormous, the difference between then and today? Equipment. Nearly every person below 40 has a computer in MEDCs and also has the knowledge to 'share' everything they want from their media collection with others. The most significant difference between the days of pirate radio and the days of worldwide networking is that you no longer need to know how it works to do it; millions of parents mindlessly expose their young kids to P2P networks such as KaZaA and LimeWire which are full of adult content, viruses and include open chat programs which might allow sexual predators access to their children. The first consumer P2P (peer-to-peer) ...read more.


In efforts to decentralize and avoid federal prosecution, modern networks designed for file sharing are de-centralized, often encrypted and use proxies to disguise IP addresses, for these reasons modern networks make it much less likely for a user to be discovered and served with a court order or other legal reprimand. A de-centralized system does not have a server which holds the files but instead a server that indexes a list of all available files rather than storing them. Most modern p2p systems also use (as mentioned previously) a process of encryption and proxy servers to make them untraceable. The servers often do not ask uploaders and downloaders of content to register accounts as they have previously done, this prevents user name linking: a process that the CIA reportedly used wherein they would search a napster username through a series of websites trying to gain personal data on a pirate in order to find and prosecute them. Another security feature of modern P2P protocols is the streaming swarm structure which works on a 'rarest first' basis, splitting files into multiple 'parts' and downloading these parts (to be reconstructed into a usable file on the leech (downloading) computer) rather than an actual file. As none of these individual parts is usable as the intended finished product on it's own Swedish law allows the redistribution under it's own piracy laws - for this reason, the most prolific pirating groups are based in the country. ...read more.


Back in the early 1980s, piracy (albeit not online) was rife amongst office workers and the computer competent, these early criminals would exchange software through floppy disk and share records between each other. As the 90s started and the first networks were being created within offices, the stealing only increased as files could be copied between computer terminals via cable rather than by hand. Now, with the age of the internet: it is estimated that over 300 million of the world's population routinely steal information and data over the internet with millions more borrowing DVDs and books from each other, whether or not these people are stealing more or less because of the internet is unquestionable, with our ability to access millions and millions of people we are able to share and steal far more than we previously could have done and this only provides incentive to give and take more than we would normally have done in a spirit of world community that is evoked by groups that exist in this sphere such as piratgruppen and the piratbyran. ?? ?? ?? ?? [1] English Wikipedia 18:06 - 18:09February 7th 2008 Pages on: Peer to peer file sharing, torrent, napster, audiogalaxy, warez, piratbyran or piratgruppen all saved complete to maintain coherence throughout the essay [2] Piratgruppen.org, Piratbyran or The Pirate Bay Blog, all saved complete to maintain coherence throughout the essay as of 18:17 - 18:23 February 7th 2008 Page|1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Data is safe, secure and quick when it is transmitted between two computers. WAN can also be used to connect different types of networks together for example a WAN network connected to a LAN networks. The reason behind this is that it is AppleTalk.

  2. Computing Project

    unit URentOutaDVD; interface uses Windows, Messages, SysUtils, Variants, Classes, Graphics, Controls, Forms, Dialogs, DBCtrls, DB, ADODB, StdCtrls, Grids, DBGrids, Mask,printers, ExtCtrls; type TFMRentOutaDVD = class(TForm) DSFilms: TDataSource; ADOFilms: TADOTable; ADOMembers: TADOTable; DSMembers: TDataSource; dblkcbxdvd: TDBLookupComboBox; dblkcbxmembers: TDBLookupComboBox; DSLoans: TDataSource;

  1. 140 Computing A-Level Revision Questions

    What methods might be employed to ensure security against loss or corruption of a master file in a direct access system? 95. What methods might be employed in a multi-access system such as public administration to ensure privacy of data? 96. Briefly describe the three stages of compilation. 97.

  2. LAN & WAN Protocols

    Computers and servers which are setup are file transfer service are called file servers. There are two main types of file transfer services. The Push bashed file transfer and the Pull based file transfer. In the Push based transfer the receiver initiates a file transmission request and the push based transfer the send the sender initiates a file transmission request.

  1. Social Issue Essay

    It is not for the scientific researcher to question the possible repercussions that they may receive for their technological advances, it is their job to explore the boundaries of science to their full and break down the walls of our complicated and still largely understood world.

  2. I have been given the task to design a database for a company called ...

    The reason that the contact number is a text data type and not a numeric type is because a numeric field would not allow a leading zero where as a text type will. Every table must have a key field, a key field is a field, which is a unique number field, which is used as an index.

  1. Computing Project

    only be accessed only in one place so if the instructor needs these back in the office or at to work from at home then it is not possible to have multiple copies as it will not all be up to date.

  2. Free essay

    Setting up and E-Commerce Site

    Equipment What sort of equipment will we need to use, do we need to by computers routers, transportation, software, furniture and so on Wholesaler Who are we going to use as our wholesaler, the cheapest person or the person best fitted for what we need at a more costly price.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work