Online Database File Sharing Issues example essay topic

3,012 words
Introduction Online file sharing has been around ever since networks have been in use. There is nothing new with file sharing now other than the vast amount of files currently being shared. Even though what is currently shared is not all legal, and some are borderline in its legality, no matter what an industry can try, file sharing is here to stay. Although a file sharing giant may come down there are numerous other applications just waiting to take its place. One may argue that it is the industries fault like the RIAA for not using the Internet medium for its benefit when it was first started up, instead avoiding it altogether for a channel of distribution.

To understand the issues concerning file sharing, one must first have a basic understanding on how it works. "The peer-to-peer computing model is not new, but has recently become a commonplace among the average computer user due to the introduction of applications like Napster and Gnutella". (McKean, 2001) A basic definition of peer-to-peer technology would be computers sharing resources and services. Unlike traditional client-server networks, in a peer-to-peer network, each computer on the network is figuratively both a client and a server. There are two ways in which a peer-to-peer network can be set up. One way is the "pure P 2 P" method where no central server is used for control and coordination, the other is the "hybrid P 2 P", where a central server is used to perform numerous functions.

With millions upon millions of file sharers logging into program such as Kazaa, everyday there are numerous security issues all users must be made aware of. Issues such as spyware programs, virus infections, unknowingly sharing of confidential files, hacking, and fake files are just a few of these issues. Fortunately, there are ways to prevent malicious users from giving you infected files or hacking into your system. These range from putting up firewalls, to a routine system scan for viruses and spyware. Unfortunately, most users are unaware of these problems. The legality of online file sharing is mainly based on interpretation.

How one interprets what is legal and illegal will affect their actions. The Canadian Copyright Act which was instated on March 19, 1998 states that private copying is legal, and a levy on blank tapes and CD's will be imposed for distribution for performers, lyricist, producers and professional associations. (Canadian Intellectual Property Office, 2002) It also stated specifically what kind of copying is allowed. While the Digital Millennium Copyright Act in the United States makes all copying of copyrighted works illegal. Conclusions 1. There are various security issues that users have to be aware of.

2. Spyware is a problem with online file sharing. 3. People are using file sharing programs at work. 4. Most people are used to downloading files and do not find anything wrong with it.

5. Even with the threat of litigation, the amount of file sharers is enormous. 6. Legal issues concerning file sharing are based on interpretation. 7. The RIAA is mainly pursuing teenage file sharers even though about a half of Kazaa users are over 25 8.

The RIAA is unable to pursue file sharers in Canada because of the difference in our laws. 9. Music CD sales have gone down in recent years. 10. The threat of litigation is more like a dare to most online file sharers.

Recommendations 1. Increase the levy on blank CD's and tapes. 2. Put up more "pay per download" services such as Apple's i-Tunes and the new Napster. 3. Decrease CD prices to encourage consumers to purchase CD's.

4. Users of peer-to-peer programs should run scheduled system scans for virus' and spyware. 5. Firewalls should put up to prevent hacking and unauthorized access to your system. 6. Companies should prevent employees from using peer-to-peer programs because they might be held liable for their workers actions.

7. Be sure to check all settings before installing programs like Kazaa to prevent accidental sharing of confidential files. 8. Make files that degenerate over time, this would be like a shareware program, but instead of having a part program, users get the whole program.

The following recommendations are debatable in their effectiveness: 1. Upload "fake" songs on peer-to-peer networks. 2. Upload "screeching" songs on peer-to-peer networks. Analysis of Information How file sharing works In a traditional client-server network, communication is started by client for downloading files, and the server replies by sending the requested files. In a peer-to-peer network, all peers are able to request, download, and send files to all other peers.

The two types of peer-to-peer networks like mentioned before are the "pure P 2 P" where there is no server being used and "hybrid P 2 P" where a central server is used "to maintain a registry of shared information and respond to queries for that information" (Lui, 2003). Figure #1 - Client / Server Architecture (Luis, 2003) As shown in Figure #2, the pure P 2 P network does not use a central server. It instead interacts with each other peer on the network allowing files, resources, and even computing power to be shared. A major advantage of this type of a peer-to-peer network is the non-reliance on a server.

Instead of the client requesting from the server for local registration, it is done automatically when the peer connects to the network. But, without a server to find all of the connections for you, this architecture sometimes will not find all connections automatically, therefore limiting the overall spread of the network. Figure #2 - Pure P 2 P Network (Microsoft, 2001) Figure #3 - Hybrid P 2 P Network (Microsoft, 2001) A hybrid P 2 P network is just like the pure P 2 P network, except that it uses a centralized server for peer connection and query searches. An application uses the server to get a list of peers currently connected to the network. Unlike the pure P 2 P architecture, the hybrid P 2 P network queries just the central server, instead of each other peer.

The server will then reply by sending a list of current peers on the network that match what was on the query. Therefore, searches are overall a lot quicker and more accurate. But like all networks that involve a centralized server, if the server is down, the whole network is also down. The next figure displays a comparison between the two peer-to-peer architectures. Figure #4 - Comparison of the two peer-to-peer architectures P 2 P Architecture Pros Cons Examples Pure P 2 P o No central server o Higher fault tolerant o Simpler architecture o More network resource consumption o Low scalability o Gnutella o Freenet Hybrid P 2 P o Less network resource consumption o High scalability o Central server dependent o Less fault tolerant o Napster (Luis, 2003) Security Issues Everyday, millions, upon millions of computer users go online and share files. (PC Watching, 2003) Files of all kinds are being shared, ranging from music, to movies, from images, to applications.

It's so easy to use, and so easy to get into. But, like with all things, there is a trade-off to this abundance of information. Like an Internet connection, as long as data is flowing out, data is able to flow in. Viruses in peer-to-peer networks in not an uncommon thing. A lot of times, users are not even aware that one or more of their files that they are sharing contain these malicious scripts.

Most of the viruses are just a mere annoyance, but some like the Melissa Virus from a few years ago are made to destroy, and the costs from the after effects could reach in the millions of dollars. Another issue with file sharing applications is spyware. Spyware are files like cookies, ActiveX protocols, and program files that are used to spy on users surfing habits, and the data is sent to the creators of these files. Most of the time, users are not aware that these files exist on their systems. A lot of times, they are installed without the knowledge of the user. File sharing programs such as Kazaa have programs like these built in them, or are installed when the program is installed.

Users often do not read the terms and services when installing software. Because of this, do not know when other programs are installed (CNN, 2002). However, there are programs that scan your hard drive for such files. Adaware is a good example of a program that will do this. It will scan your hard drive and point out all suspicious files. From there, you could either erase the files, or prevent them from being spying on your Internet activity Another reason to be cautious about is how software is installed and the default settings.

This is especially true with peer-to-peer programs, or you might be sharing confidential files without your knowledge. When Kazaa is installed, it will ask if you want it to search your hard drive for files to share. If you are careful, you might be sharing other folders other then your shared directory. Bearshare, another file sharing application, by default will share all folders containing images and music. If the user does not know this files that were not meant to be shared will be shared. The best way to avoid this is to "create a folder that will contain all your shared files, put your music or video there, and share only that folder.

Never share your entire hard drive". (Brandt, 2003) People are even using peer-to-peer programs at the workplace. In a study of 560 companies, research has shown that 77.1% of employees have engaged in file sharing in the past 14 months. In some of those businesses as many as 58% of their personal computers had different file sharing programs installed. Also, about 1 in 25 employees were found to be using file sharing applications. (Weiss, 2003) Companies could find themselves being put to court for their employees actions.

File sharing should be prohibited in the workplace, and workers be told this. A section in the company profile should be added stating that the company is not responsible for the online activities of its employees. Figure #5 - Employees that have engage in file sharing at work (Weiss, 2003) Suggestions on actions if one is using file sharing applications: o Be sure you know the default settings of the program and know which folders are being shared and which are not. o Just to be safe, put all of the files that you wish to be shared in one folder and share just that folder. o Have your virus definitions up to date and scan your hard drive on a regular basis o Watch out for files ending in. exe, . dll, . scr, . bat and. cmd for these are probably viruses or trojans. o Be aware of spyware, and if desired use programs such as Adaware to eliminate spyware from your system. o Sometimes closing the program window does not close the program itself, rather just minimizes it to the taskbar, check the taskbar if the program is truly closed. o Turn off your connection if you are leaving your computer for an extended period of time, this maybe harder with "always on" connections like cable Internet o Be sure you know exactly what you are downloading because there are a lot of fake files in peer-to-peer networks. Legal Issues In Canada, private copying is the making of copies of recorded music and video to a blank recording medium.

An example would be getting a blank CD and making a second copy of a favourite album so you can listen to it in your car. Another critical example is borrowing a tape from a friend and copying it for your own personal use instead of buying it. Up to three copyrights can be involved when private copies are made. o Copyright in the sound recording industry o Copyright in the music o Copyright in the performer's performance Since these copies are privately made, the artists cannot claim copyright infringement and cannot collect royalties. (Canadian Intellectual Property Office, 2002) Since making copies is technically legal, the Canadian government declared in March 19, 1998 the Copyright Act. It states that a levy will be placed on all blank mediums and the proceeds from the levies will be distributed to eligible artists.

This is compensation from private copying. The current interpretation with the copyright laws in Canada is as follows: Copying a CD you currently own, or copying a CD you borrowed is currently legal. However, you are not allowed to copy a CD you own and give it to someone else. That would be considered a copyright violation. How this has to do with peer-to-peer online file sharing is simple. "Every song on [your] hard drive comes from a CD in my collection or from a CD in someone else's collection which [you] have found on a P 2 P network.

In either case [you would] have made that copy and will claim safe harbour under the 'private copying' provision. If you find that song [on] a shared folder and make a copy, this will also be 'private copying'. [Someone] didn't give you a copy, rather you have downloaded the song yourself". (Currie, 2003) The law seems to be designed perfectly for online file sharing. Ottawa is currently revising the copyright laws, but as for now the current interpretation stays.

The Canadian Recording Industry wants the new phrasing to clarify that copying files is a violation of copyright laws unless the music has been rightfully purchased. In the United States however, the laws are totally different. Borrowing and copying is not allowed whatsoever, and a new law will let "copyright holders subpoena Internet service providers to identify files sharers". (Blackwell, 2003) The RIAA's main targets are those sharing a large number of music files, typically greater then 1000. The lawsuits can go for up to $150 000, but most of the users being subpoenaed are teenage kids, and it's the parents that are facing litigation. However, as shown in figure #6, half of all Kazaa users are over 25.

Figure #6 - Age group of Kazaa users (Lampert, 2003) The RIAA is currently suing all subpoenaed individuals for $150 000. Settlements are in the process. The average settlement so far is $2000 per individual. Suing file sharers is not a remedy for the current problem of online file sharing. When a business wants the sympathy of people who view you as a faceless, money-grabbing corporation, the last thing that the business should do is act like a faceless, money-grabbing corporation. (Rayner, 2003) This may actually increase the amount of files being shared for this reason alone.

Online file sharing has been around for a while and is not as safe as they may seem. There are numerous security issues when going online with a peer-to-peer application. File sharing is here to stay. With the death of one, a new one will take its place in the mainstream computer world. Though some elements may not be legal, there are better approaches to solve the legal issues concerning file sharing. Blackwell, R. (2003, September 10).

Murky laws make piracy suits less likely in Canada than U.S. Retrieved October 25, 2003 from web Brandt, A. (2003, September). The Danger of Too Much File Sharing. PC World Retrieved October 31, 2003, from EbscoHost online Magazine (Computer Source) Borland, J. (2001, October 15). Online music wars inspire new weaponry. Retrieved October 24, 2003 from web Canadian Intellectual Property Office. (2002).

Private Copying. Retrieve November 10, 2003 From web Chid i, G.A. (2003, April 5). KaZaA download offers unexpected feature. Retrieved October 25, 2003 from web CTV. ca.

Online Music sharing blames for decline in CD sales. Retrieved. October 24, 2003 From web Currie, J. (2003, August 18). Blame Canada. Retrieved October 23, 2003 From web Department of Justice Canada.

(2003). Copyright Act. Retrieved November 3, 2003 From http: // web Fet to B. (2003, September). Sharing is Caring? American Demographics Retrieved October 24, 2003, from EbscoHost online database (Academic Search Premiere) File Sharing Issues. File Sharing: A Fair Share?

Maybe Not. Retrieved October 24, 2003, From web Lambert, P. (2003, September 29). Facing the Music. People Retrieved October 25, 2003, from EbscoHost online database (Academic Search Premiere) Lui, S. (August, 2003).

Interoperability of Peer-To-Peer File Sharing Protocols. Retrieved November 8, 2003, from ACM SIGe com Exchanges Microsoft. (2001, February). NET P 2 P: Writing Peer-to-Peer Networked Apps with the Microsoft. NET Framework. Retrieved November 17, 2003 From web Peer to Peer vs. Client-Server Networks.

Free PC Tech. Retrieved November 16, 2003 From web Rayner B. (2003, September 14). Swappers have a reason to rebel. Toronto Star. Retrieved October 24, 2003, from News can online database Weiss, T. (2003, September 21). Peer-to-Peer File-Sharing Threat Spreads.

Computerworld Retrieved October 31, 2003, from Ebscohost online database (Computer Source).