• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • 1
  • Tagged with
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Peer-to-Peer file sharing software use behavior

Liu, I-Wen 20 August 2004 (has links)
Peer-to-peer file sharing has overturned the traditional way to communication, and has great impacts on society. But as so far, there are only few researches concerning this problem from users¡¦ point of view, why and how users take use of it is still equivocal. Therefore in this research, I examined the motivations and behavior of P2P uses with uses and gratifications approach, and further more, whether motivations for P2P uses explain users¡¦ behaviors and considered the contribution of individual characteristics are also examined. As for motivations, a factor analysis revealed five motivations to use P2P file sharing software: Information seeking, Convenience, Library storage, Interpersonal communication and Self-achievement. Motivations are related to individual characteristics, including gender, age, the duration of internet use and P2P use, income, and education. Several motivations and individual differences predict P2P use. And grouping users with cluster analysis, this research found three types of users: highly involved users, low involved users, and those who just want to download files. Highly involved users launch software frequently, have the strong motivations and are willing to share files with others. On the contrary, low involved users use less frequently, and have the relatively weak motivation of P2P use. Those who just download files are unwilling to share files with others.
2

Mapping South African internet user's opinions about the use of peer-to-peer file sharing technology to infringe on copyrighted films and/or television series content

Botes, Isabe 11 1900 (has links)
The aim of this study was to investigate the various reasons consumers continue to infringe on copyrighted content, specifically in the South African context, even if the law forbids it. This investigation is two-fold since it also recognises that there are many individuals who do not infringe on copyrighted content even though they have access to peer-to-peer file sharing technology. This information could prove valuable since it can then be used to find comprehensive market-led solutions to the problem that targets the end-user. This study adopted a mixed method approach in order to cross validate findings and to reveal aspects of empirical reality. The target population for this study consisted of 100 adult South Africans who have access to the internet. Data was collected through an online, self-administered questionnaire. Quantitative data was analysed through descriptive statistics, while qualitative data was analysed through thematic analysis. The results show that there are variety of factors that influence respondents’ attitudes towards copyright infringement of films and/or television series through peer-to-peer file sharing technology, each of which is discussed in detail. The study concluded by identifying 24 factors that favourably influence people’s attitudes towards copyright infringement, including high prices of legitimate goods, historical inequality in South Africa, and perceived low risk of being caught and punished. Based on the conclusion above, the study recommends that policy makers such as government officials, boards of directors, managers, committees, and executives use the results of the study when making decisions and determining policies, especially in the South African context. / Communication Science / M.A. (Communication Science)
3

Satutory limitation of liability of internet service providers in decentralized peer to peer file sharing

Popoola, Olumuyiwa Oluwole 02 1900 (has links)
A study is done on the protection of sound recordings in the decentralized peer-to-peer (DP2P) file sharing in the United States, the United Kingdom and South Africa. This study reveals that because sound recordings have unique features different from other copyright works, the illegal sharing of sound recordings can ordinarily be filtered, identified, and detected by the Internet service providers (ISPs) before granting access to users and without infringing the users‟ right to privacy. However, the ISPs have failed in this regard, hence, they are strictly held liable under the contributory, vicarious and inducing infringements notwithstanding the statutory law which prohibits ISPs from monitoring, and intercepting their networks. In fact and law, the terms filtering, identifying and detecting on the one hand and monitoring and intercepting on the other hand are different in relation to sound recordings and as such ISPs are not prohibited from filtering, identifying and detecting illegal sound recordings on their networks, thus, ISPs are not protected under the limitation law as it is generally believed. However, several recommendations are made for reform, inter alia: a review of the limitation law to include the terms filtering, identifying and detecting in pursuance of the terms monitoring, and intercepting, if the intention of the legislators was meant to include the latter terms; protection of access right in digital sound recordings, protection of the neighbouring rights of ISPs in the digital world, imposing levies on all recording equipment, the insurability of sound recordings and ISPs‟ signals, and bandwidth. / Mercentile Law / LL. M. (Mercantile Law)
4

Statutory limitation of liability of internet service providers in decentralized peer to peer file sharing

Popoola, Olumuyiwa Oluwole 02 1900 (has links)
A study is done on the protection of sound recordings in the decentralized peer-to-peer (DP2P) file sharing in the United States, the United Kingdom and South Africa. This study reveals that because sound recordings have unique features different from other copyright works, the illegal sharing of sound recordings can ordinarily be filtered, identified, and detected by the Internet service providers (ISPs) before granting access to users and without infringing the users‟ right to privacy. However, the ISPs have failed in this regard, hence, they are strictly held liable under the contributory, vicarious and inducing infringements notwithstanding the statutory law which prohibits ISPs from monitoring, and intercepting their networks. In fact and law, the terms filtering, identifying and detecting on the one hand and monitoring and intercepting on the other hand are different in relation to sound recordings and as such ISPs are not prohibited from filtering, identifying and detecting illegal sound recordings on their networks, thus, ISPs are not protected under the limitation law as it is generally believed. However, several recommendations are made for reform, inter alia: a review of the limitation law to include the terms filtering, identifying and detecting in pursuance of the terms monitoring, and intercepting, if the intention of the legislators was meant to include the latter terms; protection of access right in digital sound recordings, protection of the neighbouring rights of ISPs in the digital world, imposing levies on all recording equipment, the insurability of sound recordings and ISPs‟ signals, and bandwidth. / Mercentile Law / LL. M. (Mercantile Law)

Page generated in 0.1101 seconds