Skip to main content

Home/ Groups/ Internetni praktikum
petra funtek

UK film distributors give cinema staff cash rewards for rooting out piracy | Film | gua... - 0 views

  • Cinema staff are being incentivised with cash rewards in the fight against theatrical piracy. Thirteen ushers from across the UK have already been given sums of up to £700, adding up to a sum of thousands of pounds, as rewards for identifying potential pirates at screenings of Skyfall, Ted, The Dark Knight Rises and The Hobbit.
  • The initiative is funded by UK film distributors via the Film Distributors' Association and has been running since 2006.
metapavlin

Internet users unaware of illegal downloading | Technology | The Guardian - 0 views

  • Nearly half of the internet users surveyed incorrectly said they thought it was legal to upload commercially produced media to a file-sharing website
  • Internet users unaware of illegal downloading
  • Internet users are unwittingly turning into online pirates over confusion about what constitutes illegal downloading.
  • ...2 more annotations...
  • As many as 44% of those who took part in an independent, online survey of 2,500 respondents in the survey commissioned by the law firm Wiggin incorrectly said they thought it was legal to upload commercially produced media to a file-sharing website, or did not know whether it was lawful or not.More than a third – 35% – inaccurately claimed it was legal to copy a film or TV show as a file from a friend, or admitted they didn't know if it was legal.
  • However, almost two-thirds admitted they regularly use search engines such as Google to find unauthorised content. Over one in four used search engines on a daily basis to find such material.
metapavlin

Kim Dotcom announces Mega, successor to Megaupload | Technology | guardian.co.uk - 0 views

  • Kim Dotcom, founder of the banned Megaupload filesharing site, has announced a new version called Mega designed to sidestep the American laws under which he is being prosecuted for £175m worth of alleged online piracy, racketeering and money laundering.
  • The site would not use US-based hosting companies as partners in order to avoid being shut down by US authorities, Dotcom said.
  • Megaupload was shut down in January 2012 when New Zealand police helicopters swooped into Dotcom's mansion outside Auckland to seize computers and other evidence at the request of US authorities.
  • ...2 more annotations...
  • Users of Mega would be able to upload, store and share photos, text files, music and films, encrypt those files and grant access using unique decryption keys, Dotcom said. "You hold the keys to what you store in the cloud, not us," a statement on the Mega website said.
  • Ensuring that files are not pirated will be the job of content owners, a major change from Megaupload, which the US film industry says ignored illegal content and profited from it.
metapavlin

Kim Dotcom in his own words | Technology | guardian.co.uk - 0 views

  • On how Mega differs from MegauploadThere are quite a few innovations that Megaupload didn't have. For example, we have built in upload-download acceleration in the browser, which is technology that only became available nine months ago. We have on-the-fly encryption to protect our users' privacy – because of my own experience having been spied on, and also throughout the proceedings, the US government looking into the files of users, without a warrant …
  • I think privacy is a very important topic, and more important today for users than ever, because you read about all these privacy violations, and reaching out from companies like Facebook and Instagram, and expanding their rights on what should be yours. We want to create a service that gives you fully automated, real-time, one-click, on-the-fly privacy.
  • I see myself in a role now of someone who has been put in this impossible situation, and I'm not only fighting just for myself but for the rights of everybody.
metapavlin

Kim Dotcom: the internet cult hero spoiling for a fight with US authorities | Technolog... - 0 views

  • We want to show the world that we are innovators. We want to show the world that cloud storage has a right to exist. And, of course, when you launch something like this, you can expect some controversy. The content industry is going to react really emotionally about this. The US government will probably try and destroy the new business … you've got to stand up against that, and fight that, and I'm doing that … I will not allow them to chill me."
  • Megaupload was created initially as a service that allows you to send large files because email attachments had limitations … and that's still the case today. The popularity and initial growth was all around that. This was never set up with the intent to be some kind of piracy haven. If the US government says that we are a mega-conspiracy, a mafia that has created this kind of thing to be a criminal network of pirates, they're completely wrong … for them it was about shutting it down and dealing with it later on the fly. They are hacking the legal system."
metapavlin

The online copyright war: the day the internet hit back at big media | Technology | The... - 0 views

  • he internet has changed the world so much that current legislation is not adequate, said Wales. "
  • " If, for example, someone uploads a video of their child's birthday party and then finds it has been deleted because a copyrighted song is playing in the background, "that's not piracy. That's how we use our music these days," says Wales. "A lot of what people want to do now is not legal but should be legal. We can say that and still be against full-scale piracy."
  • I think we are at a point where we are asking whether you really need a film industry for a film to be made or a music industry to make music. People can now speak directly to their audiences,"
petra funtek

Is the Devil in the Data? A Literature Review of Piracy Around the World - Kariithi - 2... - 1 views

  • This article examines the scholarly literature pertaining to music, film and software piracy around the world, with special attention to data sources, research scope and general findings. The article finds that the conspicuous absence of methodologies utilizing critical theory in this broad literature has constricted the world view of piracy, resulting in monolithic explanations of the causes and correlates of piracy. It further identifies systematic biases relating to the unjustified use of data published by the industry watchdog Business Software Alliance
petra funtek

ScienceDirect.com - International Journal of Human-Computer Studies - A new look at sof... - 1 views

  • Soft lifting refers to the process whereby a legally licensed software program is installed or copied in violation of its licensing agreement. Previous research on this pervasive kind of unethical computer use has mainly focused on the determinants of this unethical act, which are rooted in personal, economic, technological, cultural, socio-political, or legal domains. However, little is known about the symbolic power that soft lifting has on the sense of self. Based on recent advances in behavioral priming, we hypothesized that soft lifting can influence the signals one sends to oneself; more specifically, soft lifting may prime individuals to experience an inauthentic sense of self, which, in turn, prompts further unethical behavior. In Study 1, we showed that participants, primed with the memory of a recent soft lifting experience, cheated more than participants recalling a recent experience of purchasing authentic software or than control participants. Moreover, feelings of inauthenticity mediated the priming effect of soft lifting on dishonest behavior. In Study 2, participants primed with soft lifting showed a greater willingness to purchase a wide range of counterfeit products over authentic products. Besides those antecedents or correlates of soft lifting already identified in the literature, educators should pay more attention to the negative impact of soft lifting on the self-images of users, which may go beyond computer-related behaviors. Priming may provide a new direction for HCI researchers to examine the impact of computer-use-related factors on users' perceptions, motivations, and behaviors.
1 - 20 of 325 Next › Last »
Showing 20 items per page