Skip to main content

Home/ Internetni praktikum/ Group items tagged downloads

Rss Feed Group items tagged

petra funtek

EBSCOhost: Internet Piracy as a Hobby: What Happens When the Brazilian Jeitinho Meets ... - 2 views

  • Downloading?
  • Internet Piracy as a Hobby: What Happens When the Brazilian Jeitinho Meets Television
  • This paper explores the Brazilian cultural practices of illegal downloading of American television programs. Through research on television show forums, fandom websites, fan communities in the social networking website Orkut, the networks' homepages and literature review, piracy is shown to be related to cultural practices and an inadequate broadcasting system. It seems Brazilian fans persist in breaking the law when downloading television shows from unauthorized sources, regardless of the severe legal penalties to transgressors. They use a popular 'problem-solving strategy' (Duarte, 2006) called jeitinho brasileiro to respond to the delay or unavailability of U.S. programming on Brazilian cable and free to air television. The jeitinho brasileiro is exemplified by the fans having organized systems for file sharing of the episodes in Orkut fan communities. The study looks at a group of fans named legenders, who produce subtitles for the downloaded shows as a hobby, also despite of the Brazilian legislation on intellectual property protection. Furthermore, the paper explains why Brazilians who download television shows do not respect the law in reference to cultural, economic and political contexts. It concludes with the idea that the broadcasting industry must update and adapt its television programming distribution system, taking into account the particular context of each country, such as in Brazil.
metapavlin

Internet users unaware of illegal downloading | Technology | The Guardian - 0 views

  • Nearly half of the internet users surveyed incorrectly said they thought it was legal to upload commercially produced media to a file-sharing website
  • Internet users unaware of illegal downloading
  • Internet users are unwittingly turning into online pirates over confusion about what constitutes illegal downloading.
  • ...2 more annotations...
  • As many as 44% of those who took part in an independent, online survey of 2,500 respondents in the survey commissioned by the law firm Wiggin incorrectly said they thought it was legal to upload commercially produced media to a file-sharing website, or did not know whether it was lawful or not.More than a third – 35% – inaccurately claimed it was legal to copy a film or TV show as a file from a friend, or admitted they didn't know if it was legal.
  • However, almost two-thirds admitted they regularly use search engines such as Google to find unauthorised content. Over one in four used search engines on a daily basis to find such material.
Katja Jerman

Five-year-old runs up £1,700 iPad bill in ten minutes - Telegraph - 0 views

  • Five-year-old runs up £1,700 iPad bill in ten minutes
  • "Danny was pestering us to let him have a go on the iPad. He kept saying it was a free game so my husband put in the passcode and handed it to him.
  • "He was crying, as the rest of the children were telling him we could have bought a house with the amount he had spent.
  • ...10 more annotations...
  • I am still going to play games when I can, but I will be careful now."
  • I'm not sure how I did it, I thought it was free.
  • turn off functionality such as purchasing from iTunes and the ability to turn off in-app purchases.
  • "It was far too easy a thing for him to do and more should be done to limit stuff like this from happening. That game is very annoying - and who would spend more than £1,700 on a game?
  • such incidents had to be reported as quickly as possible.
  • "All iOS devices (iPad, iPhone and iPod touch) have built in parental controls that give parents and guardians the ability to restrict access to content, eg internet access and age rated content such as music, games, apps, TV shows, movies etc.
  • Apple have now told the family they will refund the money.
  • Five-year-old runs up £1,700 iPad bill in ten minutes
  • Five-year-old runs up £1,700 iPad bill in ten minutes
  • But after downloading the free app Danny found his way into the game's online store and innocently ordered dozens of costly add-ons - totalling £1,710.43.
Katja Jerman

Digital rights advocates wary of new 'six strikes' initiative for online piracy | Techn... - 0 views

  • The Copyright Alert System (CAS) was devised by a coalition of internet service providers (ISPs), content owners and the US government to curb illegal downloading by alerting "casual infringers" when illegal filesharing is detected on their IP address
  • Initially, the alerts are intended to be educational. They tell the customer what happened and how they can prevent it from happening again. If pirating continues to happen through the IP address, users will receive the message again, followed by messages that ask them to confirm they have seen the alerts. The fifth and sixth alert are called mitigation alerts and will temporarily slow users' internet speeds, depending on the ISP.
  • CAS has also been criticized because the person who audited the MarkMonitor software to ensure that it fairly identifies copyright violations is a former lobbyist for the Recording Industry Association of America (RIAA), one of the industry groups fronting money for system.
  • ...12 more annotations...
  • McSherry said that people engaged in wholesale commercial infringement wouldn't be fazed by the system because they are familiar with ways around the system.
  • Jill Lesser, executive director of the Center for Copyright Information said in an interview with On the Media that the program is meant to abet the "casual infringer".
  • The newest attempt to thwart illegal filesharing in the United States launched Monday and while the "six strikes and you're out" initiative seems to offer light penalties, digital rights advocates are concerned that it lacks transparency.
  • Copyright Alert System (CAS)
  • was devised by a coalition of internet service providers (ISPs), content owners and the US government to curb illegal downloading by alerting "casual infringers" when illegal filesharing is detected on their IP address.
  • Initially, the alerts are intended to be educational.
  • . If pirating continues to happen through the IP address, users will receive the message again, followed by messages that ask them to confirm they have seen the alerts. The fifth and sixth alert are called mitigation alerts and will temporarily slow users' internet speeds, depending on the ISP.
  • It's certainly not how we should be doing copyright policy,
  • it's a private copyright system and it doesn't have the protections and balances that the public copyright system has.
  • to ensure that it fairly identifies copyright violations is a former lobbyist
  • McSherry said that people engaged in wholesale commercial infringement wouldn't be fazed by the system because they are familiar with ways around the system
  • This failed to have a significant effect on pirating, and the industry stopped suing these type of casual users several years ago.
  •  
    article 1
inesmag

How to keep your privacy online | Ask Jack | Technology | guardian.co.uk - 2 views

  • I would like my browsing and Google searches to be private. I don't want targeted advertising and I don't want to feel that anonymous companies are harvesting my clicks to learn all about me.
  • When the web was young, and a lot less shiny, web pages were fixed (static) and – barring browser quirks – everybody saw much the same thing. Today, much of the web is dynamic, which means that what you see has been adapted or possibly constructed on the fly just for you.
  • From your point of view, the advantage is that the websites you visit will be personalised to suit your needs and tastes. From the website's point of view, the advantage is that it can also personalise its prices and advertising to try to suit your needs and tastes, and increase your propensity to click and buy.
  • ...6 more annotations...
  • On the web, the rule is: if you're not paying, then you are what's being sold.
  • Probably the simplest way to reduce personalisation is to use an anonymising service. Instead of accessing the web directly, you access it via a third-party proxy server, so your that requests are mixed in with thousands of others. These services usually allow you to control cookies, turn JavaScript on and off, withhold "referrer details" and so on.
  • Nonetheless, it's often useful to have access to an anonymous proxy service, and everybody should find one they like. Examples include The Cloak, Megaproxy, Proxify and ID Zap. There are also networked open source privacy systems such as Tor and I2P.
  • Google also tracks your progress across hundreds of thousands of websites via Google Analytics. To opt out of this, install the Google Analytics Opt-out Browser Add-on (Beta), which Google offers for Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Apple Safari and Opera. However, some sites use different analytics software or track visitors in other ways you will be unaware of. Ghostery may help reduce these.
  • Finally, Facebook Connect is a potential privacy problem because it "allows users to 'connect' their Facebook identity, friends and privacy to any site".
  • In general, the more you do online – social networking, cloud computing etc – the more your privacy and security are at risk. Reducing that risk involves effort and inconvenience, so it's up to you to find an acceptable compromise
Jan Keček

Doubt cast on Pirate Bay's claim to have set up in North Korea | Technology | guardian.... - 0 views

  • Pirate Bay says it was 'persecuted for beliefs of freedom' but analysts say site is still likely being routed through Europe
  • The Pirate Bay, the notorious file-sharing site that was ejected from Sweden last week, claimed to have set up shop in North Korea on Monday.
  • The Pirate Bay is a popular site that hosts links to torrented material, though a separate program is required to download the links' content. This function puts the Pirate Bay in a legal grey area in most countries though it has been the subject of many lawsuits.
  • ...1 more annotation...
  • It seems that the Pirate Bay's claim was an elaborate joke. North Korea has been claiming to have opened up its internet boders recently, playing host to Google executive Eric Schmidt. In late February, North Korea began allowing foreigners to access mobile internet, resulting in a fresh cache of Instagram images of North Korea.
Urška Cerar

BBC News - Court orders UK ISPs to block more piracy sites - 0 views

  • Opponents have argued that blocking sites in this way was ineffective.
  • Data seen by the BBC suggested that the blocking of The Pirate Bay had only had a short-term effect on the level of pirate activity online
  • there had been a large reduction in the number of users illegally downloading music
  • ...2 more annotations...
  • Blocking illegal sites helps ensure that the legal digital market can grow and labels can continue to sign and develop new talent.
  • The UK has now handed the power over what we see on the internet to corporate lobbyists
Anja Pirc

Online privacy: Difference Engine: Nobbling the internet | The Economist - 0 views

  • TWO measures affecting the privacy internet users can expect in years ahead are currently under discussion on opposite sides of the globe. The first hails from a Senate committee’s determination to make America’s online privacy laws even more robust. The second concerns efforts by the International Telecommunications Union (ITU), an intergovernmental body under the auspices of the United Nations, to rewrite its treaty for regulating telecommunications around the world, which dates from 1988, so as to bring the internet into its fief.
  • The congressional measure, approved overwhelmingly by the Senate Judiciary Committee on November 29th, would require criminal investigators to obtain a search warrant from a judge before being able to coerce internet service providers (ISPs) to hand over a person’s e-mail. The measure would also extend this protection to the rest of a person’s online content, including videos, photographs and documents stored in the "cloud"—ie, on servers operated by ISPs, social-network sites and other online provider
  • a warrant is needed only for unread e-mail less than six months old. If it has already been opened, or is more than six months old, all that law-enforcement officials need is a subpoena. In America, a subpoena does not need court approval and can be issued by a prosecutor. Similarly, a subpoena is sufficient to force ISPs to hand over their routing data, which can then be used to identify a sender’s various e-mails and to whom they were sent. That is how the FBI stumbled on a sex scandal involving David Petraeus, the now-ex director of the CIA, and his biographer.
  • ...7 more annotations...
  • No-one imagined that ISPs would one day offer gigabytes of online storage free—as Google, Yahoo!, Hotmail and other e-mail providers do today. The assumption back then was that if someone had not bothered to download and delete online messages within six months, such messages could reasonably be considered to be abandoned—and therefore not in need of strict protection.
  • wholesale access to the internet, powerful mobile phones and ubiquitous social networking have dramatically increased the amount of private data kept online. In the process, traditional thinking about online security has been rendered obsolete. For instance, more and more people nowadays keep their e-mail messages on third-party servers elsewhere, rather than on their own hard-drives or mobile phones. Many put their personal details, contacts, photographs, locations, likes, dislikes and inner thoughts on Google, Facebook, Twitter, Flickr, Dropbox and a host of other destinations. Bringing online privacy requirements into an age of cloud computing is only fit and proper, and long overdue.
  • the international telecoms treaty that emerged focused on how telephone traffic flows across borders, the rules governing the quality of service and the means operators could adopt to bill one another for facilitating international calls. As such, the regulations applied strictly to telecoms providers, the majority of which were state owned.
  • he goal of certain factions is to grant governments the authority to charge content providers like Amazon, Google, Facebook and Twitter for allowing their data to flow over national borders. If enacted, such proposals would most certainly deter investment in network infrastructure, raise costs for consumers, and hinder online access for precisely those people the ITU claims it wants to help.
  • a proposal sponsored by the United States and Canada to restrict the debate in Dubai strictly t
  • o conventional telecoms has met with a modicum of success, despite stiff opposition from Russia plus some African and Middle-Eastern countries. Behind closed doors, the conference has agreed not to alter the ITU’s current definition of “telecommunications” and to leave the introductory text concerning the existing treaty’s scope intact.
  • The sticking point has been what kind of organisations the treaty should apply to. Here, one word can make a huge difference. In ITU jargon, the current treaty relates only to “recognised operating agencies”—in other words, conventional telecoms operators. The ITU wants to change that to simply “operating agencies”. Were that to happen, not only would Google, Facebook and other website operators fall under the ITU’s jurisdiction, but so too would all government and business networks. It seems the stakes really are as high as the ITU’s critics have long maintained
Jan Keček

Microsoft fined €561m for 'browser choice' error | Technology | guardian.co.uk - 0 views

  • Microsoft has been fined €561m by the European commission for failing to give users a choice of web browser when they logged into Windows computers in Europe between May 2011 and July 2012 – breaking a binding commitment it had made in 2009.
  • Microsoft made a five-year commitment in 2009 to offer users a choice of different browsers, after the EC's competition commission determined that the combination of its dominance on the desktop – where Windows runs around 95% of machines – gave the pre-installed Internet Explorer browser an unfair advantage over rivals
  • The commission implemented the "browser choice" system to create a level playing field - and said that once in use, it was very effective: "The choice screen was very successful with users," Joaquín Almunia, the competition commissioner, said in a statement. "For example, until November 2010, 84 million browsers were downloaded through it."
  • ...3 more annotations...
  • "We provided the commission with a complete and candid assessment of the situation, and we have taken steps to strengthen our software development and other processes to help avoid this mistake – or anything similar – in the future."
  • Microsoft said it took "full responsibility" for the technical error that caused the problem and that it had apologised for it.
  • ource close to Microsoft explained: "It was a single line in the code that triggered the browser choice program. It had a list of versions of Windows to test against: if the version was found in that list, the program would run. They didn't include Service Pack 1, which is effectively a different version of Windows, in that list. And so the program didn't run.
Katja Jerman

Rugby star's sons rack up £3,200 iPhone bill in three hours - Telegraph - 0 views

  • Rugby star's sons rack up £3,200 iPhone bill in three hours
  • Rugby star's sons rack up £3,200 iPhone bill in three hours
  • his sons, aged six and eight, were playing the game on his iPhone after memorising his password.
  • ...5 more annotations...
  • The boys spent more than £1,000 an hour creating their own mini monsters in the popular game.
  • During this time they bought virtual food for the monsters 54 times, paying up to £69.99 a time for a “mountain of food” for each monster.
  • The app for the iPhone is free to download but various extras, known as “in-app billing”, require cash payments to move up levels and develop monsters.
  • My kids did £3,200 playing a game called tiny monsters - it was £69 for some food for virtual monsters. Absolutely disgusting
  • The cash was eventually refunded after Tiny Monsters accepted the purchases were not authorised by the user.
metapavlin

Kim Dotcom in his own words | Technology | guardian.co.uk - 0 views

  • On how Mega differs from MegauploadThere are quite a few innovations that Megaupload didn't have. For example, we have built in upload-download acceleration in the browser, which is technology that only became available nine months ago. We have on-the-fly encryption to protect our users' privacy – because of my own experience having been spied on, and also throughout the proceedings, the US government looking into the files of users, without a warrant …
  • I think privacy is a very important topic, and more important today for users than ever, because you read about all these privacy violations, and reaching out from companies like Facebook and Instagram, and expanding their rights on what should be yours. We want to create a service that gives you fully automated, real-time, one-click, on-the-fly privacy.
  • I see myself in a role now of someone who has been put in this impossible situation, and I'm not only fighting just for myself but for the rights of everybody.
petra funtek

EBSCOhost: RIAA, MPAA, and the Digital Piracy Issue: Comparing Public Relations Strate... - 1 views

  • The downloading of copyrighted content has been a common concern for the motion picture and music recording industries, but their public relations response has been quite different.
  • A significant, moderate correlation of attributes used to frame this issue was found between the RIAA press releases and media coverage, but not between the MPAA press releases and the media.
1 - 14 of 14
Showing 20 items per page