TITLE

PROBLEMS WITH BITTORRENT LITIGATION IN THE UNITED STATES: PERSONAL JURISDICTION, JOINDER, EVIDENTIARY ISSUES, AND WHY THE DUTCH HAVE A BETTER SYSTEM

AUTHOR(S)
Foreman, Violeta Solonova
PUB. DATE
January 2014
SOURCE
Washington University Global Studies Law Review;2014, Vol. 13 Issue 1, p127
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
In this article, the author focuses on the legal framework in the United States for various lawsuits related to the America-based BitTorrent Inc. Topics discussed include copyright laws for the computer network protocol BitTorrent, significance of peer-to-peer file sharing protocol and benefits of the computer network protocol preventing illegal downloads. He further discusses various problems related to the trial and litigation of the computer network protocol company.
ACCESSION #
95634176

 

Related Articles

  • Modeling the initial stage of a file sharing process on a BitTorrent network. Lai, Pierre; Chow, K.; Hui, Lucas; Yiu, S. // Peer-to-Peer Networking & Applications;Dec2014, Vol. 7 Issue 4, p311 

    In this paper, we model the number of seeders during the initial stage of a file sharing process on BitTorrent networks. The initial stage is crucial for successfully identifying the initial seeder, who provided the source of the files on the Internet. Most existing BT models focus on different...

  • Methodology and implementation for tracking the file sharers using BitTorrent. Park, Sooyoung; Chung, Hyunji; Lee, Changhoon; Lee, Sangjin; Lee, Kyungho // Multimedia Tools & Applications;Jan2015, Vol. 74 Issue 1, p271 

    Sharing copyright protected content without the copyright holder's permission is illegal in many countries. Regardless, the number of illegal file sharing using BitTorrent continues to grow and most of file sharers and downloader are unconcerned legal action to transfer copywrite-protected...

  • ON CLIENT'S INTERACTIVE BEHAVIOUR TO DESIGN PEER SELECTION POLICIES FOR BITTORRENT-LIKE PROTOCOLS. Rocha, Marcus V. M.; da S. Rodrigues, Carlo Kleber // International Journal of Computer Networks & Communications;Sep2013, Vol. 5 Issue 5, p141 

    Peer-to-peer swarming protocols have been proven to be very efficient for content replication over Internet. This fact has certainly motivated proposals to adapt these protocols to meet the requirements of on-demand streaming system. The vast majority of these proposals focus on modifying the...

  • A multi-faced measurement study on a large private BitTorrent community. Cai, Qing-Chao; Lo, Kwok-Tung // Peer-to-Peer Networking & Applications;Jan2015, Vol. 8 Issue 1, p32 

    Private BitTorrent community is becoming increasingly popular, and generates a huge amount of Internet traffic. In this paper, we present a thorough measurement study on a famous private BitTorrent community, CHDBits. We find that the content of torrents published in this community are highly...

  • Download faster with BitTorrent software. Shaw, Andy // Web User;11/5/2014, Issue 357, p44 

    The article evaluates several BitTorrent software for downloading large files including Deluge, qBittorrent and Transmission-QT Win.

  • Combine Trust Management Scheme for BitTorrent Networks. Li Songjiang; Liu Yanheng; Wang Aimin // Applied Mechanics & Materials;2014, Vol. 713-715, p2221 

    In BitTorrent network, how to avoid free-riders is an in inevitable problem of improving BitTorrent performance. Using trust management is a trend of P2P transmission. We propose a combine trust management scheme, combining local trust value and trust value from neighbors to calculate a combine...

  • ELECTRONIC EVIDENCE IN TORRENT COPYRIGHT CASES. Dunlap, Thomas M.; Kurtz, Nicholas A. // Digital Evidence & Electronic Signature Law Review;2011, Vol. 8, p171 

    The article examines the methods of obtaining electronic evidence of peer-to-peer (P2P) users and the use of information as evidence in copyright infringement cases in the U.S. federal courts. It explores the methods adopted in the investigation of users of P2P torrent-type technologies that...

  • Hijacking the Vuze BitTorrent network: all your hop are belong to us. Chan-Tin, Eric; Heorhiadi, Victor; Hopper, Nicholas; Yongdae Kim // IET Information Security;2015, Vol. 9 Issue 4, p203 

    Vuze is a popular file-sharing client. When looking for content, Vuze selects from its list of neighbours, a set of 20 nodes to be contacted; the selection is performed such that the neighbours closest to the content in terms of Vuze ID are contacted first. To improve efficiency of its searches,...

  • Investigation on software-defined networks' reactive routing against BitTorrent. Vicino, D.; Lung, C.-H.; Wainer, G.; Dalle, O. // IET Networks;2015, Vol. 4 Issue 5, p249 

    Technologies in software-defined networks (SDNs) introduce programmatic ways to reorganise the network logical topology. A possible practical usage of SDNs is reactive routing, where the logical topology is continuously evolving based on traffic statistics and policies. Usually, the SDNs...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics