Earn money by sharing files on P2P networks www.peerfactor.info.

Slides:



Advertisements
Similar presentations
On-line media tools for strategic communications purposes When using media tools for communication we try to use the latest technologies such us blogging,
Advertisements

MediaDefender 1 From Anti-Piracy to Promotion What weve tried What has worked, and what hasnt Branding Campaigns.
Woodland Hills School District Computer Network Acceptable Use Policy.
Pirates of the Internet. Introduction - Francisco Escobar What is Copyright Infringement? Copyright infringement in the classical sense is the unauthorized.
Rik Reynaers BaF Belgian Anti-Piracy Foundation Friday April 1 st 2005 Software Law: Latest Developments in Europe “taking you on a side-track”
Copyright or Copywrong. What is a copyright and what can be copyrighted? What is “Fair Use” and what four factors determine “Fair Use”? What are the two.
Unit 1 Living in the Digital WorldChapter 4 – Smart Working This presentation will cover the following topics: Software choices Name:
Internet Piracy. History In the 1980’s mail was used to distribute pirated material Pirated material originally consisted of copyrighted games, software,
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
Copyright Infringement
Copyrights1 By Saud Al-Harbi & AbdulAziz Al-Shamrani.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
Ethics of Copyright Infringement Thomas H. Mak CS 301.
Delicious is a social bookmarking service that allows users to tag, save, manage, and share web pages. On Delicious you can; bookmark any site on the.
Legal & Moral standpoints
Internet Piracy and its Effects on Business By Eric Kutcher.
E-commerce Business Models— Introduction
HOMEWORK PAGE STAND ALONE PROGRAMS FUNCTION ON THEIR OWN AND SOMETIMES CANNOT SHARE DATA WITH OTHER PROGRAMS. INTEGRATED SOFTWARE COMBINES.
Elizabeth C. Rodriguez.  A copyright is a form of protection provided by the laws of the United States to authors of “original works of authorship.”
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Intellectual Property Rights and Online File Sharing Erwin Solis Antoine Herve Matt Olsen Nikolai Hart Tim Scott.
Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual.
Surveys of Media Access and Consumer Attitudes on Copyright Mike Palmedo & Jimmy Koo March 2011 Photo (cc) Irish Typepad (bit.ly/huMnIf)
Copyright By Harvey jones. Definition of copyright Copyright is were someone illegally downloads music or a movie for free with out promotion to do so.
© Folens 2008 Cultural changes in music Brought about by ICT.
Macrovision Corp. November 18, 2004 David Mizell Mary Voss Wei Wang.
Group members Pubudu Dissanayake Imesh Fernando Hasitha Dananjaya Kavindu Dewpura Prasad De Silva.
Chapter 26 Monopolistic Competition. Slide 26-2 Introduction A number of firms, including Hewlett-Packard, Wal-Mart, Microsoft, and Amazon all are trying.
Online Video Streaming and You Within this PowerPoint I plan to discuss the benefits and consequences of streaming online videos directly to your computer.
E-Commerce. What is E-Commerce Industry Canada version Commercial activity conducted over networks linking electronic devices (usually computers.) Simple.
Cyber Crimes.
Prepared by : April Rose B. Zamora.   Piracy, or theft, of trademarks and copyrighted material is a growing concern. As improved communication methods.
>>APMG 8119: DIGITAL ENTERPRISE. Copyright ??  Copyright is a exclusive right that gives the right to owner for ownership, transfer or sell to others.
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Group 06-From Lecture 06 Member 02 Presented by: Xu Wei iTunes B2C SUCCESS STORY&CONTROVERSIAL ISSUES.
Chapter 9 Interactive Marketing and Electronic Commerce.
Crime & Malpractice AS Module Heathcote Ch. 10.
Read more: piracy/
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Ethics and Computer Invaders. What are ‘Ethics’? Personal code of conduct accepted by society Using technology appropriately.
Movie Piracy Created by: Charlotte. Movie Piracy: An illegal act of recording a movie, television program, or a video that is copyrighted, and that you.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Unit Word Processing Exploring Ethics  Why copyrights are necessary  How to use technology ethically and legally  How to cite online sources You Will.
Advertising 1 *The red circles show the position of the keyframes on the timeline. What are banner and pop-up advertisements? 1 Answer Banner and pop-up.
MUSIC PIRACY By: E. Lockhart. MUSIC PIRACY Music Piracy is illegally downloading music from a fake website that has plagiarized copyrighted music.
Ethical Internet Use TECH 503 By A. Greenwell. Ethics in the Virtual World We all grow up learning the rules, regulations, and laws of the real world.
1. Overview One of the most popular clubs in Germany. (measured in number of members). Top 25 attendance in Europe – attending in average. Long.
MEDIA BY DAVID TEMBO. OBJECTIVES  Description on the current state of the media  Explain in detail Reasons:  File sharing  Piracy  Digital media.
>>APMG 8119: DIGITAL ENTERPRISE REPORT PREPARED FOR: (Mariia, Deepthi, Alexi & Shriram) POSTGRADUATE DIPLOMA IN BUSINESS APMG 8119: DIGITAL ENTERPRISE.
Definition of Internet Piracy Definition of Internet Piracy Internet Piracy The unlawful reproduction and/or distribution of any copyrighted digital file.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
Woodland Hills School District Computer Network Acceptable Use Policy.
By: Ashley, Sabiha, and Roshaan. Software Piracy is the unauthorized copying of software. By buying the software, you become a licensed user rather than.
9.1 Audience Appreciation
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Dollar Upload. Tips to help you earn money What type of files should I promote? There are millions of uploaded files on the internet, but you want to.
Applications Software. Is a software used to carry out a particular task e.g. a game or word processor.
Computer Safety and Ethics
Legal and ethical issues
Are you an internet addict?
Copyright Jeopardy Music Theory 2009.
EXTRATORRENTS.
By: Justin, Juan, Jian, and Jazlin
Copyright, Designs and Patents Act 1988
Licensing, Copyrights, Piracy, and Pilferage: The protection and theft of products By: Thomas O’Rourke.
Property in Cyberspace
What is Information Security?
Student Name Student Class
Woodland Hills School District
Presentation transcript:

Earn money by sharing files on P2P networks

What is PeerFactor ? PeerFactor helps content owners in order to : Promote their products, Increase their online revenues, Fight against online piracy. PeerFactor enables Internet users to : Earn money by sharing files on P2P networks.

How does PeerFactor work (1/3)? A.Content owners provide PeerFactor with a link to a legal web site selling music, movies or software. B.PeerFactor creates files that are apparently similar to the illegal copies of the copyrighted files on P2P networks. But PeerFactor’s files, when they are opened, actually redirect users to the legal online service. Those files may also contain an extract or a trial version of the concerned product.

C.PeerFactor members (registered Internet users) distribute PeerFactor’s files on P2P networks. Each PeerFactor member receives a unique ID, Each member distributes files that contain their personal ID. How does PeerFactor work (2/3)?

D.When a P2P user downloads a PeerFactor file and tries to open it, he is redirected to a legal online service selling the product he’s trying to hack. E.PeerFactor members get a commission for every redirection or sale that occurs thanks to them. How does PeerFactor work (3/3)?

PeerFactor process diagram Content owners music, movies, video games, software, etc. P2P networks PeerFactor members P2P users download PeerFactor files. P2P users are redirected to legal web sites and can buy legally the products they were trying to hack. PeerFactor members get commissions.

How much can we earn thanks to PeerFactor ? Example : You share a very demanded file (the latest video game or a forthcoming blockbuster), After a week, your file is shared by 250 P2P users, A month later, your PeerFactor file has generated 2500 redirections, 2500 x 0.05 = 125 US$ in one month. * * This is a non contractual estimation based on a US$ 0.05 fee for redirections (this option is chosen by content owners)

Does PeerFactor limit online piracy ? Yes ! If 1000 PeerFactor members share 1000 different versions of a product, it will be very difficult to find a real bootlegged version of this product on P2P networks. Every PeerFactor file voluntarily looks like illegal copies and this prevent P2P users from distinguishing PeerFactor files and illegal files. Each « spoofed » P2P user is redirected to legal web sites.

For more information : members subscriptions start on Monday, April 5th, : PeerFactor is a service managed by RetSpan.