Open Access   Article Go Back

Digital Privacy and Security: A Survey on the Modern Threat on the Digitization

Soumee Maschatak1 , Chandan Raj BR2

Section:Survey Paper, Product Type: Journal Paper
Volume-07 , Issue-15 , Page no. 339-343, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si15.339343

Online published on May 16, 2019

Copyright © Soumee Maschatak, Chandan Raj BR . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Soumee Maschatak, Chandan Raj BR, “Digital Privacy and Security: A Survey on the Modern Threat on the Digitization,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.339-343, 2019.

MLA Style Citation: Soumee Maschatak, Chandan Raj BR "Digital Privacy and Security: A Survey on the Modern Threat on the Digitization." International Journal of Computer Sciences and Engineering 07.15 (2019): 339-343.

APA Style Citation: Soumee Maschatak, Chandan Raj BR, (2019). Digital Privacy and Security: A Survey on the Modern Threat on the Digitization. International Journal of Computer Sciences and Engineering, 07(15), 339-343.

BibTex Style Citation:
@article{Maschatak_2019,
author = {Soumee Maschatak, Chandan Raj BR},
title = {Digital Privacy and Security: A Survey on the Modern Threat on the Digitization},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {15},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {339-343},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1256},
doi = {https://doi.org/10.26438/ijcse/v7i15.339343}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i15.339343}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1256
TI - Digital Privacy and Security: A Survey on the Modern Threat on the Digitization
T2 - International Journal of Computer Sciences and Engineering
AU - Soumee Maschatak, Chandan Raj BR
PY - 2019
DA - 2019/05/16
PB - IJCSE, Indore, INDIA
SP - 339-343
IS - 15
VL - 07
SN - 2347-2693
ER -

           

Abstract

Today’s software industry is operating on loses because of a modern threat known as Digital Piracy. Not only the software industry, various sectors of the industry like the cinematography, authors, inventers and discoverers are facing a threat wherein their work may attain a global attention without bringing them anything. A recent studies has shown that due to recent craze of digitization and the socio-economic condition, people are more inclined towards acquiring everything without even giving it time and money. This is becoming a threat to the intellectual property owners. This paper is all about understanding the factors affecting digital piracy, the types of digital piracy and the various steps and measures needed to stop the digital piracy from spreading its wings.

Key-Words / Index Term

Piracy, factors, types, peer-to-peer applications, BitTorrent

References

[1] Sulaiman Al-Rafee, Timothy Paul Cronan, “Digital Piracy: Factors that Influence Attitude Toward Behaviour”, 2006
[2] Paul Kocher, Joshua Jaffe, Benjamin Jun, Carter Laren, Nate Lawson, “Self-Protecting Digital Content”,2003
[3] B. Srinivas, Dr. Koduganti Venkata Rao, Dr. P. Suresh Varma, “Piracy Detection and Prevention using SIFT Based On Earth Mover’s Distance”, 2012
[4] K.P. Chow, K.Y. Cheng, L.Y. Man, Pierre K.Y. Lai, Lucas C.K. Hui, C.F. Chong, K.H. Pun, W.W. Tsang, H.W. Chan, S.M. Yiu, “BTM – An Automated Rule-based BT Monitoring System for Piracy Detection”, 2007
[5] A. Parker, Peer-to-Peer in 2005, CacheLogic Research, available at http://www.cachelogic.com/home/pages/studies/ 2005_01.php
[6] BitTorrent Protocol, BitTorrent.org, available at http://www.bit torrent.org/protocol.html
[7] Yawei Zhang, Lei Jin, Xiaojun Ye, “Software Piracy Prevention: Splitting on Client”, IEEE International Conference on Security Technology, December 13-15, 2008
[8] H. Chang and M. Atallah. Protecting software code by guards. Security and Privacy in Digital Rights Management,LNC S, 2320:160–175, 2002.
[9] George Coulouris, Jean Dollimore & Tim Kindberg. Election Algorithm, Bully Algo & Ring based algo. In Distributed Systems, 2006
[10] A. G., Galletta, D. F., & Thong, J. Y. L. “Software piracy in the workplace: A model and empirical test. Journal of Management Information Systems”, 2003
[11] Leugimap, Why “Free Software” is better than “Open Source”, http://www.gnu.org/philosophy/freesoftware-forfreedom.html Free Software Foundation. October 6, 2004.