SlideShare una empresa de Scribd logo
1 de 20
By Niall Walsh
  Welcome!
CC BY-NC-ND 2.0 Shavar Ross
                              CC BY-NC 2.0 CyberHades
Digital Compression

Greater Bandwidth

Ease of Distribution
CC BY-SA 2.0 ImHoboTown

CC BY-SA 2.0 milanus
CC BY-NC-SA 2.0 itBox24




             CC BY-NC 2.0 zicot2003
CC BY Cea.
Digital      Greater      Ease of
Compression   Bandwidth   Distribution
CC BY-NC-ND Lasse Kristensen
CC BY-NC-ND EMOruffino☮




                                            CC BY-NC-SA
                                            2.0 frostwire.com
CC BY-NC-ND silverlithium
CC BY-NC 2.0 texplorer




CC BY-NC-ND silverlithium
CC BY 2.0 Robin Iversen Rönnlund
CC BY-NC-ND 2.0 Shavar Ross
CC BY-NC 2.0 Alrunia
CC BY-NC-SA 2.0 equinoxefr
CC BY-NC-SA 2.0 Alatryste
Technical Measures

Copyright Protection
CC BY 2.0 aussiegall
CC BY-NC-ND Lasse Kristensen
CC BY 2.0 woodleywonderworks

Más contenido relacionado

Destacado

Software above the level of a single device
Software above the level of a single deviceSoftware above the level of a single device
Software above the level of a single devicechloegoodrum
 
Utiliser LinkedIn en recherche d'emploi
Utiliser LinkedIn en recherche d'emploiUtiliser LinkedIn en recherche d'emploi
Utiliser LinkedIn en recherche d'emploiActiris
 
Autism circle of friends
Autism circle of friendsAutism circle of friends
Autism circle of friendsthefritzplace
 
Maastikumäng 7. klassile
Maastikumäng 7. klassileMaastikumäng 7. klassile
Maastikumäng 7. klassileLiiaL
 
Plenary1 01 roland_stauss
Plenary1 01 roland_staussPlenary1 01 roland_stauss
Plenary1 01 roland_stausskkangbi
 
Revista Dirigir número 0
Revista Dirigir número 0Revista Dirigir número 0
Revista Dirigir número 0Elsa Fernandes
 
Gerir bem a sua autarquia
Gerir bem a sua autarquiaGerir bem a sua autarquia
Gerir bem a sua autarquiaElsa Fernandes
 
Customer Experience by Richard Perry, FOUNDED, cxfounded
Customer Experience by Richard Perry, FOUNDED, cxfoundedCustomer Experience by Richard Perry, FOUNDED, cxfounded
Customer Experience by Richard Perry, FOUNDED, cxfoundedFOUNDED London
 
Embracing the Red Bar: A Technique for Safely Refactoring Your Test Suite
Embracing the Red Bar: A Technique for Safely Refactoring Your Test SuiteEmbracing the Red Bar: A Technique for Safely Refactoring Your Test Suite
Embracing the Red Bar: A Technique for Safely Refactoring Your Test SuiteM. Scott Ford
 

Destacado (10)

Software above the level of a single device
Software above the level of a single deviceSoftware above the level of a single device
Software above the level of a single device
 
Planning !
Planning !Planning !
Planning !
 
Utiliser LinkedIn en recherche d'emploi
Utiliser LinkedIn en recherche d'emploiUtiliser LinkedIn en recherche d'emploi
Utiliser LinkedIn en recherche d'emploi
 
Autism circle of friends
Autism circle of friendsAutism circle of friends
Autism circle of friends
 
Maastikumäng 7. klassile
Maastikumäng 7. klassileMaastikumäng 7. klassile
Maastikumäng 7. klassile
 
Plenary1 01 roland_stauss
Plenary1 01 roland_staussPlenary1 01 roland_stauss
Plenary1 01 roland_stauss
 
Revista Dirigir número 0
Revista Dirigir número 0Revista Dirigir número 0
Revista Dirigir número 0
 
Gerir bem a sua autarquia
Gerir bem a sua autarquiaGerir bem a sua autarquia
Gerir bem a sua autarquia
 
Customer Experience by Richard Perry, FOUNDED, cxfounded
Customer Experience by Richard Perry, FOUNDED, cxfoundedCustomer Experience by Richard Perry, FOUNDED, cxfounded
Customer Experience by Richard Perry, FOUNDED, cxfounded
 
Embracing the Red Bar: A Technique for Safely Refactoring Your Test Suite
Embracing the Red Bar: A Technique for Safely Refactoring Your Test SuiteEmbracing the Red Bar: A Technique for Safely Refactoring Your Test Suite
Embracing the Red Bar: A Technique for Safely Refactoring Your Test Suite
 

Último

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Copyright and how the internet is changing our

Notas del editor

  1. *Welcome everybody to your presentation . “Hope you enjoy it”*In the presentation I will be going over the threats to copyright, the legal disputes that have taken place over the past decade, the solutions that nations have implemented and how the general public felt about these solutions and the threats to copyright in the future.
  2. Copyright refers to laws that regulate the use of the work of a creator, such as an artist or author. This includes copying, distributing, altering and displaying creative, literary and other types of work. Due to the advancements in technology and the Internet, the definition of copyright has been changed over and over.
  3. The three biggest threats to copyright are Digital Compression, Greater Bandwidth and Ease of Distribution.
  4. Over the past decade technology has allowed the public to simply do what was seen as impossible in the past. Large files can be simply compressed using such applications as DVD shrink, used to shrink the size of movie files and WINRAR, used to shrink the size of general files.
  5. Greater Bandwidth allows Internet users to receive more data packages than before. Unlimited Bandwidth means their is no limit to the amount of packages received but this is usually subjected to slow download speeds.
  6. With Digital Compression and Greater Bandwidth comes the ease in which illegally copied files can be Distributed. Small packages can be sent and received faster and more efficient. Compression applications are so efficient that little to no quality damage is done to the files.
  7. Downloading over the past decade has soared thanks to these threats to copyright.
  8. Torrent sites have gained in popularity due to the vast increase in downloading. Since Napsters demise in 2001, other torrents sites have been created with de centralised servers. This meant that these programs were less easy for corporations or recording industries to track down, the main problem with Napster. Napster is now, ironicly, a music subscription service.
  9. The Pirate Bay was created by three Swedish men, GottfridSvartholm, Fredrik Neij and Peter Sunde and was launched on the 15th September 2003. Since then the site has grown from strength to strength and to this day has over 5 million registered users and over 3.5 million torrent files. The PirateBay is the largest BitTorrent tracker in the world.
  10. The men have gone through the courts on numerous occasions being the plaintiff and the defendant. They have spent time in prison and have received many fines. This is one of the most famous cases of copyright infringements.
  11. ACTA (Anti-Counterfeit Trade Agreement) is a multinational treaty for the purpose of establishing international standards for intellectual property rights enforcement. The agreement aims to establish an international legal framework for targeting counterfeit goods, generic medicines and copyright infringement on the Internet. There has been mixed feelings about the Agreement across the World.
  12. Many people across the world are protesting because of this treaty. Many think it will censor the internet and take away our human right to freedom of speech. Pictured above is an Anonymous supporter protesting the treaty. Anonymous, a hactivist group, have been tormenting governments, to show that the general public arent happy with ACTA. Anonymous took down the Fine Geal website on the 9th of Januarey 2012.
  13. SOPA (Stop Online Piracy Act) was a United States bill introduced by U.S. Representative Lamar Smith to expand the ability of U.S. law enforcement to fight online trafficking in copyrighted intellectual and counterfeit goods. This bill was also protested and was abandoned in the U.S. The following pictures depicts how ACTA will be invading the internet’s privacy, thus invading each of its users privacy also.
  14. On the 29th of February 2012 SOPA Ireland was passed today by Sean Sherlock, Minister for Research and Innovation. This was done despite protests and a petition on http://stopsopaireland.com/ which reached to 80,000 signatures. The law has being introduced due to pressure from the music industry who are currently suing the Irish government for failing to provide legislative provisions for blocking, diverting and interrupting internet
  15. With the growing pressure on legal systems across the world from frustrated record industries and bands in the last decade, has a solution to the problem being created? According to a article in PostNote the answer is yes. The following procedures are the solutions to Copyright Infringement. In France the government sought to tax search engines which would allow users to gain access to torrent sites.
  16. Copy protection can be fully effective provided the protection measures to be included not only in the media (CDs, DVDs, etc.) but also in the devices that read them (players, computer drives, etc.) according to the PostNote article. If a pirate copy is inserted into the DVD player, the DVD player will shut down and wont allow the user to open again. This must be technically removed and it is then that they’ll be caught.
  17. Copyright protection is also a measure used. This may involve putting a “watermark” on the digital data on media such as those listed above. This will result in copies of such data will not have the same quality as the original, thus not being worthwhile to copy. Pictures with copy protection may not allow any users to be saved to their computer. Films with copy Protection wont allow applications like DVD Shrink to work.
  18. Due to the recent setbacks in file sharing, users are seeking alternative ways of file sharing. This has sprung the concept of Darknets. Darknets is a way of downloading anonymous, indiscriminate and uncensored files. Most are unheard until now because users didn't need to be so secure about file sharing. Now that file sharing users may be faced with a criminal conviction or a hefty fine, security is essential.
  19. StegoShare is a java program. This program breaks the file the user wishes to send into pieces and through the use of stenography, hides the pieces inside images. This will look like the user is sending lots of pictures to the ISP. This way of file sharing is completely anonymous and untraceable. With the introduction of SOPA in Ireland I think this method will be the future of file sharing.
  20. That’s my presentation hope you enjoyed it.