Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
17,757 result(s) for "File sharing"
Sort by:
The handbook of peer production
\"The Handbook of Peer Production has emerged from a community of researchers, practitioners and activists who share a belief in the virtue of open collaboration. We are grateful for this community's existence and hope we have been equal to the task of documenting its work. Academic books are always collective endeavors; we are immensely thankful to those who have helped us in bringing this project forward. The Handbook chapters were peer reviewed by the three editors. In addition, Chapter 1 (\"The Duality of Peer Production\"), Chapter 29 (\"What's Next?\"), and Chapter 30 (\"Be Your Own Peer!\") which we co-wrote, were reviewed by Sébastien Broca. His insightful comments played a substantial part in making our arguments more coherent, so we express our heartfelt thanks for his contribution\"-- Provided by publisher.
The Effect of Digital Sharing Technologies on Music Markets: A Survival Analysis of Albums on Ranking Charts
Recent technological and market forces have profoundly impacted the music industry. Emphasizing threats from peer-to-peer (P2P) technologies, the industry continues to seek sanctions against individuals who offer a significant number of songs for others to copy. Combining data on the performance of music albums on the Billboard charts with file sharing data from a popular network, we assess the impact of recent developments related to the music industry on survival of music albums on the charts and evaluate the specific impact of P2P sharing on an album's survival on the charts. In the post-P2P era, we find significantly reduced chart survival except for those albums that debut high on the charts. In addition, superstars and female artists continue to exhibit enhanced survival. Finally, we observe a narrowing of the advantage held by major labels. The second phase of our study isolates the impact of file sharing on album survival. We find that, although sharing does not hurt the survival of top-ranked albums, it does have a negative impact on low-ranked albums. These results point to increased risk from rapid information sharing for all but the \"cream of the crop.\"
This is happening : #life through the lens of Instagram
\"Featuring nearly 200 photos, [this collection] is the first-ever crowd-sourced book of images shot by and for Instagram users. This is a slice of life seen through the moments that give us pause, make us smile, and fill us with wonder\"--Page 2 of cover.
The Effect of File Sharing on Record Sales: An Empirical Analysis
For industries ranging from software to pharmaceuticals and entertainment, there is an intense debate about the appropriate level of protection for intellectual property. The Internet provides a natural crucible to assess the implications of reduced protection because it drastically lowers the cost of copying information. In this paper, we analyze whether file sharing has reduced the legal sales of music. While this question is receiving considerable attention in academia, industry, and Congress, we are the first to study the phenomenon employing data on actual downloads of music files. We match an extensive sample of downloads to U.S. sales data for a large number of albums. To establish causality, we instrument for downloads using data on international school holidays. Downloads have an effect on sales that is statistically indistinguishable from zero. Our estimates are inconsistent with claims that file sharing is the primary reason for the decline in music sales during our study period.
Visual Cryptography and Secret Image Sharing
This book covers an extensive range of topics related to visual cryptography techniques and secure image sharing solutions. It addresses sharing multiple secrets and visual cryptography schemes based on the probabilistic reconstruction of the secret image, including pictures in the distributed shares, contrast enhancement techniques, visual cryptography schemes based on different logical operations for combining shared images, cheating prevention, and the alignment problem for image shares. The book also describes practical applications, steganography, and authentication. Case studies demonstrate the effectiveness of the techniques.
Read this if you want to be Instagram famous
Packed with the essential secrets of the hottest Instagrammers around, all you have to do is put their advice into practice. With tips covering photographic techniques, captioning, codes of conduct, kit and managing your account, soon you too will be hailed as a Instragram icon!!!
File-Sharers and Copyright-Infringers
Whether you choose to call it file sharing, copyright infringement, or digital piracy, downloading non-licensed music, movies, software, and other forms of digital content is common worldwide. Despite the widespread nature of this phenomenon, much remains unknown about it. Is \"digital piracy\" truly having a negative impact on society? Does enforcement actually deter would-be downloaders? Gunter examines these issues, providing both an analysis of the historical aspects of copyright and of newly collected data on downloaders. His findings lead into a critique of the pros and cons of the current state of copyright law and enforcement.
Instagram : visual social media cultures
\"In the first book-length examination of Instagram, Leaver, Highfield and Abidin trace how this mobile photography app has developed as a platform and a culture. Rich with examples from across the world, from birth pictures to selfies at funerals, Instagram is essential reading for students and scholars of media and communication\"-- Provided by publisher.
Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing
Cloud file sharing (CFS) has become one of the important tools for enterprises to reduce technology operating costs and improve their competitiveness. Due to the untrustworthy cloud service provider, access control and security issues for sensitive data have been key problems to be addressed. Current solutions to these issues are largely related to the traditional public key cryptography, access control encryption or attribute-based encryption based on the bilinear mapping. The rapid technological advances in quantum algorithms and quantum computers make us consider the transition from the tradtional cryptographic primitives to the post-quantum counterparts. In response to these problems, we propose a lattice-based Ciphertext-Policy Attribute-Based Encryption(CP-ABE) scheme, which is designed based on the ring learing with error problem, so it is more efficient than that designed based on the learing with error problem. In our scheme, the indirect revocation and binary tree-based data structure are introduced to achieve efficient user revocation and dynamic management of user groups. At the same time, in order to further improve the efficiency of the scheme and realize file sharing across enterprises, the scheme also allows multiple authorities to jointly set up system parameters and manage distribute keys. Furthermore, by re-randomizing the user’s private key and update key, we achieve decryption key exposure resistance(DKER) in the scheme. We provide a formal security model and a series of security experiments, which show that our scheme is secure under chosen-plaintext attacks. Experimental simulations and evaluation analyses demonstrate the high efficiency and practicality of our scheme.