skip to main content
research-article
Free access

Why file sharing networks are dangerous?

Published: 01 February 2009 Publication History
First page of PDF

References

[1]
Christin, N., Weigend, A. S., Chuang, J. Content availability, pollution and poisoning in file sharing peer-to-peer networks. Proceedings of the 6th ACM Conference on Electronic commerce, Vancouver, BC, June 05-08, 2005, 68--77.
[2]
de Paula, R., Ding, X., Dourish, P., Nies, K., Pillet, B., Redmiles, D. R, Ren, J., Rode, J. A., Filho, R. S. In the eye of the beholder: a visualization-based approach to information system security. International Journal of Human-Computer Studies, 63, July 2005, 5--24.
[3]
Gerber, A., Houle, J., Nguyen, H., Roughan, M., and Sen, S. P2P The Gorilla in the Cable. National Cable & Telecommunications Association (NCTA) 2003 National Show, Chicago, IL, June 8-11, 2003.
[4]
Good, N. S., and Krekelberg, A. Usability and privacy: A study of Kazaa P2P file-sharing. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (Ft. Lauderdale, Florida, April 05-10, 2003.)
[5]
Ingram, M. 66,000 Names and Personal Details Leak on P2P. April 29,2006; http://www.slyck.com/news.php?story=1169
[6]
Johnson M.E. Information risk of inadvertent disclosure: An analysis of file-sharing risk in the financial supply chain. J. MIS 25, 2 (2008), 97--123.
[7]
Kalafut, A., Acharya, A., Gupta, M. A Study of Malware in Peer-to-peer Networks. Proceedings of the Internet Measurement Conference, ACM 2006.
[8]
Karagiannis, T., Broido, A., Brownlee, N., Claffy, K., Faloutsos, M. File sharing in the Internet: A characterization of P2P traffic in the backbone. Technical Report, UC Riverside, 2003.
[9]
Karagiannis, T., Broido, A., Faloutsos, M., and Claffy, K. 2004.Transport Layer Identification of P2P Traffic. Proceedings of the 4th ACM SIGCOMM conference on Internet Measurement. (Taorima, Siciliy, Italy), 121--134.
[10]
Mennecke, T. Slyck News - P2P Population Continues Climb. (June 14, 2006.) http://www.slyck.com/news.php?story=1220
[11]
Pew Internet Activities and Trends Report. Survey Question: Ever Share files from your own computer such as music, video, or picture files, or computer games with others online? June 2005.
[12]
Pew Internet Project Data Memo. July 2003; http://www.pewinternet.org/pdfs/PIP_Copyright_Memo.pdf
[13]
Shin, S., Jung, J., Balakrishnan, H. Malware prevalence in the KaZaA file-sharing network. Proceedings of the Internet Measurement Conference, ACM 2006.
[14]
W32.Antinny.Q - Symantec.com; http://www.symantec.com/security_response/writeup.jsp?docid=2004-053016-5101-99&tabid=2
[15]
Zhao, S., Stutzbach, D., and Rejaie, R. Characterizing files in the modern gnutella network: A measurement study. Proc of In Multimedia Computing and Networking, (S.Chandra and C Griwodz, Eds), 2006.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 52, Issue 2
Inspiring Women in Computing
February 2009
127 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/1461928
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 February 2009
Published in CACM Volume 52, Issue 2

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Popular
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)339
  • Downloads (Last 6 weeks)53
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2015)The Ethics of Social Media and Network SecurityBusiness Ethics and Diversity in the Modern Workplace10.4018/978-1-4666-7254-3.ch006(79-90)Online publication date: 2015
  • (2015)File sharing in cloud computing using win stay lose shift strategyInternational Journal of High Performance Computing and Networking10.1504/IJHPCN.2015.0700168:2(154-166)Online publication date: 1-Jun-2015
  • (2013)Detection and classification of peer-to-peer trafficACM Computing Surveys10.1145/2480741.248074745:3(1-40)Online publication date: 3-Jul-2013
  • (2011)Browse and discoverProceedings of the ACM 2011 conference on Computer supported cooperative work10.1145/1958824.1958868(295-304)Online publication date: 19-Mar-2011
  • (2011)Path-Goal Theory: A Successful Columbia Records StoryJournal of Human Behavior in the Social Environment10.1080/10911359.2011.55565121:4(350-362)Online publication date: 23-May-2011
  • (2011)Digital evidence from peer-to-peer networksComputer Law & Security Review10.1016/j.clsr.2011.09.00427:6(647-652)Online publication date: Dec-2011
  • (2010)The inadvertent disclosure of personal health information through peer-to-peer file sharing programsJournal of the American Medical Informatics Association10.1136/jamia.2009.00023217:2(148-158)Online publication date: Mar-2010
  • (2009)Data Hemorrhages in the Health-Care SectorFinancial Cryptography and Data Security10.1007/978-3-642-03549-4_5(71-89)Online publication date: 21-Jul-2009
  • (2009)Information Curators in an Enterprise File-Sharing ServiceECSCW 200910.1007/978-1-84882-854-4_23(403-410)Online publication date: 2009

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media