SlideShare uma empresa Scribd logo
1 de 16
Tales from the underground:
Exploring unauthorised file sharing
       communities on the Internet
                                  Dr Jenine Beekhuyzen
        Institute for Integrated and Intelligent Systems
               Griffith University - Brisbane, Australia
My Doctorate

Doctoral study completed in 2010 (2006-2009) in the School of ICT,
Science, Engineering, Environment & Technology Faculty
Title: A Critical Ethnography of an Online File Sharing Community: An
Actor-Network Theory Perspective of Controversies in the Digital Music
World
Participant in the Doctoral Consortium at QUALIT 2006 - Brisbane,
Australia
Participant in the Doctoral Consortium at ICIS 2008 - Paris, France
    Title: Digital Rights Management and the Online Music Experience
Participant in the Junior Faculty Consortium at ICIS 2010 - St. Louis, USA
Graduation!
Publications
Beekhuyzen, J., von Hellens, L. and Nielsen, S. (2012) Insights from the Underground: Using ANT to Understand Practices
and Motivations for File Sharing in Online Communities, European Conference on Information Systems (ECIS), Barcelona,
Spain, 11-13 June - Winner of the Claudio Ciborra award for Innovation in Research

Beekhuyzen, J., von Hellens, L. and Nielsen, S. (2012) The High Seas (C’s) of piracy in Information Systems: Cost,
convenience and choice, Australasian Conference on Information Systems (ACIS), Geelong, Australia, 3-5 December

Beekhuyzen, J., von Hellens, L. & Nielsen, S. (2011) Underground Online Music Communities: Exploring Rules for
Membership, Online Information Review, Vol. 35 Issue: 5, pp.699 - 715

Beekhuyzen, J., von Hellens, L. & Nielsen, S.(2010) Collaboration in Online Communities: Reconceptualising the Complex
Problem of Unauthorised Music File Sharing, ACIS, Brisbane, Australia 1-3 December

Beekhuyzen, J., Nielsen, S. & von Hellens, L. (2010) The NVivo Looking Glass: Seeing the Data Through the Analysis,
QualIT Conference - Qualitative Research in IT & IT in Qualitative Research, Brisbane, Australia 29-30 November

Beekhuyzen, J. & von Hellens, L. (2009) Reciprocity and Sharing in an Underground File Sharing Community, 20th
Australasian Conference on Information Systems (ACIS), Melbourne, Australia, Monash University, 2-4 December

Beekhuyzen, J. & von Hellens, L. (2008) How does Technology Influence Online Music Access and Use? A Taxonomy of
Empirical Studies, 19th Australasian Conference on Information Systems (ACIS), Christchurch, New Zealand, 3-5 December.

Beekhuyzen, J. (2007) Putting the pieces of the puzzle together: Using NVivo for a literature review, QualIT2007 -
Qualitative Research in IT:, Wellington, New Zealand, Victoria University of Wellington, 19-20 November
Background to PhD
Continuation of Smart Internet Technology Cooperative Research Centre
project (2004/2005) into media use and digital technologies that aims to
develop guidelines for the user-centred design of new digital rights
management systems (DRMs).




                                                          A continuum from
                                                          downloading to
                                                          purchase
Publications

Singh, S., Jackson, M., Waycott, J. & Beekhuyzen, J. (2006) Downloading vs Purchase:
Music industry vs consumers, Lecture Notes in Computer Science, Springer, Berlin /
Hiedleberg (reprinted from the First International Conference on Digital Rights Management
2005)
Waycott, J., Jackson, M., Singh, S. (2005) Digital Rights Management and consumers’
use of music: An activity theory perspective, Proceedings of QualIT 2005, Brisbane,
Australia, 25-27 November
Jackson, M., Singh, S., Waycott, J. & Beekhuyzen, J. (2005) DRMs, Fair Use and Users’
Experience of Sharing Music, DRM 2005 - Fifth ACM Workshop on Digital Rights
Management, Virginia, US, 7 Nov 2005
Beekhuyzen, J., von Hellens, L., Morley, M, and Nielsen, S.H. (2004) Searching for a
methodology for Smart Internet Technology Development, Proceedings of the Twelfth
International Conference on Information Systems Development, Melbourne, Australia,
August 25-27
My Doctoral Studies

Explore motivations for file sharing on the Internet - those that
sometimes buy and sometimes file share - see Lessig 2004
Reconceptualise file sharing “piracy” and participants/users
Focus on music downloading as a cultural activity
Downloading, uploading, sharing in online social spaces that
challenge authority - in general, and in the context of online
communities (Roswell)
Unauthorised? Authorised? Difficulties in researching...
Latest developments in Portugal and growing trend to distribute
authorised music releases by musicians (and other artists) -
124,191,862 legal downloads in first 6 months - 31% of all BitTorrent
Conceptualising Music Distribution




      Conceptualisation of music distribution systems
Design/Methodology/Approach

Actor-network theory (Callon, Latour & Rip, 1986)
Critical approach (Habermas, 1984, Ngwenyama and Lee, 1997, Klecun,
2004, Stahl 2008) - roots in IS research in the Marxist view of society as
a series of class struggles (Orlikowski and Baroudi, 1991).
Ethnographic methodology (Thomas, 1993) - systems, structure,
technology and rules of unauthorised (illegal?) file sharing
Empirical: in-depth interviews with 16 file sharers, 6 musicians & 8
music recording industry experts, focus groups, covert observations over
120 days of a surreptitious online community - Roswell (Pseudonym)
Roswell - 1200+ members (20 000+) - strong rules for active
participation - strongly ordered and not adhoc
Findings
Internet has robust architectures for participation - file sharing
communities that manifest social interaction create affordances for an
ever-expanding number of people to share their experiences (and
their content)
Underground file sharing communities are sophisticated systems for
organising music within subcultures on the Internet
Granted membership is meritocratic
Members are encouraged to develop habits of active participation and
contribution to the community (sharing or uploading new content)
Community has strong conventions for participating/contributing e.g.
naming and ripping new uploads, obfuscating personal identities
Findings
Cost - physical mediums (CDs) too expensive, compared to digital music ($1.69-$2.19/track from iTunes).
Retail price of a digital single track is equal to the comparable cost of a track on a CD, however the two are
not commensurable - no costs for packaging, few costs for distribution and storage of the digital artifact.
Bagchi et al. (2006) argue individuals may feel that the injustices inflicted by the manufacturers justify piracy
Convenience - easier to use than online stores like iTunes (Alderman 2001) - less barriers to the music
transaction, such as the need for a credit card. Interoperability is important, and technical competence
influences the choice of unauthorised file sharing system (or even paid music system). Smith and Telang
(2009) suggest that giving away content in one channel can stimulate sales in other channels. Gran & Molde
(2010) - downloaders are 10 times more likely to purchase

Choice – frustrated that the largest online music store (iTunes) is limited - no Beatles & AC/DC etc. - “long
tail” (Anderson, 2006), whereas sources that provide access to unauthorised content enable unlimited access
to almost any digitally recorded music, often at a very high quality. If a legitimate source is not available to
purchase, they look for other sources.




                                                                                !
Findings

Interesting...
New content is unpredictable and dynamic - exists temporarily
Members contributing to a collective consciousness while developing
their own culture and language
Motivated by appeal of unpredictability (similar to radio? social
media?), ability to collaborate with peers
Evaluate value through consideration of cost, convenience and choice
Many file share without malicious motivations, they do it simply
because they can (and because they enjoy it :))
Practical Implications

Too often, we impute an automatic link between illegal behaviors and ethics and forget that
the criminalization of ‘deviant acts’ transforms and reduces broader normative meanings to
legal ones. Once a category of behaviors has become defined by statute as sanctionable, the
behaviors so-defined assume a new set of meanings. These may obscure the alternative
nuanced images that guide those who engage in such behaviors, those who enforce the laws
and norms that prohibit” (Thomas, 2005).

Insights into the ‘black box’ of file sharing and underlying ideologies
Understanding of sophisticated underground file sharing communities
assists further development of legitimate online music systems to
appeal to the large number of individuals involved in music file
sharing communities and file sharing in general
Ethical considerations and challenges of studying illegal behaviour -
of interest to the IS community
Social Implications

Misuse of the concept of “piracy” to describe all who engage in
file sharing as criminals does disservice to those who are shapers
of the digital revolution - and is often inaccurate according to the
common meaning of the concept - not well defined
Understand practices within a subculture that is regarded as
deviant from the mainstream and illegal “moral panic”"[a]
condition, episode, person or group of persons emerges to
become defined as a threat to societal values and
interests” (Cohen, 1973: 9)
Contributes to the discussion and policy formulation on file
sharing
Contributions

Develop theory for studying illegal behaviour in IS - IS moving beyond
organisational boundaries - covert observations
Contradicts community literature?
Only known ethnography investigating underground music file sharing
communities using a qualitative interpretive/critical approach
Underground communities have not been systematically studied
previously
Addresses lack of research literature
Novel in applying ANT to a context not previously applied
Contact


Thank you!
e: jenine@griffith.edu.au
w: www.iinet.net.au/~beek
t: @jeninebeek
b: diaryofatechgirl.wordpress.com

Mais conteúdo relacionado

Mais procurados

Digital Libraries, Digital Repositories, Digital Copyright: Overview, Challen...
Digital Libraries, Digital Repositories, Digital Copyright: Overview, Challen...Digital Libraries, Digital Repositories, Digital Copyright: Overview, Challen...
Digital Libraries, Digital Repositories, Digital Copyright: Overview, Challen...Indian Institute of Management Ahmedabad
 
10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for ChangeTeodoro Llanes II
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3Dave King
 
Using Web 2.0 in Your Library
Using Web 2.0 in Your LibraryUsing Web 2.0 in Your Library
Using Web 2.0 in Your LibrarySteve Yuen
 
Workshop Part 1: Digitality (arts & aesthetic education)
Workshop Part 1: Digitality (arts & aesthetic education)Workshop Part 1: Digitality (arts & aesthetic education)
Workshop Part 1: Digitality (arts & aesthetic education)Benjamin Jörissen
 
Goggin tasa2014digitaltechdisabilityaustraliansociallife
Goggin tasa2014digitaltechdisabilityaustraliansociallifeGoggin tasa2014digitaltechdisabilityaustraliansociallife
Goggin tasa2014digitaltechdisabilityaustraliansociallifeUniversity of Sydney
 
T. Kennedy: Research & Teaching
T. Kennedy: Research & TeachingT. Kennedy: Research & Teaching
T. Kennedy: Research & TeachingTracy Kennedy
 
Tech2002lecweekone0910
Tech2002lecweekone0910Tech2002lecweekone0910
Tech2002lecweekone0910The_Joker
 
Handout web technology.doc1
Handout web technology.doc1Handout web technology.doc1
Handout web technology.doc1mikeade30002
 
Workshop on the Aesthetics of Information Ethics
Workshop on the Aesthetics of Information EthicsWorkshop on the Aesthetics of Information Ethics
Workshop on the Aesthetics of Information EthicsPaolo Cirio
 
Digital and Post-digital Conditions: Challenges for Nexts Arts Educations
Digital and Post-digital Conditions: Challenges for Nexts Arts EducationsDigital and Post-digital Conditions: Challenges for Nexts Arts Educations
Digital and Post-digital Conditions: Challenges for Nexts Arts EducationsBenjamin Jörissen
 
Learning 2.0: Innovations to Gain the Edge
Learning 2.0:  Innovations to Gain the EdgeLearning 2.0:  Innovations to Gain the Edge
Learning 2.0: Innovations to Gain the EdgeLili Goleniewski
 
Team Another One: Chapter 2 Presentation
Team Another One: Chapter 2 PresentationTeam Another One: Chapter 2 Presentation
Team Another One: Chapter 2 Presentationvillemic
 
Team Another One
Team Another OneTeam Another One
Team Another OneYaseen Ali
 

Mais procurados (20)

Digital Libraries, Digital Repositories, Digital Copyright: Overview, Challen...
Digital Libraries, Digital Repositories, Digital Copyright: Overview, Challen...Digital Libraries, Digital Repositories, Digital Copyright: Overview, Challen...
Digital Libraries, Digital Repositories, Digital Copyright: Overview, Challen...
 
10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for Change
 
Digital Trails Dave King 1 5 10 Part 1 D3
Digital Trails   Dave King   1 5 10   Part 1 D3Digital Trails   Dave King   1 5 10   Part 1 D3
Digital Trails Dave King 1 5 10 Part 1 D3
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
rethinking
rethinkingrethinking
rethinking
 
Using Web 2.0 in Your Library
Using Web 2.0 in Your LibraryUsing Web 2.0 in Your Library
Using Web 2.0 in Your Library
 
Workshop Part 1: Digitality (arts & aesthetic education)
Workshop Part 1: Digitality (arts & aesthetic education)Workshop Part 1: Digitality (arts & aesthetic education)
Workshop Part 1: Digitality (arts & aesthetic education)
 
Goggin tasa2014digitaltechdisabilityaustraliansociallife
Goggin tasa2014digitaltechdisabilityaustraliansociallifeGoggin tasa2014digitaltechdisabilityaustraliansociallife
Goggin tasa2014digitaltechdisabilityaustraliansociallife
 
T. Kennedy: Research & Teaching
T. Kennedy: Research & TeachingT. Kennedy: Research & Teaching
T. Kennedy: Research & Teaching
 
Tech2002lecweekone0910
Tech2002lecweekone0910Tech2002lecweekone0910
Tech2002lecweekone0910
 
The Magic of Social Networks
The Magic of Social NetworksThe Magic of Social Networks
The Magic of Social Networks
 
Handout web technology.doc1
Handout web technology.doc1Handout web technology.doc1
Handout web technology.doc1
 
Workshop on the Aesthetics of Information Ethics
Workshop on the Aesthetics of Information EthicsWorkshop on the Aesthetics of Information Ethics
Workshop on the Aesthetics of Information Ethics
 
Digital and Post-digital Conditions: Challenges for Nexts Arts Educations
Digital and Post-digital Conditions: Challenges for Nexts Arts EducationsDigital and Post-digital Conditions: Challenges for Nexts Arts Educations
Digital and Post-digital Conditions: Challenges for Nexts Arts Educations
 
Learning 2.0: Innovations to Gain the Edge
Learning 2.0:  Innovations to Gain the EdgeLearning 2.0:  Innovations to Gain the Edge
Learning 2.0: Innovations to Gain the Edge
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Team Another One: Chapter 2 Presentation
Team Another One: Chapter 2 PresentationTeam Another One: Chapter 2 Presentation
Team Another One: Chapter 2 Presentation
 
Team Another One
Team Another OneTeam Another One
Team Another One
 
CeDEM12: Proceedings of the International Conference for E-Democracy and Open...
CeDEM12: Proceedings of the International Conference for E-Democracy and Open...CeDEM12: Proceedings of the International Conference for E-Democracy and Open...
CeDEM12: Proceedings of the International Conference for E-Democracy and Open...
 

Destaque

Pdhpe.wiki 2
Pdhpe.wiki 2Pdhpe.wiki 2
Pdhpe.wiki 2amira24
 
Pnud
PnudPnud
Pnudfodm
 
Pdhpe rationale
Pdhpe rationalePdhpe rationale
Pdhpe rationaleamira24
 
Ada lovelaceday141014techgirlsmovementbeekhuyzen
Ada lovelaceday141014techgirlsmovementbeekhuyzenAda lovelaceday141014techgirlsmovementbeekhuyzen
Ada lovelaceday141014techgirlsmovementbeekhuyzenJenine Beekhuyzen
 
Jj new batch
Jj new batchJj new batch
Jj new batchJJ Mentor
 
Bartley residences photos
Bartley residences photosBartley residences photos
Bartley residences photosHenry Loh
 
2 5 estensione_vita_materiali_vezzoli_polimi_12.13 (9)
2 5 estensione_vita_materiali_vezzoli_polimi_12.13 (9)2 5 estensione_vita_materiali_vezzoli_polimi_12.13 (9)
2 5 estensione_vita_materiali_vezzoli_polimi_12.13 (9)elisa_bacchetti
 
Newsletter december 2012
Newsletter december 2012Newsletter december 2012
Newsletter december 2012BIBFJ
 
Opere di francesco corrente a martina franca
Opere di francesco corrente a martina francaOpere di francesco corrente a martina franca
Opere di francesco corrente a martina francaSergioSemeraro
 
Datafying Bitcoins
Datafying BitcoinsDatafying Bitcoins
Datafying BitcoinsTariq Ahmad
 
Coffeescript - take a sip of code
Coffeescript - take a sip of codeCoffeescript - take a sip of code
Coffeescript - take a sip of codeDimitris Tsironis
 
Urban Residences Brochure
Urban Residences BrochureUrban Residences Brochure
Urban Residences BrochureHenry Loh
 

Destaque (20)

Pdhpe.wiki 2
Pdhpe.wiki 2Pdhpe.wiki 2
Pdhpe.wiki 2
 
Ob chapter1
Ob chapter1Ob chapter1
Ob chapter1
 
Grabadora de voz
Grabadora de vozGrabadora de voz
Grabadora de voz
 
Pnud
PnudPnud
Pnud
 
Pdhpe rationale
Pdhpe rationalePdhpe rationale
Pdhpe rationale
 
Ada lovelaceday141014techgirlsmovementbeekhuyzen
Ada lovelaceday141014techgirlsmovementbeekhuyzenAda lovelaceday141014techgirlsmovementbeekhuyzen
Ada lovelaceday141014techgirlsmovementbeekhuyzen
 
Digital Humanitarianism
Digital HumanitarianismDigital Humanitarianism
Digital Humanitarianism
 
Jj new batch
Jj new batchJj new batch
Jj new batch
 
Luisa cantor
Luisa cantorLuisa cantor
Luisa cantor
 
lionel messi
lionel messilionel messi
lionel messi
 
Seminar ppt
Seminar pptSeminar ppt
Seminar ppt
 
Bartley residences photos
Bartley residences photosBartley residences photos
Bartley residences photos
 
2 5 estensione_vita_materiali_vezzoli_polimi_12.13 (9)
2 5 estensione_vita_materiali_vezzoli_polimi_12.13 (9)2 5 estensione_vita_materiali_vezzoli_polimi_12.13 (9)
2 5 estensione_vita_materiali_vezzoli_polimi_12.13 (9)
 
Newsletter december 2012
Newsletter december 2012Newsletter december 2012
Newsletter december 2012
 
Opere di francesco corrente a martina franca
Opere di francesco corrente a martina francaOpere di francesco corrente a martina franca
Opere di francesco corrente a martina franca
 
Datafying Bitcoins
Datafying BitcoinsDatafying Bitcoins
Datafying Bitcoins
 
تقسیم بندی مخازن و سیالات نفتی
تقسیم بندی مخازن و سیالات نفتیتقسیم بندی مخازن و سیالات نفتی
تقسیم بندی مخازن و سیالات نفتی
 
3 bedrooms
3 bedrooms3 bedrooms
3 bedrooms
 
Coffeescript - take a sip of code
Coffeescript - take a sip of codeCoffeescript - take a sip of code
Coffeescript - take a sip of code
 
Urban Residences Brochure
Urban Residences BrochureUrban Residences Brochure
Urban Residences Brochure
 

Semelhante a Phd seminar oct2012

Piracy in Musical Audio-Visual Production and Distribution: A Forensic Engine...
Piracy in Musical Audio-Visual Production and Distribution: A Forensic Engine...Piracy in Musical Audio-Visual Production and Distribution: A Forensic Engine...
Piracy in Musical Audio-Visual Production and Distribution: A Forensic Engine...editor1knowledgecuddle
 
Information Ethics: Current and Future Research Areas
Information Ethics: Current and Future Research AreasInformation Ethics: Current and Future Research Areas
Information Ethics: Current and Future Research AreasInHD
 
Digital Documents, Histories and Archives in the 21st century
Digital Documents, Histories and Archives in the 21st century Digital Documents, Histories and Archives in the 21st century
Digital Documents, Histories and Archives in the 21st century Prolibro
 
Are Digital Audiobooks Truly Ear Resistible
Are Digital Audiobooks Truly Ear ResistibleAre Digital Audiobooks Truly Ear Resistible
Are Digital Audiobooks Truly Ear Resistiblejenpost87
 
Online Disability Activism - University of Leicester, Mar 2011
Online Disability Activism - University of Leicester, Mar 2011Online Disability Activism - University of Leicester, Mar 2011
Online Disability Activism - University of Leicester, Mar 2011filippotrevisan
 
Welcome-Firstlooks
Welcome-FirstlooksWelcome-Firstlooks
Welcome-FirstlooksCharles Ess
 
Information Ethics in a Lib2.0 World
Information Ethics in a Lib2.0 WorldInformation Ethics in a Lib2.0 World
Information Ethics in a Lib2.0 WorldKathryn Shaughnessy
 
The Cloud and the Crowd
The Cloud and the CrowdThe Cloud and the Crowd
The Cloud and the CrowdETMGhent
 
Respond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docxRespond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docxdaynamckernon
 
Scholarship in the Digital World
Scholarship in the Digital WorldScholarship in the Digital World
Scholarship in the Digital WorldDavid De Roure
 
"The Conservation Commons: Lessons and Analyses Adapted from other Sectors an...
"The Conservation Commons: Lessons and Analyses Adapted from other Sectors an..."The Conservation Commons: Lessons and Analyses Adapted from other Sectors an...
"The Conservation Commons: Lessons and Analyses Adapted from other Sectors an...Tom Moritz
 
Citizen Science overview for ASU HSD598 graduate course, "Citizen Science"
Citizen Science overview for ASU HSD598 graduate course, "Citizen Science"Citizen Science overview for ASU HSD598 graduate course, "Citizen Science"
Citizen Science overview for ASU HSD598 graduate course, "Citizen Science"Darlene Cavalier
 
Respond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docxRespond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docxdaynamckernon
 
After reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docxAfter reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docxrosiecabaniss
 

Semelhante a Phd seminar oct2012 (20)

Fys (1)
Fys (1)Fys (1)
Fys (1)
 
Fys (1) (1)
Fys (1) (1)Fys (1) (1)
Fys (1) (1)
 
FYS Research Paper
FYS Research PaperFYS Research Paper
FYS Research Paper
 
Piracy in Musical Audio-Visual Production and Distribution: A Forensic Engine...
Piracy in Musical Audio-Visual Production and Distribution: A Forensic Engine...Piracy in Musical Audio-Visual Production and Distribution: A Forensic Engine...
Piracy in Musical Audio-Visual Production and Distribution: A Forensic Engine...
 
TMSP Nation of Neigbors-feb14-v8
TMSP Nation of Neigbors-feb14-v8TMSP Nation of Neigbors-feb14-v8
TMSP Nation of Neigbors-feb14-v8
 
Perspectives on the evidence, value and impact of LIS research: conceptual ch...
Perspectives on the evidence, value and impact of LIS research: conceptual ch...Perspectives on the evidence, value and impact of LIS research: conceptual ch...
Perspectives on the evidence, value and impact of LIS research: conceptual ch...
 
The New Information Ecology
The New Information EcologyThe New Information Ecology
The New Information Ecology
 
Information Ethics: Current and Future Research Areas
Information Ethics: Current and Future Research AreasInformation Ethics: Current and Future Research Areas
Information Ethics: Current and Future Research Areas
 
Digital Documents, Histories and Archives in the 21st century
Digital Documents, Histories and Archives in the 21st century Digital Documents, Histories and Archives in the 21st century
Digital Documents, Histories and Archives in the 21st century
 
Are Digital Audiobooks Truly Ear Resistible
Are Digital Audiobooks Truly Ear ResistibleAre Digital Audiobooks Truly Ear Resistible
Are Digital Audiobooks Truly Ear Resistible
 
Online Disability Activism - University of Leicester, Mar 2011
Online Disability Activism - University of Leicester, Mar 2011Online Disability Activism - University of Leicester, Mar 2011
Online Disability Activism - University of Leicester, Mar 2011
 
Welcome-Firstlooks
Welcome-FirstlooksWelcome-Firstlooks
Welcome-Firstlooks
 
Information Ethics in a Lib2.0 World
Information Ethics in a Lib2.0 WorldInformation Ethics in a Lib2.0 World
Information Ethics in a Lib2.0 World
 
The Cloud and the Crowd
The Cloud and the CrowdThe Cloud and the Crowd
The Cloud and the Crowd
 
Respond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docxRespond to these two classmates’ posts. 1. After reading thi.docx
Respond to these two classmates’ posts. 1. After reading thi.docx
 
Scholarship in the Digital World
Scholarship in the Digital WorldScholarship in the Digital World
Scholarship in the Digital World
 
"The Conservation Commons: Lessons and Analyses Adapted from other Sectors an...
"The Conservation Commons: Lessons and Analyses Adapted from other Sectors an..."The Conservation Commons: Lessons and Analyses Adapted from other Sectors an...
"The Conservation Commons: Lessons and Analyses Adapted from other Sectors an...
 
Citizen Science overview for ASU HSD598 graduate course, "Citizen Science"
Citizen Science overview for ASU HSD598 graduate course, "Citizen Science"Citizen Science overview for ASU HSD598 graduate course, "Citizen Science"
Citizen Science overview for ASU HSD598 graduate course, "Citizen Science"
 
Respond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docxRespond to at least two of your classmates’ posts. 1. After .docx
Respond to at least two of your classmates’ posts. 1. After .docx
 
After reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docxAfter reading this journal article regarding ethics of interne.docx
After reading this journal article regarding ethics of interne.docx
 

Mais de Jenine Beekhuyzen

ACIS 2016 workshop on Change and Unconscious Bias
ACIS 2016 workshop on Change and Unconscious BiasACIS 2016 workshop on Change and Unconscious Bias
ACIS 2016 workshop on Change and Unconscious BiasJenine Beekhuyzen
 
Go girl 2016 Tech Girls Movement
Go girl 2016 Tech Girls MovementGo girl 2016 Tech Girls Movement
Go girl 2016 Tech Girls MovementJenine Beekhuyzen
 
Keynote for St. Catherines School Better Teaching & Learning Conference 12.08.16
Keynote for St. Catherines School Better Teaching & Learning Conference 12.08.16Keynote for St. Catherines School Better Teaching & Learning Conference 12.08.16
Keynote for St. Catherines School Better Teaching & Learning Conference 12.08.16Jenine Beekhuyzen
 
Digicon2016 Keynote Swinburne University of Technology Melbourne
Digicon2016 Keynote Swinburne University of Technology MelbourneDigicon2016 Keynote Swinburne University of Technology Melbourne
Digicon2016 Keynote Swinburne University of Technology MelbourneJenine Beekhuyzen
 
Girls in stem: what can you do in the classroom
Girls in stem: what can you do in the classroomGirls in stem: what can you do in the classroom
Girls in stem: what can you do in the classroomJenine Beekhuyzen
 
Increasing girls participation in stem sydney june 2016
Increasing girls participation in stem sydney june 2016Increasing girls participation in stem sydney june 2016
Increasing girls participation in stem sydney june 2016Jenine Beekhuyzen
 
Tech Girls Movement Tech Girls Are Superheroes Book 2 Launch Google Sydney IW...
Tech Girls Movement Tech Girls Are Superheroes Book 2 Launch Google Sydney IW...Tech Girls Movement Tech Girls Are Superheroes Book 2 Launch Google Sydney IW...
Tech Girls Movement Tech Girls Are Superheroes Book 2 Launch Google Sydney IW...Jenine Beekhuyzen
 
Creating the next gen of Tech Girl Superheroes
Creating the next gen of Tech Girl SuperheroesCreating the next gen of Tech Girl Superheroes
Creating the next gen of Tech Girl SuperheroesJenine Beekhuyzen
 
2015 Search for the Next Tech Girl Superhero showcase event
2015 Search for the Next Tech Girl Superhero showcase event2015 Search for the Next Tech Girl Superhero showcase event
2015 Search for the Next Tech Girl Superhero showcase eventJenine Beekhuyzen
 
Jewella at Disrupt Sydney September 2015
Jewella at Disrupt Sydney September 2015Jewella at Disrupt Sydney September 2015
Jewella at Disrupt Sydney September 2015Jenine Beekhuyzen
 
Zurich entrepreneurship in Action
Zurich entrepreneurship in ActionZurich entrepreneurship in Action
Zurich entrepreneurship in ActionJenine Beekhuyzen
 
TEDx presentation by Jewella at St. Hildas School #techgirls #STEM
TEDx presentation by Jewella at St. Hildas School #techgirls #STEMTEDx presentation by Jewella at St. Hildas School #techgirls #STEM
TEDx presentation by Jewella at St. Hildas School #techgirls #STEMJenine Beekhuyzen
 
Systematic Literature Reviews Health Information Management Journal
Systematic Literature Reviews Health Information Management JournalSystematic Literature Reviews Health Information Management Journal
Systematic Literature Reviews Health Information Management JournalJenine Beekhuyzen
 
Ecis2015 Womens Network keynoteslides jb keynote_womensnetworkingevent
Ecis2015 Womens Network keynoteslides jb keynote_womensnetworkingeventEcis2015 Womens Network keynoteslides jb keynote_womensnetworkingevent
Ecis2015 Womens Network keynoteslides jb keynote_womensnetworkingeventJenine Beekhuyzen
 
Systematic literature reviews - Moving offline communities online
Systematic literature reviews - Moving offline communities onlineSystematic literature reviews - Moving offline communities online
Systematic literature reviews - Moving offline communities onlineJenine Beekhuyzen
 
Which tech girl superhero are you
Which tech girl superhero are youWhich tech girl superhero are you
Which tech girl superhero are youJenine Beekhuyzen
 
Which tech girl superhero are you?
Which tech girl superhero are you?Which tech girl superhero are you?
Which tech girl superhero are you?Jenine Beekhuyzen
 
Developing your research question
Developing your research questionDeveloping your research question
Developing your research questionJenine Beekhuyzen
 

Mais de Jenine Beekhuyzen (18)

ACIS 2016 workshop on Change and Unconscious Bias
ACIS 2016 workshop on Change and Unconscious BiasACIS 2016 workshop on Change and Unconscious Bias
ACIS 2016 workshop on Change and Unconscious Bias
 
Go girl 2016 Tech Girls Movement
Go girl 2016 Tech Girls MovementGo girl 2016 Tech Girls Movement
Go girl 2016 Tech Girls Movement
 
Keynote for St. Catherines School Better Teaching & Learning Conference 12.08.16
Keynote for St. Catherines School Better Teaching & Learning Conference 12.08.16Keynote for St. Catherines School Better Teaching & Learning Conference 12.08.16
Keynote for St. Catherines School Better Teaching & Learning Conference 12.08.16
 
Digicon2016 Keynote Swinburne University of Technology Melbourne
Digicon2016 Keynote Swinburne University of Technology MelbourneDigicon2016 Keynote Swinburne University of Technology Melbourne
Digicon2016 Keynote Swinburne University of Technology Melbourne
 
Girls in stem: what can you do in the classroom
Girls in stem: what can you do in the classroomGirls in stem: what can you do in the classroom
Girls in stem: what can you do in the classroom
 
Increasing girls participation in stem sydney june 2016
Increasing girls participation in stem sydney june 2016Increasing girls participation in stem sydney june 2016
Increasing girls participation in stem sydney june 2016
 
Tech Girls Movement Tech Girls Are Superheroes Book 2 Launch Google Sydney IW...
Tech Girls Movement Tech Girls Are Superheroes Book 2 Launch Google Sydney IW...Tech Girls Movement Tech Girls Are Superheroes Book 2 Launch Google Sydney IW...
Tech Girls Movement Tech Girls Are Superheroes Book 2 Launch Google Sydney IW...
 
Creating the next gen of Tech Girl Superheroes
Creating the next gen of Tech Girl SuperheroesCreating the next gen of Tech Girl Superheroes
Creating the next gen of Tech Girl Superheroes
 
2015 Search for the Next Tech Girl Superhero showcase event
2015 Search for the Next Tech Girl Superhero showcase event2015 Search for the Next Tech Girl Superhero showcase event
2015 Search for the Next Tech Girl Superhero showcase event
 
Jewella at Disrupt Sydney September 2015
Jewella at Disrupt Sydney September 2015Jewella at Disrupt Sydney September 2015
Jewella at Disrupt Sydney September 2015
 
Zurich entrepreneurship in Action
Zurich entrepreneurship in ActionZurich entrepreneurship in Action
Zurich entrepreneurship in Action
 
TEDx presentation by Jewella at St. Hildas School #techgirls #STEM
TEDx presentation by Jewella at St. Hildas School #techgirls #STEMTEDx presentation by Jewella at St. Hildas School #techgirls #STEM
TEDx presentation by Jewella at St. Hildas School #techgirls #STEM
 
Systematic Literature Reviews Health Information Management Journal
Systematic Literature Reviews Health Information Management JournalSystematic Literature Reviews Health Information Management Journal
Systematic Literature Reviews Health Information Management Journal
 
Ecis2015 Womens Network keynoteslides jb keynote_womensnetworkingevent
Ecis2015 Womens Network keynoteslides jb keynote_womensnetworkingeventEcis2015 Womens Network keynoteslides jb keynote_womensnetworkingevent
Ecis2015 Womens Network keynoteslides jb keynote_womensnetworkingevent
 
Systematic literature reviews - Moving offline communities online
Systematic literature reviews - Moving offline communities onlineSystematic literature reviews - Moving offline communities online
Systematic literature reviews - Moving offline communities online
 
Which tech girl superhero are you
Which tech girl superhero are youWhich tech girl superhero are you
Which tech girl superhero are you
 
Which tech girl superhero are you?
Which tech girl superhero are you?Which tech girl superhero are you?
Which tech girl superhero are you?
 
Developing your research question
Developing your research questionDeveloping your research question
Developing your research question
 

Último

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Último (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Phd seminar oct2012

  • 1. Tales from the underground: Exploring unauthorised file sharing communities on the Internet Dr Jenine Beekhuyzen Institute for Integrated and Intelligent Systems Griffith University - Brisbane, Australia
  • 2. My Doctorate Doctoral study completed in 2010 (2006-2009) in the School of ICT, Science, Engineering, Environment & Technology Faculty Title: A Critical Ethnography of an Online File Sharing Community: An Actor-Network Theory Perspective of Controversies in the Digital Music World Participant in the Doctoral Consortium at QUALIT 2006 - Brisbane, Australia Participant in the Doctoral Consortium at ICIS 2008 - Paris, France Title: Digital Rights Management and the Online Music Experience Participant in the Junior Faculty Consortium at ICIS 2010 - St. Louis, USA
  • 4. Publications Beekhuyzen, J., von Hellens, L. and Nielsen, S. (2012) Insights from the Underground: Using ANT to Understand Practices and Motivations for File Sharing in Online Communities, European Conference on Information Systems (ECIS), Barcelona, Spain, 11-13 June - Winner of the Claudio Ciborra award for Innovation in Research Beekhuyzen, J., von Hellens, L. and Nielsen, S. (2012) The High Seas (C’s) of piracy in Information Systems: Cost, convenience and choice, Australasian Conference on Information Systems (ACIS), Geelong, Australia, 3-5 December Beekhuyzen, J., von Hellens, L. & Nielsen, S. (2011) Underground Online Music Communities: Exploring Rules for Membership, Online Information Review, Vol. 35 Issue: 5, pp.699 - 715 Beekhuyzen, J., von Hellens, L. & Nielsen, S.(2010) Collaboration in Online Communities: Reconceptualising the Complex Problem of Unauthorised Music File Sharing, ACIS, Brisbane, Australia 1-3 December Beekhuyzen, J., Nielsen, S. & von Hellens, L. (2010) The NVivo Looking Glass: Seeing the Data Through the Analysis, QualIT Conference - Qualitative Research in IT & IT in Qualitative Research, Brisbane, Australia 29-30 November Beekhuyzen, J. & von Hellens, L. (2009) Reciprocity and Sharing in an Underground File Sharing Community, 20th Australasian Conference on Information Systems (ACIS), Melbourne, Australia, Monash University, 2-4 December Beekhuyzen, J. & von Hellens, L. (2008) How does Technology Influence Online Music Access and Use? A Taxonomy of Empirical Studies, 19th Australasian Conference on Information Systems (ACIS), Christchurch, New Zealand, 3-5 December. Beekhuyzen, J. (2007) Putting the pieces of the puzzle together: Using NVivo for a literature review, QualIT2007 - Qualitative Research in IT:, Wellington, New Zealand, Victoria University of Wellington, 19-20 November
  • 5. Background to PhD Continuation of Smart Internet Technology Cooperative Research Centre project (2004/2005) into media use and digital technologies that aims to develop guidelines for the user-centred design of new digital rights management systems (DRMs). A continuum from downloading to purchase
  • 6. Publications Singh, S., Jackson, M., Waycott, J. & Beekhuyzen, J. (2006) Downloading vs Purchase: Music industry vs consumers, Lecture Notes in Computer Science, Springer, Berlin / Hiedleberg (reprinted from the First International Conference on Digital Rights Management 2005) Waycott, J., Jackson, M., Singh, S. (2005) Digital Rights Management and consumers’ use of music: An activity theory perspective, Proceedings of QualIT 2005, Brisbane, Australia, 25-27 November Jackson, M., Singh, S., Waycott, J. & Beekhuyzen, J. (2005) DRMs, Fair Use and Users’ Experience of Sharing Music, DRM 2005 - Fifth ACM Workshop on Digital Rights Management, Virginia, US, 7 Nov 2005 Beekhuyzen, J., von Hellens, L., Morley, M, and Nielsen, S.H. (2004) Searching for a methodology for Smart Internet Technology Development, Proceedings of the Twelfth International Conference on Information Systems Development, Melbourne, Australia, August 25-27
  • 7. My Doctoral Studies Explore motivations for file sharing on the Internet - those that sometimes buy and sometimes file share - see Lessig 2004 Reconceptualise file sharing “piracy” and participants/users Focus on music downloading as a cultural activity Downloading, uploading, sharing in online social spaces that challenge authority - in general, and in the context of online communities (Roswell) Unauthorised? Authorised? Difficulties in researching... Latest developments in Portugal and growing trend to distribute authorised music releases by musicians (and other artists) - 124,191,862 legal downloads in first 6 months - 31% of all BitTorrent
  • 8. Conceptualising Music Distribution Conceptualisation of music distribution systems
  • 9. Design/Methodology/Approach Actor-network theory (Callon, Latour & Rip, 1986) Critical approach (Habermas, 1984, Ngwenyama and Lee, 1997, Klecun, 2004, Stahl 2008) - roots in IS research in the Marxist view of society as a series of class struggles (Orlikowski and Baroudi, 1991). Ethnographic methodology (Thomas, 1993) - systems, structure, technology and rules of unauthorised (illegal?) file sharing Empirical: in-depth interviews with 16 file sharers, 6 musicians & 8 music recording industry experts, focus groups, covert observations over 120 days of a surreptitious online community - Roswell (Pseudonym) Roswell - 1200+ members (20 000+) - strong rules for active participation - strongly ordered and not adhoc
  • 10. Findings Internet has robust architectures for participation - file sharing communities that manifest social interaction create affordances for an ever-expanding number of people to share their experiences (and their content) Underground file sharing communities are sophisticated systems for organising music within subcultures on the Internet Granted membership is meritocratic Members are encouraged to develop habits of active participation and contribution to the community (sharing or uploading new content) Community has strong conventions for participating/contributing e.g. naming and ripping new uploads, obfuscating personal identities
  • 11. Findings Cost - physical mediums (CDs) too expensive, compared to digital music ($1.69-$2.19/track from iTunes). Retail price of a digital single track is equal to the comparable cost of a track on a CD, however the two are not commensurable - no costs for packaging, few costs for distribution and storage of the digital artifact. Bagchi et al. (2006) argue individuals may feel that the injustices inflicted by the manufacturers justify piracy Convenience - easier to use than online stores like iTunes (Alderman 2001) - less barriers to the music transaction, such as the need for a credit card. Interoperability is important, and technical competence influences the choice of unauthorised file sharing system (or even paid music system). Smith and Telang (2009) suggest that giving away content in one channel can stimulate sales in other channels. Gran & Molde (2010) - downloaders are 10 times more likely to purchase Choice – frustrated that the largest online music store (iTunes) is limited - no Beatles & AC/DC etc. - “long tail” (Anderson, 2006), whereas sources that provide access to unauthorised content enable unlimited access to almost any digitally recorded music, often at a very high quality. If a legitimate source is not available to purchase, they look for other sources. !
  • 12. Findings Interesting... New content is unpredictable and dynamic - exists temporarily Members contributing to a collective consciousness while developing their own culture and language Motivated by appeal of unpredictability (similar to radio? social media?), ability to collaborate with peers Evaluate value through consideration of cost, convenience and choice Many file share without malicious motivations, they do it simply because they can (and because they enjoy it :))
  • 13. Practical Implications Too often, we impute an automatic link between illegal behaviors and ethics and forget that the criminalization of ‘deviant acts’ transforms and reduces broader normative meanings to legal ones. Once a category of behaviors has become defined by statute as sanctionable, the behaviors so-defined assume a new set of meanings. These may obscure the alternative nuanced images that guide those who engage in such behaviors, those who enforce the laws and norms that prohibit” (Thomas, 2005). Insights into the ‘black box’ of file sharing and underlying ideologies Understanding of sophisticated underground file sharing communities assists further development of legitimate online music systems to appeal to the large number of individuals involved in music file sharing communities and file sharing in general Ethical considerations and challenges of studying illegal behaviour - of interest to the IS community
  • 14. Social Implications Misuse of the concept of “piracy” to describe all who engage in file sharing as criminals does disservice to those who are shapers of the digital revolution - and is often inaccurate according to the common meaning of the concept - not well defined Understand practices within a subculture that is regarded as deviant from the mainstream and illegal “moral panic”"[a] condition, episode, person or group of persons emerges to become defined as a threat to societal values and interests” (Cohen, 1973: 9) Contributes to the discussion and policy formulation on file sharing
  • 15. Contributions Develop theory for studying illegal behaviour in IS - IS moving beyond organisational boundaries - covert observations Contradicts community literature? Only known ethnography investigating underground music file sharing communities using a qualitative interpretive/critical approach Underground communities have not been systematically studied previously Addresses lack of research literature Novel in applying ANT to a context not previously applied
  • 16. Contact Thank you! e: jenine@griffith.edu.au w: www.iinet.net.au/~beek t: @jeninebeek b: diaryofatechgirl.wordpress.com

Notas do Editor

  1. \n
  2. do I have time for story about going to Paris with 5 days notice?\n\n\n
  3. \n
  4. conversation with Marco de Marco at ECIS 2012 - CC was risk taking and innovative in his research - pushing the limits - flattering to win award\nexplain system in Australia - almost all publish by dissertation not by publication - we publish mostly at the end of our doctorate, not during - playing a different game (Baskerville ICIS2008)\n\nlink to ECIS paper\n
  5. we focused on music - with introduction of iTunes and other music services e.g. Bigpond Music in Australia\nsample vs substitution\n\nlink to paper downloading vs purchase\n
  6. 1 - developed model of continuum from downloading to purchase\n2 - application of activity theory to better understand these approaches to accessing music online\n3 - legal aspects of music downloading (file sharing)\n4 - methodology to study music access and use - scenarios and personas from UCD\n\n
  7. Link to Lessig free culture\n\npiracy - always bad, or is it?\nLessig (2004) argues that people are motivated to use unuathorised file sharing networks for four primary reasons: \n•As substitutes for purchasing content: users who download instead of purchasing (A). \n•To sample music before purchasing it: sharing could increase the quantity of music purchased (B). \n•To get access to copyrighted content that is no longer sold or that they would not have purchased because the transaction costs off the Net are too high (C)\n•To get access to content that is not copyrighted or that the copyright owner wants to give away (D). \nLaws to copyright change as Mickey Mouse gets older...85 yrs.\n\nWith some musicians now authorising the release of their music solely as a BitTorrent download (and not for commercial sale), it is possible to infer that this method of distribution by musicians will increase in the future. A recent ruling in Portugal that unauthorised file sharing for personal use is legal further evidences the need for this reconceptualisation of file sharing.\n\n
  8. piracy - always bad, or is it?\nLessig (2004) argues that people are motivated to use unuathorised file sharing networks for four primary reasons: \n•As substitutes for purchasing content: users who download instead of purchasing (A). \n•To sample music before purchasing it: sharing could increase the quantity of music purchased (B). \n•To get access to copyrighted content that is no longer sold or that they would not have purchased because the transaction costs off the Net are too high (C)\n•To get access to content that is not copyrighted or that the copyright owner wants to give away (D). \nLaws to copyright change as Mickey Mouse gets older...85 yrs.\n\nWith some musicians now authorising the release of their music solely as a BitTorrent download (and not for commercial sale), it is possible to infer that this method of distribution by musicians will increase in the future. A recent ruling in Portugal that unauthorised file sharing for personal use is legal further evidences the need for this reconceptualisation of file sharing.\n\n
  9. \n
  10. \n
  11. e.g. Liisa and the Finnish Eurovision winner :)\n\ntriplej interview\n
  12. mention guy who downloaded entire archive of disney and didnt watch it - because they can\n
  13. Ethics - the Australian process\nlink to paper by Sag\n
  14. link to article about portugal and file sharing bittorrent?\n
  15. e.g. Liisa and the Finnish Eurovision winner :)\n
  16. \n