On the penetration of business networks by P2P file sharing
Lee, K., Hughes, D. and Walkerdine, J. (2007) On the penetration of business networks by P2P file sharing. In: Second International Conference on Internet Monitoring and Protection (ICIMP 07), 1 - 5 July, Silicon Valley, USA.
|PDF - Published Version |
Download (141kB) | Preview
*Subscription may be required
P2P file-sharing poses a number of problems for system administrators including unpredictable network usage, increased vulnerability to security threats and the danger of legal action. Due to these problems, many businesses take measures to restrict the use of P2P software, but how successful have these measures been? This paper analyzes the degree to which business networks have been penetrated by P2P applications and shows that despite the risks, business networks participate significantly in P2P file-sharing systems. Furthermore, we find that participation is greatest amongst small businesses and that viral media has a significant effect on the participation of large businesses.
|Publication Type:||Conference Paper|
|Copyright:||© 2007 IEEE|
|Notes:||Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.|
|Item Control Page|
Downloads per month over past year