2011
DOI: 10.2202/1944-2866.1125
|View full text |Cite
|
Sign up to set email alerts
|

Overcoming the Warez Paradox: Online Piracy Groups and Situational Crime Prevention

Abstract: US federal law enforcement operations occurring between 2001 and 2005 attempted to disrupt the online piracy scene, targeting copyright piracy rings known as 'warez groups'. Previous work on warez groups has demonstrated a paradoxical situation where attempts to curtail warez group activities through policing and advancements in DRM only further encourage such groups to crack and distribute content. This study collected data on 93 convictions from these policing operations to construct a crime script of these … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
1

Year Published

2014
2014
2025
2025

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(16 citation statements)
references
References 32 publications
0
15
1
Order By: Relevance
“…These crime script applications demonstrate the variety of data sources that can be used for analysis. These include surveys or interviews [20]- [22], [25], [26], police records [18], [22], [26], court documents [19], [27], and the infrastructure used by offenders [23], [28]. Another data source that is particularly useful for understanding cybercrimes are the forums used by offenders to trade in goods and services, as well as sharing information.…”
Section: B Crime Script Analysismentioning
confidence: 99%
“…These crime script applications demonstrate the variety of data sources that can be used for analysis. These include surveys or interviews [20]- [22], [25], [26], police records [18], [22], [26], court documents [19], [27], and the infrastructure used by offenders [23], [28]. Another data source that is particularly useful for understanding cybercrimes are the forums used by offenders to trade in goods and services, as well as sharing information.…”
Section: B Crime Script Analysismentioning
confidence: 99%
“…For example, if the initially selected data source is not complete enough, the use of multiple secondary data sources or collection of complementary data can be envisaged to improve completeness [16]. As an example, Basamanowicz and Bouchard [27] used court proceedings as their main source of data, but also employed 'secondary data sources to verify and supplement the court case documents'.…”
Section: ) Data Source Selectionmentioning
confidence: 99%
“…This content is posted online in part by hobbyists or enthusiasts who wish to share the products they have bought personally or downloaded elsewhere (Goldman, ). Most of it however is actually distributed by members of an online community known in the computer underground as the warez scene (Basamanowicz & Bouchard, ; Craig, ).…”
Section: The Warez Scenementioning
confidence: 99%
“…Products are first released on the scene servers where the access is restricted to members of the warez scene (Chaudhry & Zimmerman, ). Couriers eventually move the products from scene servers to more open systems like peer‐to‐peer networks (Basamanowicz & Bouchard, ). Warez hackers therefore have a much faster access to warez and are responsible for the proliferation of infringing content across multiple peer‐to‐peer networks and websites.…”
Section: The Warez Scenementioning
confidence: 99%
See 1 more Smart Citation