SlideShare ist ein Scribd-Unternehmen logo
1 von 12
A Field Guide to Internet Piracy
Types of pirate sites and how they operate
Lydia Crowe, University of Iowa Press
AAUP, June 21, 2013
Source: http://commons.wikimedia.org/wiki/File:Pirate-ship.svg
Do not host content
Link to content from around
the web
Easily searchable
Examples: ebook3000.com,
ebookee.org, avaxhome.ws
1. Indexing Sites
Host content
Not searchable
Legal uses: online storage of large files; transfer of
files too large for e-mail.
Examples: megaupload.com (RIP),
depositfile.com, rapidshare.com,
mediafire.com
2. Locker sites
Right: Kim Dotcom, Megaupload mogul.
Source:
http://commons.wikimedia.org/wiki/File:Kim_S
Both store and index files.
Legal uses: document sharing for teachers,
companies, authors, etc.
Example: scribd.com
3. Document hosting sites
4. Torrent search engines
Index of torrent files.
Torrents do not contain book content – only
metadata. Users, not torrent sites, are liable for
infringement.
Content is hosted on individuals’ computers and can
be downloaded in parts from multiple users (seeders)
at the same time. Any given torrent can be hosted
and accessed in multiple countries and jurisdictions.
Examples: ISOHunt.com, ThePirateBay.org
4. Torrent search engines
Source: http://arstechnica.com/business/2010/01/bittorrent-census-about-99-of-files-copyright-infringing/
Usenet: a discussion system that can also be used to
exchange ASCII-encoded binary files
5. Usenet search engines
Source: Wikimedia Commons. Usenet Binaries Upload process.PNG. Author: Dale Mahalko.
Users pay for subscriptions to the
Usenet network.
Usenet has no central system but
consists of a dynamic array of
servers. When the servers
connect, they pass files back and
forth.
Once a book is posted to Usenet,
removing it is nearly impossible.
Examples: usenet.nl
5. Usenet search engines
Source: Wikimedia Commons. Hercules and the
Lernaean Hydra. National Archaeological
Museum of Spain. Photo: Luis García.
Some sites claim to have certain e-books, but ask the
user to pay a fee for access to the file.
Often, paying this fee gives the user access to a
torrent network that he/she could have accessed for
free and that may or may not have the file he/she
wants.
Example: downloadprovider.me
6. Scams
Some e-books are lendable. If the publisher
has allowed it, they can be loaned to
another user’s e-reader for 14 days.
Users sign up to e-book lending sites and list
the books they own. Then they can look at
other people’s collections and ask to borrow
their books.
NOT piracy – but your authors might see it
differently!
Examples: lendle.me, ecolibris.net,
ebookfling.com
7. E-book lending sites
(NOT infringing)
Targets: indexing sites, locker sites, and document
hosting sites
1. Locate infringing files using Google
Use site-specific searches: <“university of iowa press”
site:ebook3000.com>, for example, will find everything
containing the phrase “university of iowa press” on the site
ebook3000.com.
Google Alerts for the press name or for specific titles can also
turn up infringing sites.
2. Record titles and URLs on a spreadsheet
3. Send mass takedown notices
4. Follow up for compliance
Anti-piracy at the University of Iowa
Press
Anti-piracy at the University of Iowa
Press

Weitere ähnliche Inhalte

Was ist angesagt?

Internet browsing techniques
Internet browsing techniquesInternet browsing techniques
Internet browsing techniques
Tola Odugbesan
 
The World Wide Web CSCE 101 – Spring 2010
The World Wide Web CSCE 101 – Spring 2010The World Wide Web CSCE 101 – Spring 2010
The World Wide Web CSCE 101 – Spring 2010
webhostingguy
 
ENGL 1221 McManus
ENGL 1221 McManusENGL 1221 McManus
ENGL 1221 McManus
Traciwm
 
Pratt sils knowledge organization spring 2014
Pratt sils knowledge organization spring 2014Pratt sils knowledge organization spring 2014
Pratt sils knowledge organization spring 2014
PrattSILS
 
Super Searching 3
Super Searching 3Super Searching 3
Super Searching 3
lwmurray1
 
Pratt SILS Knowledge Organization Fall 2010
Pratt SILS Knowledge Organization Fall 2010Pratt SILS Knowledge Organization Fall 2010
Pratt SILS Knowledge Organization Fall 2010
PrattSILS
 
LIS 653 Posters Fall 2014
LIS 653 Posters Fall 2014 LIS 653 Posters Fall 2014
LIS 653 Posters Fall 2014
PrattSILS
 

Was ist angesagt? (20)

Internet browsing techniques
Internet browsing techniquesInternet browsing techniques
Internet browsing techniques
 
Introduction of internet
Introduction of internetIntroduction of internet
Introduction of internet
 
The Hidden Web
The Hidden WebThe Hidden Web
The Hidden Web
 
Internet basics for seniors
Internet basics for seniorsInternet basics for seniors
Internet basics for seniors
 
The World Wide Web CSCE 101 – Spring 2010
The World Wide Web CSCE 101 – Spring 2010The World Wide Web CSCE 101 – Spring 2010
The World Wide Web CSCE 101 – Spring 2010
 
Using Search Engines
Using Search EnginesUsing Search Engines
Using Search Engines
 
Digital Library Infrastructure for a Million Books
Digital Library Infrastructure for a Million BooksDigital Library Infrastructure for a Million Books
Digital Library Infrastructure for a Million Books
 
ENGL 1221 McManus
ENGL 1221 McManusENGL 1221 McManus
ENGL 1221 McManus
 
Legal Web 2.0
Legal Web 2.0Legal Web 2.0
Legal Web 2.0
 
Internet research
Internet researchInternet research
Internet research
 
Pratt sils knowledge organization spring 2014
Pratt sils knowledge organization spring 2014Pratt sils knowledge organization spring 2014
Pratt sils knowledge organization spring 2014
 
Super Searching 3
Super Searching 3Super Searching 3
Super Searching 3
 
Lesson 2 network and the internet
Lesson 2 network and the internetLesson 2 network and the internet
Lesson 2 network and the internet
 
Deep Web
Deep WebDeep Web
Deep Web
 
Pratt SILS Knowledge Organization Fall 2010
Pratt SILS Knowledge Organization Fall 2010Pratt SILS Knowledge Organization Fall 2010
Pratt SILS Knowledge Organization Fall 2010
 
LIS 653 Posters Fall 2014
LIS 653 Posters Fall 2014 LIS 653 Posters Fall 2014
LIS 653 Posters Fall 2014
 
Internet Concepts Ch 1
Internet Concepts Ch 1Internet Concepts Ch 1
Internet Concepts Ch 1
 
Phishing With Data URI
Phishing With Data URIPhishing With Data URI
Phishing With Data URI
 
LIS 653 fall 2013 final project posters
LIS 653 fall 2013 final project postersLIS 653 fall 2013 final project posters
LIS 653 fall 2013 final project posters
 
Presentation 2
Presentation 2Presentation 2
Presentation 2
 

Ähnlich wie AAUP 2013: Digital Piracy Review (L. Crowe)

Copyright presentation mphernandez edtc6340
Copyright presentation mphernandez edtc6340Copyright presentation mphernandez edtc6340
Copyright presentation mphernandez edtc6340
mphernandez
 
Copyright presentation mphernandez edtc63401
Copyright presentation mphernandez edtc63401Copyright presentation mphernandez edtc63401
Copyright presentation mphernandez edtc63401
mphernandez
 
13 2 t4e_chapterthirteen_powerpointw_teays
13 2 t4e_chapterthirteen_powerpointw_teays13 2 t4e_chapterthirteen_powerpointw_teays
13 2 t4e_chapterthirteen_powerpointw_teays
sagebennet
 
13 2 t4e_chapterthirteen_powerpointw_teays
13 2 t4e_chapterthirteen_powerpointw_teays13 2 t4e_chapterthirteen_powerpointw_teays
13 2 t4e_chapterthirteen_powerpointw_teays
sagebennet
 

Ähnlich wie AAUP 2013: Digital Piracy Review (L. Crowe) (20)

Itc lec 7 website, browsers , search engines, hands on internet surfing...Pre...
Itc lec 7 website, browsers , search engines, hands on internet surfing...Pre...Itc lec 7 website, browsers , search engines, hands on internet surfing...Pre...
Itc lec 7 website, browsers , search engines, hands on internet surfing...Pre...
 
University of texas libraries’ copyright crash course
University of texas libraries’ copyright crash courseUniversity of texas libraries’ copyright crash course
University of texas libraries’ copyright crash course
 
Promises and Pitfalls: Linked Data, Privacy, and Library Catalogs
Promises and Pitfalls: Linked Data, Privacy, and Library CatalogsPromises and Pitfalls: Linked Data, Privacy, and Library Catalogs
Promises and Pitfalls: Linked Data, Privacy, and Library Catalogs
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
Promises and Pitfalls: Linked Data, Privacy, and Library Catalogs
Promises and Pitfalls: Linked Data, Privacy, and Library CatalogsPromises and Pitfalls: Linked Data, Privacy, and Library Catalogs
Promises and Pitfalls: Linked Data, Privacy, and Library Catalogs
 
Final web 2.0
 Final web 2.0 Final web 2.0
Final web 2.0
 
Introduction to Web2.0 for public libraries
Introduction to Web2.0 for public librariesIntroduction to Web2.0 for public libraries
Introduction to Web2.0 for public libraries
 
Web 2.0...it’s okay to play!
Web 2.0...it’s okay to play!Web 2.0...it’s okay to play!
Web 2.0...it’s okay to play!
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
The Wonderful World of Wikis
The Wonderful World of WikisThe Wonderful World of Wikis
The Wonderful World of Wikis
 
Use of Library & Internet the English literature
Use of Library & Internet  the English literatureUse of Library & Internet  the English literature
Use of Library & Internet the English literature
 
Web 2.0 for MA Trustees Association
Web 2.0 for MA Trustees AssociationWeb 2.0 for MA Trustees Association
Web 2.0 for MA Trustees Association
 
Copyright presentation mphernandez edtc6340
Copyright presentation mphernandez edtc6340Copyright presentation mphernandez edtc6340
Copyright presentation mphernandez edtc6340
 
Copyright presentation mphernandez edtc63401
Copyright presentation mphernandez edtc63401Copyright presentation mphernandez edtc63401
Copyright presentation mphernandez edtc63401
 
Deep web
Deep webDeep web
Deep web
 
The Wiki and the Wikipedia: A Comparative Study
The Wiki and the Wikipedia: A Comparative StudyThe Wiki and the Wikipedia: A Comparative Study
The Wiki and the Wikipedia: A Comparative Study
 
13 2 t4e_chapterthirteen_powerpointw_teays
13 2 t4e_chapterthirteen_powerpointw_teays13 2 t4e_chapterthirteen_powerpointw_teays
13 2 t4e_chapterthirteen_powerpointw_teays
 
13 2 t4e_chapterthirteen_powerpointw_teays
13 2 t4e_chapterthirteen_powerpointw_teays13 2 t4e_chapterthirteen_powerpointw_teays
13 2 t4e_chapterthirteen_powerpointw_teays
 
Shaping our futures: the Social Semantic Web
Shaping our futures: the Social Semantic WebShaping our futures: the Social Semantic Web
Shaping our futures: the Social Semantic Web
 
Open.Michigan at U-M Flint
Open.Michigan at U-M FlintOpen.Michigan at U-M Flint
Open.Michigan at U-M Flint
 

Mehr von Association of University Presses

Mehr von Association of University Presses (20)

Keep UP Gallery
Keep UP GalleryKeep UP Gallery
Keep UP Gallery
 
Raise UP Gallery
Raise UP GalleryRaise UP Gallery
Raise UP Gallery
 
Read. Think. Act.
Read. Think. Act. Read. Think. Act.
Read. Think. Act.
 
2018 Book, Jacket, & Journal Show
2018 Book, Jacket, & Journal Show2018 Book, Jacket, & Journal Show
2018 Book, Jacket, & Journal Show
 
AAUP 2017: "Conceiving, Developing, and Creating a Great University Press Web...
AAUP 2017: "Conceiving, Developing, and Creating a Great University Press Web...AAUP 2017: "Conceiving, Developing, and Creating a Great University Press Web...
AAUP 2017: "Conceiving, Developing, and Creating a Great University Press Web...
 
AAUP 2017: "Finances for Everyone"
AAUP 2017: "Finances for Everyone"AAUP 2017: "Finances for Everyone"
AAUP 2017: "Finances for Everyone"
 
AAUP 2016: Successful University Press Fundraising Four Ways (N. Mitchell)
AAUP 2016: Successful University Press Fundraising Four Ways (N. Mitchell)AAUP 2016: Successful University Press Fundraising Four Ways (N. Mitchell)
AAUP 2016: Successful University Press Fundraising Four Ways (N. Mitchell)
 
Digital Monograph Cost Builder: Intro & Demo (N. Maron & K. Schmelzinger)
Digital Monograph Cost Builder: Intro & Demo (N. Maron & K. Schmelzinger)Digital Monograph Cost Builder: Intro & Demo (N. Maron & K. Schmelzinger)
Digital Monograph Cost Builder: Intro & Demo (N. Maron & K. Schmelzinger)
 
AAUP 2016: Maximize Your International Sales (J. Lawrence-Hurt)
AAUP 2016: Maximize Your International Sales (J. Lawrence-Hurt)AAUP 2016: Maximize Your International Sales (J. Lawrence-Hurt)
AAUP 2016: Maximize Your International Sales (J. Lawrence-Hurt)
 
AAUP 2016: Accessibility is Accessible (S. Ma)
AAUP 2016: Accessibility is Accessible (S. Ma)AAUP 2016: Accessibility is Accessible (S. Ma)
AAUP 2016: Accessibility is Accessible (S. Ma)
 
AAUP 2016: Accessibility Standards from the Inside Out (M. Rothberg)
AAUP 2016: Accessibility Standards from the Inside Out (M. Rothberg)AAUP 2016: Accessibility Standards from the Inside Out (M. Rothberg)
AAUP 2016: Accessibility Standards from the Inside Out (M. Rothberg)
 
AAUP 2016: Getting to Accessible Publishing at the University of Michigan Pre...
AAUP 2016: Getting to Accessible Publishing at the University of Michigan Pre...AAUP 2016: Getting to Accessible Publishing at the University of Michigan Pre...
AAUP 2016: Getting to Accessible Publishing at the University of Michigan Pre...
 
AAUP 2016: Accessibility Presentation (J. Axelrod)
AAUP 2016: Accessibility Presentation (J. Axelrod)AAUP 2016: Accessibility Presentation (J. Axelrod)
AAUP 2016: Accessibility Presentation (J. Axelrod)
 
AAUP 2016: UPScope (S. Doerr)
AAUP 2016: UPScope (S. Doerr)AAUP 2016: UPScope (S. Doerr)
AAUP 2016: UPScope (S. Doerr)
 
AAUP 2016: Reimagining the University Press from Scratch, Part 2 (J. McAdam)
AAUP 2016: Reimagining the University Press from Scratch, Part 2 (J. McAdam)AAUP 2016: Reimagining the University Press from Scratch, Part 2 (J. McAdam)
AAUP 2016: Reimagining the University Press from Scratch, Part 2 (J. McAdam)
 
AAUP 2016: Books and Journals Together at Last (E. Nowak)
AAUP 2016: Books and Journals Together at Last (E. Nowak)AAUP 2016: Books and Journals Together at Last (E. Nowak)
AAUP 2016: Books and Journals Together at Last (E. Nowak)
 
AAUP 2016: Books & Journals—Collaboration (K. Luu)
AAUP 2016: Books & Journals—Collaboration (K. Luu)AAUP 2016: Books & Journals—Collaboration (K. Luu)
AAUP 2016: Books & Journals—Collaboration (K. Luu)
 
AAUP 2016: The Charlotte Initiative for Permanent Acquisitions of eBooks for ...
AAUP 2016: The Charlotte Initiative for Permanent Acquisitions of eBooks for ...AAUP 2016: The Charlotte Initiative for Permanent Acquisitions of eBooks for ...
AAUP 2016: The Charlotte Initiative for Permanent Acquisitions of eBooks for ...
 
AAUP Design Show: 50 Years
AAUP Design Show: 50 YearsAAUP Design Show: 50 Years
AAUP Design Show: 50 Years
 
AAUP 2015: Marketing's Role in the Cover Art Process (J. Thomson)
AAUP 2015: Marketing's Role in the Cover Art Process (J. Thomson)AAUP 2015: Marketing's Role in the Cover Art Process (J. Thomson)
AAUP 2015: Marketing's Role in the Cover Art Process (J. Thomson)
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Kürzlich hochgeladen (20)

Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 

AAUP 2013: Digital Piracy Review (L. Crowe)

  • 1. A Field Guide to Internet Piracy Types of pirate sites and how they operate Lydia Crowe, University of Iowa Press AAUP, June 21, 2013 Source: http://commons.wikimedia.org/wiki/File:Pirate-ship.svg
  • 2. Do not host content Link to content from around the web Easily searchable Examples: ebook3000.com, ebookee.org, avaxhome.ws 1. Indexing Sites
  • 3. Host content Not searchable Legal uses: online storage of large files; transfer of files too large for e-mail. Examples: megaupload.com (RIP), depositfile.com, rapidshare.com, mediafire.com 2. Locker sites Right: Kim Dotcom, Megaupload mogul. Source: http://commons.wikimedia.org/wiki/File:Kim_S
  • 4. Both store and index files. Legal uses: document sharing for teachers, companies, authors, etc. Example: scribd.com 3. Document hosting sites
  • 5. 4. Torrent search engines Index of torrent files. Torrents do not contain book content – only metadata. Users, not torrent sites, are liable for infringement. Content is hosted on individuals’ computers and can be downloaded in parts from multiple users (seeders) at the same time. Any given torrent can be hosted and accessed in multiple countries and jurisdictions. Examples: ISOHunt.com, ThePirateBay.org
  • 6. 4. Torrent search engines Source: http://arstechnica.com/business/2010/01/bittorrent-census-about-99-of-files-copyright-infringing/
  • 7. Usenet: a discussion system that can also be used to exchange ASCII-encoded binary files 5. Usenet search engines Source: Wikimedia Commons. Usenet Binaries Upload process.PNG. Author: Dale Mahalko.
  • 8. Users pay for subscriptions to the Usenet network. Usenet has no central system but consists of a dynamic array of servers. When the servers connect, they pass files back and forth. Once a book is posted to Usenet, removing it is nearly impossible. Examples: usenet.nl 5. Usenet search engines Source: Wikimedia Commons. Hercules and the Lernaean Hydra. National Archaeological Museum of Spain. Photo: Luis García.
  • 9. Some sites claim to have certain e-books, but ask the user to pay a fee for access to the file. Often, paying this fee gives the user access to a torrent network that he/she could have accessed for free and that may or may not have the file he/she wants. Example: downloadprovider.me 6. Scams
  • 10. Some e-books are lendable. If the publisher has allowed it, they can be loaned to another user’s e-reader for 14 days. Users sign up to e-book lending sites and list the books they own. Then they can look at other people’s collections and ask to borrow their books. NOT piracy – but your authors might see it differently! Examples: lendle.me, ecolibris.net, ebookfling.com 7. E-book lending sites (NOT infringing)
  • 11. Targets: indexing sites, locker sites, and document hosting sites 1. Locate infringing files using Google Use site-specific searches: <“university of iowa press” site:ebook3000.com>, for example, will find everything containing the phrase “university of iowa press” on the site ebook3000.com. Google Alerts for the press name or for specific titles can also turn up infringing sites. 2. Record titles and URLs on a spreadsheet 3. Send mass takedown notices 4. Follow up for compliance Anti-piracy at the University of Iowa Press
  • 12. Anti-piracy at the University of Iowa Press

Hinweis der Redaktion

  1. 1. Introduce self - experience (4 yrs, Rights &amp; Permissions for 3 yrs)2. Introduce presentation - a little about what you will see when you start searching for book piracy; what it&apos;s practical to take action against and how you can do it; and lastly a little about the anti-piracy efforts the University of Iowa Press has taken and the results we&apos;ve seen. Hope this presentation is not too basic - you might be familiar with a lot of this information already, but I find that having a thorough understanding of how these sites operate helps you decide where to expend time and energy policing them -- and helps you explain to authors whether an apparent link to their book is something to be concerned about or not. So, without further ado…
  2. 3. Most common thing you&apos;ll see - indexing sites. Sometimes they&apos;re on a blog made by a free blogging platform like Blogger or Wordpress; sometimes they&apos;re a more complicated site, with search tools and books organized by category. They don&apos;t actually host any files and have a kind of symbiotic relationship with…
  3. 4. Locker sites. These servers are where your books actually live. They&apos;re not directly associated with the indexing sites; an indexing site page for a book may have links to many different locker sites. But they are generally not searchable and often the file names are strings of random characters. Indexing sites help users find the files they want on locker sites. They have legal uses too -- providing online file storage or transfer of files too big to be an e-mail attachment, for example -- but they&apos;re largely used for piracy. Some are worse offenders than others.This leaves the question -- do you go after the indexing site, the locker site, or both? In general, I only target the locker site, since the locker site is where the file is actually stored. There&apos;s also the theory that leaving indexing sites full of dead links frustrates would-be downloaders and has a deterrent effect. Whether that&apos;s true or not I don&apos;t know, but in my experience, links on indexing sites are not updated regularly; the dead links tend to stay up once a locker site has taken the book file down, and that renders the locker site useless.
  4. 5. Another type of site that both hosts and indexes books is a document storing site, the most popular of these being Scribd. These sites have numerous legal uses - but they are also used to share books illegally. In my experience these sites are quite compliant. Scribd, in particular, is very good about blacklisting particular e-book files so that they can never be uploaded again.
  5. 6. Now for some of the trickier kinds of sites that are more difficult to police -- these are BitTorrent and Usenet search engines. First I&apos;ll talk about BitTorrent sites. These are indexes of torrent files. ThePirateBay.org is probably the most notorious example. Torrent files have no book content. What a torrent file consists of is metadata, like the size and structure of the file, the title, and a list of trackers, or computers that help BitTorrent users find each other. What makes torrent sites tricky is that they are not liable for infringement. Users of the torrent sites are exchanging files directly from their personal computers; this makes them liable. So while individuals could be prosecuted for piracy, and have been, few presses have the resources to do this - it would require you to get lists of downloading activity from individuals&apos; ISPs and comb through them for instances of your books being pirated. And, since a torrent file can be hosted simultaneously in multiple countries and multiple jurisdictions, many users have no legal obligation to comply with a takedown request. It is simply impractical for us to go after them -- so I ignore them.
  6. 7. The good news is that according to a recent survey by a Princeton student, books are 1% or less of the content being exchanged through BitTorrent. It&apos;s much more popular for larger files like movies, TV shows, and software. Another thing to keep in mind is that for the torrent system to work, multiple people who have the same file have to be online and providing access to the file. This is called &quot;seeding.&quot; A book title may be listed on a torrent site, but unless users are online with the book, there&apos;s no way to download it. So it&apos;s much harder to obtain a scholarly book with a small audience on BitTorrent than a commercial bestseller. This is good news for us.
  7. 8. Now a little about Usenet. This was originally a text-based system, used to distribute news articles and foster discussion. But it is also used to exchange binary files that have been encoded into ASCII. Here&apos;s a diagram showing how a file -- in this case, a DVD -- is uploaded to a Usenet newsgroup. First the whole CD is turned into a binary file; then it&apos;s split and compressed. Next parity files - which help the file to rebuild itself later - are created. Then, all the files are encoded into characters that can be sent over Usenet. Finally, someone downloads the file and reverses the whole process to turn all the characters back into a DVD.
  8. 8. Usenet is a subscription service. What&apos;s particularly clever about it is that there is no central server. It&apos;s a system that consists of a dynamic array of servers which are constantly passing files back and forth. Once a book is posted to Usenet, it&apos;s almost instantaneously propagated to multiple servers all over the world. So removing a book from Usenet, once it&apos;s posted, is nearly impossible. If one server removes it, it&apos;s still on all the others, and it will soon be &quot;re-propagated&quot;. (This is a literary audience -- so you can see why I chose a picture of Hercules and the Hydra instead of a technical diagram to illustrate this!) As with BitTorrent, servers are located all over the world, many in countries where such piracy is legal. And unlike with BitTorrent, prosecuting users is almost impossible because Usenet providers keep the IP addresses of their users private and maintain no logs of user activity. This makes going after Usenet piracy not just impractical, but nearly impossible! So let&apos;s change the subject before you all get too depressed...
  9. 9. It&apos;s not surprising that all these online marketplaces of content have given rise to some predatory practices against users, too. It&apos;s common to come across sites that ask for the user to pay for a subscription to access thousands of downloadable e-books. Often, these are just fronts for BitTorrent search engines that provide the same content that, say, ThePirateBay provides for free. As we&apos;ve learned, there is no guarantee that the user can actually find an active torrent of the book he wants. The one I come across the most often is downloadprovider.me. So, if you see a book that appears to be on downloadprovider.me, keep this information in mind! When I come across a site I haven&apos;t seen before, I find it useful to click through and see how difficult it is to find the e-book file. If you click a download link and are redirected to a paywall, it&apos;s worth taking the site&apos;s claims with a grain of salt.
  10. 10. The last thing I want to mention before I move on is the legal practice of e-book lending, which often looks suspicious but is harmless as far as I can tell. Some e-books are lending-enabled. They can be transferred from one e-reader to another, for a limited number of times, for a temporary period. E-book lending sites have lists of users and the books that they own. The users can then browse each other&apos;s collections and ask to borrow books. These sites don&apos;t have any book content -- they just help users meet up, and then the users go to, say, Amazon.com and use the lending function there. University of Iowa Press books are not lending-enabled, so even though one of our books will show up in a user&apos;s list from time to time, they wouldn&apos;t actually be able to lend it out. A year ago I had an author contact me quite distraught about his book being listed on one of these sites -- it was hard to convince him that this was a legitimate practice! But it is, and it&apos;s worth familiarizing yourself with how these sites look and whether or not your titles are lending-enabled.
  11. 11. I&apos;ll close by speaking briefly about how we&apos;ve been addressing the piracy problem at the University of Iowa Press, which I&apos;ll be the first to admit has been pretty simple and unsophisticated. I use Google searches and Google alerts to find infringing files. I target only indexing/locker sites and document hosting sites, for all the reasons I&apos;ve discussed here. My usual process is to find a specific site where a lot of books are being offered and then use a site-specific search. For example: university of iowa press, in quotation marks, then site:ebook3000.com, will find everything on that site containing the phrase University of Iowa Press.The only problem is that some sites omit the name of the press,and sometimes even scramble the title or author name! In this case, a search for individual books by title or author is needed. This is obviously more time-consuming and if you have a large list, you may just be able to target best-selling or new titles. Fortunately for us, we have a relatively small list. I then record the titles and URLs for that site on a spreadsheet, and once I&apos;ve combed through the site, I send a single takedown notice for all the URLs. It&apos;s also useful to follow up in a few weeks - see if the file has actually been taken down or if the broken links have been updated. Sometimes it takes a few whacks with the whac-a-mole mallet, so to speak, to get the file to stay down.
  12. 12. Here&apos;s a shot of the spreadsheet I use as an example. I also use the far-left column to record the number of times I have found the file -- this seems like information that could come in handy someday. Now have my efforts been effective? Without a more sophisticated way of measuring pirate activity, I can&apos;t say for sure. But what I can tell you is that the number of active links I have found since I started this activity a couple of years ago has gone down drastically. I used to spend an hour or more a day on finding links and sending takedown notices; now it&apos;s on average an hour a month, if that. I&apos;m not sure if this means that I&apos;ve been successful or that book downloaders have become better at concealing their activities. But my small amount of work on this does seem to have made a difference. And that&apos;s the good news I really want everyone to take away from all this. It can seem overwhelming when you first venture out there and see how much piracy there is, but sending takedown notices is quick and easy when you send them en masse, and the vast majority of sites I&apos;ve interacted with are compliant with these requests. I hope this information has been helpful. I want to thank you very much for your attention. There will be time for questions in a few minutes, but for now I&apos;m going to turn the floor over to Mike Schwartz of Princeton University Press...