An analysis of security vulnerabilities in the movie production and distribution process

被引:16
作者
Byers, S
Cranor, LF
Cronin, E
Korman, D
McDaniel, P
机构
[1] AT&T Labs Res, Florham Pk, NJ 07932 USA
[2] Carnegie Mellon Univ, Sch Comp Sci, Pittsburgh, PA 15213 USA
[3] Univ Penn, CIS Dept, Philadelphia, PA USA
关键词
movie industry; piracy; Internet security; peer-to-peer networks; copyright;
D O I
10.1016/j.telpol.2004.05.007
中图分类号
G2 [信息与知识传播];
学科分类号
05 ; 0503 ;
摘要
Unauthorized copying of movies Is a major concern for the motion picture industry. While unauthorized copies of movies have been distributed via portable physical media for some time, low-cost, high-bandwidth Internet connections and peer-to-peer file sharing networks provide highly efficient distribution media. Many movies are showing up on file sharing networks shortly after, and in some cases prior to, theatrical release. It has been argued that the availability of unauthorized copies directly affects theater attendance and DVD sales, and hence represents a major financial threat to the movie industry. This research attempts to determine the source of unauthorized copies by studying the availability and characteristics of recent popular movies in file sharing networks. A data set of 312 popular movies was developed and one or more samples of 183 of these movies was located on file sharing networks, for a total of 285 movie samples. Seventy-seven percent of these samples appear to have been leaked by industry insiders. Most of the samples appeared on file sharing networks prior to their official consumer DVD release date. Indeed, of the movies that had been released on DVD as of the time of this study, only 5% first appeared after their DVD release date on a web site that indexes file sharing networks, indicating that consumer DVD copying currently represents a relatively minor factor compared with insider leaks. A brief analysis of the movie production and distribution process was performed and potential security vulnerabilities were identified that may lead to unauthorized copies becoming available to those who may wish to redistribute them. Finally, recommendations are offered for reducing security vulnerabilities in the movie production and distribution process. (C) 2004 Elsevier Ltd. All rights reserved.
引用
收藏
页码:619 / 644
页数:26
相关论文
共 34 条
[1]  
BIDDLE P, 2002, P 2002 ACM WORKSH DI
[2]  
BUTLER RW, 2003, KANSAS CITY STA 0622
[3]  
*CERT, 2004, CERT HOM
[4]  
Cheswick WR., 2003, FIREWALLS INTERNET S
[5]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[6]  
*DEL TOUCH, 2003, IMP PIR FILM IMD
[7]  
ELLER C, 2003, BALTIMORE SUN 0331
[8]  
Garfinkel Simson., 1996, PRACTICAL UNIX INTER
[9]  
GRAHAM T, 2003, PHILADELPHIA IN 0927
[10]  
GUNTER C, 2001, P 34 ANN HAW INT C S