Skip to main content

Examining the Use of Peer-to-Peer Networks from an Activity Perspective

  • Chapter
  • First Online:
Handbook of Peer-to-Peer Networking
  • 2591 Accesses

Abstract

Since the introduction of Napster in 1999, millions of Internet users have exchanged massive amounts of files via P2P (Peer-to-Peer) filesharing networks. Notwithstanding the widespread penetration of these systems among Internet consumers, little is known about the usage process. Therefore, the aim of this chapter is to examine the usage of “illegal” P2P networks by means of an exploratory, qualitative study. The main findings revealed significant differences between the uses of various systems. Bittorrent clients were mainly used to download large files such as video, movies, and complete albums, while Gnutella clients were particularly utilized for small files such as single songs. The results indicate that the type of content, the characteristics of the client, the omnipresence of fake files and malware, the users’ motivations, the users’ lifestyles and the presence of bandwidth caps had an impact on how the participants utilized P2P systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 349.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 449.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Andersen B, Frenz M (2007) The Impact of Music Downloads and P2P File-Sharing on the Purchase of Music: A Study for Industry Canada. Available via Industry Canada. Cited 23 Oct 2008

    Google Scholar 

  2. Bannon LJ, Bødker S (1991) Beyond the Interface: Encountering Artifacts in Use. In: Carroll J (ed) Designing Interaction: Psychology at the Human-Computer Interface, Cambridge University Press, New York

    Google Scholar 

  3. Bazeley P (2007) Qualitative Data Analysis with NVivo. Sage Publications, London

    Google Scholar 

  4. Bertelsen OW, Bødker S (2003) Activity Theory. In: Carroll JM (ed) HCI Models, Theories, and Frameworks: Toward a Multidisciplinary Science, Morgan Kaufmann Publishers, San Francisco

    Google Scholar 

  5. Bødker S (1989) A Human Activity Approach to User Interfaces. Hum-Comput Interact 4(3): 171–195.

    Article  Google Scholar 

  6. Bødker S (1991) Through the Interface: A Human Activity Approach to User Interface Design. Lawrence Erlbaum Associates, Hillsdale, New Jersey

    Google Scholar 

  7. Bødker S (1993) Historical Analysis and Conflicting Perspectives – Contextualizing HCI. Paper presented at the East–West HCI conference, Moscow, Russia

    Google Scholar 

  8. Bødker S (1996) Applying Activity Theory to Video Analysis: How to Make Sense of Video Data in Human-Computer Interaction. In: Nardi BA (ed) Context and Consciousness: Activity Theory and Human-Computer Interaction, The MIT Press, Cambridge

    Google Scholar 

  9. British Music Rights (2008) Music Experience and Behaviour in Young People. Available via BMR. http://www.ukmusic.org/cms/uploads/files/UoH%20Reseach%202008.pdf. Cited 1 Oct 2008

  10. Carey J (2008) Peer-to-Peer Video File Sharing: What Can We Learn From Consumer Behavior. In: Noam EM, Pupillo LM (Eds) Peer-to-Peer Video: The Economics, Policy, and Culture of Today’s New Mass Medium, Springer Science + Business Media, LLC, New York

    Google Scholar 

  11. Christin N, Weigend AS, Chuang J (2005) Content Availability, Pollution and Poisoning in File Sharing Peer-to-Peer Networks. Paper presented at The Sixth ACM Conference on Electronic Commerce, Vancouver, Canada

    Google Scholar 

  12. Condry I (2004) Cultures of music piracy: An ethnographic comparison of the US and Japan. Int J Cult Stud 7(3): 343–363

    Article  Google Scholar 

  13. Courage C, Baxter K (2005) Understanding Your Users. A Practical Guide to User Requirements: Methods, Tools, & Techniques. Elsevier, San Francisco

    Google Scholar 

  14. Crawford K, Hasan H (2006) Demonstrations of the Activity Theory Framework for Research in Information Systems. Australas J Inf Syst 13(2): 49–67

    Google Scholar 

  15. Einav G (2008) College Students: The Rationale for Peer-to-Peer Video File Sharing. In: Noam ME, Pupillo LM (Eds) Peer-to-Peer Video: The Economics, Policy, and Culture of Today’s New Mass Medium, Springer Science + Business Media, LLC, New York

    Google Scholar 

  16. Engeström Y (1987) Learning by Expanding: An Activity-Theoretical Approach to Developmental Research. Orienta-Konsultit Oy, Helsinki

    Google Scholar 

  17. Fokker J, De Ridder H, Westendorp P, Pouwelse J (2007) Inducing Cooperationin Peer-to-Peer Television Systems. Paper presented at EuroITV’07, Amsterdam, The Netherlands

    Google Scholar 

  18. Gavosto A, Lamborghini B, Lamborghini S (2008) Peer-to-Peer Network and the Distribution in the EU. In: Noam ME, Pupillo LM (Eds) Peer-to-Peer Video: The Economics, Policy, and Culture of Today’s New Mass Medium, Springer Science + Business Media, LLC, New York

    Google Scholar 

  19. Gay G, Hembrooke H (2004) Activity-Centered Design. An Ecological Approach to Designing Smart Tools and Usable Systems. The MIT Press, Cambridge

    Google Scholar 

  20. Kalafut A, Acharya A, Gupta M (2006) A Study of Malware in Peer-to-Peer Networks. Paper presented at the Internet Measurement Conference, Rio de Janeiro, Brazil

    Google Scholar 

  21. Kaptelinin V (1996) Activity Theory: Implications for Human-Computer Interaction. In: Nardi BA (ed) Context and Consciousness: Activity Theory and Human-Computer Interaction, The MIT Press, Cambridge

    Google Scholar 

  22. Kaptelinin V (2005) The Object of Activity: Making Sense of the Sense-Maker. Mind, Cult, Activity 12(1): 4–18

    Article  Google Scholar 

  23. Kaptelinin V, Nardi B (2006) Acting with Technology: Activity Theory and Interaction Design. The MIT Press, Cambridge

    Google Scholar 

  24. Kozulin A (1986) The Concept of Activity in Soviet Psychology: Vygotsky, His Disciples and Critics. Am Psychologist 41(3): 264–274

    Article  MathSciNet  Google Scholar 

  25. Kuuti K (1996) Activity Theory as a Potential Framework for Human-Computer Interaction Research. In: Nardi BA (ed) Context and Consciousness: Activity Theory and Human-Computer Interaction, The MIT Press, Cambridge

    Google Scholar 

  26. LaRose R, Lai Y-J, Lange R, Love B, Wu Y. (2005) Sharing or Piracy? An Exploration of Downloading Behavior. J Comput-Mediat Commun 11(1)

    Google Scholar 

  27. Lee J (2003) An End-User Perspective on File-Sharing Systems. Commun ACM 46(2): 49–53

    Article  Google Scholar 

  28. Leontiev N (1978) Activity, Consciousness, and Personality. Prentice-Hall, Englewood Cliffs, NJ

    Google Scholar 

  29. Lewis K, Massey C (2004) Help or Hindrance? Participant Diaries as a Qualitative Data Collection Tool. Paper presented at the 17th Annual Conference of the Small Enterprise Association of Australia and New Zealand, Brisbane, Australia.

    Google Scholar 

  30. Mann C, Stewart F (2000) Internet Communication and Qualitative Research: A Handbook for Researching Online. SAGE Publications, London

    Google Scholar 

  31. Nardi BA (1996a) Activity Theory and Human-Computer Interaction. In: Nardi BA (ed) Context and Consciousness: Activity Theory and Human-Computer Interaction, The MIT Press, Cambridge

    Google Scholar 

  32. Nardi, B.A. (1996b) Studying Context: A Comparison of Activity Theory, Situated Action Models, and Distributed Cognition. In: Nardi BA (ed) Context and Consciousness: Activity Theory and Human-Computer Interaction, The MIT Press, Cambridge

    Google Scholar 

  33. Quek A, Shah H (2004) A Comparative Survey of Activity-based Methods for Information Systems Development. Paper presented at the 6th International Conference on Enterprise Information Systems, Porto, Portugal

    Google Scholar 

  34. Shin S, Jung J Balakrishnan B (2006) Malware Prevalence in the KaZaA File-Sharing Network. Paper presented at the International Measurement Conference, Rio de Janeiro, Brazil

    Google Scholar 

  35. Suchman LA (1987) Plans and Situated Actions: The Problem of Human Machine Communication. Cambridge University Press, Cambridge

    Google Scholar 

  36. Uden L, Willis N (2001) Designing User Interfaces using Activity Theory. Paper presented at the 34th Hawaii International Conference on System Sciences, Maui, Hawaii

    Google Scholar 

  37. Zimmerman DH, Wieder DL (1977) The Diary: Diary-Interview Method. J Contemp Ethnogr 5(4): 479–498

    Article  Google Scholar 

Download references

Acknowledgements

FLEET (an interdisciplinary research project in FLEmish E-publishing Trends) is an IWT SBO project, with research partners IBBT SMIT, Cemeso, LSTS, MOFI, ICRI, CUO IBBT, MICT, ECDC and TNO.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jorn De Boever .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

De Boever, J., De Grooff, D. (2010). Examining the Use of Peer-to-Peer Networks from an Activity Perspective. In: Shen, X., Yu, H., Buford, J., Akon, M. (eds) Handbook of Peer-to-Peer Networking. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09751-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-09751-0_4

  • Published:

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-09750-3

  • Online ISBN: 978-0-387-09751-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics