P2P's Significance for eBusiness: Towards a Research Agenda

Applications running over peer-to-peer (P2P) networks have exploded since the late 1990s. Research is needed into many aspects of P2P. These include architecture, application functionality, and the categories of digital works that are shared using P2P facilities. A range of significant strategic, consumer and policy issues also arise, such as challenges to the operation of copyright, defamation and other censorship laws. Organisations affected by P2P are devising and deploying countermeasures, such as technological protections for digital works and attempts to identify devices and users. These too require study. This paper presents the landscape of research opportunities, indicating methods that might be appropriately applied to the various kinds of questions.

[1]  Keith W. Ross,et al.  Computer networking - a top-down approach featuring the internet , 2000 .

[2]  RissonJohn,et al.  Survey of research towards robust peer-to-peer networks , 2006 .

[3]  Ian J. Lloyd Society for Computers and Law , 1996, Journal of Information, Law and Technology.

[4]  Jean-Noël Ezingeard,et al.  Developing a Relevant Research Agenda in Knowledge Management - Bridging the Gap Between Knowing and Doing , 2000, ECIS.

[5]  Mary Baker,et al.  2 P2P or Not 2 P2P? , 2003, IPTPS.

[6]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[7]  Hiroyuki Morikawa,et al.  Exploiting Semantics in Unstructured Peer-to-Peer Networks , 2004 .

[8]  Diomidis Spinellis,et al.  A survey of peer-to-peer content distribution technologies , 2004, CSUR.

[9]  J. Chuang,et al.  Economics of Peer-to-Peer Systems , 2004 .

[10]  Keith W. Ross,et al.  The KaZaA Overlay : A Measurement Study , 2004 .

[11]  Adam Wierzbicki,et al.  Deconstructing the Kazaa network , 2003, Proceedings the Third IEEE Workshop on Internet Applications. WIAPP 2003.

[12]  Bryn Loban,et al.  Between rhizomes and trees: P2P information systems , 2004, First Monday.

[13]  G. Fox Peer-to-peer networks , 2001, Comput. Sci. Eng..

[14]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[15]  Ian Clarke,et al.  Protecting Free Expression Online with Freenet , 2002, IEEE Internet Comput..

[16]  Johan A. Pouwelse,et al.  The Bittorrent P2P File-Sharing System: Measurements and Analysis , 2005, IPTPS.

[17]  Heather A. Smith,et al.  Developments in Practice VI: Riding the Wave: Discovering the Value of P2P Technologies , 2003, Commun. Assoc. Inf. Syst..

[18]  James F. Doyle,et al.  Peer-to-Peer: harnessing the power of disruptive technologies , 2001, UBIQ.

[19]  Glynn S. Lunney,et al.  The Death of Copyright: Digital Technology, Private Copying, and the DMCA , 2001 .

[20]  Ren J. Chevance Server Architectures: Multiprocessors, Clusters, Parallel Systems, Web Servers, Storage Solutions , 2004 .

[21]  B. Cohen,et al.  Incentives Build Robustness in Bit-Torrent , 2003 .

[22]  Ron Weber,et al.  Research Commentary: Information Systems and Conceptual Modeling - A Research Agenda , 2002, Inf. Syst. Res..

[23]  Rakesh Kumar,et al.  Understanding KaZaA , 2004 .

[24]  David P. Anderson,et al.  SETI@home: an experiment in public-resource computing , 2002, CACM.

[25]  Tim Moors,et al.  Survey of Research towards Robust Peer-to-Peer Networks: Search Methods , 2007, RFC.

[26]  Andy Oram,et al.  Peer-to-Peer: Harnessing the Power of Disruptive Technologies , 2001 .

[27]  John C.-I. Chuang,et al.  Incentive mechanism for peer-to-peer media streaming , 2004, Twelfth IEEE International Workshop on Quality of Service, 2004. IWQOS 2004..

[28]  Michalis Faloutsos,et al.  Is P2P dying or just hiding? [P2P traffic measurement] , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[29]  Aviel D. Rubin,et al.  Publius: a robust, tamper-evident, censorship-resistant web publishing system , 2000 .

[30]  Steve Mann,et al.  Wearable Computing: A First Step Toward Personal Imaging , 1997, Computer.

[31]  Stephen D. Crocker Host Software , 1969, RFC.

[32]  Rakesh Kumar,et al.  Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[33]  Alex Berson Client-Server Architecture , 2006, Encyclopedia of Multimedia.

[34]  LawrenceElaine,et al.  Legal and Technical Issues Management Frameworkfor Peer-to-Peer Networks , 2006, J. Theor. Appl. Electron. Commer. Res..

[35]  Roger Clarke,et al.  Open Source Software And Open Content As Models For eBusiness , 2004, Bled eConference.

[36]  Cezary Dubnicki,et al.  FPN: a distributed hash table for commercial applications , 2004, Proceedings. 13th IEEE International Symposium on High performance Distributed Computing, 2004..