Analysis of content copyright infringement in mobile application markets
Title | Analysis of content copyright infringement in mobile application markets |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Johnson, R., Kiourtis, N., Stavrou, A., Sritapan, V. |
Conference Name | 2015 APWG Symposium on Electronic Crime Research (eCrime) |
Keywords | android, Androids, back-end servers, content copyright infringement, copyright, cyber-lockers, Humanoid robots, ios, Java, mobile application markets, Mobile communication, mobile computing, mobile devices, Mobile handsets, network locations, paid entertainment, paid streaming content, pirated content streaming, pubcrawl170109, search criteria, search keywords, Servers, Uniform resource locators, unofficial mobile markets, URL, video content, Windows mobile applications, Writing |
Abstract | As mobile devices increasingly become bigger in terms of display and reliable in delivering paid entertainment and video content, we also see a rise in the presence of mobile applications that attempt to profit by streaming pirated content to unsuspected end-users. These applications are both paid and free and in the case of free applications, the source of funding appears to be advertisements that are displayed while the content is streamed to the device. In this paper, we assess the extent of content copyright infringement for mobile markets that span multiple platforms (iOS, Android, and Windows Mobile) and cover both official and unofficial mobile markets located across the world. Using a set of search keywords that point to titles of paid streaming content, we discovered 8,592 Android, 5,550 iOS, and 3,910 Windows mobile applications that matched our search criteria. Out of those applications, hundreds had links to either locally or remotely stored pirated content and were not developed, endorsed, or, in many cases, known to the owners of the copyrighted contents. We also revealed the network locations of 856,717 Uniform Resource Locators (URLs) pointing to back-end servers and cyber-lockers used to communicate the pirated content to the mobile application. |
DOI | 10.1109/ECRIME.2015.7120798 |
Citation Key | johnson_analysis_2015 |
- network locations
- Writing
- Windows mobile applications
- video content
- URL
- unofficial mobile markets
- Uniform resource locators
- Servers
- search keywords
- search criteria
- pubcrawl170109
- pirated content streaming
- paid streaming content
- paid entertainment
- android
- Mobile handsets
- mobile devices
- mobile computing
- Mobile communication
- mobile application markets
- Java
- ios
- Humanoid robots
- cyber-lockers
- copyright
- content copyright infringement
- back-end servers
- Androids