Intrinsic and Extrinsic Values Associated With File Sharing

IDEA GROUP PUBLISHING
ITJ3283
International Journal of Enterprise Information Systems, 2(3), 59-82, July-September 2006 59
701 E. Chocolate Avenue, Suite 200, Hershey PA 17033-1240, USA
Tel: 717/533-8845; Fax 717/533-8661; URL-http://www.idea-group.com
This paper appears in the publication, International Journal of Enterprise Information Systems, Volume 2, Issue 3
edited by Angappa Gunasekaran© 2006, Idea Group Inc.
Intrinsic and Extrinsic Values
Associated With File Sharing
Alan D. Smith, Robert Morris University, USA
ABSTRACT
This article examines potential and active customers’ intrinsic and extrinsic values associated
with selected legal, ethical, and economic impacts of file sharing, especially in relation to potential impacts on customer relationship management (CRM). The pros and cons of file sharing
are highlighted in a conceptual model and empirically tested through graphical and statistical
analysis through hypothesis testing via factor analysis and principal component analysis (PCA)
techniques. Recommendations on the potential growth of the file sharing industry through the
lens of price, competition, increased selection, and regulation are included. These file-sharing
topics, issues, and concerns will have a variety of impacts on potential and active customers,
businesses, and strategic leveraging of CRM.
Keywords:
CRM; Digital Millennium Copyright Act; e-books; Internet file sharing; music
industry; Napster; P2P networks
INTRODUCTION
File Sharing and the
Emergence of MP3
With broadband Internet service becoming more accessible and affordable,
there is an ever-growing group of users who
is looking to exchange files with other users
of similar interests. The concept of peerto-peer (P2P) file sharing initially became
popular when the digital music revolution
hit in 1999 and Napster was introduced to
the public. MP3s (MPEG Audio Layer 3)
have revolutionized the music industry and
are considered the global ex facto standard
for digital music. MP3s have CD quality sound but are relatively small in size
because they are in digital format. Since
they are a small file size, it makes them
easy to transfer over the Internet. These
small files are transferred over two main
types of servers and networks. They include
Copyright © 2006, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is
prohibited.
60 International Journal of Enterprise Information Systems, 2(3), 59-82, July-September 2006
pay Web sites in which the user pays for
each song downloaded and free sites for
which there is no cost to the user (Healy,
2002; MP3 information, 2004; Saroiu,
Gummad, & Gribble, 2002). The ease and
accessibility of these cost-free files makes
P2P file sharing very popular. Perhaps the
general public does not realize that P2P
file sharing has moved past the exchange
of digital music into other entertainment
media. Along with MP3 files, movies, video
games, and books are also readily available
to download for free or for a reasonable fee
on the Internet.
All of these media types and more can
be found through a variety of easy-to-use
file-sharing programs. A consumer now can
find movies even before they are released
in the theater. It is possible to download
episodes of favorite television shows,
books, and audio books in MP3 formats.
Magazines, video games, and computer
software are also available through filesharing programs (Clark & Tsiaparas,
2002). Unfortunately, due to current copyright laws, these files can be considered by
some to be illegal in nature.
Roots of File Sharing
One model of P2P file sharing is based
on the use of a central server system that
directs traffic between individual registered
users. The central servers maintain directories of the shared files stored on the respective PCs of registered users of the network.
These directories are updated every time a
user logs on or off the network. Each time a
user of a centralized P2P file-sharing system
submits a request for a particular file, the
central server creates a list of files matching
the search request by cross-checking the
request with the server’s database of files
that are currently connected to the network.
This is the model used by Napster and
certain other P2P networks. This also has
been the most successful model employed,
because it gave users fast, direct connections to each other (Aberer, Hauswirth, &
Schmidt, 2002).
Napster, a peer-to-peer file-sharing
program for MP3 files, experienced legal problems in just six short months in
service. The lawsuit brought by the Recording Industry Association of America
caused Napster to change its method and
philosophy of doing business (Heidmiller,
2002). Although Napster is no longer a
free site, more than 180 other file-sharing
services entered the market in order to
ease the distribution of files by providing
a free network (Schwartz, 2004). These
file-sharing services have grown rapidly in
popularity, mainly by word of mouth and
via the Internet.
File-sharing programs work by making a connection to a network’s central
computer and automatically uploading a
digital file that is currently on the users’
hard drive and computer. These networks
collect a master list of the digital files
from every user connected to its server
(Schwartz,2003). When looking for music,
an individual can type in a name of a song
or artist in a network’s search engine. The
network then will check its collective database obtained from every logged-in user.
Once a search is complete, it will display
a list of songs from various users. After
the user finds the desired file, downloads
will be sent automatically to the file, thus
completing the P2P file-sharing exchange.
When connected to a file-sharing program,
you also must allow others to download music from your personal files and computer.
These file-sharing networks are used most
frequently for exchanging MP3 files, which
Copyright © 2006, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc.
is prohibited.
22 more pages are available in the full version of this document,
which may be purchased using the "Add to Cart" button on the
publisher's webpage:
www.igi-global.com/article/intrinsic-extrinsic-values-associatedfile/2107
Related Content
Web Switching
Vishal Sharma and Rakhi Sharma (2002). Enterprise Networking: Multilayer Switching
and Applications (pp. 86-104).
www.irma-international.org/chapter/web-switching/18417/
The Consistency of Virtual Organizations Enabling Capabilities and
Improvements in Knowledge Management Performance
Ali Moeini, Alireza Farmahini Farahani and Ahad Zare Ravasan (2013). International
Journal of Enterprise Information Systems (pp. 20-43).
www.irma-international.org/article/consistency-virtual-organizations-enablingcapabilities/77849/
E-Commerce Security
Steven Furnell (2006). Enterprise Information Systems Assurance and System Security:
Managerial and Technical Issues (pp. 131-149).
www.irma-international.org/chapter/commerce-security/18385/
Enterprise Information Systems: Two Case Studies
Hui-Lien Tung, Tina Marshall-Bradley, Joseph Wood, Donald A. Sofge, James Grayson,
Margo Bergman and W.F. Lawless (2010). Social, Managerial, and Organizational
Dimensions of Enterprise Information Systems (pp. 434-458).
www.irma-international.org/chapter/enterprise-information-systems/37926/
A Qualitative Study of Green IT Adoption within the Philippines Business
Process Outsourcing Industry: A Multi-Theory Perspective
Alexander A. Hernandez and Sherwin E. Ona (2015). International Journal of Enterprise
Information Systems (pp. 28-62).
www.irma-international.org/article/a-qualitative-study-of-green-it-adoption-withinthe-philippines-business-process-outsourcing-industry/143266/