Order in the Warez Scene: Explaining an Underground Virtual Community with the CPR Framework

@article{Chandra2016OrderIT,
  title={Order in the Warez Scene: Explaining an Underground Virtual Community with the CPR Framework},
  author={Priyank Chandra},
  journal={Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems},
  year={2016}
}
  • Priyank Chandra
  • Published 7 May 2016
  • Computer Science
  • Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems
The paper analyzes the warez scene, an illegal underground subculture on the Internet, which specializes in removing copy protection from software and releasing the cracked software for free. [] Key Method Subsequently, the paper uses Ostrom's framework of long-enduring common-pool resource institutions to understand the warez scene's longevity and ability to govern itself. Theoretical and design implications of these findings are then discussed.

Figures from this paper

Ladange, Adange, Jeetange: The Farmers' Movement and Its Virtual Spaces

The farmers' movement began in November 2020, when more than 300,000 protesters marched towards New Delhi in India in opposition to new agrarian acts introduced by the Indian central government.

Piracy and the Impaired Cyborg

The paper argues that software piracy, when looked through the lens of the 'cyborg,' is an act of self-making that is motivated by a desire to gain autonomy and independence, i.e., it can be understood as a way to overcome the barriers that undermine access to the technological self.

Steampunk, Survivalism and Sex Toys: An Exploration of How and Why HCI Studies Peripheral Practices

This chapter describes how peripheral practices research serves three critical functions within HCI: (1) It introduces a diversity of perspectives into the field; (2) It identifies new approaches to existing problems and challenges; (3) It serves as a defamiliarizing lens on existing norms and assumptions within the field.

Piracy Landscape Study: Analysis of Existing and Emerging Research Relevant to Intellectual Property Rights (IPR) Enforcement of Commercial-Scale Piracy

This report provides an overview of the actors involved in the generation and distribution of pirated content, how these actors are organized, and their financial motivations. It further reviews the

References

SHOWING 1-10 OF 63 REFERENCES

Welcome to the Scene

It is found that hacking groups that make this online community generally have a very limited life span as well as low production levels and work and compete in a very distributed and democratic community where they are unable to identify clear leaders.

Police Operations 3.0: On the Impact and Policy Implications of Police Operations on the Warez Scene: Police Operations on the Warez Scene

Governments and private firms have sought to regulate online piracy through legislation, police enforcement, and lawsuits. This article evaluates the effectiveness of large-scale police operations

The Economies of Online Cooperation: Gifts and Public Goods in Cyberspace

Even a casual trip through cyberspace will turn up evidence of hostility, selfishness, and simple nonsense. Yet the wonder of the Internet is not that there is so much noise, but that there is any

Electronic Potlatch: A study on new technologies and primitive economic behaviors

Economy - the very idea. In an age where the market economy seems to have achieved a total and omnipresent hegemony, there would seem to be little to discuss anymore. Going against this, the book

The work of sustaining order in wikipedia: the banning of a vandal

This paper analyzes "vandal fighting" as an epistemic process of distributed cognition, highlighting the role of non-human actors in enabling a decentralized activity of collective intelligence in Wikipedia.

Cross-national investigation and prosecution of intellectual property crimes: the example of “Operation Buccaneer”

Abstract“Operation Buccaneer” was the name given to a law enforcement operation against “DrinkOrDie,” a highly organised but globally dispersed Internet-based software piracy group. The concerted

Coase's Penguin, or Linux and the Nature of the Firm

It is suggested that the authors are seeing the broad and deep emergence of a new, third mode of production in the digitally networked environment, a mode I call commons-based peer production, which has systematic advantages over markets and managerial hierarchies when the object of production is information or culture.

CSCW at play: 'there' as a collaborative virtual environment

A study of 'There', one such game, focusing on how its flexibility has allowed players to develop their own forms of play within the game, and how the 'place' of There is a fluid interaction space that supports safe interactions between strangers.

Is the Devil in the Data? A Literature Review of Piracy Around the World

This article examines the scholarly literature pertaining to music, film and software piracy around the world, with special attention to data sources, research scope and general findings. The article

Designing trust into online experiences

A ncient social traditions were designed to elicit trust during uncertain encounters, but for many users, strategic trust is difficult to generate, shaken easily, and once shaken extremely difficult to rebuild.
...