{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T06:03:09Z","timestamp":1760853789919},"reference-count":36,"publisher":"Proceedings of the National Academy of Sciences","issue":"43","content-domain":{"domain":["www.pnas.org"],"crossmark-restriction":true},"short-container-title":["Proc. Natl. Acad. Sci. U.S.A."],"published-print":{"date-parts":[[2014,10,28]]},"abstract":"<jats:title>Significance<\/jats:title>\n          <jats:p>The emergence of the Internet as the primary medium for information exchange has led to the development of many decentralized sharing systems. The most popular among them, BitTorrent, is used by tens of millions of people monthly and is responsible for more than one-third of the total Internet traffic. Despite its growing social, economic, and technological importance, there is little understanding of how users behave in this ecosystem. Because of the decentralized structure of peer-to-peer services, it is very difficult to gather data on users behaviors, and it is in this sense that peer-to-peer file-sharing has been called the \u201cdark matter\u201d of the Internet. Here, we investigate users activity patterns and uncover socioeconomic factors that could explain their behavior.<\/jats:p>","DOI":"10.1073\/pnas.1309389111","type":"journal-article","created":{"date-parts":[[2014,10,7]],"date-time":"2014-10-07T02:54:30Z","timestamp":1412650470000},"page":"15322-15327","update-policy":"http:\/\/dx.doi.org\/10.1073\/pnas.cm10313","source":"Crossref","is-referenced-by-count":9,"title":["Impact of heterogeneity and socioeconomic factors on individual behavior in decentralized sharing ecosystems"],"prefix":"10.1073","volume":"111","author":[{"given":"Arnau","family":"Gavald\u00e0-Miralles","sequence":"first","affiliation":[{"name":"Departaments ad\u2019Enginyeria Inform\u00e0tica i Matem\u00e0tiques and"},{"name":"d\u2019Enginyeria Qu\u00edmica, Universitat Rovira i Virgili, 43007 Tarragona, Spain;"},{"name":"Departments of cChemical and Biological Engineering,"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David R.","family":"Choffnes","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Washington, Seattle, WA 98195-2350; and"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"John S.","family":"Otto","sequence":"additional","affiliation":[{"name":"Electrical Engineering and Computer Science, and"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mario A.","family":"S\u00e1nchez","sequence":"additional","affiliation":[{"name":"Electrical Engineering and Computer Science, and"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fabi\u00e1n E.","family":"Bustamante","sequence":"additional","affiliation":[{"name":"Electrical Engineering and Computer Science, and"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lu\u00eds A. N.","family":"Amaral","sequence":"additional","affiliation":[{"name":"Departments of cChemical and Biological Engineering,"},{"name":"Physics and Astronomy,"},{"name":"Northwestern Institute on Complex Systems, and"},{"name":"Howard Hughes Medical Institute, Northwestern University, Evanston, IL 60208;"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jordi","family":"Duch","sequence":"additional","affiliation":[{"name":"Departaments ad\u2019Enginyeria Inform\u00e0tica i Matem\u00e0tiques and"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Roger","family":"Guimer\u00e0","sequence":"additional","affiliation":[{"name":"d\u2019Enginyeria Qu\u00edmica, Universitat Rovira i Virgili, 43007 Tarragona, Spain;"},{"name":"Instituci\u00f3 Catalana de Recerca i Estudis Avan\u00e7ats (ICREA), 08010 Barcelona, Spain"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"341","published-online":{"date-parts":[[2014,10,6]]},"reference":[{"key":"e_1_3_3_1_2","unstructured":"B Cohen Incentives build robustness in BitTorrent. Proc First International Workshop on Economics of Peer-to-Peer Systems Vol 6 pp. 68\u201372. Available at www2.sims.berkeley.edu\/research\/conferences\/p2pecon\/program.html. Accessed September 29 2014. (2003)."},{"key":"e_1_3_3_2_2","first-page":"351","article-title":"Internet study 2008\/2009","volume":"37","author":"Schulze H","year":"2009","unstructured":"H Schulze, K Mochalski, Internet study 2008\/2009. IPOQUE Rep 37, 351\u2013362 (2009).","journal-title":"IPOQUE Rep"},{"key":"e_1_3_3_3_2","doi-asserted-by":"crossref","unstructured":"J Otto M S\u00e1nchez D Choffnes F Bustamante G Siganos On blind mice and the elephant: Understanding the network impact of a large distributed system. Proc ACM SIGCOMM 2011 (Assoc Computing Machinery New York) pp. 110\u2013121. (2011).","DOI":"10.1145\/2043164.2018450"},{"key":"e_1_3_3_4_2","volume-title":"Building a Digital Economy: The Importance of Saving Jobs in the EU\u2019s Creative Industries","author":"Tera Consultants","year":"2010","unstructured":"; Tera Consultants Building a Digital Economy: The Importance of Saving Jobs in the EU\u2019s Creative Industries (Intl Chamber of Commerce\/BASCAP, Paris, 2010)."},{"key":"e_1_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.1171990"},{"key":"e_1_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.1167742"},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1038\/srep01801"},{"key":"e_1_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.1202775"},{"key":"e_1_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0026752"},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1038\/nature07634"},{"key":"e_1_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.1038\/srep01684"},{"key":"e_1_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.1199644"},{"key":"e_1_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1038\/nature11421"},{"key":"e_1_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2008.07.002"},{"key":"e_1_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.68.065103"},{"key":"e_1_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0405728101"},{"key":"e_1_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0800332105"},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1126\/science.1174562"},{"key":"e_1_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-003-0088-1"},{"key":"e_1_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/11558989_19"},{"key":"e_1_3_3_21_2","unstructured":"A Iosup P Garbacki JA Pouwelse D Epema Analyzing BitTorrent: Three lessons from one peer-level view. Proc 11th ASCI Conference pp 96\u2013104. Available at www.pds.ewi.tudelft.nl\/~iosup\/aiosup05asci.pdf. Accessed September 29 2014. (2005)."},{"key":"e_1_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2013.6674215"},{"key":"e_1_3_3_23_2","first-page":"62","article-title":"Infringing nations: Predicting software piracy rates, bittorrent tracker hosting, and p2p file sharing client downloads between countries","volume":"7","author":"Kigerl AC","year":"2013","unstructured":"AC Kigerl, Infringing nations: Predicting software piracy rates, bittorrent tracker hosting, and p2p file sharing client downloads between countries. Int J Cyber Criminol 7, 62\u201380 (2013).","journal-title":"Int J Cyber Criminol"},{"key":"e_1_3_3_24_2","first-page":"363","volume-title":"ACM SIGCOMM Computer Communication Review","author":"Choffnes D","year":"2008","unstructured":"D Choffnes, F Bustamante, Taming the torrent: A practical approach to reducing cross-isp traffic in peer-to-peer systems. ACM SIGCOMM Computer Communication Review (Assoc Computing Machinery, New York) Vol 38, 363\u2013374 (2008)."},{"key":"e_1_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1038\/163688a0"},{"key":"e_1_3_3_26_2","unstructured":"D Choffnes Strange bedfellows: Community identification in BitTorrent. Proc 9th International Conference on Peer-to-Peer Systems (USENIX Assoc Berkeley CA) p 13. (2010)."},{"key":"e_1_3_3_27_2","unstructured":"D Wetherall Privacy revelations for web and mobile apps. Proc 13th USENIX Conference on Hot Topics in Operating Systems (USENIX Assoc Berkeley CA) p 21. (2011)."},{"key":"e_1_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1038\/srep00350"},{"key":"e_1_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176344136"},{"key":"e_1_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1287\/isre.9.4.380"},{"key":"e_1_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1177\/0163443705055723"},{"key":"e_1_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2003.11045767"},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jors.2602552"},{"key":"e_1_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-007-9361-0"},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1633576100"},{"key":"e_1_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.192407699"}],"container-title":["Proceedings of the National Academy of Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/pnas.org\/doi\/pdf\/10.1073\/pnas.1309389111","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T02:11:00Z","timestamp":1649815860000},"score":1,"resource":{"primary":{"URL":"https:\/\/pnas.org\/doi\/full\/10.1073\/pnas.1309389111"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,6]]},"references-count":36,"journal-issue":{"issue":"43","published-print":{"date-parts":[[2014,10,28]]}},"alternative-id":["10.1073\/pnas.1309389111"],"URL":"https:\/\/doi.org\/10.1073\/pnas.1309389111","relation":{},"ISSN":["0027-8424","1091-6490"],"issn-type":[{"value":"0027-8424","type":"print"},{"value":"1091-6490","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,6]]},"assertion":[{"value":"2014-10-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}