{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:51Z","timestamp":1750306611853,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,12,2]],"date-time":"2014-12-02T00:00:00Z","timestamp":1417478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS 1218287"],"award-info":[{"award-number":["CNS 1218287"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","award":["Faculty Research Award"],"award-info":[{"award-number":["Faculty Research Award"]}],"id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,12,2]]},"DOI":"10.1145\/2674005.2675009","type":"proceedings-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T16:30:28Z","timestamp":1418056228000},"page":"319-324","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["User Behavior and Change"],"prefix":"10.1145","author":[{"given":"Arnau","family":"Gavald\u00e0-Miralles","sequence":"first","affiliation":[{"name":"Northwestern University, Evanston, IL, USA"}]},{"given":"John S.","family":"Otto","sequence":"additional","affiliation":[{"name":"Northwestern University, Evanston, IL, USA"}]},{"given":"Fabi\u00e1n E.","family":"Bustamante","sequence":"additional","affiliation":[{"name":"Northwestern University, Evanston, IL, USA"}]},{"given":"Lu\u00eds A.N.","family":"Amaral","sequence":"additional","affiliation":[{"name":"Northwestern University, Evanston, IL, USA"}]},{"given":"Jordi","family":"Duch","sequence":"additional","affiliation":[{"name":"Universitat Rovira I Virgili, Tarragona, Spain"}]},{"given":"Roger","family":"Guimer\u00e0","sequence":"additional","affiliation":[{"name":"Universitat Rovira I Virgili, Tarragona, Spain"}]}],"member":"320","published-online":{"date-parts":[[2014,12,2]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/2398776.2398833"},{"key":"e_1_3_2_1_2_1","volume-title":"Ars Technica","author":"Anderson N.","year":"2009","unstructured":"N. Anderson . Swedes start buying music; are anti-P2P laws working ? Ars Technica , 24 November 2009 . http:\/\/arstechnica.com\/tech-policy\/2009\/11\/swedes-start-buying-music-are-anti-p2p-laws-working\/. N. Anderson. Swedes start buying music; are anti-P2P laws working? Ars Technica, 24 November 2009. http:\/\/arstechnica.com\/tech-policy\/2009\/11\/swedes-start-buying-music-are-anti-p2p-laws-working\/."},{"key":"e_1_3_2_1_3_1","volume-title":"Ars Technica","author":"Anderson N.","year":"2011","unstructured":"N. Anderson . Major ISPs agree to \"six strikes\" copyright enforcement plan . Ars Technica , 7 July 2011 . http:\/\/arstechnica.com\/tech-policy\/2011\/07\/major-isps-agree-to-six-strikes-copyright-enforcement-plan\/. N. Anderson. Major ISPs agree to \"six strikes\" copyright enforcement plan. Ars Technica, 7 July 2011. http:\/\/arstechnica.com\/tech-policy\/2011\/07\/major-isps-agree-to-six-strikes-copyright-enforcement-plan\/."},{"key":"e_1_3_2_1_4_1","volume-title":"Model selection and multi-model inference: a practical information-theoretic approach","author":"Burnham K. P.","year":"2002","unstructured":"K. P. Burnham and D. R. Anderson . Model selection and multi-model inference: a practical information-theoretic approach . Springer , 2002 . K. P. Burnham and D. R. Anderson. Model selection and multi-model inference: a practical information-theoretic approach. Springer, 2002."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/1402958.1403000"},{"key":"e_1_3_2_1_6_1","volume-title":"Gone in 60 seconds: The impact of the Megaupload shutdown on movie sales","author":"Danaher B.","year":"2013","unstructured":"B. Danaher and M. D. Smith . Gone in 60 seconds: The impact of the Megaupload shutdown on movie sales , 6 March 2013 . http:\/\/ssrn.com\/abstract=2229349. B. Danaher and M. D. Smith. Gone in 60 seconds: The impact of the Megaupload shutdown on movie sales, 6 March 2013. http:\/\/ssrn.com\/abstract=2229349."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/P2P.2013.6688699"},{"key":"e_1_3_2_1_8_1","volume-title":"New Zealand passes 'three strikes' copyright law","author":"Greenwood D.","year":"2011","unstructured":"D. Greenwood . New Zealand passes 'three strikes' copyright law , 15 April 2011 . http:\/\/www.zdnet.com\/new-zealand-passes-three-strikes-copyright-law-2062208409\/. D. Greenwood. New Zealand passes 'three strikes' copyright law, 15 April 2011. http:\/\/www.zdnet.com\/new-zealand-passes-three-strikes-copyright-law-2062208409\/."},{"unstructured":"Hadopi. Hadopi 1 1\/2 year after the launch 1 March 2012. http:\/\/www.hadopi.fr\/sites\/default\/files\/ page\/pdf\/note17\\_en.pdf.  Hadopi. Hadopi 1 1\/2 year after the launch 1 March 2012. http:\/\/www.hadopi.fr\/sites\/default\/files\/ page\/pdf\/note17\\_en.pdf.","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1557019.1557088"},{"key":"e_1_3_2_1_11_1","volume-title":"CNN Money","author":"Pepitone J.","year":"2011","unstructured":"J. Pepitone . 50,000 BitTorrent users sued for alleged illegal downloads . CNN Money , 10 June 2011 . http:\/\/money.cnn.com\/2011\/06\/10\/technology\/ bittorrent\\_lawsuits\/index.htm. J. Pepitone. 50,000 BitTorrent users sued for alleged illegal downloads. CNN Money, 10 June 2011. http:\/\/money.cnn.com\/2011\/06\/10\/technology\/ bittorrent\\_lawsuits\/index.htm."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/5.18626"},{"key":"e_1_3_2_1_13_1","volume-title":"Estimating the dimension of a model. The annals of statistics, 6(2):461--464","author":"Schwarz G.","year":"1978","unstructured":"G. Schwarz . Estimating the dimension of a model. The annals of statistics, 6(2):461--464 , 1978 . G. Schwarz. Estimating the dimension of a model. The annals of statistics, 6(2):461--464, 1978."},{"unstructured":"B. F. Skinner. Walden Two. 1976.  B. F. Skinner. Walden Two. 1976.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","volume-title":"MIT","author":"Starner T.","year":"1995","unstructured":"T. Starner and A. Pentland . Real-time American Sign language visual recognition from video using Hidden Markov Models. Master's thesis , MIT , February 1995 . T. Starner and A. Pentland. Real-time American Sign language visual recognition from video using Hidden Markov Models. Master's thesis, MIT, February 1995."},{"volume-title":"Irish ISPs start blocking The Pirate Bay","year":"2013","unstructured":"TorrentFreak. Irish ISPs start blocking The Pirate Bay , 10 July 2013 . http:\/\/torrentfreak.com\/irish-isps-start-blocking-the-pirate-bay-130710\/. TorrentFreak. Irish ISPs start blocking The Pirate Bay, 10 July 2013. http:\/\/torrentfreak.com\/irish-isps-start-blocking-the-pirate-bay-130710\/.","key":"e_1_3_2_1_16_1"},{"volume-title":"Russia's 'SOPA' passed by lawmakers, site blocking begins \"in weeks","year":"2013","unstructured":"TorrentFreak. Russia's 'SOPA' passed by lawmakers, site blocking begins \"in weeks \", 21 June 2013 . http:\/\/torrentfreak.com\/russias-sopa-passed-by-lawmakers-site-blocking-begins-in-weeks-130621. TorrentFreak. Russia's 'SOPA' passed by lawmakers, site blocking begins \"in weeks\", 21 June 2013. http:\/\/torrentfreak.com\/russias-sopa-passed-by-lawmakers-site-blocking-begins-in-weeks-130621.","key":"e_1_3_2_1_17_1"},{"volume-title":"Hurt Locker BitTorrent lawsuit dies, but not without controversy","year":"2011","unstructured":"TorrentFreak. Hurt Locker BitTorrent lawsuit dies, but not without controversy , 22 December 2011 . http:\/\/torrentfreak.com\/hurt-locker-bittorrent-lawsuit-dies-but-not-without-controversy-111222. TorrentFreak. Hurt Locker BitTorrent lawsuit dies, but not without controversy, 22 December 2011. http:\/\/torrentfreak.com\/hurt-locker-bittorrent-lawsuit-dies-but-not-without-controversy-111222.","key":"e_1_3_2_1_18_1"},{"unstructured":"TorrentFreak. 200 000 BitTorrent users sued in the United States 8 August 2011. http:\/\/torrentfreak.com\/200000-bittorrent-users-sued-in-the-united-states-110808\/.  TorrentFreak. 200 000 BitTorrent users sued in the United States 8 August 2011. http:\/\/torrentfreak.com\/200000-bittorrent-users-sued-in-the-united-states-110808\/.","key":"e_1_3_2_1_19_1"},{"volume-title":"Three strikes and you're still in -- France kills piracy disconnections","year":"2013","unstructured":"TorrentFreak. Three strikes and you're still in -- France kills piracy disconnections , 9 July 2013 . http:\/\/torrentfreak.com\/three-strikes-and-youre-still-in-france-kills-piracy-disconnections-130709\/. TorrentFreak. Three strikes and you're still in -- France kills piracy disconnections, 9 July 2013. http:\/\/torrentfreak.com\/three-strikes-and-youre-still-in-france-kills-piracy-disconnections-130709\/.","key":"e_1_3_2_1_20_1"},{"unstructured":"Vuze Inc. Vuze. http:\/\/www.vuze.com.  Vuze Inc. Vuze. http:\/\/www.vuze.com.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","volume-title":"Three strikes' file sharing law coming sooner than you think","author":"Walls A.","year":"2011","unstructured":"A. Walls . ' Three strikes' file sharing law coming sooner than you think , 4 August 2011 . http:\/\/www.nbr.co.nz\/article\/three-strikes-file-sharing-law-coming-sooner-you-think-aw-98379. A. Walls. 'Three strikes' file sharing law coming sooner than you think, 4 August 2011. http:\/\/www.nbr.co.nz\/article\/three-strikes-file-sharing-law-coming-sooner-you-think-aw-98379."}],"event":{"sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"acronym":"CoNEXT '14","name":"CoNEXT '14: Conference on emerging Networking Experiments and Technologies","location":"Sydney Australia"},"container-title":["Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2674005.2675009","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2674005.2675009","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:17:04Z","timestamp":1750227424000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2674005.2675009"}},"subtitle":["File-sharers and Copyright Laws"],"short-title":[],"issued":{"date-parts":[[2014,12,2]]},"references-count":22,"alternative-id":["10.1145\/2674005.2675009","10.1145\/2674005"],"URL":"https:\/\/doi.org\/10.1145\/2674005.2675009","relation":{},"subject":[],"published":{"date-parts":[[2014,12,2]]},"assertion":[{"value":"2014-12-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}