Free Essay

Illicit Image Filtering and Classification Techniques

In:

Submitted By anii03
Words 2230
Pages 9
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 4 Issue 04, April-2015

Illicit Image Filtering and Classification
Techniques
Miss Anita Parihar
PG Student (Digital Systems)
Department of E&TC Engineering
Sinhgad College of Engineering
Pune, Maharashtra (India)

Dr. D. M. Bhalerao
Professor
Department of E&TC Engineering
Sinhgad College of Engineering
Pune, Maharashtra (India)

Abstract— Adult images have become a threat to social networking, which are having a negative impact, on society. We often hear the stories of blackmailing for adult images which is a serious crime. This should be stopped somewhere, further we will see various techniques to do so. We present a method to classify images into different categories of pornographic content to create a system for filtering illicit images from network traffic. Even though different systems for this application were offered in the past, which are based on simple skin color features and have quite poor performance. Latest advances in the image recognition field in particular for the classification of objects have shown that bag-of-visualwords-approaches are a good method for many image classification problems.
Keywords—Bag-of-Visual Words (BoVW), Explicit Content,
Neural Network, Region-of-Interest (ROI), Skin Detection

I.

INTRODUCTION

II.

The inevitable fact that technology is becoming more intertwined in the daily life of the individual will lead to an increase in court cases and in crime. Due to such image uploads as people have different mentality and culture which causes several serious issues and may revolve into crime. So here we are presenting some of the techniques of filtering and classification of pornographic images. The internet has made people access more information than any time before and has become the major source of information. In the other hand, it also shows the dark side. Among the millions of Web sites, there are over 500,000 web sites linked to pornography and other issues that are as dangerous as poison to the children.
Ideally, a pornographic image filter is created once and then the filter administrator can simply select which types of images he wants the filter to remove and which types of images are allowed, in the literature, different illicit image filtering techniques will be presented.
In the literature, different illicit image filtering techniques were presented: In the mid of 90s, the first algorithm to detect naked person in images was researched.
The algorithm distinguish whether or not the filtered skin color is matched to an exact body part in the full image, rather than extracts primitive features helping effectual classification. A further approach had researched; the algorithm was based on image contents, and classified illicit

IJERTV4IS041037

images by extract skin regions and feature vectors that are helpful for the image classification. The feature vector has essential features such as “color, texture, contour, placement, and relative size information” for a given region. Neural
Network based technique focus on the study of decisionboundary surface telling adult images from non adult images via the computer-based classification rule, called Perceptron.
Afterward a new algorithm to detect explicit images is proposed. In this technique, first the images are altered from the color model to discriminate objects in the image of no interest. After that the image is filtered using skin detection, which intends to segment a human being within the image.
Then we can approximate the probability of the image as an image with illicit content, by counting all pixels with some skin tone. Newly the bag-of-visual-words (BOVW) models, which were originally planned for texture classification, are motivated by the bag-of-words models in text classification where a document is characterized by an unsorted set of the contained words.
IMAGE CLASSIFICATION AND FILTERING TECHNIQUES

A. Neural Network Based Adult Image Classification
“A neural network is a massively parallel distributed processor made up of plain processing units that has a ordinary propensity for storing experimental knowledge & making it available for employ” [1]. The support vector machine (SVM) technique is a new image classification method. The principle of the method is to find decision lines or surfaces distinguishing data from others like the technique using neural networks. The technique using the neural networks is just to discover decision surfaces classifying the training data. But, SVM is to locate decision surfaces maximizing the distance of two sets.
B. Explicit Content Image Detection
Skin detection can help detect a person limb, torso, or face in a picture. Recently various methods of skin identification within a digital image have been developed.
Skin color has established to be a helpful and robust method for face recognition, localization and tracking. Here a number of researchers who have looked at using color information to detect skin. In this system a novel explanation using the HSV color model, which is extremely parallel to the RGB color model, is planned. Once the conversion of color model has been made, the next stage is to continue to pixel detection with human skin.

www.ijert.org
(This work is licensed under a Creative Commons Attribution 4.0 International License.)

1016

International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 4 Issue 04, April-2015

This was accomplished by viewing a number of images, which are a threshold where most people with different skin color within the image can be segmented. To determine the threshold it was essential to make an analysis of the histograms in the HSV color model. With the intention of finding naked people, there are other types of features such as the percentage of pixels detecting similar skin color. Based on these features, a process of segmentation is carried out in color images.
A few examples are illustrated in figure below which illustrate people with different skin color and can be seen that the threshold used works properly.

C. Bag-of-Visual-Words Models for Adult Image
Classification and Filtering
Bag of visual words model is motivated by the bag of word model in which an image is characterized by an unsorted set of discrete visual words, which are accomplished by discretization of local descriptors. For illicit image detection, we follow the BOVW method, where images are characterized as a histogram of visual words. The visual words indicate local features extracted from the images and the vocabulary is learnt task-specifically from a training database. As local features, we extract image patches around difference-of-Gaussian interest points which are scaled to a common size and then PCA (Principal Component Analysis, it is a statistical method that uses orthogonal transformation to translate a set of observations of probably correlated variables into a set of values of linearly uncorrelated variables) transformed leaving 30 coefficients to diminish their dimensionality. To form a visual vocabulary, we employ the training algorithm for unsupervised training of Gaussian mixture models. This algorithm creates a set of 2 #splits densities by iteratively splitting each existing density in the direction of its variance starting from a single Gaussian [2, 3].
The so learned visual vocabulary is able to capture frequently occurring patterns in the given training data. The BOVW model is capable to capture almost enough color information that an added skin color model is not necessary.

Fig. 1. Skin color segmentation (a) and (c) Original Images, (b) and (d)
Segmented Images

The system formed a classifier, using the HSV color model, which allows us to identify texture in the image, and this way can detect skin to know if there are pixel areas with some skin tone, and the value of the probability that the input image was an image with explicit content can be estimated.
Skin detection can be used as the basis for detection of the images with explicit content because there is a considerable relationship between the images with huge areas of skin and illicit images or with explicit content.
The system can make use of different type of images, as images in different lighting conditions and images with different size. The input images for testing are categorized in: a) images of naked people or with explicit content and b) ordinary images. In the images with explicit content people Asians, Caucasian, Europeans, Latin
Americans and a little amount of people with black skin can be found. In natural images there are different types of images such as: clad people, animals, plants, cars, cartoons, landscapes and others were as well found from Internet.

D. ROI and Color Moments based Bag-of-Visual-Words
Models for Adult Image Classification and Filtering
The standard BoVW technique clusters visual words from the patches in the entire image and assumes the weighting schemes of hard assignment. An additional name of patches is keypoints in some methods. There are two dissimilarities between the method of BoVW based on ROI and the standard BoVW method. Firstly, we intended to form visual words in ROI for adult image detection. The patches in
ROI are more analytical to adult contents than those in the entire image. So it can develop the representative power of visual words for adult image detection. Secondly, softweighting scheme is implemented to improve the performance of BoVW further. Furthermore, CM is elected by estimating some commonly-used global features.

First the input image is changed from the RGB to the HSV color model. Next step using the threshold the image is filtered using the skin detection to recognize the areas that enclose some skin color, and in this manner merely get the image of the person or people within the input image.
At this point, all skin areas detected are taken, and continue to count the amount of pixels that there are within the image to approximate the probability that this image is classified as an image with explicit content or not.

IJERTV4IS041037

Fig. 2. BoVW based on ROI

www.ijert.org
(This work is licensed under a Creative Commons Attribution 4.0 International License.)

1017

International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 4 Issue 04, April-2015

As shown in Fig. 2, we use the process of BoVW based on ROI to improve the performance. ROI (Region of
Interest) implies the subareas having illicit parts or poses in the field of illicit image detection. Skin-color regions contain these illicit subareas. So, we relate the type of skin-color models to capture ROI. Weighting schemes play a vital role in creating the BoVW histogram and accordingly have enormous effects on the performance of BoVW. CM offers a measurement for color resemblance between images. In CM, we find out the first 3 moments of 3 channels in Lab color space over 5×5 grid partitions, and merge the features into a
225-dimension feature vector [5]. The supported vector machines (SVM) classifier has been one of the most accepted classifiers for BoVW-based image classification and illicit image detection based on global features.

in ROI are more analytical than those in the entire image. The evaluation with the state-of-the-art methods shows that
“Adult image detection combining BOVW based on region” method is capable to really improve the performance.
ACKNOWLEGMENT

I wish to express my genuine thanks and deep sense of gratitude to respected guide Dr. D M. Bhalerao in
Department of Electronics and Telecommunication
Engineering of Sinhgad college of Engineering, Vadgaon
(BK), Pune 41, for her technical guidance, encouragement and constructive criticism, which inspired me to endeavor harder for excellence.
REFERENCES

III.

CONCLUSION

[1]

To filter illicit contents flourishing on the Internet effectively, we have presented different novel techniques of illicit image classification and recognition. “The explicit content image detection” method has given an algorithm to detect images with explicit content in color images, by the
HSV color model and a method of skin detection which works efficiently, while the “bag of visual words” technique method permits for establishment of a flexible content filter that can be easily modified for the user’s requirements.
BoVW evidently outperforms state of the art methods in this task on a standard task. To filter illicit contents growing on the Internet effectively, a novel technique of illicit image detection is used which merges BoVW based on ROI and
CM. It creates visual words in ROI and adopt soft-weighting method to improve the performance of BoVW. The patches

IJERTV4IS041037

[2]

[3]

[4]

[5]

Wonil kim, Han-Ku Lee, Seong Joon Yoo, and Sung Wook Baik:
“Neural Network Based Adult Image Classification”, In: College of
Electronics and Information Engineering, Sejong University, Seoul,
Republic of Korea, pp. 481 – 486, 2005.
J. Yang, Y. G. Jiang, A. G. Hauptmann and C. W. Ngo. “Evaluating
Bag-of-Visual-Words Representation in Scene Classification”, In:
ACM MIR’07, pp. 197-206, 2007.
Deselaers, T., Pimenidis, L., Ney, H.: “Bag-of-visual-words models for adult image classification and filtering”, In: 19th International
Conference on Pattern Recognition, Tampa,USA, pp. 1–4 (2008).
Basilio, Torres, Medina,Gabriel, Meana, Hernadez, “Explicit Content
Image Detection”, In: International Journal of Signal and Image
Processing, vol. 1, No. 2, December 2010.
Y. Liu, S. Lin, S. Tang, and Y. Zhang, “Adult Image Detection
Combining BoVW Based on Region of Interest and Color Moments”,
In: Laboratory of Advanced Computing Research, Institute of
Computing Technology, Chinese Academy of Sciences, Beijing
100190, China, IFIP International Federation for Information
Processing AICT 340, pp. 316-325, 2010.

www.ijert.org
(This work is licensed under a Creative Commons Attribution 4.0 International License.)

1018

Similar Documents

Premium Essay

Ethics

...the importance of ethics in accounting education and evaluate the development of literature in this area. Secondly, the paper argues for the direction of accounting education to focus on religious ethical development and values in developing accounting ethics. The paper argues that the Islamic worldview and ethics perspective can provide some insights into the process of developing a more humanized and ethical accountant. This paper proposes the Islamic legal principle of ma§laúah as an ethical filtering mechanism to be taught as part of the ethical accounting education process. This is aimed at providing awareness to accounting students and accountants on the process to resolve ethical conflicts. The study of Islamic worldview and ethics provides a different ethical dimension on accounting education. Here, the debates on ethics in accounting education need to start with values, not on codes of professional conduct, and on responsibilities, not on rules. JEL Classification: Key words: Accounting education, Islamic ethics,...

Words: 6717 - Pages: 27

Premium Essay

Paper

...Korea • Mexico • Singapore • Spain • United Kingdom • United States Management of Information Security, Third Edition Michael E. Whitman and Herbert J. Mattord Vice President, Career and Professional Editorial: Dave Garza Executive Editor: Stephen Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Developmental Editor: Lynne Raughley Editorial Assistant: Meghan Orvis Vice President, Career and Professional Marketing: Jennifer McAvey Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Senior Content Project Manager: Andrea Majot Senior Art Director: Jack Pendleton Cover illustration: Image copyright 2009. Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Professional Group Cengage Learning Customer...

Words: 229697 - Pages: 919

Premium Essay

Impotent Music

...INFORMATION RESOURCE GUIDE Computer, Internet and Network Systems Security An Introduction to Security i Security Manual Compiled By: S.K.PARMAR, Cst N.Cowichan Duncan RCMP Det 6060 Canada Ave., Duncan, BC 250-748-5522 sunny@seaside.net This publication is for informational purposes only. In no way should this publication by interpreted as offering legal or accounting advice. If legal or other professional advice is needed it is encouraged that you seek it from the appropriate source. All product & company names mentioned in this manual are the [registered] trademarks of their respective owners. The mention of a product or company does not in itself constitute an endorsement. The articles, documents, publications, presentations, and white papers referenced and used to compile this manual are copyright protected by the original authors. Please give credit where it is due and obtain permission to use these. All material contained has been used with permission from the original author(s) or representing agent/organization. ii T eofContent abl 1.0 INTRODUCTION........................................................................................................................................................... 2 1.1 BASIC INTERNET TECHNICAL DETAILS ........................................................................................................................ 2 1.1.1 TCP/IP : Transmission Control Protocol/Internet Protocol .........................................

Words: 134858 - Pages: 540

Premium Essay

Netwrk Security

...Fundamentals of Network Security John E. Canavan Artech House Boston • London http://www.artechhouse.com Library of Congress Cataloging-in-Publication Data Canavan, John E. Fundamentals of network security / John E. Canavan. p. cm.—(Artech House telecommunications library) Includes bibliographical references and index. ISBN 1-58053-176-8 (alk. paper) 1. Computer security. 2. Computer networks—Security measures. I. Title. II. Series. QA76.9.A25 C364 2000 005.8—dc21 00-050810 CIP British Library Cataloguing in Publication Data Canavan, John E. Fundamentals of network security.—(Artech House telecommunications library) 1. Computer networks—Security measures I. Title 005.8 1-58053-176-8 Cover design by Yekaterina Ratner Microsoft ® screen shots reprinted by permission from Microsoft Corporation. Netscape Communicator browser window © 1999 Netscape Communications Corporation. Used with permission. Netscape Communications has not authorized, sponsored, endorsed, or approved this publication and is not responsible for its content. Permission to reproduce screen shots from the PGP and Sniffer products has been provided by Network Associates, Inc. Network Associates, PGP, Pretty Good Privacy Sniffer, and Distributed Sniffer System are registered trademarks of Network Associates, Inc. and/or its affiliates in the U.S. and/or other countries. MIT screen shots used with permission. Qualcomm's Eudora screen shots used with permission. Copyright © 2001 ARTECH HOUSE, INC. 685 Canton Street...

Words: 95027 - Pages: 381

Free Essay

Code

...C O D E C ODE v e r s i o n 2 . 0 L A W R E N C E L E S S I G A Member of the Perseus Books Group New York Copyright © 2006 by Lawrence Lessig CC Attribution-ShareAlike Published by Basic Books A Member of the Perseus Books Group Printed in the United States of America. For information, address Basic Books, 387 Park Avenue South, New York, NY 10016–8810. Books published by Basic Books are available at special discounts for bulk purchases in the United States by corporations, institutions, and other organizations. For more information, please contact the Special Markets Department at the Perseus Books Group, 11 Cambridge Center, Cambridge MA 02142, or call (617) 252-5298, (800) 255-1514 or e-mail special.markets@perseusbooks.com. CIP catalog record for this book is available from the Library of Congress. ISBN-10: 0–465–03914–6 ISBN-13: 978–0–465–03914–2 06 07 08 09 / 10 9 8 7 6 5 4 3 2 1 Code version 1.0 FOR CHARLIE NESSON, WHOSE EVERY IDEA SEEMS CRAZY FOR ABOUT A YEAR. Code version 2.0 TO WIKIPEDIA, THE ONE SURPRISE THAT TEACHES MORE THAN EVERYTHING HERE. C O N T E N T S Preface to the Second Edition Preface to the First Edition Chapter 1. Code Is Law Chapter 2. Four Puzzles from Cyberspace PART I: “REGULABILITY” ix xiii 1 9 Chapter 3. Is-Ism: Is the Way It Is the Way It Must Be? Chapter 4. Architectures of Control Chapter 5. Regulating Code PART II: REGULATION BY CODE 31 38 61 Chapter 6. Cyberspaces Chapter 7. What Things Regulate...

Words: 190498 - Pages: 762

Premium Essay

Scavenger Hunt Questions and Answers

...2012 Catalog Volume 20 Issue 1 March 5, 2012 – December 31, 2012 This Catalog contains information, policies, procedures, regulations and requirements that were correct at the time of publication and are subject to the terms and conditions of the Enrollment Agreement entered into between the Student and ECPI University. In keeping with the educational mission of the University, the information, policies, procedures, regulations and requirements contained herein are continually being reviewed, changed and updated. Consequently, this document cannot be considered binding. Students are responsible for keeping informed of official policies and meeting all relevant requirements. When required changes to the Catalog occur, they will be communicated through catalog inserts and other means until a revised edition of the Catalog is published. The policies in this Catalog have been approved under the authority of the ECPI University Board of Trustees and, therefore, constitute official University policy. Students should become familiar with the policies in this Catalog. These policies outline both student rights and student responsibilities. The University reserves the right and authority at any time to alter any or all of the statements contained herein, to modify the requirements for admission and graduation, to change or discontinue programs of study, to amend any regulation or policy affecting the student body, to increase tuition and fees, to deny admission, to revoke an offer...

Words: 130938 - Pages: 524

Premium Essay

Form

...OFFICIAL CATALOG This Catalog contains information, policies, procedures, regulations and requirements that were correct at the time of publication and are subject to the terms and conditions of the Enrollment Agreement entered into between the Student and ECPI University. In keeping with the educational mission of the University, the information, policies, procedures, regulations and requirements contained herein are continually being reviewed, changed and updated. Consequently, this document cannot be considered binding. Students are responsible for keeping informed of official policies and meeting all relevant requirements. When required changes to the Catalog occur, they will be communicated through catalog inserts and other means until a revised edition of the Catalog is published. The policies in this Catalog have been approved under the authority of the ECPI University Board of Trustees and, therefore, constitute official University policy. Students should become familiar with the policies in this Catalog. These policies outline both student rights and student responsibilities. The University reserves the right and authority at any time to alter any or all of the statements contained herein, to modify the requirements for admission and graduation, to change or discontinue programs of study, to amend any regulation or policy affecting the student body, to increase tuition and fees, to deny admission, to revoke an offer of admission and to dismiss from the...

Words: 149595 - Pages: 599

Free Essay

Art and Story Proceedings 2004

...Proceeding for the School of Visual Arts Eighteenth Annual National Conference on Liberal Arts and the Education of Artists: Art and Story CONTENTS SECTION ONE: Marcel’s Studio Visit with Elstir……………………………………………………….. David Carrier SECTION TWO: Film and Video Narrative Brief Narrative on Film-The Case of John Updike……………………………………. Thomas P. Adler With a Pen of Light …………………………………………………………………… Michael Fink Media and the Message: Does Media Shape or Serve the Story: Visual Storytelling and New Media ……………………………………………………. June Bisantz Evans Visual Literacy: The Language of Cultural Signifiers…………………………………. Tammy Knipp SECTION THREE: Narrative and Fine Art Beyond Illustration: Visual Narrative Strategies in Picasso’s Celestina Prints………… Susan J. Baker and William Novak Narrative, Allegory, and Commentary in Emil Nolde’s Legend: St. Mary of Egypt…… William B. Sieger A Narrative of Belonging: The Art of Beauford Delaney and Glenn Ligon…………… Catherine St. John Art and Narrative Under the Third Reich ……………………………………………… Ashley Labrie 28 15 1 22 25 27 36 43 51 Hopper Stories in an Imaginary Museum……………………………………………. Joseph Stanton SECTION FOUR: Photography and Narrative Black & White: Two Worlds/Two Distinct Stories……………………………………….. Elaine A. King Relinquishing His Own Story: Abandonment and Appropriation in the Edward Weston Narrative………………………………………………………………………….. David Peeler Narrative Stretegies in the Worlds of Jean Le Gac and Sophe Calle…………………….. Stefanie Rentsch...

Words: 117240 - Pages: 469

Free Essay

E-Commerce

...European Commission, DG Internal Market and Services Unit E2 STUDY ON THE ECONOMIC IMPACT OF THE ELECTRONIC COMMERCE DIRECTIVE FINAL REPORT | 7 SEPTEMBER 2007 Study on The Economic Impact of the Electronic Commerce Directive COLOPHON Authors Dr. Claus Kastberg Nielsen, Mr. Christian Jervelund, Ms. Karin Gros Pedersen, Ms. Benita Rytz, Mr. Eske Stig Hansen, Mr. Jacob Lind Ramskov Client Date: DG Internal Market and Services, European Commission 7 September 2007 2 Study on The Economic Impact of the Electronic Commerce Directive TABLE OF CONTENTS Executive Summary.........................................................................................................4 Preface 6 Chapter 1 Main findings............................................................................................7 1.1. Intermediary providers and certain online merchants have benefitted already.......12 1.2. Cross border trade and productivity growth.........................................................12 1.3. Contractual obligations in consumer contracts may hinder cross border trade......14 Chapter 2 The impact of specific provisions............................................................16 2.1. Limited liability provisions ..................................................................................16 2.2. E-contracts ..........................................................................................................23 2.3. Information requirement...

Words: 25986 - Pages: 104

Free Essay

Ceh Test Questions

...Exam : 312-50 Title : Ethical Hacker Certified Ver : 02-23-2009 312-50 QUESTION 1: What is the essential difference between an 'Ethical Hacker' and a 'Cracker'? A. The ethical hacker does not use the same techniques or skills as a cracker. B. The ethical hacker does it strictly for financial motives unlike a cracker. C. The ethical hacker has authorization from the owner of the target. D. The ethical hacker is just a cracker who is getting paid. Answer: C Explanation: The ethical hacker uses the same techniques and skills as a cracker and the motive is to find the security breaches before a cracker does. There is nothing that says that a cracker does not get paid for the work he does, a ethical hacker has the owners authorization and will get paid even if he does not succeed to penetrate the target. QUESTION 2: What does the term "Ethical Hacking" mean? A. Someone who is hacking for ethical reasons. B. Someone who is using his/her skills for ethical reasons. C. Someone who is using his/her skills for defensive purposes. D. Someone who is using his/her skills for offensive purposes. Answer: C Explanation: Ethical hacking is only about defending your self or your employer against malicious persons by using the same techniques and skills. QUESTION 3: Who is an Ethical Hacker? A. A person whohacksfor ethical reasons B. A person whohacksfor an ethical cause C. A person whohacksfor defensive purposes D. A person whohacksfor offensive purposes Answer:...

Words: 34575 - Pages: 139

Premium Essay

Information Rules

...informationInformation Rules A STRATEGIC GUIDE TO THE NETWORK ECONOMY Carl Shapiro Hal R. Varian HARVARD BUSINESS SCHOOL PRESS BOSTON, MASSACHUSETTS Copyright © 1999 Carl Shapiro and Hai R. Varian All rights reserved Printed in the United States of America 03 02 01 00 99 5 Library of Congres§ Cataloging-in-Publication Data Shapiro, Carl. Information rules : a strategic guide to the network economy / Carl Shapiro and Hal R. Varian. p. cm. Includes bibliographical references and index. ISBN 0-87584-863-X (alk. paper) 1. Information technology—Economic aspects. 2. Information society. I. Varian, Hal R. II. Title. HC79.I55S53 1998 658.4'038—dc21 98-24923 GIF The paper used in this publication meets the requirements of the American National Standard for Permanence of Paper for Printed Library Materials Z39.49-1984. To Dawn, Eva, and Ben To Carol and Chris Contents Preface ix l The Information Economy 2 Pricing Information 19 3 Versioning Information 53 4 Rights Management 83 5 Recognizing Lock-In 103 6 Managing Lock-In 135 7 173 Networks and Positive Feedback 8 Cooperation and Compatibility 9 Waging a Standards War 10 Information Policy 227 261 297 viii I Contents Further Reading 319 Notes 327 Bibliography 329 Index 335 About the Authors 351 Preface Luck led us to write this book. Each of us became economists because we wanted to apply our ...

Words: 108051 - Pages: 433

Premium Essay

Information Rules

...Information Rules A STRATEGIC GUIDE TO THE NETWORK ECONOMY Carl Shapiro Hal R. Varian HARVARD BUSINESS SCHOOL PRESS BOSTON, MASSACHUSETTS Copyright © 1999 Carl Shapiro and Hai R. Varian All rights reserved Printed in the United States of America 03 02 01 00 99 5 Library of Congres§ Cataloging-in-Publication Data Shapiro, Carl. Information rules : a strategic guide to the network economy / Carl Shapiro and Hal R. Varian. p. cm. Includes bibliographical references and index. ISBN 0-87584-863-X (alk. paper) 1. Information technology—Economic aspects. 2. Information society. I. Varian, Hal R. II. Title. HC79.I55S53 1998 658.4'038—dc21 98-24923 GIF The paper used in this publication meets the requirements of the American National Standard for Permanence of Paper for Printed Library Materials Z39.49-1984. To Dawn, Eva, and Ben To Carol and Chris Contents Preface ix l The Information Economy 2 Pricing Information 19 3 Versioning Information 53 4 Rights Management 83 5 Recognizing Lock-In 103 6 Managing Lock-In 135 7 Networks and Positive Feedback 173 8 Cooperation and Compatibility 227 9 Waging a Standards War 261 297 10 Information Policy viii I Contents Further Reading 319 Notes 327 Bibliography 329 Index 335 About the Authors 351 Preface Luck led us to write this book. Each of us became economists because we wanted to apply our analytical training to better understand...

Words: 108016 - Pages: 433

Premium Essay

A Guide to Forensic Accounting Investigation

...A GUIDE TO FORENSIC ACCOUNTING INVESTIGATION THOMAS W. GOLDEN, STEVEN L. SKALAK, AND MONA M. CLAYTON JOHN WILEY & SONS, INC. A GUIDE TO FORENSIC ACCOUNTING INVESTIGATION THOMAS W. GOLDEN, STEVEN L. SKALAK, AND MONA M. CLAYTON JOHN WILEY & SONS, INC. This book is printed on acid-free paper. Copyright © 2006 by PricewaterhouseCoopers LLP. PricewaterhouseCoopers refers to the individual member firms of the worldwide PricewaterhouseCoopers organization. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, fax 978-646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, 201-748-6011, fax 201-748-6008, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this...

Words: 246885 - Pages: 988

Free Essay

Telco Regulation

...Tenth Anniversary Edition Tenth Anniversary Edition TELECOMMUNICATIONS REGULATION HANDBOOK TELECOMMUNICATIONS REGULATION HANDBOOK The Telecommunications Regulation Handbook is essential reading for anyone involved or concerned by the regulation of information and communications markets. In 2010 the Handbook was fully revised and updated to mark its tenth anniversary, in response to the considerable change in technologies and markets over the past 10 years, including the mobile revolution and web 2.0. The Handbook reflects modern developments in the information and communications technology sector and analyzes the regulatory challenges ahead. Designed to be pragmatic, the Handbook provides a clear analysis of the issues and identifies the best regulatory implementation strategies based on global experience. February 2011 – SKU 32489 Edited by Colin Blackman and Lara Srivastava Tenth Anniversary Edition TELECOMMUNICATIONS REGULATION HANDBOOK Edited by Colin Blackman and Lara Srivastava Telecommunications Regulation Handbook Tenth Anniversary Edition Edited by Colin Blackman and Lara Srivastava ©2011 The International Bank for Reconstruction and Development / The World Bank, InfoDev, and The International Telecommunication Union All rights reserved 1 2 3 4 14 13 12 11 This volume is a product of the staff of the International Bank for Reconstruction and Development / The World Bank, InfoDev, and The International Telecommunication...

Words: 132084 - Pages: 529

Premium Essay

Mba in a Day

...MBA In A Day What You Would Learn at Top-Tier Business Schools (If You Only Had the Time!) Steven Stralser, Ph.D. John Wiley & Sons, Inc. TLFeBOOK More Praise for MBA In A Day® “Steve Stralser is a unique talent. It is unusual to meet people who are both highly professional as well as generous with their knowledge. Not only is Professor Stralser’s advice invaluable for business professionals, but those in the arts who are more focused on their creative endeavors would benefit from reading MBA In A Day® to help strengthen their business skills.” —Bobi Leonard, CEO, Arcara Enterprises, Inc. “Steve’s book is a valuable asset to anyone needing to avoid the pitfalls of business, be they a small business owner, a physician, a lawyer, or just about anyone who deals with business. Just because you have not had the opportunity to study for a formal MBA, why be at a disadvantage in the business world? In just a few days of quality reading time you will level the playing field. Let your own brainpower do the rest.” —George Reiss, MD, Clinical Instructor, Mayo Clinic; Eye Physician, Phoenix Coyotes Professional Hockey Club “Professor Stralser’s MBA In A Day® contains insights that are incredibly valuable for any entrepreneur obsessed with success. They provide quick access to sound practical thinking on the real-world business issues most likely to confront the busy start-up entrepreneur.” —Michael Hool, Partner, Rogers & Theobald, LLC; Chairman, Arizona...

Words: 92092 - Pages: 369