Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Ofcom

Page created by Clyde Keller
 
CONTINUE READING
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Ofcom
Online Content Study: Changes
      in the distribution, discovery
      and consumption of lawful and
      unauthorised online content
      MC 359 (Lot 3 Label 9 and Label 13)

      Appendix
      For OFCOM

      50090 – November 2015

   IDATE Project Manager
      Vincent BONNEAU
      +33 (0)4 67 14 44 53
      v.bonneau@idate.org
"
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Ofcom
About IDATE and DigiWorld Institute

Founded in 1977, IDATE has gained a reputation as a leader in tracking telecom, Internet and media markets, thanks to the
skills of its teams of specialized analysts. Now, with the support of more than 40 member companies – which include many
of the digital economy’s most influential players – the newly rebranded DigiWorld Institute has entered into a new stage of
its development, structured around three main areas of activity:
• IDATE Research, an offer of market intelligence publications
• IDATE Consulting, time-tested analysis
• DigiWorld Institute, a think tank on the digital economy.

Copyright IDATE 2015, CS 94167, 34092 Montpellier Cedex 5, France
All rights reserved. None of the contents of this publication may be reproduced, stored in a retrieval system or transmitted in any form, including
electronically, without the prior written permission of IDATE.
IDATE, DigiWorld, DigiWorld Institute and DigiWorld Yearbook are the international registered trademarks of IDATE.
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Ofcom
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

Contents
1.     Regulations against piracy ............................................................................................... 5
1.1.    Example of policies in various countries ....................................................................................................... 5
1.2.    Graduated responses schemes ....................................................................................................................... 5

2.     Content delivery techniques ............................................................................................. 6
2.1.    P2P solutions .................................................................................................................................................... 6
2.2.    Facebook strengthening anti-piracy after complaints from rights holders ............................................... 11
2.3.    Popcorn Time .................................................................................................................................................. 12
2.4.    Periscope......................................................................................................................................................... 12
2.5.    UltraViolet ........................................................................................................................................................ 14
2.6.    Licensed Digital Rights Cloud ....................................................................................................................... 18
2.7.    Digital copy ..................................................................................................................................................... 20
2.8.    Procedure to set up private game servers ................................................................................................... 21

3.     Benchmark of lawful offerings ....................................................................................... 22
3.1.    Content catalogue........................................................................................................................................... 22
3.2.    Technical limits ............................................................................................................................................... 30
3.3.    Reasons for infringing.................................................................................................................................... 36

4.     Unauthorised content techniques .................................................................................. 37
4.1.    Detection solution providers ......................................................................................................................... 37
4.2.    Case of wrong detections .............................................................................................................................. 38
4.3.    List of major privacy techniques ................................................................................................................... 42
4.4.    Blocking by legitimate services..................................................................................................................... 45
4.5.    Freenet & F2F .................................................................................................................................................. 46
4.6.    BGP blocking .................................................................................................................................................. 47
4.7.    DPI techniques ................................................................................................................................................ 48
4.8.    Hybrid blocking ............................................................................................................................................... 50

5.     Estimates and forecasts of lawful and unauthorised content ...................................... 52
5.1.    Main objectives ............................................................................................................................................... 52
5.2.    First module: breakdown of files consumed per category of content ....................................................... 53
5.3.    Breakdown of time spent per device............................................................................................................. 54
5.4.    Dataset ............................................................................................................................................................. 56

www.idate.org © IDATE 2015                                                                                                                                                    3
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Ofcom
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

Tables & Figures
Table 1:      Main characteristics of antipiracy policies in Common Law and Civil Law countries ................................. 5
Table 2:      Examples of graduated response implemented by selected countries ...................................................... 5
Table 3:      Delivery modes and limitations for the different solutions ........................................................................ 35
Table 4:      Storage options for the different solutions................................................................................................ 35
Table 5:      Assessment of the different detection solutions ....................................................................................... 37
Table 6:      Analysis of cases ending up in detection errors ....................................................................................... 42
Table 7:      Main add-on privacy techniques are the following: .................................................................................. 42
Table 8:      Main “new” piracy systems include the following ..................................................................................... 44
Table 9:      Categories of content and scope of products and services covered ........................................................ 52
                         st
Table 10:     Sources, 1 module ................................................................................................................................. 53
                         nd
Table 11:     Sources, 2 module ................................................................................................................................ 54
                              st
Table 12:     Results of the 1 module: Volumes of content legally and illegally consumed par category of content ... 56
                              st
Table 13:     Results of the 1 module: Volumes of content consumed through illegal distribution channels .............. 57
                              nd
Table 14:     Results of the 2 module: Volumes of content consumed per device ..................................................... 57

Figure 1:     Publishing the file with BitTorrent............................................................................................................... 8
Figure 2:     Receiving the file with BitTorrent ............................................................................................................... 8
Figure 3:     Receiving the file after the source has left the swarm ................................................................................ 9
Figure 4:     Integration of DHT, PEX and Magnet Links on a P2P and trackerless network ....................................... 10
Figure 5:     Operating principles of Content ID ........................................................................................................... 12
                                                                                                                                    rd
Figure 6:     Screenshot of a Periscope stream, from a TV set (Mayweather-Pacquiao fight, 3 May 2015) .............. 13
Figure 7:     UltraViolet offering ................................................................................................................................... 15
Figure 8:     UltraViolet satisfaction ............................................................................................................................. 15
Figure 9:     Upgrade of the DRL account by the user for digital content purchase ..................................................... 16
Figure 10:    Disc to digital process .............................................................................................................................. 17
Figure 11:    General scheme for the consumption of content from one device ........................................................... 18
Figure 12:    The Disney Digital Copy service .............................................................................................................. 20
Figure 13:    Reasons for infringing .............................................................................................................................. 36
Figure 14:    Perception of content availability ............................................................................................................. 36
Figure 15:    Man-in-the-middle attack ......................................................................................................................... 41
Figure 16:    Operating principles of VPN..................................................................................................................... 43
Figure 17:    Operating principles of TOR .................................................................................................................... 43
Figure 18:    Operating principles of seedboxes ........................................................................................................... 44
Figure 19:    Anonymous P2P file transfer (with an Anti-Piracy peer) .......................................................................... 45
Figure 20:    Applications identifications with DPI ........................................................................................................ 49
Figure 21:    Deep Packet Inspection mechanism ........................................................................................................ 49
Figure 22:    DPI and policy management market, 2015-2019 (million EUR) ............................................................... 50
                                                                        st
Figure 23:    Illustration of calculation principles of the 1 module ............................................................................... 54
                                                                        nd
Figure 24:    Illustration of calculation principles of the 2 module .............................................................................. 55

www.idate.org © IDATE 2015                                                                                                                                             4
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Ofcom
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

1. Regulations against piracy
1.1. Example of policies in various countries
     Table 1:        Main characteristics of antipiracy policies in Common Law and Civil Law countries
                             Common Law countries                                Civil Law countries
                             •    No specific law or minimal             legal
                                  framework ;                                    •   Enactment of specific laws pointing OTT
     Regulation system
                                                                                     services.
                             •    Strict appliance of copyright.
                             •    No specific organism ;
     Competent bodies                                                            •   Creation of dedicated organization(s).
                             •    Civil and criminal courts.
                                                                          •          Public organizations;
                             •    Publishers / right-holders associations •          Non-commercial organizations;
     Initiative
                                  and/or federations.                     •          Publishers / right-holders associations
                                                                                     and/or federations.
                             •    Preventing illegal commercial uses;            •   Limiting personal illegal practices;
     Main objectives
                             •    Limiting personal illegal practices.           •   Providing legal support to right-holders.
                             •    USA;                                           •   France;
     Country sample          •    UK;                                            •   Germany;
                             •    Canada;                                        •   Netherlands
     Source: IDATE, 2015

1.2. Graduated responses schemes
     The table below provides an example of various graduated response implemented by few countries.

     Table 2:        Examples of graduated response implemented by selected countries

     Country           Name of the law           Aim of the law

     Canada            Copyright                 The new law states that infringer will get notices from their ISP asking them
                       Modernization Act         to stop. Latter proceeding can be intended by right holders on the bases of
                       (2011)                    the received mails.

     France            HADOPI law (2009)         This law states the creation of a dedicated organization called HADOPI to
                                                 track infringers and to implement the graduated response.

     New Zealand       Copyright Infringing      In this Act, the copyright owner has to determine the fixed-line infringing the
                       File Sharing              law through a file-sharing network, and to notify it to the ISP. The graduated
                       Amendment Act             response is then done by the ISP.
                       (2011)

     South Korea       Korean Copyright Act      In South Korea, the ISP is in charge of the graduated response: it has to
                       (2009)                    send a notification to both the infringer and the right holder for the copyright
                                                 infringement.

     Taiwan            Copyright Act (2009)      Taiwan graduated response is similar to the Korean one, as the ISP is in
                                                 charge of it. The termination of Internet service for an infringer can occur in
                                                 case of 3 infringements.
     Source: IDATE, 2015
     Another popular method against infringing individuals is fines, for example the German system based on
     immediate financial sanctions of 1 000 EUR per infringed item on average.

     www.idate.org © IDATE 2015                                                                                                      5
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Ofcom
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

2. Content delivery techniques
2.1. P2P solutions
    Napster
    With first P2P solutions like Napster, the discovery mechanism for peers and resources was based on a
    central index that would index all files (without having a copy of them) and associated peers with their IP
    addresses. Without the central index server, no peer would have been able to find a file.
    Any new file to be shared was then declared to the central server. Any Internet user wanting to get a
    specific file would look for it in the central server through a search engine and connect to the IP address
    of the peer that has the file. The download of the file itself occurred only between peers (and did not go
    through the central index). The central index server, hosted within the P2P architecture, was clearly seen
    as a major drawback of the solution when facing legal procedures and was abandoned by later P2P
    solutions.
    With Napster, the solution was also mono-source, which means that the content was downloaded from
    only one peer. This has been improved since then. It should also be noted that with Napster, peers that
    want to download do not need to upload any content or share any content.

    Gnutella
    In Gnutella versions (up to version 0.4), there is no need for a central server. Each peer indexes its own
    files. To look for a file, each peer makes some request to its closest peers. Requests go then step by step
    through a tree-like approach and results are returned in the opposite way. Peers then exchange content
    directly.

    Gnutella stopped this approach, which proved to be too inefficient to handle both connections from
    narrowband and broadband users. The data propagation (for requests) was slow due to the bottlenecks
    created by narrowband users.

    eDonkey
    To solve the bottlenecks problem of Gnutella, eDonkey introduced an “intermediate mechanism” (in this
    case the eD2k servers), so that files could be searched independent of nodes. Servers are used to
    discover content, but they do not actually host it

    www.idate.org © IDATE 2015                                                                                                      6
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Ofcom
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

Kad Network
The Kad Network involves no servers, but each computer within the network communicates with each
other acting like a mini server. An important concept here is “bootstrapping”: to join the Kad network, the
user is required to know the IP address and port number of any other computer within the network.

BitTorrent
BitTorrent is designed around the connection of peers and the exchange of resources for a specific
content file. With BitTorrent, peers look first for specific content then connect to a non-generic tracker, in
charge of that specific content, before exchanging with relevant peers.

www.idate.org © IDATE 2015                                                                                                      7
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Ofcom
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

First publication; A to “upload” the file

Figure 1:       Publishing the file with BitTorrent

1.    A either creates a new tracker, or uses an existing tracker run by various torrent communities. (The latter case
      is much simpler for A and is the majority case, and thus this will be assumed for the diagram. But should A
      create its own tracker, then A acts as the tracker as well as the original seed)
2.    A creates a torrent file, which includes metadata on the file and the tracker
3.    A uploads the torrent file onto a web server, usually through the website of the tracker used (but the content file
      stays on the computer A)
4.    Using a BitTorrent client, A starts seeding (allowing for other peers to connect in order for the file to be
      distributed)
5.    The tracker is updated (to know that A is seeding)

Receiving the file part 1; how a peer receives parts of the file from the seed

Figure 2:       Receiving the file with BitTorrent

6.  B finds torrent file created by A inside the torrent website
7.  B downloads the torrent file
8.  B opens the torrent file with a BitTorrent client
9.  B connects to the tracker specified in the client
10. B receives information on the seeds and peers currently present in the swarm (in this example, it is just the
    original seed A)
11. B is registered as a peer by the tracker
12. B connects to A directly

www.idate.org © IDATE 2015                                                                                                      8
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Ofcom
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

13. B downloads a part of the desired file
14. B remains connected as a peer to receive further pieces of the file, either from A or other peers who may have
    joined during the download in process 13.

The original seed A may disconnect, but file sharing can still be completed through file sharing of peers.
Underlying operations are detailed in Appendix.

Receiving the file part 2; original seed A may disconnect, but file sharing can still be completed
through file sharing of peers

Figure 3:       Receiving the file after the source has left the swarm

15. A disconnects from the swarm (whilst A can remain in the swarm as long as it likes in order to continue
     distributing parts of the file, once it has delivered all parts of the file to other machines, it no longer needs to
     remain in the swarm)
16. The tracker is updated to exclude A from the swarm
17. D finds, downloads and opens the torrent file (process 6 to 8)
18. D connects to the tracker specified in the client
19. D receives information on the seeds and peers currently present in the swarm; peers B and C are present who
     have parts of the file
20. D is registered as a peer by the tracker
21. D connects to B and C directly, but not to A
22. D exchanges files with B and C (B and C may also be exchanging files with each other during the process of D
     joining the swarm)
23. So long as B, C, and D are connected, they remain peers accessible by other peers and seeds for further file
     exchange
Notes:
- For simplicity reasons, the diagram has only 4 computers, but in reality many more computers can take part
   simultaneously, exchanging data between each other.
- BitTorrent relies on the web (in the general sense) for the distribution of its torrents. Thus users search for torrents
   via a search on the Internet, rather than within a specified website.

www.idate.org © IDATE 2015                                                                                                      9
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Ofcom
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

It should also be noted that the tracker may not be updated (operation 16) during a certain time. D would
then connect to the tracker and would try to connect to A (without success) but would still be able to
connect to B and C and exchanges files with them.

Interface
On a more practical level, for a user to use BitTorrent, he or she must first download a client. A popular
client is, for example, utorrent, easily downloadable from utorrent.com. Once the client is downloaded,
then the next step is to look for the desired content (discovery). Once the desired .torrent file has been
downloaded, by double-clicking it the utorrent client will open automatically, and the file can be
downloaded through BitTorrent file sharing. It is worth noting that there are many guides available on the
Internet, readily available, explaining how to use BitTorrent and download contents.

DHT, PEX and magnet links
As explained in the main text, internal indexes typically use techniques such as DHT, PEX and magnet
links. The figure below shows the integration of the 3 techniques in a P2P and trackerless network.

Figure 4:       Integration of DHT, PEX and Magnet Links on a P2P and trackerless network

Source: IDATE

DHT – Distributed Hash Table
The concept of DHT has been developed, in the P2P area, to avoid the use of centralized trackers (or
user database) on P2P networks (and especially Torrent). Rather than having a database of all peers
including the list of content provided by each peer centralized in a unique (or few) server, developers
made a new kind of decentralized database.
With DHT, the content of the whole database is spread on all peers. Each one owns a part of the global
database (about 100 peers listed for 1 P2P client user). To avoid that a part of data disappears when a
peer is disconnected, each part of the database is duplicated to other peers.

www.idate.org © IDATE 2015                                                                                                     10
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

    In the case of BitTorrent, a content index outside the network is still necessary. Indeed, with a trackerless
    system using DHT, the traditional torrent file is replaced by a Magnet Links (cf. description below). This
    link allows a peer to find other peers who own the specified content.
    In the case of P2P clients (such as eMule or the Kademlia network) that use an internal content search
    engine, there is no centralized content index anymore as they use a DHT to list content stored by peers.

    However, most of those clients can work with a DHT and with a centralized tracker. The aim of this idea
    may be to maximize the probability to find the content on a peer computer.

    Magnet Links
    As explained in the main text, the magnet link is actually the next generation of the torrent file. A magnet
    link contains a “hash” that can be considered as an ID, unique to a content. It can also contain a tracker
    address if necessary.
    Magnet links are actually not “links” but rather a metadata containing at least the content ID. It is not a
    hyperlink or a link toward a webpage or a server. A magnet link looks like:
    magnet:?xt=urn:btih:f105dd901e63e3319c2b259b055fbb6e08a65ab5&dn=Star+Wars%3A+Episode+I++
    The+Phantom+Menace+%281999%29+1080p+BrRip+x26&tr=udp%3A%2F%2Ftracker.openbittorrent.co
    m%3A80&tr=udp%3A%2F%2Ftracker.publicbt.com%3A80&tr=udp%3A%2F%2Ftracker.istole.it%3A6969
    &tr=udp%3A%2F%2Ftracker.ccc.de%3A80

    However, these links are unique for specific file and not for a specific “content”. For instance, the movie
    Star Wars episode 1 in its original language may have multiple file versions even if the movie and the
    song are still the same.

    PEX – Peer Exchange
    PEX is a technique allowing peers to exchange their data stored on their part of DHT, typically peers
    information. Without any central tracker or entity, peers have to communicate automatically in order for
    new peers to join the network. PEX then have an important role in the bootstrapping process of a
    “decentralized” P2P, but cannot be used alone in this process. The initial contact is usually done with the
    help of a server giving a part of the DHT (usually not up to date) and then a first peer to contact.
    If a tracker is still available, PEX allows reducing the tracker load, and allows peers to exchange
    information that they already get from the tracker with other peers. Such a system makes the exchange of
    information faster, as the tracker may take time to answer a request, in case of a heavy load of tracker.

2.2. Facebook strengthening anti-piracy after complaints from rights
     holders
    In May 2015, major TV stations in France (TF1, M6, Canal+ and France Télévisions) sent an official letter
    to both Facebook and Twitter requesting more measures be taken to fight piracy through social media.
    The complaint was that their programs were being illegally shared on the social media sites. In June
    Facebook responded by deploying Audible Magic, a system which uses audio fingerprinting technology to
    help identify and prevent unauthorized videos from being uploaded (a system whereby uploaded videos
    are matched against a database containing information on copyrighted contents, provided to Facebook by
    the rights holders). There are also tools whereby content owners can report to Facebook, upon which
    illegal videos can be removed by Facebook, and IP policies are in place so that serial offenders can be
    identified. The idea here is to combat not just TV programs but all “freebooting” activities, where third
    parties “steal” video content from elsewhere and upload it to Facebook, potentially gaining huge and
    unfair view counts.
    Then in August 2015, as explained in the main text, Facebook declared updates to their video
    management through its blog, enhancing the Audible Magic system and building new video matching
    technology that will evaluate millions of video uploads quickly and accurately, and when matches are
    surfaced, publishers will be able to report them to Facebook for removal. This is expected to be tested
    through a beta launch (as of August 2015). It is in fact similar to the process YouTube has gone through
    (which in itself could be considered as a social network), which applies a Content ID system scanning
    uploaded videos against a vast database of videos submitted by copyright holders.

    www.idate.org © IDATE 2015                                                                                                     11
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

    Figure 5:       Operating principles of Content ID

    Source: Google/YouTube

2.3. Popcorn Time
    As detailed in the main text, Popcorn Time offers P2P streaming in an easy-to-use Netflix-style interface.
    Below is a description of the operating principle of Popcorn Time.

    Operating principle
    As it is based on P2P, the movies are not hosted in any server and are streamed using the P2P Bit
    Torrent protocol. All movies are pulled in from the YIFY movie database. Depending on the content, the
    application uses different torrents, as for illustration:
    • Movies are uploaded by YTS. As of June 2015, YTS is the 2 ranked torrent site, as ranked by
                                                                                        nd

      Alexa, subsidiary of Amazon Web Service. With a global ranking of 777 (at the time of writing) and
      India rank of 275, yts.to is one of the most popular torrent websites for movie and TV show addicts.
      The website is quite popular in India, the United States, Saudi Arabia, Egypt and Pakistan, to name a
      few.
    • TV Show episodes from EZTV. TV-torrent distribution group EZTV was a niche site specializing in TV
      content only. Because of its narrow focus, EZTV’s traffic varies in line with the TV seasons. Despite
      posting only a few dozen torrents per week it attracts millions of visitors. Created in 2005, it was
      dissolved in April 2015, after a hostile takeover of their domains and brand by "EZCLOUD LIMITED".
      EZTV and its RSS website ezRSS are currently blocked by multiple ISPs in Italy and in the UK at the
      request of MPA and FACT

2.4. Periscope
    Periscope is a live video streaming application for iOS and Android systems. The service allows users to
    stream live video from their phones, by using the embedded camera. In March 2015, Twitter paid slightly
    less than 100 million USD to purchase the company.
    Periscope claims 10 million accounts, as of early August 2015.
    Periscope lists the current live broadcast with large, full-width images.
    During a live stream, the watcher can comment and the broadcaster sees the comments. However, as so
    few people watch each stream, broadcasters often respond directly on camera. Periscope does not pull in
    live Twitter responses during Periscope broadcast. Instead, all the comments are Periscope-only.
    Moreover, those who follow the Periscope link on the original Tweet will be able to watch and engage with
    the live video in the app (if they have it on their iOS device) or in a pop-up screen (for Desktop and
    Android users) where they'll still see comments and hearts, but not be able to add any of their own.

    www.idate.org © IDATE 2015                                                                                                     12
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

Different features are included:
• Replay: When the broadcast is over, the broadcaster can make it available for replay so viewers can
  watch later. Viewers can replay the broadcast with comments and hearts to relive the full experience.
  Replays currently last 24 hours. The broadcaster can delete the replay at any time.
• Private: If the broadcaster wants to broadcast to specific people, he needs to press the ‘Private’ option
  before going live and choose who he wants to invite to his broadcast.
• Twitter: the broadcaster can choose to share his Periscope broadcasts on Twitter by tapping the bird
  icon before he starts broadcasting. When he goes live, he’ll tweet a link so that his Twitter followers
  can watch on the web (or in the app). As a reminder, Twitter is the owner of the Periscope application.
• Manage notifications: Periscope will suggest people for the broadcaster to follow based on his Twitter
  network. He can always follow new people, or unfollow them if he doesn’t want to be notified when
  they go live. He can also adjust notification preferences in Periscope Settings.

Adapted to piracy, the service allows people who did pay for the content to use their smartphones (or
tablets) to re-transmit it to users of Periscope. It could also be provided by a person who broadcasts a
pirate stream from his TV set.
For live events (sports or music concert), this could also be done even by an attendee of the show who
has effectively paid his entrance ticket.
The quality of the video usually, (very) far away from HD quality, even though the quality of the
smartphone camera is improving. Nevertheless, it is free. Indeed, this wouldn't necessarily be acceptable
video quality for a movie but for a short-term, highly expensive live event, it has proved workable for many
fans.
One of the peak consumption moments occurred during the very popular boxing fight in early May 2015,
in Las Vegas, between Pacquiao and Mayweather.

The Mayweather-Pacquiao fight cost up to 100 USD to purchase in-home, with exponentially higher fees
for bars showing the fight (people paid a 20 USD entrance fee to get into the bar to watch the fight).
HBO and Showtime had been aggressive in chasing down sites illegally streaming the fight, filing
lawsuits well before Saturday night.
So Periscope was privileged by many internet users to circumvent traditional streaming websites.
                                                                                                             rd
Figure 6:       Screenshot of a Periscope stream, from a TV set (Mayweather-Pacquiao fight, 3 May 2015)

Source: Periscope

Even fight attendees became broadcasters for the Periscope audience.

www.idate.org © IDATE 2015                                                                                                     13
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

2.5. UltraViolet
     Description
     UltraViolet concept features are described in the table below. Updated information on the system are
     mainly provided from UltraViolet FAQ (UVDemystified.com/UVfaq.html ) written by Jim Taylor.
     Ultraviolet                  Details
     Availability                 Service launched commercially in the US in 2011
                                  Available in the other following countries: Australia, Austria, Belgium, Canada, France,
                                  Germany, Ireland, Luxembourg, Netherlands, New Zealand, Switzerland and United
                                  Kingdom
                                  Phased launch: streaming commercially available, download available on UV players
                                  only. Common File Format (CFF) still waiting for approval was expected to be launched
                                  end of 2014.
     Origin                       Initiative started in 2007 with a project called Open Market (from Mitch Singer from Sony)
                                  and went public in 2008 under the name Digital Entertainment Content Ecosystem
                                  (DECE)
                                  DECE is non-profit organization. [Not chartered as a non-profit for tax purposes, but set
                                  up as a cost-recovery organization to be self-funding, not to make a profit.]
                                  Backed more than 80 members of the DECE consortium including major movie studios,
                                  retailers, consumer electronics manufacturers, cable companies, ISPs, network hosting
                                  vendors and security vendors
                                  Promoted under the brand name UltraViolet in 2010
                                                                      1
                                  The Digital Entertainment Group (DEG) that promotes home entertainment products is
                                  also supporting UltraViolet
     Main stakeholders            •   Studios/content providers including Sony Pictures, Universal, 20th Century Fox,
                                      Paramount Studios, DreamWorks, BBC
                                  •   Consumer electronics manufacturers: Philips, Sony, Panasonic, Samsung
                                  •   Cable companies: Comcast
                                  •   Technology providers: Rovi, Akamai
                                  •   Retailers: Amazon, Flixster/Warner, Wal-Mart/Vudu, Barnes&Nobles/Nook, M-Go,
                                      CinemaNow/Best Buy, Blinkbox, Target, Sainsbury’s, Nolim/Carrefour
     Characteristics
     Type of content              Movies and TV shows from UV-enabled vendors (both online and physical retailers).
                                  Some services like Flixster may focus on some types of videos (movies only)
                                  Only commercial video contents (no personal contents)
                                  Still some discussions to extend to music, ebooks, video games and smartphones apps in
                                                                                         2
                                  UV roadmap but with no clear development or plan yet
     Limitations                  •   Up to 6 members within the household (per account)
     regarding devices            •   Up to 12 devices for download as offline viewing or progressive download (requiring
                                      registered account)
     Delivery modes               •   Streaming (up to 3 simultaneous access)
                                  •   Download (up to 3 simultaneous download files from the same selling retailer)
     Compatible devices           •   Windows
                                  •   Mac
                                  •   iOS (iPhone and iPad, including AppleTV
                                  •   Android (including Kindle Fire and Nook tablets)
                                  •   PlayStation 3 and 4
                                  •   Xbox 360 and Xbox One
                                  •   Roku
                                  •   Chromecast
                                  •   Google TV
                                  •   Plus, connected Blu-ray players, connected TVs, and home media hubs

     1
         The DEG pushed the launch of DVD and Blu-ray.
     2
      Jim Taylor, DECE, 2015 “We’ve talked about adding support for music, ebooks, games, and anything else that gives consumers a
     better experience with UltraViolet’s open ‘digital library’ model.”

     www.idate.org © IDATE 2015                                                                                                     14
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

Ultraviolet                  Details
Retro-compatibility          The feature allowing consumer to add content previously acquired is now supported
                             An "upgrade" with disc-to-digital can be made available from a studio enabling the
                             conversion of an existing purchase to UltraViolet.
                             However, the number of upgradable movies is limited to the content catalogue of
                             UltraViolet.
Content location             Cloud, physical (DVD, Blu-Ray) and local storage
DRM compatibility            5 DRM systems selected allowing restrictions management on a broad range of devices
                             • Google Widevine
                             • Marlin
                             • CMLA-OMA V2
                             • Microsoft PlayReady
                             • Adobe Primetime DRM
                             Only 2 DRMs were really operable with UltraViolet when it was launched commercially in
                             2011 It is still the case; Adobe Primetime and Marlin are waiting final approval.

Figure 7:        UltraViolet offering

Source: Irdeto

Figure 8:        UltraViolet satisfaction

Source: NPD survey on UltraViolet, February 2014

www.idate.org © IDATE 2015                                                                                                     15
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

UltraViolet operating principles
The operating principles encompass three main stages:
1. account registration and account/content linking
2. acquisition of rights of the content
3. consumption of content in streaming and/or download modes through a different provider and/or a
    different device

The first stage is the registration of the user (first member) basically made through an online registration,
with a login and a password. This first member of the UltraViolet account can add other members with the
same account (up to 6 members).
The acquisition of rights of the content stage differs depending how the content title was purchased:
physically (physical support, like DVD, Blu-rays) or digitally. This part distinguishes the DRL account
upgrade for each case.

Figure 9:       Upgrade of the DRL account by the user for digital content purchase

Source: IDATE

Hence, the phase (1) corresponds to the online content purchase of digital content. As illustrated on the
figure below, partnered retailers (like Vudu here) allow the user to link their retail account with the
Ultraviolet account. Once content is purchased, the Ultraviolet account is automatically upgraded (with
the newly purchased title).
During the phase (2), the retailer #1 records the transaction in the locker. The phase (3) refers to the
registration of the consumer rights defining, for each piece of targeted content, the associated usage
rights in terms of access (for instance subscription, video on demand, rental) and in terms of devices
authorized (and type of DRM supported). Then the DRL code of the purchased title has been added to
the Ultraviolet content library (corresponding to the user’s DRL account). Phases (4) and (5) are
confirmation links.
The other option is to manually upgrade directly the user’s account. When the user purchases its physical
content (a DVD or a Blu-ray with the UV sticker), he upgrades its account by entering itself a code. The
objective here is to upgrade purchased discs to the DRL (Disc to Digital). Users are also allowed to
purchase the UltraViolet version of their existing physical disc for 2$ for standard definition and 5$ for HD.

www.idate.org © IDATE 2015                                                                                                     16
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

Figure 10:      Disc to digital process

Source: Vudu

The last stage of UltraViolet principle is the consumption of the content. Today, members are allowed to
stream content purchased or downloaded it on UV players from any device and regardless of the content
providers.
There are five ways for the consumption:
• Content consumption in streaming mode from the same device (detailed below)
• Content consumption streaming mode using another device
• Content consumption streaming mode through different providers
• Content consumption in download mode
• Additional copy already downloaded

In the first case illustrated below, the consumption of the content is purchased from retailer #1 on a first
device (tablet on the figure). The operating principle is quite simple, very similar to usual cloud-based
solutions. For the other ways, another device and another provider have been added.
So, when streaming from the dame device, once the content is purchased on a retailer site and rights
acquired in the UltraViolet account of the consumer, the content can be accessed.
The phase (1) indicates the launch of a request to the retailer #1 by the device to play the content by
streaming, embedding device specifications (screen’s size, resolution, throughput, etc). Actually at this
point, the DRM client requests for a license using an URL that points to the DRL (UltraViolet) as shown in
the phase (2). Phases (3) and (4) verify information regarding the account and associated rights. Once
verified, the DRL requests the appropriate license to the DRM License Server in the phase (5) while
confirming to the Retailer its request. In the same time, the Right Locker gives access of the whole
customers' UV collection to the Retailer #1 though an overlay, hence this latter has updated information
of the content of the user and associated rights (purchased or not at the given Retailer). The DRM
License Server then authorizes content delivery and informs the Locker Access Service Provider to
generate the license as well as to stream the content targeted by the user (Phase (7)). Once delivered,
the DRM client validates the user and usage rights (descrambling if required). Then the content can be
played.
It should be noted that usually the Locker Access Service Provider role is done directly by the Retailer.

www.idate.org © IDATE 2015                                                                                                     17
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

     Figure 11:       General scheme for the consumption of content from one device

     Source: IDATE.

2.6. Licensed Digital Rights Cloud

     www.idate.org © IDATE 2015                                                                                                     18
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

Solution                  Main features                                    Content accessibility
CatchMedia                Legally delivery of users' licensed content Contents are scanned and matched
                          across multiple devices from anywhere            with the Smart Cloud that includes:
                          Features include the synchronization of home • A registry of users and their devices
                          user library                                     • A registry of the users’ content
                          B2B service, CatchMedia is now available in • Digital Service Providers to deliver
                          UK via Carphone Warehouse, in the US via             content to specific devices
                          BestBuy and in India via Hungama
                                                                           • The        post-acquisition     content
                          Contents include: music, video, book digital         licences
                          games
                          Compatible with PC, Android, Blackberry,
                          iPhone, TV sets, cable & satellite receivers and Physical to Digital option available
                          in-car entertainment systems
iTunesMatch/iCloud        Music purchased from iTunes store (with Music collection stored in iCloud
                          rights) available on every devices               • up to 25000 songs
                          Users' music collection stored in iCloud
                          including music from CD or purchased
                          elsewhere from iTunes
                          24.99$/year (no free option)
                          Compatible devices: iPhone, iPad, iPod touch,
                          Mac, PC, or Apple TV
Amazon    Cloud    player With the Amazon Cloud Player Plus plan Music is stored in the Amazon cloud
premium                   (24.99$/year), users can “store” (scan & match player, accessible through the web, or
                          process) (including music from CD or illegal mobile/dedicated application
                          MP3) in addition to Amazon MP3 files.            • Up to 250 000 songs
                          Compatible devices: iPhone, iPad, iPod touch,
                          Mac, PC, Kindle fire, and some connected
                          audio/video devices (e.g. Roku)
Google Play Music         This service allows users to “store” with a scan Music is stored in the Google Play
                          & match process. Only music from a computer Music cloud
                          can be scanned.                                  • Up to 50000 songs
                          Free option, upgrade for free-ad option and
                          offline mode for 9.99€ per month
                          Contents can be streamed or downloaded from
                          the web platform or through a mobile
                          application.
                          Content can also be shared with Google+
                          users.
                          The service is only available through the web
                          (PC and Mac) and using an Android App.
                          Apple devices cannot access this service.
Source: IDATE

www.idate.org © IDATE 2015                                                                                                     19
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

2.7. Digital copy
     Figure 12:       The Disney Digital Copy service

     Source: Disney

     Solution                     Main features                                  Content accessibility
     Blinkbox                     Based on UltraViolet digital copies service    The user can redeem an UV code
                                  (2$ for standard definition and 5$ for HD)     from DVD or Blu-Ray
                                  It requires the creation of UV account
     Vudu (Walmart)               Based on UltraViolet digital copies service  The user needs to use Vudu To Go
                                  (2$ for standard definition and 5$ for HD)   application   application   when
                                  It requires the use of Vudu To Go            converting DVD or Blu-Ray
                                  application                                  Users can also go into any
                                                                               Walmart stores with physical disc
                                                                               where digital copies are created
                                                                               and stored in the Vudu digital
                                                                               locker
     Disney                       Disney allows its users to redeem a digital The user has to insert the DVD or
                                  copy of some of its titles. The digital copy BluRay Disc on his computer, and
                                  can only be downloaded on the user then enter the redemption code.
                                  computer, but can be transferred then into The movie is then transferred on
                                  multiple devices. The digital copy is a the computer.
                                  Windows Media file or an iTunes file (both
                                  with DRM).
                                  The service is only available in the USA.
                                  Video files are compatible with Apple
                                  devices and with Windows Media files
                                  player.
     Source: IDATE

     www.idate.org © IDATE 2015                                                                                                     20
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

2.8. Procedure to set up private game servers

     Source: heroes-wow

     www.idate.org © IDATE 2015                                                                                                     21
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

3. Benchmark of lawful offerings
3.1. Content catalogue
    Benchmark of online video services (October 2015)

    Model                        Bundled SVOD                    Rental VOD & EST                 Rental VOD & EST                 Stand-alone SVOD             Stand-alone SVOD
                                                                                                                                                                OTT linear channels
    Parent company               Amazon.com, Inc.                Tesco PLC                        Apple Inc.                       Netflix Inc.                 Sky PLC
    Country of origin            USA                             UK                               USA                              USA                          UK
    Price range                  Amazon Prime Instant video      Rental: from 0.99 GBP to         Rental: from 0.99 GBP to         Free trial for a month then: Entertainment pass: 1 GBP
                                 is bundled with Amazon's        3.49 GBP                         3.99 GBP                         • 5.99 GBP per month for     the first month then 5.99 GBP
                                 Prime membership                                                                                     SD content on 1 screen    per month
                                                             Buy: from 1.89 GBP to                Buy: from 5.99 GBP to            • 7.49 GBP per month for
                                 Free trial for a month then 10.99 GBP                            13.99 GBP                           HD content on 2 screens Movies pass: Free trial for a
                                 three plans:                                                                                      • 8.99 GBP per month for month then 9.99 GBP per
                                 • 5.99 GBP per month                                                                                 HD content on 4 screens month
                                 • 79 GBP per year
                                 • 39 GBP per year for                                                                                                          Sport pass: from 6.99 GBP to
                                     students                                                                                                                   9.99 GBP per day
    Content volume               15 000+ movies & episodes 15 000+ Movies (including              45 000+ films (including         1 000+ movies and 400 TV     Entertainment: 13 Pay-TV
                                 of TV shows                 premieres) and TV shows              premieres) and 190 000           series                       channels and 250TV series
                                                                                                  episodes of TV shows                                          on demand

                                                                                                                                                                Movies pass: 1 000+ movies
                                                                                                                                                                (including up to 16 premieres
                                                                                                                                                                per month + exclusivity on

                                                                                                                                                                Sport pass: 24 hour Sky sport
                                                                                                                                                                access

    www.idate.org © IDATE 2015                                                                                                                                                                22
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

Availability                 PC, Mac                         PC, Mac                          PC, Mac                          PC, Mac                       PC, Mac

                             Smartphones: Fire Phone,        Smartphones: iPhone,             Smartphones: iPhone              Managed Networks: Virgin      Smartphones: iPhone,
                             iPhone, Android phones          Android phones, Windows                                           Media                         Android phones
                                                             phone
                             Tablets: Kindle Fire, iPad,     Tablets: iPad, Android           Tablets: iPad                    Smartphones: Android          Tablets: iPad, Android tablets
                             Android tablets                 tablets, Windows tablets                                          phones, iPhone, Windows
                                                                                                                               smartphones                   Smart TV sets: LG
                                                                                              OTT boxes: Apple TV
                             Smart TV sets: Samsung,         Smart TV sets: Samsung,
                             LG, Panasonic and Sony          LG, Toshiba                                                       Tablets: Kindle Fire, iPad,   Game Consoles: Xbox 360,
                                                                                                                               Android tablets, Windows      Xbox One, PS3, PS4
                             Game Consoles: Wii, Wii U,      Game Consoles: Xbox 360,                                          tablets
                             Xbox 360, Xbox One, PS3,        Xbox One, PS3
                                                                                                                                                           OTT boxes: Now TV box,
                             PS4                                                                                               Smart TV sets: Gründig, LG, Google Chromecast, Roku,
                             OTT boxes: Fire TV, Fire TV     OTT boxes: Google                                                 Panasonic Philips, Samsung, Youview
                             Stick, Apple TV                 Chromecast                                                        Sharp, Sony, Toshiba

                             DVD players: Samsung, LG, DVD players: Samsung, LG                                                Game Consoles: Wii, Wii U,
                             Panasonic, Sony                                                                                   Xbox 360, Xbox One, PS3,
                                                                                                                               PS4

                                                                                                                               OTT boxes: Apple TV, Roku
                                                                                                                               3, Youview, Google
                                                                                                                               Chromecast, Nexus Player

                                                                                                                               DVD players: Panasonic,
                                                                                                                               Samsung, Toshiba, Sony,
                                                                                                                               LG.
IDATE according to service publishers

www.idate.org © IDATE 2015                                                                                                                                                               23
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

Benchmark of online music streaming services (October 2015)

Model                         Bundled subscription           Media center + stand-alone     Media center + stand-alone         Stand-alone FTA and          Stand-alone subscription
                              streaming service              audio streaming service linked audio streaming service            subscription audio streaming audio streaming service
                                                             to proprietary ecosystem       linked to proprietary              service
                                                                                            ecosystem
Parent company                Amazon.com, Inc.               Apple Inc.                    Google Inc. / Alphabet Inc.         Spotify Ltd.                Aspiro AB.
Country of origin             USA                            USA                           USA                                 Sweden                      Norway
Price range                   Amazon Prime Instant           9.99 GBP/month per individual 9.99 GBP/month per                  Free trial for a month,     20 GBP/month
                              video is bundled with                                        individual                          then 9.99 GBP/month
                              Amazon's Prime                 Family plan: 14.99 GBP/month                                      4.99 GBP for students
                              membership                     for up to 6 people           Family plan:
                                                                                          14.99 GBP/month for up to 6
                              Free trial for a month then                                 people
                              three plans:
                              • 5.99 GBP per month
                              • 79 GBP per year
                              • 39 GBP per year for
                                  students
Content                       1 million tracks               30 million tracks                 18 million tracks               30 million tracks           30 million tracks
Availability                  PC, Mac, Fire Phone,           Mac, PC, iOS Smartphones          Mac, PC, Android phones,        PC, Mac, iPhone, iPad,      PC, Mac, iPhone, iPad,
                              iPhone, Android phones,        and tablets, WatchOS, Android     Android tablets, iPhone,        Android Phones, Android     Android Phones, Android
                              Kindle Fire, iPad, Android     devices (coming autumn 2015)      iPad, iPod Touch.               tablets.                    tablets.
                              tablets
IDATE according to service publishers. Extra source: Dailymail.co.uk 3.

3
    http://www.dailymail.co.uk/home/event/article-3119837/Apple-s-launching-new-music-streaming-service-does-stack-rest.html

www.idate.org © IDATE 2015                                                                                                                                                             24
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

Music: availability of best-selling artists, albums and songs on selected audio streaming services (September 2015)

             UK all time best-selling artists               UK all time best selling Albums                         UK 2015 best-selling Artists                     UK 2015 best-selling Songs
   1    The Beatles                                   Queen – Greatest Hits                                 Sam Smith – In the lonely Hour                     Marc Ronson ft. Bruno Marts – Uptown Funk
                     Av.: None                                     Av.:                                            Av.:                                           Av.:     

   2    Elvis Presley                                 ABBA – Gold: Greatest Hits                            Ed Sheeran – X                                     Hozier – Take me to Church
                     Av.:                                      Av.:                                            Av.:                                           Av.:    

   3    Cliff Richard                                 The Beatles – Sgt. Pepper's Lonely Hearts Club Band   George Ezra – Wanted on Voyage                     OMI - Cheerleader

                     Av.:                                     Av.: None                                           Av.:                                          Av.:    

   4    Madonna                                       Adele – 21                                            Taylor Swift – 1989                                Ellie Goulding – Love me like you do

                     Av.:                                     Av.:                                           Av.:                                              Av.:    

   5    Michael Jackson                               Oasis – (What's the Story) Morning Glory?             Hozier – Hozier                                    Wiz Khalifa ft. Charlie Puth – See you again
                     Av.:                                      Av.:                                            Av.:                                           Av.:    

   6    Rihanna                                       Thriller – Michael Jackson                            James Bay – Chaos and the Calm                     James Bay – Hold Back the River
                     Av.:                                      Av.:                                            Av.:                                           Av.:    
        Elton John                                    Pink Floyd – The Dark Side of the Moon                Noel Gallagher's High Flying – Chasing Yesterday   Rihanna/Kanye    West/Mc     Cartney   –   Fourfive
   7                                                                                                                                                           Seconds
                     Av.:                                      Av.:                                            Av.:                                           Av.:   

   8    Queen                                         Dire Straits – Brothers in Arms                       Meghan Trainor – Title                             Maroon 5 – Sugar

                     Av.:                                      Av.:                                            Av.:                                          Av.:    

   9    ABBA                                          Bad – Michael Jackson                                 Paloma Faith – A perfect Contradiction             Years & years – King

                     Av.:                                      Av.:                                             Av.:                                          Av.:    

  10    David Bowie                                   Queen – Greatest Hits 2                               Mumford & Sons – Wilder Mind                       Ed Sheeran – Thinking Out Loud
                     Av.:                                     Av.:                                            Av.:                                           Av.:    

Officialcharts.com as of 09/21/2015. Services' websites.

Colour code:  Amazon Prime;  Apple Music;  Google Music;  Spotify;  Tidal.

www.idate.org © IDATE 2015                                                                                                                                                                                      25
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

Benchmark of eBook subscription services (October 2015)

Model                        Subscription online library                         Reading app linked to online bookstore             Subscription online library & online bookstore
Parent company               Amazon.com, Inc.                                    Apple Inc.                                         Oyster / Highland Capital Partners
Country of origin            USA                                                 USA                                                USA
Price range                  Free trial for a month,                             From 0.99 GBP                                      Free trial for a month,
                             then 7.99 GBP/month                                                                                    then 9.95 GBP/month
Content                      700 000 eBooks and Audiobooks                       2.5 million eBooks                                 1+ million eBooks
Availability                 Kindle, Kindle Fire Android, iOS, Windows           Mac, iPad, iPhone, iPod Touch.                     iPhone, iPad, Android, Kindle Fire, Nook HD, Mac,
                             Phone and Blackberry Devices                                                                           PC
IDATE according to service publishers

www.idate.org © IDATE 2015                                                                                                                                                         26
Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content - Appendix

Books: availability of physical and online best-selling books on subscription services (October 2015)

          Amazon UK bestselling books for                 The Guardian UK top 10 bestselling                 The Guardian UK top 100 bestselling                  The Telegraph UK bestselling authors
                      2015                                         books of 2014                                      books of all time                                      of the decade
        Ella Woodward – Deliciously Ella: Awesome Guinness World Records 2015                               Dan Brown – The Da Vinci Code                         J.K. Rowling
   1    ingredients, incredible food that you and your body
        will love
                   Av.: ×                                         Av.: × ×                                            Av.: ×  ×                                               Av.:   

   2    Paula Hawkins – The Girl on the Train           David Walliams – Awful Auntie                       J.K. Rowling – Harry Potter and the Deathly Hallows   Roger Hargreaves

                   Av.: ×  ×                                      Av.: ×                                             Av.:                                                  Av.:  
        E.L. James – Fifty Shades of Grey               Jeff Kinney – The Long Haul: Diary of a Wimpy Kid   J.K. Rowling – Harry Potter and the Philosopher's Dan Brown
   3                                                                                                        Stone
                   Av.: ×  ×                                      Av.: ×                                             Av.:                                                  Av.: ×  
        Amelia Freer – Eat. Nourish. Glow: 10 easy steps Lynda Bellingham – There’s Something I’ve Been J.K. Rowling – Harry Potter and the Order of the Jacqueline Wilson
   4    for losing weight, looking younger & feeling Dying To Tell You                                  Phoenix
        healthier
                   Av.: ×  ×                                      Av.: ×  ×                                          Av.:                                                  Av.: ×  

   5    Harper Lee – Go Set a Watchman                  Zoe Sugg – Girl Online                              E.L. James – Fifty Shades of Grey                     Terry Pratchett

                   Av.: ×  ×                                      Av.: ×  ×                                          Av.: ×  ×                                               Av.: ×  

   6    Mary Berry – Mary Berry's Absolute Favourites   Gillian Flynn – Gone Girl                           J.K. Rowling – Harry Potter and the Goblet of Fire    John Grisham

                   Av.: ×                                         Av.: ×  ×                                          Av.:                                                  Av.: ×  ×
        Emma Healey – Elizabeth is Missing              Jamie Oliver – Jamie’s Comfort Food                 J.K. Rowling – Harry Potter and the Chamber of Richard Parsons
   7                                                                                                        Secret
                   Av.: ×                                        Av.: × ×                                            Av.:                                                  Av.: × 
        Jasmine Hemsley – The Art of Eating Well        Boris Johnson – Churchill Factor                    J.K. Rowling – Harry Potter and the Prisoner of Danielle Steel
   8                                                                                                        Askaban
                   Av.: ×                                         Av.: ×  ×                                          Av.:                                                  Av.: ×  ×

   9    Harper Lee – To Kill A Mockingbird              Guy Martin – My Autobiography                       Dan Brown – Angels and Demons                         James Patterson

                   Av.: ×  ×                                      Av.: ×                                             Av.: ×                                                 Av.: ×  ×

  10    Jessie Burton – The Miniaturist                 Tom Kerridge – Best Ever Dishes                     J.K. Rowling – Harry Potter and the Half Blood Prince Enid Blyton

                   Av.: ×  ×                                      Av.: ×                                             Av.:                                                  Av.: ×  ×

UK bestselling books for 2015: http://www.amazon.co.uk/gp/bestsellers/2015/books/ref=zg_bsar_cal_ye ; excluding colouring books.
UK top 10 bestselling books of 2014: http://www.theguardia n.com/books/2014/dec/23/readers-turn-over-new-leaf-celebrity-memoirs-slip-out-booksellers-top-10
UK top 100 bestselling books of all time: http://www.theguardian.com/news/datablog/2012/aug/09/best-selling-books-all-time-fifty-shades-grey-compare
UK bestselling authors of the decade: http://www.telegraph.co.uk/culture/books/6866648/Bestselling-authors-of-the-decade.html

Colour code:  Amazon Kindle Unlimited; × Amazon.com;  Apple iBooks; × iTunes Store;  Oysters Unlimited × Oysterbooks (sales); .

www.idate.org © IDATE 2015                                                                                                                                                                           27
You can also read