Book Review: Judiciary-Friendly Forensics of Software Copyright Infringement (Vinod Polpaya Bhattathiripad)

نویسنده

  • Pedro Luís Próspero Sanchez
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Forensics of Software Copyright Infringement Crimes: The Modern POSAR Test Juxtaposed With the Dated AFC Test

This paper presents a new development in the forensics of software copyright through a juxtaposed comparison between the proven AFC test and the recent POSAR test, the two forensic procedures for establishing software copyright infringement cases. First, the paper separately overviews the 3-stage, linear sequential AFC test and then the 5-phase, cyclic POSAR test (as AFC’s logical extension). T...

متن کامل

A Proposal for Incorporating Programming Blunder as Important Evidence in Abstraction-Filtration-Comparison Test

This paper investigates an unexplored concept in Cyber Forensics, namely, a Programming Blunder. Programming Blunder is identified as a variable or a code segment or a field in a database table, which is hardly used or executed in the context of the application or the user’s functionality. Blunder genes can be found in many parts of any program. It is the contention of this paper that this phen...

متن کامل

Software Piracy Forensics: The Need for Further Developing AFC

Among all the available approaches for software piracy forensics, one existing and exceptional approach is the theoretical frame work called AFC (Abstraction-Filtering-Comparison), an accepted approach in US courts for evaluating copyright infringement claims involving computer software. Through this paper, the authors would like to approach AFC in a threefold manner: One, to discuss the nature...

متن کامل

Software Piracy Forensics: Impact and Implications of Postâ•’Piracy Modifications

Piracy is potentially possible at any stage of the lifetime of the software. In a post-piracy situation, however, the growth of the respective versions of the software (both the original and pirated) is expected to be in different directions as a result of expectedly different implementation strategies. This paper shows how such post-piracy modifications are of special interest to a cyber crime...

متن کامل

Appendix 1: Challenges in Software Quality Forensics and Litigation - A Case Study

Software forensic experts are called upon not only to perform authorship analysis and software copyright infringement forensics but also to perform software quality forensics. Because the prime evidence in such cases also are digital (in the form of software, databases etc.), the judiciary too often engages software forensic practitioners as expert witnesses to arrive at a considered judgment. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JDFSL

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2014