Software Piracy Forensics: The Need for Further Developing AFC

نویسندگان

  • S. Santhosh Baboo
  • P. Vinod Bhattathiripad
چکیده

Among all the available approaches for software piracy forensics, one existing and exceptional approach is the theoretical frame work called AFC (Abstraction-Filtering-Comparison), an accepted approach in US courts for evaluating copyright infringement claims involving computer software. Through this paper, the authors would like to approach AFC in a threefold manner: One, to discuss the nature and efficacy of AFC; two, to recount some existing observations on it, and three, to identify areas, if any, where there is scope and need for appropriate modifications to further increase the efficacy and validate the legitimacy of the AFC approach, and in particular from the view point of a researcher who believes that software intelligence offered by the automated tools for software piracy investigation needs to be supplemented with manual intelligence for making the expert report more judiciary-friendly.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Forensics of Software Copyright Infringement Crimes: The Modern POSAR Test Juxtaposed With the Dated AFC Test

This paper presents a new development in the forensics of software copyright through a juxtaposed comparison between the proven AFC test and the recent POSAR test, the two forensic procedures for establishing software copyright infringement cases. First, the paper separately overviews the 3-stage, linear sequential AFC test and then the 5-phase, cyclic POSAR test (as AFC’s logical extension). T...

متن کامل

Software Piracy Forensics: Impact and Implications of Postâ•’Piracy Modifications

Piracy is potentially possible at any stage of the lifetime of the software. In a post-piracy situation, however, the growth of the respective versions of the software (both the original and pirated) is expected to be in different directions as a result of expectedly different implementation strategies. This paper shows how such post-piracy modifications are of special interest to a cyber crime...

متن کامل

Developing a Predictive Model of Software Piracy Behavior: An Empirical Study

There is, perhaps, no more visible financial dilemma in the software industry today than that of software piracy. In this paper, we detail the development and empirical validation of a predictive model of software piracy behavior by computer-using professionals. The model was developed from the results of prior research in software piracy and the reference disciplines of the theory of planned b...

متن کامل

Schools of Thought in Software Piracy Research

The unauthorized copying of computer programs, referred to as software piracy, continues to be a major threat to the security of the digital assets of software publishers. Software piracy has received much attention from researchers, often from different perspectives, or schools of thought. As a first step, we have reviewed the articles on software piracy in Information Systems journals, classi...

متن کامل

Lessons learned writing digital forensics tools and managing a 30TB digital evidence corpus

Writing digital forensics (DF) tools is difficult because of the diversity of data types that needs to be processed, the need for high performance, the skill set of most users, and the requirement that the software run without crashing. Developing this software is dramatically easier when one possesses a few hundred disks of other people’s data for testing purposes. This paper presents some of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010