Software Piracy Forensics: The Need for Further Developing AFC
نویسندگان
چکیده
Among all the available approaches for software piracy forensics, one existing and exceptional approach is the theoretical frame work called AFC (Abstraction-Filtering-Comparison), an accepted approach in US courts for evaluating copyright infringement claims involving computer software. Through this paper, the authors would like to approach AFC in a threefold manner: One, to discuss the nature and efficacy of AFC; two, to recount some existing observations on it, and three, to identify areas, if any, where there is scope and need for appropriate modifications to further increase the efficacy and validate the legitimacy of the AFC approach, and in particular from the view point of a researcher who believes that software intelligence offered by the automated tools for software piracy investigation needs to be supplemented with manual intelligence for making the expert report more judiciary-friendly.
منابع مشابه
Forensics of Software Copyright Infringement Crimes: The Modern POSAR Test Juxtaposed With the Dated AFC Test
This paper presents a new development in the forensics of software copyright through a juxtaposed comparison between the proven AFC test and the recent POSAR test, the two forensic procedures for establishing software copyright infringement cases. First, the paper separately overviews the 3-stage, linear sequential AFC test and then the 5-phase, cyclic POSAR test (as AFC’s logical extension). T...
متن کاملSoftware Piracy Forensics: Impact and Implications of Postâ•’Piracy Modifications
Piracy is potentially possible at any stage of the lifetime of the software. In a post-piracy situation, however, the growth of the respective versions of the software (both the original and pirated) is expected to be in different directions as a result of expectedly different implementation strategies. This paper shows how such post-piracy modifications are of special interest to a cyber crime...
متن کاملDeveloping a Predictive Model of Software Piracy Behavior: An Empirical Study
There is, perhaps, no more visible financial dilemma in the software industry today than that of software piracy. In this paper, we detail the development and empirical validation of a predictive model of software piracy behavior by computer-using professionals. The model was developed from the results of prior research in software piracy and the reference disciplines of the theory of planned b...
متن کاملSchools of Thought in Software Piracy Research
The unauthorized copying of computer programs, referred to as software piracy, continues to be a major threat to the security of the digital assets of software publishers. Software piracy has received much attention from researchers, often from different perspectives, or schools of thought. As a first step, we have reviewed the articles on software piracy in Information Systems journals, classi...
متن کاملLessons learned writing digital forensics tools and managing a 30TB digital evidence corpus
Writing digital forensics (DF) tools is difficult because of the diversity of data types that needs to be processed, the need for high performance, the skill set of most users, and the requirement that the software run without crashing. Developing this software is dramatically easier when one possesses a few hundred disks of other people’s data for testing purposes. This paper presents some of ...
متن کامل