|Total results: 34||
|Judiciary-Friendly Forensics of Software Copyright Infringement
Vinod Polpaya Bhattathiripad.
The software industry continues to expand as new products enter into the technological marketplace in order to meet increasing demand. As a result of the popularity of often-expensive software products, companies face the growing challenge of protecting their products against copyright...
Global Issues and Ethical Considerations in Human Enhancement Technologies
Steven John Thompson.
With rapid advancements in human enhancement technologies, society struggles with many issues, such as definition, effects, participation, regulation, and control. Current and future initiatives in these technologies may not be in the participants’ best interests; therefore, it is imperative for...
Evolving Issues Surrounding Technoethics and Society in the Digital Age
The advancement of technologies in the 20th century has radically transformed the interconnectedness of humans, science, and technology within an evolving society.
Evolving Issues Surrounding Technoethics and Society in the Digital Age serves as an interdisciplinary base of scholarly contributions on...
The Context and Background
This chapter introduces the nature, evolution, and development of cyber (digital) crimes in the context of the modern digital revolution with particular stress on software piracy and copyright infringement. Firstly, it overviews the various forensic implications of cyber criminality in its various...
Software Copyright Infringement and Litigation
This chapter deals with software copyright infringement litigations. The chapter commences with a mention of the moral and legal rights of individuals, organizations, and institutions to protect their property rights to software and also to seek remedial measures in case of violation of their rights....
Formal Elements and Measures in Software and their Forensic Importance
This chapter introduces various software elements and then explains the forensic utility and importance of these elements. Firstly, the forensic importance of these elements (and also of various metrics and measures based on these elements) are explained in the context of software authorship...
Forensic Expertise and Judicial Expectations
This chapter primarily focuses on recommendations, suggestions, and directives from the legal systems on matters related to investigation of software copyright infringement and then presents them as positive contributory gestures by the legal systems across the world. Samples are taken from various...
Software Copyright Infringement Forensics and Authorship Analysis
This chapter primarily focuses on an overview of authorship analysis and then explains how authorship analysis can be of help, perhaps in a limited way, in software copyright infringement forensics. The chapter looks into various approaches (which use the elements and measures that have already been...
Forensics with the AFC Test
This chapter tries to explain the procedural aspects of the copyright infringement investigation with special attention to the Abstraction – Filtration – Comparison test. Firstly, it situates the AFC test properly in the field (and also in the process) of copyright infringement of software program....
Forensics with the POSAR Test
This chapter introduces and explores the POSAR test, a recent forensic procedure for establishing software copyright infringement cases. Firstly, there is an overview of the 3-stage, linear sequential AFC test. By introducing the 5-phase, cyclic POSAR test as AFC's logical extension, the chapter then...
This chapter presages into the future scope of growth along different dimensions of the current forensic technologies for software copyright infringement investigation. Firstly, it explains how induction of additional software elements in the forensic processes and procedures can make the forensic...
Interdisciplinary Perspectives on Business Convergence, Computing, and Legality
Reema Khurana, Rashmi Aggarwal.
As digital technologies develop, companies envision new ways to incorporate ever more disparate elements in their products, such as the combination of computing power and telecommunications in modern smart phones.Interdisciplinary Perspectives on Business Convergence, Computing, and Legality...
Knowledge Sharing Centric Competitive Business Intelligence to Guide Convergence
This chapter discusses how knowledge sharing can increase enterprise business intelligence in the era of high business convergence. How the consequence of knowledge sharing would help achieve various business intelligence initiatives such as competitive intelligence, strategy formulation, facilitating...
Comparative Analysis of Selected Websites of Brokerage Houses in Poland
The main objective of this chapter is to identify the most important criteria for assessing Websites of brokerage houses and to specify a Website that is optimal from the point of view of a small, individual customer. At the beginning of the chapter, the author presents general assumptions of the study...
Analysis of Facts for Companies Going Public through Social Media
Dilip Kumar Mallick, Susmi Routray.
Social media is altering interpersonal and social connections, empowering new forms of commitment and contribution. The emergence of social media has a dramatic impact on the current commercial environment. The power of authority has shifted from business to potential consumers. Going wrong in social...
Emerging Legal Trends on Hyperlinks and Meta-Tags: A Discourse
Hyperlinks and meta-tags form two primary tools for Website designs. They are a convenient way to generate easy and faster connectivity on the World Wide Web. Hyperlinking techniques allow a quick retrieval of information, whereas meta-tags present a summarized understanding of the content and subject...
Compliance and Regulatory Standards for Cloud Computing
Jitendra Singh, Vikas Kumar.
Cloud computing is expanding in reach, with its utility-based features and enhanced agility. Still, there is a big concern about the privacy and security of the data. Because of these concerns, third-party cloud users are employing the cloud only for less sensitive data, and the advantage of cloud...
Business to Rural: The Future of IT Outsourcing
In this chapter, the author investigates the socio-economic impact of the organization on the life of the common people of Uttarakhand, a Simayal village. The author also explores the salient feature or uniqueness of B2R that differentiates it from other urban BPOs in India. The author went through the...
Analysis of the Outsourcing Models and Recommendation: Case of Outworks
Benu Sagar Dubey, Gopakumar K, Mukesh Singh.
This chapter presents the trends in IT services, outsourcing, and vendor management in Indian IT industry. It includes a study of IT services, vendor management, and business model of Outworks Solution India Private Limited, NOIDA. Major findings are in the field of Cloud Computing, mobile...
Aspects of Client Vendor Relationship and the Risks Therein
Daisy Mathur Jain.
Information Technology (IT) is an ever-growing industry. It, therefore, becomes imperative to understand what it entails, the key parties involved, and their relationship, along with the various risks involved. This chapter aims to delve into the underlying concept of service in the IT industry, the...
Factors Influencing the Effectiveness of C2C Websites in Delhi-NCR
Teena Bagga, Roushan Chouhan.
Electronic commerce is becoming increasingly important in business, and Consumer-to-Consumer (C2C) e-commerce is a growing area of e-commerce. C2C (Consumer to Consumer) refers to transactions that take place directly between consumers; the suitable example would be consumers selling their used or new...