Computer Forensics and Investigations
Computer Forensics and Investigations
Cybercrime Treaty Could Chill Research
IEEE Security and Privacy
Real Digital Forensics: Computer Security and Incident Response
Real Digital Forensics: Computer Security and Incident Response
Computer-Mediated collaborative reasoning and intelligence analysis
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Design and implementation of a policy-based privacy authorization system
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Feature: Forensic investigation of peer-to-peer networks
Network Security
Hi-index | 0.00 |
Digital technology for transferring and controlling data has made substantial advances in recent years. It is important to protect innovations and to curb the copyright infringements in computer-based systems. Copyright is a legal framework of basic rights, allowing the owner to control or permit someone else to reproduce copyrighted works with commercial value. In recent decades, copyright violations have been moving into the criminal realm. This paper focuses on the procedure guidance of a fictitious P2P model, and discusses whether it contributes to the crime of copyright infringement in dealing with the distribution of digital content. From the perspective of internet forensics, the action research and the whole control mechanism, it is shown that a commercial server has full control over the P2P model.