Get IGI Global News
US
China
Cart
0
Login/Create Portal Account
All Products
All Products
Books
Journals
Videos
Book Chapters
Journal Articles
Video Lessons
Teaching Cases
Special Offers
IGI Global’s New Emerging Topic e-Book Collections
Acquire highly focused and affordable Cutting-Edge Peer-Reviewed Research Content through a selection of 17 topic-focused e-Book Collections discounted up to 90%, compared to list prices. Collection topics include Artificial Intelligence, Data Science, Language Learning, Marketing and Customer Relations, Sustainability, and many more. Hosted on the InfoSci
®
platform, these collections feature no DRM, no additional cost for multi-user licensing, no embargo of content, full-text PDF & HTML format, and more.
Learn More
Open Access Book (Free Access) - Encyclopedia of Information Science and Technology, Sixth Edition (ISBN: 9781668473665)
The
Encyclopedia of Information Science and Technology, Sixth Edition)
continues the legacy set forth by the first five editions by providing comprehensive coverage and up-to-date definitions of the most important issues, concepts, and trends pertaining to technological advancements and information management within a variety of settings and industries. The entire book is being published under open access.
Read Now
Open Access Book (Free Access) - Food Sustainability, Environmental Awareness, and Adaptation and Mitigation Strategies for Developing Countries (ISBN: 9781668456293)
Food Sustainability, Environmental Awareness, and Adaptation and Mitigation Strategies
for Developing Countries provides information on the recent technology, mitigation, and environmental protection that must be applied for food sustainability in developing countries. This book is being published under Platinum Open Access through funding from Diponegoro University, Indonesia.
Read Now
Open Access Book (Free Access) - New Models of Higher Education: Unbundled, Rebundled, Customized, and DIY (ISBN: 9781668438091)
The Walmart Corporation and the Lumina Foundation have provided funding to make
New Models of Higher Education: Unbundled, Rebundled, Customized, and DIY
fully open access, completely removing any paywall between scholars in education and the latest research on new models for the future of higher education.
Read Now
Open Access Book (Free Access) - Handbook of Research on the Global View of Open Access and Scholarly Communications (ISBN: 9781799898054)
Through a collaboration between IGI Global and the University of North Texas, the
Handbook of Research on the Global View of Open Access and Scholarly Communications
has been published as fully open access, completely removing any paywall between researchers of any field, and the latest research on the equitable and inclusive nature of Open Access and all of its complications.
Read Now
Books
Books
Open Access Books
OnDemand Book Chapters
Books by Subject
Business, Administration, & Management
Scientific, Technical, & Medical (STM)
Education
Books by Field
Business & Management
Computer Science & Technology
Education
Environment & Agriculture
Government & Law
Library & Information Science
Media & Communications
Medicine & Healthcare
Science & Engineering
Security & Forensics
Social Sciences & Humanities
Journals
Journals
OnDemand Journal Articles
Journals by Subject
Business, Administration, & Management
Scientific, Technical, & Medical (STM)
Education
Journals by Field
Business & Management
Computer Science & Technology
Education
Environment & Agriculture
Government & Law
Library & Information Science
Media & Communications
Medicine & Healthcare
Science & Engineering
Security & Forensics
Social Sciences & Humanities
e-Collections
e-Book Collections
Emerging Topic e-Collections
e-Journal Collection Archive
e-Cases Collection
Pick & Choose
Open Access
View All Open Access Opportunities
Search across all of IGI Global’s available open access publishing opportunities to unleash your research potential.
Find an Open Access Journal for Your Next Manuscript
Search across all of IGI Global’s available open access publishing opportunities to unleash your research potential.
Submit an Open Access Book Proposal
Learn more about open access book publishing and how it can propel your research forward in the field.
Convert Your Work to Open Access
Already published? You can convert your work to open access to increase its impact through IGI Global’s Restrospective Open Access Program.
Utilize Open Access Collection Database
Open up your research potential by utilizing our open access content or integrating the open access collection into your library
Consider Open Access Agreements
For Libraries: consider no-cost or investment-level open access agreements with IGI Global to support your faculty's research endeavors.
Search Funding Resources
Looking for additional funding resources to support your open accesss endeavors? View industry resources compiled by our open access team.
Review Open Access Policies & Ethical Guidelines
Considering IGI Global to publish your work under open access? Review IGI Global’s open access policies and ethical guidelines
Publish
with Us
Resources
Librarians
e-Collections
Book Title List
Journal Title List
Video Title List
Library Collection Development Service
Browse Forthcoming Books
Consortia Partnerships
Library and Publisher Collaborations
Product Distributors
Catalogs
Open Access Initiative
Instructors
Course Adoption
Teaching Cases
K-12 Online Learning Collection
Researchers
Browse Books
Browse Journals
Browse Forthcoming Books
Search Open Access Content
OnDemand Downloads
Webinars
InfoScipedia
Authors and Editors
eEditorial Discovery
®
System
Peer Review Process
Ethics and Malpractice
COPE Membership
Fair Use Policy
Open Access Publishing
FAQ
Distributors
Distributor Resources
Book Distributors
Journal Subscription Agencies
E-Resource Partners
Browse Forthcoming Books
Catalogs
About Us
Newsroom
news
room
Email Updates
RSS
Search
Search:
All Posts
IGI Global News
New Title Releases
Press Releases
All Tags
A-Title (1)
Academic Writing Month (1)
Accounting & Finance (20)
Acquisitions (66)
Adaptive & Complex Systems (7)
Adult Learning (19)
AERA (3)
Aerospace Engineering (10)
Against the Grain (5)
Agent Technologies (4)
ALA Annual (1)
ALA Midwinter (1)
Algorithms (3)
AMCIS (1)
AOM (1)
Applied E-Learning (39)
Articles (189)
Artificial Intelligence (69)
ASEE (1)
Asia (86)
Author News (646)
Awards & Recognition (145)
BIBF (2)
Bioinformatics (12)
Biologically-Inspired Computing (11)
Biomedical Technologies (24)
Biometrics (9)
Blended & Mobile Learning (28)
Book Series (234)
Books & E-Books (977)
Business & Organizational Research (49)
Business & Technical Education (14)
Business and Management (283)
Business Information Systems (39)
Business Intelligence (28)
Business Process Management (23)
Chapters (264)
Charleston (5)
Chemical Engineering (5)
Chemoinformatics (3)
China (69)
Clinical Technologies (15)
Cognitive Informatics (21)
Cognitive Learning (9)
Collective Intelligence (7)
Computational Intelligence (15)
Computational Linguistics (6)
Computer Engineering (9)
Computer Graphics & Art (6)
Computer Science and Information Technology (242)
Computer Simulation (5)
Computer Vision & Image Processing (6)
Computer-Assisted Language Learning (6)
Computer-Mediated-Communication (11)
Conferences (204)
Consortia (6)
Consumer Management (9)
Contributor Collaboration (13)
COPE Resources (6)
Course Adoption (86)
Cyber Behavior (40)
Cyber Warfare & Terrorism (38)
Cybernetics (8)
Data Analysis & Statistics (17)
Data Mining (28)
Data Warehousing (14)
Database Technologies (88)
Databases (33)
Decision Support Systems (9)
Digital Crime & Forensics (20)
Digital Divide & Developing Countries (22)
Digital Libraries (22)
Digital Literacy (18)
Distance Education (32)
E-Business (30)
E-Collaboration (19)
E-Commerce (19)
Eastern Europe (62)
Education (410)
Electrical Engineering (4)
Electronic Services (15)
End User Computing (4)
Engineering Education (14)
Enterprise Information Systems (9)
Enterprise Resource Planning (2)
Entrepreneurship & E-Innovation (6)
Environmental Engineering (25)
Environmental, Agricultural, and Physical Sciences (96)
ER&L (1)
Europe (149)
Events & Collaborations (265)
Facebook (10)
FIBF (1)
Free Content (140)
Gaming (40)
Gender & Technology (13)
Geoinformatics (6)
Global Business (41)
Global Information Technology (40)
Government and Law (131)
Grid & High Performance Computing (1)
Healthcare (102)
Healthcare Information Systems (52)
Hidden (1)
Hospitality, Travel & Tourism Management (10)
Human Aspects of Business (34)
Human Aspects of Technology (105)
Human Resources Development (21)
India (47)
Industrial Engineering (4)
Industrial Informatics (4)
Information Ethics (13)
Information Resources Management (23)
Information Retrieval (12)
Information Security & Privacy (29)
Information Trust (20)
Information Value & Quality (9)
InfoSci-Books (282)
InfoSci-Cases (15)
InfoSci-Databases (80)
InfoSci-Dictionary (5)
InfoSci-Disciplines (8)
InfoSci-Journals (179)
InfoSci-Medical (10)
InfoSci-OnDemand (21)
InfoSci-Select (1)
InfoSci-Videos (12)
Instructional Design (30)
Interactive Technologies (35)
Internet Technologies (30)
Interview (203)
IT Governance (13)
IT Policy & Standardization (11)
IT Research & Theory (14)
Journals (366)
Knowledge Discovery (64)
Knowledge Management (103)
Knowledge Society (49)
Latin & South America (20)
Library and Information Science (180)
Library Collaboration (25)
Library Information Systems (102)
Library Technology Innovation Series (14)
Marketing (37)
Materials Science (1)
Mechanical Engineering (5)
Media and Communications (173)
Medical, Healthcare, and Life Sciences (184)
Middle East & Africa (73)
Mobile Computing (26)
Multimedia Technology (41)
Music Technologies (2)
Nanotechnology (10)
Networking (39)
Neural Networks (6)
Newsletter (242)
North America (400)
Oceania (70)
Open Access (64)
Open Access Week (42)
Open Source Software (5)
Partnerships (19)
Peer Review Week (8)
Presentations (78)
Public & Sector Management (19)
Public Policy & Administration (100)
Research Essentials (22)
Research Trends (217)
Resources for Distributors (274)
Resources for Instructors (401)
Resources for Librarians (417)
Resources for Researchers (537)
Resources for Translators (119)
Reviews & Indexing (102)
Robotics (21)
Science & Engineering (99)
Security and Forensics (132)
Semantic Web (2)
Sensor Technologies (1)
SLA (2)
Small & Medium Enterprises (3)
Social Computing (62)
Social Sciences and Humanities (198)
Software (96)
Strategic Information Systems (5)
Supply Chain Management (10)
Surveys, Measurements & Response Systems (7)
Sustainable Development (36)
Systems & Software Engineering (5)
Teaching Cases (61)
Technologies in Higher Education (46)
Technologies in K-12 Education (34)
Telecommunications (7)
Topic Collections (30)
Twitter (16)
Ubiquitous & Pervasive Computing (3)
Urban & Regional Development (9)
Videos (19)
Virtual Communities (47)
Virtual Learning Environments (71)
Web Services (8)
Web Technologies & Engineering (13)
Web-Based Teaching & Learning (45)
Webinar (59)
Wireless Systems (9)
World Forgotten Children's Foundation (1)
Posted any time
Posted this week
Posted this month
Posted this year
Sort by:
Relevance
Newest first
Oldest first
Search
Reset
Dr. Bhattathiripad discusses cyber crime and forensics, and how technology is taking this field to another level
Interview with Vinod Polpaya Bhattathiripad, Author of Judiciary-Friendly Forensics of Software Copyright Infringement
By
IGI Global
on
Aug 18, 2014
Since 2007,
Dr. Vinod Polpaya Bhattathiripad
has been a cyber forensic consultant to police, judiciary, intelligence, and banks in India, generally on civil and criminal cases related to cyber abuse, and specifically on cases related to software copyright infringement. As a software engineer, he has worked in 148 software development projects spanning 18 years. Author of the new publication
Judiciary-Friendly Forensics of Software Copyright Infringement
, Dr. Bhattathiripad recently took a moment to participate in an interview with IGI Global Promotions Coordinator Ann Lupold, on the changing state of cyber crime and forensics, and how new technologies are impacting the field.
Tell us a little about yourself. How did you become involved in the study of cyber crime investigation?
Dr. Bhattathiripad:
My entry into cyber forensics was really unplanned. After earning my master’s in Operations Research and Computer Applications in 1987, I have been a software professional in India. My functional area was business software and my areas of technical expertise were mathematical modeling, software design, development and implementation. Surprisingly, in 2002, I was summoned by an Indian court to act as the court’s technical expert in a software copyright infringement dispute. I was then a real foreigner to the world of legal disputes, and so, I had to learn software forensic procedures from scratch before conducting a detailed forensic study and then preparing a forensic report on behalf of the court. With all that, I was still somehow able to successfully complete this judicial assignment. As a knock on effect of this success, I got attracted to the exciting world of cyber forensics and so, I decided to pursue cyber forensics further, parallel to my software development career. In just a few years, I saw myself specializing in cyber forensics, dedicating myself fully to this brand new area, acquiring a PhD in forensics of software copyright infringement, publishing a few research papers and finally, authoring a book on this topic. I have been a consultant to the Indian judiciary, police, intelligence agencies and many multinational companies on matters related to cyber crime and digital evidence for quite some time now.
Your IGI Global book,
Judiciary-Friendly Forensics of Software Copyright Infringement
, was just released a few months ago. Tell us a little about the book.
The book too was really unplanned. In 2012, IGI Global had a request to publish a reference book containing latest updates in forensics of software copyright infringement. Subsequently, the American company contacted me to write a reference book on this topic for the international audience in both software forensics and the judiciary. Till then, I hadn’t even thought of authoring such a book. However, by then I had a good collection of information on this topic, thanks not just to my Ph D work but also to my near- decade long practical involvement in this field. I thought that I should have these collected pieces of information published for the benefit of forensic researchers and law professionals worldwide as these pieces of information could potentially help them to contribute better.
Now, about the title. From my experience in software forensics, I had a feeling that, although there was rampant software copyright infringement, most affected parties were not approaching the court for legal redress. This may probably be due to a general feeling in the air that the legal and forensic systems of most countries are not prepared enough to handle software copyright infringement disputes. There may be some truth in this general feeling. The reasons for this feeling may well be: establishing software copyright infringement legally and judicially involves a forensic process which demands a high degree of awareness of the theory and practice of computer science and engineering together with a legal aptitude. As part of their forensic tasks, the forensic experts may have to obtain millions of codes, hundreds of databases, images and other related segments of the software of both the complainant as well as the accused. The experts then may have to sift through these pieces of software segments separately, and finally compare the two set of software segments in a scientific manner to obtain the required evidence to establish copyright infringement. So, this forensic task is complex, voluminous as well as demanding. Further, interpretation of the collected evidence in the context of copyright infringement laws of the country is a Herculean task for legal experts too. The title addresses these issues and provides ways to make the forensic tasks easier.
Who could most benefit from this publication?
The implications of the proceedings and activities of the software forensic process may not only affect the involved parties, the law enforcement personnel, and the judiciary, but also the (large group of) clientele of the involved parties. Hence, the affected parties, the involved parties, law enforcement personnel, legal officers, software developers as well as the software users should be properly informed of these matters. There has been a dearth of reference materials for them to get properly well-informed in this area. The need of the hour was a reference book which brings all the established as well as the new forensics procedures on one platform with their processes explained in a non-esoteric manner that is friendly to the judiciary as well as the lay people at large. This book was expected to fill this gap and does seem to be doing so.
What were some of your most interesting findings in the research and development of the book?
My findings as part of this book can be summarized as thus: (1) A new functional role of a couple of software elements, which can constructively contribute to the establishment of software copyright infringement; (2) a revised protocol by the name of POSAR to enhance AFC, the established forensic protocol in the US judiciary for establishing the merit of software copyright infringement disputes; and (3) some suggestive statistics in interactional pragmatics of court room discourse in software disputes.
The Washington Post
recently featured an article on the inaccuracies of law enforcement’s use of cell phone data. What are your thoughts regarding this issue? Can it happen in software copyright infringement cases too?
It is a good question, indeed. Before answering this question, I should explain the question’s background. In this digital world, people leave digital footprints of their activities. Mobile phones keep details of call records. The mobile service provider’s computer server keeps details of activities and movement of each mobile user under any particular mobile tower. Computers keep details of even each mouse-click. Because of all these, digital equipment can be a source of evidence to enter into and establish the user’s actions and intentions. However, each piece of evidence needs to be systematically collected, scientifically preserved and forensically analyzed by experts, before presenting it in the court. Procedurally collected and presented cyber evidence can surely help win any case in any country where cyber laws have already been properly amended.
Now, let me be specific on
The Washington Post
report. Just because your mobile phone number appears in the Call Details Record (CDR) of a particular tower near a crime scene cannot be a valid reason for the police to accuse you. Nevertheless, such unscientific accusations happen even in a scientifically well-developed country like America. This is what
The Washington Post
has recently revealed. There is truth in that report. I can further explain it thus: Signals from a mobile tower can travel a few kilometres before they fade. That means, your mobile phone can pick up a particular tower’s signals even if you are kilometres away from the tower. If your mobile phone has picked up signals from a particular tower situated near a crime scene, you will also be listed in the CDR (of that tower) along with the actual culprit. You can be one among the suspects. A good cyber forensic expert can scientifically measure the exact location of each suspect and thus assess his/her role in the crime. Without subjecting the CDR to such a detailed forensic study, no police officer can straightaway use just the CDR information to accuse you.
The Washington Post
has revealed that, even in the US, there seems to be an unscientific belief among police and law officials that CDR information does not require further scientific scrutiny.
This does not mean that CDR is a baseless document. For instance, if the police have already collected some other information which can be primarily evidential to the suspect's involvement in the crime, then the CDR information (that suspect was not anywhere else but well within the range of tower near the crime scene) adds value to that primary evidence. So, CDR is a valuable record.
The problem lies not with CDR per se but with those police and law officials who are not trained enough to properly use CDR to establish a crime. Lack of awareness on forensic collection of digital evidence is a basic issue across the world.
Can such issues come up in software copyright infringement cases too?
Yes, if the police and the judiciary do not strictly follow the software forensic standards. Just because two software packages look similar cannot be a reason for the court to establish guilt. Both the plaintiff’s and the defendant’s software can look similar when both of them graduate through the same educational system, or have used the same implementation technique from a particular text book or have strictly followed the same international programming standards. Because of these and many other factors, many globally similar elements can appear in the two software systems. So, before comparing two software systems, all globally similar elements (and also a few other unprotectable elements) need to be filtered out and removed from both the software systems in a scientific manner. Failing to do so can lead to wrong forensic decisions which can even lead to punishing an innocent.
Are the legal systems in various countries ready to deal with cases related to infringement of software copyright?
Legal systems in North America, Western Europe and Australia have already amended their general copyright laws to somehow accommodate software copyright and thus, are somewhat ready to deal such issues but all these legal systems still have a long way to go. For example, none of them have so far formulated a proper law specifically for software copyright. The rest of the world is far behind.
Where do you see the future of software forensics in regards to their role in society?
When the entire society is highly dependent on digital gadgets and when the entire constellation of digital gadgets runs on software, software forensics is going to play an important role in any criminal justice system.
Is there any message you would like to give to your readers as it pertains to your research?
Keep oneself away from both software piracy and use of pirated software.
Thank you very much, Dr. Bhattathiripad, for taking the time to speak about your research. I wish you the best of luck in your future study and endeavors.
Judiciary-Friendly Forensics of Software Copyright Infringement
is part of IGI Global's
Research Essentials Book Series
, a collection which offers succinct discussion on niche topics in a wide variety of subjects. Sized and priced appropriately, these concise, advanced, and timely resources will be perfect for supplementary course usage, targeted towards instructors and students, as well as the independent researcher looking for the most recent and innovative research in their field.
Dr. Bhattathiripad will also be presenting his research at the upcoming
6th International Conference on Digital Forensics and Cyber Crime (ICDF2C)
, in New Haven, CT, from September 18-20.
Browse for more posts in:
Computer Science and Information Technology
Security and Forensics
Software
Cyber Behavior
Cyber Warfare & Terrorism
Digital Crime & Forensics
Book Series
Books & E-Books
Research Essentials
Conferences
Presentations
India
Author News
Resources for Instructors
Resources for Researchers
No comments
Comments
Log in
or
sign up
to comment.
Be the first to comment!
Please complete the following form to proceed to the video:
First Name*:
Last Name*:
Email*:
Affiliation (Please do not provide abbreviations)*:
Highest Educational Degree Earned?*:
Your Major Areas of Research?*:
Submit
Close
More from IGI Global
Mar 26, 2024
A Q&A with Dr. Akwesi Assensoh-Kodua
Dr. Akwesi Assensoh-Kodua answered some questions about their background and what went into the development of their chapter...
IGI Global
Read More
Books & E-Books
Interview
Author News
Mar 21, 2024
Creepy Crawly Intruders Find a Home in a Human Nose
A Florida man sought medical attention for persistent nasal congestion. During the procedure, he discovered approximately 150 live bugs in his nose and sinus cavities, which caused discomfort and health risks...
IGI Global
Read More
Medical, Healthcare, and Life Sciences
Books & E-Books
Research Trends
Mar 14, 2024
You can Trust… AI?
As AI advances, companies are challenged to sell it to a skeptical public, addressing concerns such as job replacement by highlighting AI's role in enhancing human capabilities.
IGI Global
Read More
Computer Science and Information Technology
Artificial Intelligence
Research Trends
Mar 7, 2024
Teachers are Falling Behind the Times
EdTech providers are collaborating to address the interoperability challenge in educational technology, aiming to create a seamless experience for educators and students by developing common standards and protocols.
IGI Global
Read More
Feb 29, 2024
Participate in the IGI Global Annual Academic Publishing Trends & Open Access Survey 2024
In its second year, the IGI Global Annual Academic Publishing Trends & Open Access Survey 2024 seeks to create a realistic outlook on problems faced by the academic community and their potential solutions.
IGI Global
Read More
Open Access
Feb 29, 2024
An Open Letter from the President of IGI Global
A Message to Librarians from the President of IGI Global, Lindsay Wertman
IGI Global
Read More
Education
Business and Management
Computer Science and Information Technology
Newsletter
Books & E-Books
Journals
Open Access
Feb 23, 2024
Why Businesses Need Whistleblowers
The tourism industry faces challenges from unethical behaviors that damage trust and reputations. Whistleblowing emerges as a potential solution, where companies can encourage employees to report misconduct to identify and rectify problems swiftly, though barriers such as fear of retaliation and lack of protection for whistleblowers exist.
IGI Global
Read More
Business and Management
Research Trends
Feb 20, 2024
IGI Global Expands Journal Collaboration with ResearchGate
IGI Global is excited to announce a significant collaboration with ResearchGate, the premier platform for global scientific networking...
IGI Global
Read More
Journals
Articles
Open Access
Feb 20, 2024
How to Harness the Power of Social Media to Increase the Discoverability of Your Research
Recording Now Available of the Free Webinar Co-Hosted by: IGI Global and eContent Pro
IGI Global
Read More
Webinar
Contributor Collaboration
Feb 15, 2024
Turning the Human Heart into an Electrical Generator
In an article from Medicalnews.net, a remarkable breakthrough has emerged: an experimental wireless pacemaker that recharges...
IGI Global
Read More
Medical, Healthcare, and Life Sciences
Books & E-Books
Research Trends
First
Previous
1
2
3
4
5
6
7
8
9
10
...
Next
Last