Abstract
In recent decades, copyright violations have been moving into the criminal realm. This paper focuses on one fictitious P2P model, and discusses whether it contributes to the crime of copyright infringement for being involved in dealing with the distribution of digital content. After the perspective of digitized forensic investigation in the action research and the whole control mechanism, the facts show that a commercial server has full control over the P2P model.
This work was supported in part by National Science Council in R.O.C. under Grant No. NSC 93-2213-E-015-001.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Digital Forensics Research Workshop. A Road Map for Digital Forensics Research (2001), http://www.ijde.org/archives/02_fall_art2.html
Levy, E., Arce, I.: Criminals become Tech Savvy. IEEE Security and Privacy 2(2) (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kao, DY., Wang, SJ., Huang, F.FY. (2006). Digitized Forensic Investigation at P2P Copyright Controversy, Infringement. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, FY. (eds) Intelligence and Security Informatics. ISI 2006. Lecture Notes in Computer Science, vol 3975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11760146_72
Download citation
DOI: https://doi.org/10.1007/11760146_72
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34478-0
Online ISBN: 978-3-540-34479-7
eBook Packages: Computer ScienceComputer Science (R0)