scholarly journals “Intellectual property theft by predatory publishers recruited in Academia can be facilitated through public engagement and spam emails”

2020 ◽  
Author(s):  
Pardis Tabaee Damavandi

Harassment in deprived areas is not uncommon, but it is never-ending.

Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 1987
Author(s):  
Md. Selim Hossain ◽  
Md. Habibur Rahman ◽  
Md. Sazzadur Rahman ◽  
A. S. M. Sanwar Hosen ◽  
Changho Seo ◽  
...  

In this work, we examine the privacy and safety issues of Internet of Things (IoT)-based Precision Agriculture (PA), which could lead to the problem that industry is currently experiencing as a result of Intellectual Property Theft (IPT). Increasing IoT-based information flow in PA will make a system less secure if a proper security mechanism is not ensured. Shortly, IoT will transform everyday lives with its applications. Intellectual Property (IP) is another important concept of an intelligent farming system. If the IP of a wise farming system leaks, it damages all intellectual ideas like cultivation patterns, plant variety rights, and IoT generated information of IoT-based PA. Thus, we proposed an IoT enabled SDN gateway regulatory system that ensures control of a foreign device without having access to sensitive farm information. Most of the farm uses its devices without the use of its integrated management and memory unit. An SDN-based structure to solve IP theft in precision farming has been proposed. In our proposed concept, a control system integrates with the cloud server, which is called the control hub. This hub will carry out the overall PA monitoring system. By hiring the farm devices in the agricultural system, these devices must be tailored according to our systems. Therefore, our proposed PA is a management system for all controllable inputs. The overall goal is to increase the probability of profit and reduce the likelihood of IPT. It does not only give more information but also improves information securely by enhancing the overall performance of PA. Our proposed PA architecture has been measured based on the throughput, round trip time, jitter, packet error rate, and the cumulative distribution function. Our achieved results reduced around (1.66–6.46)% compared to the previous research. In the future, blockchain will be integrated with this proposed architecture for further implementation.


Author(s):  
Andrea Schoepfer

Studies of white-collar crime have largely focused on the crimes and immoral and unethical actions of adults during the course of their legitimate occupations, yet adults are not the only offenders, and white-collar crimes don’t always require employment. By narrowing the focus to who can offend, we may miss out on a fuller understanding of the phenomenon. The specific category of “white-collar delinquency” has been proposed to address this gap in the research. The original conceptualization of white-collar delinquency focused on crimes of juveniles that are of major financial and social consequence. The concept largely focuses on computer crimes, fraud, and crimes of skill, including piracy, securities fraud, espionage, denial of service attacks, hacking, identity fraud, dissemination of worms and viruses, and other crimes that can result in serious economic harm. Just as juveniles engage in conventional street crime offenses as do adult offenders, they also possess the ability to engage in white-collar offenses as do adult offenders, and there is a need to study the two age groups separately, as motivations, influences, and opportunities may differ. The literature thus far has largely ignored juvenile involvement in white-collar crimes due to the nature of the phenomenon, the reliance on offender-based definitions, and the presumption of opportunities to engage in the actions. Some white-collar offenses that were historically committed exclusively by adults have a place in the juvenile community as well. This “migration” has taken place for a number of reasons, with the majority of them closely tied to the nearly limitless access juveniles currently have to technology. Due to the overwhelming popularity of personal computers in homes and marked advancements in technology, opportunities for hybrid white-collar crimes (e.g., credit card fraud, identity theft, hacking, phishing, general fraud, intellectual property theft, financial/bank fraud) have dramatically increased, yet criminological studies focusing on technology related crimes have, until recently, been relatively sparse, and studies of fraud have predominately focused on characteristics of the victims as opposed to the offenders. As access to computers and the internet grow, so too do opportunities to engage in these types of crimes. Juveniles are able to interact with others from the privacy of their own homes with the benefit of complete anonymity. This anonymity may contribute to the appeal of computer-related delinquency, as such acts involve almost no confrontation and no violence, and are individualistic in nature. These individualistic crimes may attract those who would normally avoid more conventional crimes that involve confrontation. Technology has opened the door for a new type of offender and new types of offending. Although it is difficult to identify an exact dollar amount, financial losses from serious computer crimes such as audio, video, and software piracy; security breaches; and intellectual property theft are likely to exceed the financial losses from conventional crimes, and it is therefore imperative that more attention be given to these types of crimes and perpetrators. Theoretical explanations for this new category of crime have not yet been fully explored for many reasons. First, technology advances much faster than the laws regulating behavior. Second, apprehension and prosecution for crimes of technology are relatively low, and thus little data exists for theory testing with these crimes and offenders. Finally, computer and technology crimes fall into a gray area; they are not necessarily either property crimes or traditional white-collar crimes. In criminology, computer crimes tend to fall into a “hybrid” or “other” category of white-collar crime and as such are often ignored in studies on white-collar crime. Furthermore, juveniles are often overlooked in white-collar crime research due to their status and limited access to opportunity. By proposing the term “white-collar delinquency,” researchers hope to bring more focus to the understudied topic of juveniles engaging in crimes of serious economic consequence.


Author(s):  
Abhrajit Sengupta ◽  
Nimisha Limaye ◽  
Ozgur Sinanoglu

Logic locking is a prominent solution to protect against design intellectual property theft. However, there has been a decade-long cat-and-mouse game between defenses and attacks. A turning point in logic locking was the development of miterbased Boolean satisfiability (SAT) attack that steered the research in the direction of developing SAT-resilient schemes. These schemes, however achieved SAT resilience at the cost of low output corruption. Recently, cascaded locking (CAS-Lock) [SXTF20a] was proposed that provides non-trivial output corruption all-the-while maintaining resilience to the SAT attack. Regardless of the theoretical properties, we revisit some of the assumptions made about its implementation, especially about security-unaware synthesis tools, and subsequently expose a set of structural vulnerabilities that can be exploited to break these schemes. We propose our attacks on baseline CAS-Lock as well as mirrored CAS (M-CAS), an improved version of CAS-Lock. We furnish extensive simulation results of our attacks on ISCAS’85 and ITC’99 benchmarks, where we show that CAS-Lock/M-CAS can be broken with ∼94% success rate. Further, we open-source all implementation scripts, locked circuits, and attack scripts for the community. Finally, we discuss the pitfalls of point function-based locking techniques including Anti-SAT [XS18] and Stripped Functionality Logic Locking(SFLL-HD) [YSN+17], which suffer from similar implementation issues.


2019 ◽  
Vol 13 (4) ◽  
pp. 509-528
Author(s):  
James Reardon ◽  
Denny McCorkle ◽  
Anita Radon ◽  
Desalegn Abraha

Purpose Intellectual property theft amounts to billions of dollars per year worldwide. The first step in stemming this loss is to understand the underlying precursors of this behavior. This paper aims to propose and test a model of consumer choice to purchase or pirate intellectual property, specifically music. This paper combines and applies the theory of reasoned action (TRA) and Becker’s theory of crime to develop a more comprehensive model of digital piracy behavior. Culture was tested as an antecedent to the attitudes and the perceptions of risk associated with music piracy. Design/methodology/approach A survey of 4,618 participants was conducted across 23 countries. Construct measures were validated using confirmatory factor analysis in LISREL. A conceptual model was tested using logistic structural equation modeling in MPlus. Respondents were asked about the last music they acquired to test a behavioral model of music piracy. Findings The results indicated that culture, specifically rule orientation and uncertainty avoidance, had a significant impact on attitudes toward the music industry, ethical perceptions of music piracy and risk perceptions. Respondents’ ethical perceptions of downloading had the highest impact on music piracy behavior. The personal/copy risk associated with the illegal downloading of music had a significant impact while the relative channel risk did not. The market value, quality and selection also had a significant impact on downloading behavior, as did the respondent's ability to find and download music. Research limitations/implications While this paper was limited by focusing on the illegal downloading of music, the results can provide guidance in the design of future research concerning the piracy and unlicensed downloading of other types of intellectual properties such as movies/videos, TV, paywall content and e-books. Practical implications In recent years, improved access to music and video through online streaming and online stores has significantly decreased music piracy. This research indicated that further inroads into this behavior could be made through better online purchase access and through consumer education about the ethics and results of digital downloading. Further, efforts are more efficient by targeting cultures with lower levels of rule orientation with ethics education and targeted risk messages in countries with higher uncertainty avoidance. Social implications Yearly losses to the music industry amount to about $5-29bn. Many find music and video downloading and “sharing” as acceptable. The model developed in this research has implications to affect this mass loss of revenue to the music industry and perhaps the societal view of downloading behavior that is illegal but commonly accepted. Originality/value This model is the first to integrate cultural aspects into models of digital piracy. In addition, the model is developed from a strong theoretical base (TRA and Becker’s theory of crime) to integrate multiple antecedents to intellectual property theft research.


Author(s):  
Shun-Yung Kevin Wang ◽  
Jeremy J McDaniel

Stealing ideas is not something new, but stealing and transporting ideas in a massive amount has become possible in the era of the Internet, in which this group of incidents emerged rapidly. Based on the frameworks of criminological theory/thesis, this chapter intends to elaborate intellectual property theft and piracy emerged in the cyberspace. Contemporary cases of intellectual property theft and piracy are used to illustrate the blurred line between victims and offenders, especially in the era of Internet. The impacts of related information technology should be carefully appraised, as more and more intellectual properties are in digital format.


Author(s):  
Shun-Yung Kevin Wang ◽  
Jeremy J McDaniel

Stealing ideas is not something new, but stealing and transporting ideas in a massive amount has become possible in the era of the internet. Based on the frameworks of criminological theory/thesis, this chapter intends to elaborate intellectual property theft and piracy in cyberspace. Contemporary cases of intellectual property theft and piracy are used to illustrate the blurred line between victims and offenders. The impacts of related information technology should be carefully appraised, as more and more intellectual properties are in digital format.


Sign in / Sign up

Export Citation Format

Share Document