Towards a Conceptualization of Social Entrepreneurship in Higher Education.
The International Journal of Management Science and InformationTechnology (IJMSIT), NAISIT Publishers, Toronto , Vol. II. No. 10
Readiness Index 2012: Benchmarking ICT Progress and Impacts for the Next Decade.
In: Dutta, S. & Bilbao-Osorio, B. (eds) The Global InformationTechnology Report, 2012. Living in a Hyperconnected World. Geneva
, K. , & O'Malley , K. ( 2015 ). Educational technology: A review of the integration, resources, and effectiveness of technology in K-12 classrooms . Journal of InformationTechnology Education: Research , 14 , 397 – 416 . 10.28945/2298 Doiz
Authors:Aranka Varga, Fanni Trendl and Kitti Vitéz
academic path. Table 1. Differences in training levels among the members of the study group ( N : 27) Faculty Persons Level Persons Faculty of Medicine 1 VET a 2 Faculty of Humanities 11 BA /BSc 9 Faculty of InformationTechnology 4 MA 1 Faculty of Arts 1
In Hungary, there is an active practice for inspecting crimes committed in information technology environments as well as crimes affecting intellectual property as the two areas often overlap. Recently a criminal infringement of copyright occurred in a very special environment — the virtual world of Second Life. In this paper, the questions raised by the above-mentioned case from a legal and IT forensic perspective will be present along with the recommended answers from the authors.
The first half of the paper will present the specialties of virtual world environments and how the criminal investigation was started. General criminal procedure norms governing IT forensics will be discussed. The question of how copyright law protects avatars or virtual items in Second Life and how the financial value of a virtual item can be determined will be answered. The remainder of the paper will present, in detail, the IT forensic examination of the concrete criminal case where illegal copies of avatars appeared in Second Life. The question regarding how digital evidences can be obtained from simulated virtual environments from a legal and IT forensic perspective will be discussed in details.
The paper was written in order to stimulate interest in the special field of relationship between IT forensics, criminal law and virtual worlds because there are hardly any articles dealing with the aforementioned problem in scientific literature.