Search Results

You are looking at 1 - 10 of 18 items for :

  • "Information Technology" x
  • Social Sciences and Law x
Clear All

Outcomes. In: Soumitra, D. – Geiger, T. – Lanvin, B. (eds): The Global Information Technology Report 2015. Geneva, ICTs for Inclusive Growth World Economic Forum and INSEAD. 5

Open access

) Towards a Conceptualization of Social Entrepreneurship in Higher Education. The International Journal of Management Science and Information Technology (IJMSIT), NAISIT Publishers, Toronto , Vol. II. No. 10

Open access

Stolterman, E. – Fors, C. A. (2004) Information Technology and the Good Life. In: Information Systems Research: Relevant Theory and Informed Practice. p. 689. 31 Svecnik, E

Open access
Educatio
Authors: Balázs Hámori and Katalin Szabó†

Readiness Index 2012: Benchmarking ICT Progress and Impacts for the Next Decade. In: Dutta, S. & Bilbao-Osorio, B. (eds) The Global Information Technology Report, 2012. Living in a Hyperconnected World. Geneva

Open access

Informatics. Subotica. 27 Mumtaz, S. (2000) Factors Affecting Teachers’ Use of Information and Communications Technology: a Review of the Literature. Journal of Information

Open access

) OECD Information Technology Outlook 2010 . OECD Publishing. 47 OECD (2014) Report by the Public Governance Committee on the Implementation of the Recommendation of

Open access

, K. , & O'Malley , K. ( 2015 ). Educational technology: A review of the integration, resources, and effectiveness of technology in K-12 classrooms . Journal of Information Technology Education: Research , 14 , 397 – 416 . 10.28945/2298 Doiz

Open access

academic path. Table 1. Differences in training levels among the members of the study group ( N : 27) Faculty Persons Level Persons Faculty of Medicine 1 VET a 2 Faculty of Humanities 11 BA /BSc 9 Faculty of Information Technology 4 MA 1 Faculty of Arts 1

Open access

In Hungary, there is an active practice for inspecting crimes committed in information technology environments as well as crimes affecting intellectual property as the two areas often overlap. Recently a criminal infringement of copyright occurred in a very special environment — the virtual world of Second Life. In this paper, the questions raised by the above-mentioned case from a legal and IT forensic perspective will be present along with the recommended answers from the authors.

The first half of the paper will present the specialties of virtual world environments and how the criminal investigation was started. General criminal procedure norms governing IT forensics will be discussed. The question of how copyright law protects avatars or virtual items in Second Life and how the financial value of a virtual item can be determined will be answered. The remainder of the paper will present, in detail, the IT forensic examination of the concrete criminal case where illegal copies of avatars appeared in Second Life. The question regarding how digital evidences can be obtained from simulated virtual environments from a legal and IT forensic perspective will be discussed in details.

The paper was written in order to stimulate interest in the special field of relationship between IT forensics, criminal law and virtual worlds because there are hardly any articles dealing with the aforementioned problem in scientific literature.

Restricted access

in the EU: A Proposal for the Regulation of Accredited Providers ’ ( 2010 ) 1 International Journal of Law and Information Technology 1 – 28 . Cortés , Pablo , Online

Restricted access