• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • 1
  • 1
  • Tagged with
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Automated Analysis of End User License Agreements / Automated Analysis of End User License Agreements

Hussain, Faisal Mateen & Irfan January 2011 (has links)
Context Spyware is “computer software that obtains information from a user's computer without the user's knowledge or consent” [25]. Spyware is often embedded in another application and is usually stated in End User License Agreement (EULA) [20]. However it is quite common to accept the EULA without even reading it. Therefore beside the traditional spyware analysis techniques, automated EULA analysis can be helpful for common users in order to identify the spyware [18]. Objectives The techniques of automated EULA analysis do exist however the process of taking a binary application, analyze it, and prepare it in order to extract the EULA has not been studied in existing research. There is a need for such a tool that can extract and analyze the EULA text from an installer binary without executing it. Objectives of this research are to investigate the techniques to unpack the binary file, extract the EULA, analyze it and present the analysis results to the end user. Methods In order to establish basic understanding of the related concepts preliminary study is done. In this study a number of article sources are used, including ACM Digital Library, Compendex, Inspec, IEEE Xplore, and Springer Link. Material has been selected after reading titles and summaries. Prototype of an open source tool is designed and developed. This tool extracts the EULA from executable binary installers, analyzes the extracted text and gives suggestions about legitimate level of the software. Results To evaluate our application we downloaded 150 executables from different web sites, which were already classified as bad or good by [23]. We used our tool to extract EULA text from executables. We were able to extract EULA from 48 percent of selected binary files. Analysis of extracted EULAs was also done to classify the software as good or bad. This analysis assists the user to make a decision to accept or reject the installation of software without reading even a single word of EULA. During the extraction and analysis process there was no significant impact on performance of the host system. Conclusion We conclude that EULA can be extracted from a binary file without executing it. However because of limited time it was not possible to extract EULA from all installer binaries. The rate of EULA extraction can be improved in future research.
2

Ochrana počítačových her a videoher / Protection of Computer Games and Video Games

Kamenický, Lukáš January 2021 (has links)
Protection of Computer Games and Video Games Abstract The topic of this thesis is the legal protection of computer games and video games. Its main goal is to analyse the Czech law of video game protection and to figure out if the current state of legislation is sufficient enough considering the quick growth of the gaming industry by comparing it to the legislation in other countries and pondering de lege ferenda possibilities. The secondary goal of this study is to serve as a brief and practical guide for game creators who are having a hard time with regards to legal protection of their own creations. The thesis does not only revolve around the Czech national law, but it also deals with international law and Community law upon which the Czech law is based. The thesis is divided into six parts. The first part lays down the main goals of the study and possible ways of achieving them. The second part goes through the most important theoretical concepts, terminology and video game history, through which it introduces the reader to video games. The third part focuses on international treaties potentially applicable to video game protection, on the US law, and finally on the European Union law and the law in a few specific European countries. The fourth part introduces in detail all the possible legal forms of...
3

”Bannad? Det är ju oskäligt!” : En fall- och litteraturstudie om de allmänna användarvillkorens roll i samband med avstängning av spelare i videospel / ”Banned? That’s unfair!” : A case- and literature study concerning the role of standardized terms of use in connection with player suspensions in videogames

Johansson, Markus January 2023 (has links)
No description available.

Page generated in 0.1006 seconds