Abstract
Along with the rapid growth of network applications and digital contents, online gaming has become a very successful industry in recent years. It not only brings tremendous business opportunities but also attracts marvelous customers to be online players. However, due to the lack of virtual property protection and related information security schemes, more and more players have violated the law because of its real world profit. Unfortunately, online gaming crime has turned out one of the most serious cybercrimes in many countries, such as in Taiwan, South Korea, China, and so on. In order to solve this judicial problem and effectively protect virtual property, we propose a Virtual Property Description Language (VPDL) as the syntax to record and express virtual property. There are six models, including Identity Model, Ownership Model, Trading Model, Content Model, Revocation Model, and Security Model. It can effectively protect virtual property and strengthen the competence of digital evidence by recording the legal source, ownership, trading track, and handling of virtual properties so as to lower the cases of online gaming crime. The online gaming companies may use it in the aspects of virtual property management, tracing historic records and collecting legal digital evidence, while the existing system mechanism of online game doesn’t need to be changed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lin, Y.S., Chou, S.L.: Online Games Brings up Valuable Ways (in Chinese), MIC, C6 Edition, Economic Daily News (2006)
Wang, S.W.: No-lives Live out their second lives through Online Games (in Chinese), Common Wealth Magazine, No.379 (2007)
DFC Intelligence, Online Game Market Forecasted to Reach $13 Billion by 2011 (858) 780-9680 (2006)
NCSoft, Earnings Release 4Q 2003, NCsoft Corp. (2004)
Police Administration Bureau, Police Administration Statistical Aviso (in Chinese), No. 35 (2006)
Chen, L.J.: Consumption Dispute Online Games Topped Last Year (in Chinese), C4 Edition, Taipei Overall, The United Daily News (January 27, 2006)
Jamieson, J.: Online gaming portal for crime Cyber-crime - expert warns the problem could find its way to North America, The Province Newspaper, Vancouver, Canada (2004)
Chen, Y.C., Chen, P.S., Hwang, J.J., Korba, L., Song, R., Yee, G.: Analysis of Online Gaming Crime Characteristics. Journal of Internet Research (2005)
Yan, J.J., Choi, H.J.: Security Issues in Online Games. The Electronic Library: International journal for the application of technology in information environments, 3–8 (2001)
Song, R., Korba, L., Yee, G., Chen, Y.C.: Protection of Virtual Property in Online Gaming. In: Proceedings of 2005 Conference on Distributed Multimedia Systems, Banff, Alberta, Canada (2005)
Song, R., Korba, L., Yee, G., Chen, Y.C.: Protect Virtual Property in Online Gaming System. International Journal of Software Engineering and Knowledge Engineering (IJSEKE) 17(4), 483–496 (2007)
Kaihara, S.: Realization of the computerized patient record - relevance and unsolved problems. International Journal of Medical Informatics (49), 1–8 (1998)
van der Haak, M., Wolff, A., Brandner, R., Drings, P., Wannenmacher, M., Wetter, T.: Data security and protection in cross-institutional electronic patient records. International Journal of Medical Informatics (70), 117–130 (2003)
Hwang, J.J., Chou, S.L., Yeh, Y.J., Tsai, R.L.: Protecting information integrity for electronic patient records. Journal of Information Management 13(4) (2006)
Huang, C.C.: Information Security-Basis of E-commerce (in Chinese). Hwa Tai Publishing, Taipei (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, P.S., Hung, CY., Ko, CH., Chen, YC. (2008). Preservation of Evidence in Case of Online Gaming Crime. In: Yang, C.C., et al. Intelligence and Security Informatics. ISI 2008. Lecture Notes in Computer Science, vol 5075. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69304-8_23
Download citation
DOI: https://doi.org/10.1007/978-3-540-69304-8_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69136-5
Online ISBN: 978-3-540-69304-8
eBook Packages: Computer ScienceComputer Science (R0)