Dissertations / Theses on the topic 'Computer software / Law and legislation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Computer software / Law and legislation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Nichols, Kenneth Nolan. "Technical-legal aspects of software patents." CSUSB ScholarWorks, 1996. https://scholarworks.lib.csusb.edu/etd-project/1249.
Full textKarjiker, Sadulla. "Open-source software and the rationale for copyright protection of computer programs." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/80044.
Full textENGLISH ABSTRACT: The rationale for the legal protection of copyright works is based on the perceived need to encourage the creation of works which are considered to be socially beneficial. By awarding authors proprietary rights in their creations, copyright law allows authors the ability to earn direct financial returns from their efforts, and, thus, copyright law provides the required incentives for authors to create copyright works. Since the early days of commercial software development, copyright protection has been extended to computer programs; thus, by providing such protection it was assumed that their production should be encouraged, and that without such protection they will not be produced to the extent required by society. Comparatively recently, we have witnessed large-scale production of open-source software, which is licensed on generous terms, giving users the right to freely use, modify and redistribute such software. By adopting such licensing terms, the authors of open-source software are unable to charge licensees a fee for permission to use their software, which is the reward which copyright assumes authors seek to create such software. This development has made it necessary to re-evaluate the rationale for copyright protection of computer programs, and determine whether the continued protection of computer programs is justifiable. This study seeks to first establish a coherent theoretical justification for copyright protection, which it is submitted should be an economic justification, rather than a moral justification. The legal analysis in this work seeks to establish whether the copyright protection of computer programs is consistent with the economic justification for copyright protection. In particular, the analysis focuses on the current scope of copyright protection, and seeks to establish whether such protection is excessive, stifling creativity and innovation, and, thus, imposing too high a social cost. It is contended that copyright doctrine has generally sought to minimise these costs, and that current scope of copyright protection of computer programs leaves enough creative room for the production of new software. Despite the fact that the effect of open-source software licences is that authors are unable to earn the direct financial rewards which copyright enables authors to earn as an incentive to create such software, their authors continue to have financial incentives to create such software. Commercial firms who invest in open-source software do so because they seek to provide financially-rewarding related services in respect of software, or because it serves to promote sales in their complementary products. Similarly, the participation of individual computer programmers is largely consistent with the standard economic theories relating to labour markets and the private provision of public goods. Individuals are principally motivated by economic motives, such as career concerns. Copyright protection gives participants the choice to opt for the direct financial rewards which its proprietary protection enables, or the more indirect financial rewards of open-source software development. It is submitted within this research that rather than undermining the rationale for copyright protection of computer programs, the development of open-source software has illustrated that copyright protection allows for the emergence of alternative business models, which may be more economically advantageous to authors.
AFRIKAANSE OPSOMMING: Die rasionaal agter outeursregbeskerming wat deur die reg verleen word is gebasseer op 'n behoefte om die skepping van werke wat sosiaal voordelig geag word te bevorder. Outeursreg verleen aan outeurs direkte finansiële vergoeding vir hul inspanning deur die vestiging van eiendomsreg oor hul werke. Dus, outeursreg voorsien outeurs van die nodige insentiewe om sulke werke te skep. Sedert die begindae van kommersiële sagteware ontwikkeling, is outeursregbeskerming uitgebrei om aan rekenaarprogramme sulke beskerming te bied. Deur die bied van outeursregbeskerming word daar aangeneem dat die ontwikkeling van rekenaarprogramme aangemoedig word en dat sonder die genoemde beskerming programme nie geproduseer sal word tot in 'n mate benodig deur die samelewing nie. Onlangs egter, is daar 'n grootskaalse ontwikkeling van oopbronsagteware opgemerk. Hierdie sagteware word onder ruime terme gelisensieer en gee aan gebruikers die reg om die genoemde sagteware te gebruik, te wysig en vrylik te versprei. Deur sulke terme van lisensiëring aan te neem word outeurs verhoed om vanaf lisensiehouers 'n fooi te vorder vir die toestemming om die sagteware te gebruik. Outeursreg neem aan dat hierdie vergoeding die basis vorm waarom outeurs sulke sagteware ontwikkel. Hierdie ontwikkeling maak dit nodig om die rasionaal agter outeursregbeskerming van rekenaarprogramme te her-evalueer en ook om vas te stel of die volgehoue beskerming van rekenaarprogramme regverdigbaar is. Hierdie studie poog om, eerstens, 'n samehangende teoretiese regverdiging vir outeursreg te vestig. Daar word aan die hand gedoen dat hierdie beskerming 'n ekonomiese, eerder as 'n morele regverdiging as grondslag moet hê. Die regsontleding vervat in hierdie werk poog om vas te stel of die outeursregbeskerming wat aan rekenaarprogramme verleen word in lyn is met die ekonomiese regverdiging van outeursregbeskerming. Die analise fokus in besonder op die huidige bestek van outeursregbeskerming en poog om vas te stel of sodanige beskerming oormatig is, of dit kreatiwiteit en innovasie onderdruk en derhalwe te hoë sosiale koste tot gevolg het. Daar word geargumenteer dat outeursreg in die algemeen poog om sosiale koste te verlaag en dat die huidige omvang van outeursregbeskerming van rekenaarprogramme voldoende kreatiewe ruimte vir die ontwikkeling van nuwe sagteware laat. Die effek van oopbronsagteware is dat outeurs nie in staat is om direkte finansiële vergoeding te verdien, wat as insentief gesien word vir die ontwikkeling van sagteware, nie. Ten spyte hiervan is daar steeds voldoende finansiële insentiewe om sodanige sagteware te ontwikkel. Kommersiële firmas belê in oopbronsagteware om finansiëel lonende verwante dienste ten opsigte van sagteware te voorsien. Dit kan ook dien om verkope in hul onderskeie aanvullende produkte te bevorder. Eweweens is die deelname van individuele rekenaarprogrameerders oorwegend in lyn met die standaard ekonomiese teoriëe ten opsigte van die arbeidsmark en die privaat voorsiening van openbare goedere. Individue word gemotiveer deur ekonomiese motiewe, soos byvoorbeeld oorwegings wat verband hou met hul loopbane. Outeursregbeskerming bied aan deelnemers die keuse om voordeel te trek uit die direkte finansiële vergoeding wat moontlik gemaak word deur outeursregbeskerming of uit die meer indirekte finansiële vergoeding gebied deur die ontwikkeling van oopbronsagteware. In hierdie navorsing word daar geargumenteer dat die ontwikkeling van oopbronsagteware geillustreer het dat outeursregbeskerming die onstaan van alternatiewe besigheidsmodelle toelaat wat ekonomies meer voordelig is vir outeurs in plaas daarvan dat dit die rasionaal vir die outeursregbeskerming van rekenaarprogramme ondermyn.
Bac, Joanna Ewa. "Software intelligence (SI), dependent legal personhood & SI-human amalgamation : an evolutionary step for US patent law and SI." Thesis, University of Aberdeen, 2018. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=237873.
Full textHodge, Dominic Shaughn. "The income tax consequences of the in-house development of software." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1013550.
Full textEverett, Christopher E. "Fundamentals of software patent protection at a university." Master's thesis, Mississippi State : Mississippi State University, 2003. http://library.msstate.edu/etd/show.asp?etd=etd-01062003-174536.
Full textForsyth, Guy, and N/A. "A minimalist sui generis legislative proposal for the application of common law principles to the protection of computer software." University of Canberra. Law, 1998. http://erl.canberra.edu.au./public/adt-AUC20090714.142532.
Full textDogan, Fatih. "Patentrechtlicher Schutz von Computerprogrammen." Berlin wvb, Wiss. Verl, 2005. http://www.wvberlin.de/data/inhalt/dogan.htm.
Full textLouw, Sanelda. "Die belastingaftrekbaarheid van sagteware." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/20434.
Full textENGLISH ABSTRACT: The aim of this study is to determine the applicability of the various South African Income Taxation Act sections on the deduction of software costs. A distinction is made between the various deduction sections in the Income Taxation Act that are applicable to software costs. By doing this an appropriate taxation deduction is recommended for the different types of software costs that the taxpayer incurs. Software assets and expenditure can be divided into various categories based on the acquisition agreement. The rights and assets that are obtained, differ for each category of software cost. In some instances a copyright is obtained and in other instances only a right of use is obtained. Furthermore the taxpayer receives intellectual property, an intangible asset, and/or a tangible asset. A literature study and an analysis of the different types of software costs and the four concerned Income Taxation Act sections serve as background for the consideration of the applicability of each specific deduction section in the Income Taxation Act on the various categories of software costs. By using the information obtained in the literature study and the analyses, a recommendation is made of the most applicable deduction article for each category of software cost.
AFRIKAANSE OPSOMMING: Hierdie studie het ten doel om die toepaslikheid van die verskillende Suid-Afrikaanse Inkomstebelastingwetsartikels, op die aftrekking van sagtewarekoste te bepaal. 'n Onderskeid word getref tussen die verskillende aftrekkingsartikels wat van toepassing is op sagtewarekoste in die Inkomstebelastingwet. Sodoende word 'n geskikte belastingaftrekking vir die verskillende tipes sagtewarekoste voorgestel wat deur elke belastingpligtige aangegaan word. Sagtewarebates of -uitgawes kan in verskillende kategoriee verdeel word na aanleiding van die verkrygingsooreenkoms wat aangegaan is. Die regte en bates wat verkry word verskil ten opsigte van elke kategorie sagtewarekoste. In sommige gevalle word 'n outeursreg verkry en in ander gevalle slegs 'n gebruiksreg. Verder kan of intellekuele eiendom, 'n ontasbare bate, en/of 'n tasbare bate verkry word. 'n Literatuurstudie en analise van die verskillende tipes sagtewarekoste en die vIer betrokke Inkomstebelastingwetsartikels dien as agtergrond vir die oorweging van die toepaslikheid van elke spesifieke aftrekkingsartikel in die Inkomstebelastingwet op die onderskeie kategoriee sagtewarekoste. Daama word die inligting wat bekom is in die literatuurstudie en analise gebruik om die mees toepaslike aftrekkingsartikel vir elke kategorieë sagtewarekoste voor te stel.
Lundström, Justus, Jonas Widriksson, and Viktor Zaunders. "Changes in media consumption and file sharing : The impact of legislation and new digital media services." Thesis, Jönköping University, JIBS, Business Informatics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-12534.
Full textIn this study we investigate how the attitude and behaviour concerning illegal file shar-ing have changed among the young population in Sweden. The study will analyze the impact of the IPRED law that was introduced in April 2008 and new digital media ser-vices that have emerged in the last couple of years. It is also evaluated which of these have had the most impact on the attitude and behaviour of the selected population.
The main part of our research consists of a quantitative survey handed out to a sample population among high school students (ages 16-20) in Jönköping, Sweden. This pri-mary data is later compared to secondary data from a similar study that was done on the same demographics two years prior to this research in order to measure the change in behaviour and attitude. The previous study was conducted prior to the IPRED law im-plementation by one of the authors. We also used prior research within this subject and related fields to further understand and interpret our data.
What we have discovered through our research is that there has been a decrease in ille-gal file sharing, especially when considering music, however this decrease is much more an effect of the adopting of new media services then it can be attributed to the IPRED law. Furthermore, the attitudes towards file sharing have remained unchanged and a large number of young adults do not feel that file sharing should be illegal.
It is also concluded that good legal alternatives to file sharing have a large market po-tential if these services can fulfil consumers demand on availability and price. Addition-ally we have found that good legal alternatives are important if the public is to refrain from returning to their old file sharing habits once the initial scare from new legislation has worn off.
Kacher, Benjamin Lawrence. "Commercial Computer Software License Rights in Defense Acquisition." Thesis, The George Washington University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1566105.
Full textThe tremendous growth of the commercial software industry in the United States represents an excellent opportunity for the United States Department of Defense ("DoD") to acquire quality software products that will help the DoD achieve its missions. However, the DoD struggles to acquire commercial computer software ("CCS") and commercial computer software documentation ("CCSD") effectively because of the inconsistencies and contradictions found in its rules governing the acquisition of CCS and CCSD.
The DoD's rules governing the acquisition of CCS and CCSD appear simple on the surface and represent an admirable attempt to enable the DoD to more easily acquire CCS and CCSD in the commercial marketplace and to allow commercial vendors to sell their products to the DoD. However, these rules contain many unseen inconsistencies and problems and therefore lead to many areas of confusion and even contradiction.
The primary purpose of this paper is to find ways to help the DoD and CCS vendors work together more effectively, by explaining the DoD's rules governing acquisition of CCS and CCSD, explaining fourteen primary problem areas associated with the acquisition of CCS and CCSD and, finally, by exploring potential solutions to these problems.
Mashinini, Thethiwe Nomalanga. "The computer software patent debate : a double-edged sword?" Diss., University of Pretoria, 2016. http://hdl.handle.net/2263/60064.
Full textMini Dissertation (LLM)--University of Pretoria, 2016.
Mercantile Law
LLM
Unrestricted
Ital, Eric Guy. "Copyright law and the Internet : in modern South African law." Thesis, Stellenbosch : Stellenbosch University, 2000. http://hdl.handle.net/10019.1/51666.
Full textENGLISH ABSTRACT: The Internet is coming more and more into focus of national and international legislation. Especially with regard to copyright law, the rapid growth of the Internet, its global character, its novel technical applications and its private and commercial use by millions of people makes the control over a work complicated and raises copyright problems all over the world. Present legislation is therefore challenged to avoid gaps in the law. Considering the rapid growth of online providers and users in South Africa, it is likely that copyright disputes with regard to the Internet will evolve here soon. In this dissertation, the "world" of the Internet and its lawfulness with regard to existing South African copyright law will be examined. The examination tries to establish whether South African copyright law is able to cope with the present Internet problems and whether it leads to reasonable results. The first chapter of this dissertation will give an overview of the basic principles of the Internet, including the history, development and function of the Internet. Furthermore the changing aspects by means of diqital technology will be discussed. Because the global character of the Internet lead to "international" infringements, governments are considering the prospect of reaching international accord on the protection of intellectual property in the digital era. In chapter two, the present international harmonisation of copyright law will be introduced. Especially the quick adoption of the World Intellectual Property Organisation Treaties in December 1996 demonstrated that an international realisation for a call for action is existing. In chapter three, the application of South African copyright law with regard to the Internet will be discussed. First, it will be examined if a digital work on the Internet is protected in the same way as a "traditional" work. Second, the various rights of the copyright holder are discussed in connection with the use of a work on the Internet. Third, the potential application of the exclusive rights of the copyright holder to various actions on the Internet, such as caching, Web linking and operating an online service will be discussed. The Internet is a worldwide entity, and, as such, copyright infringement on this system is an international problem. The scenario of global, simultaneous exploitation of works on the Internet conflicts sharply with the current system of international copyright protection, which is firmly based on national copyright laws with territorial effects. Section four provides therefore an overview of the applicable law on an international net and analyses the necessity and borders of protection.
AFRIKAANSE OPSOMMING: Nasionale en internasionale wetgewing fokus in In toenemende mate op die Internet. Die versnelde groei van die Internet, sy wêreldkarakter, sy nuwe tegnologiese aanwendings en sy private en kommersiële gebruik deur miljoene mense maak beheer oor In werk baie gekompliseerd en skep veral outeursregprobleme regoor die wêreld. Wetgewing soos dit tans is, word dus uitgedaag om die leemtes in die reg te ondervang. Gegewe die vinnige groei van gekoppelde verskaffers en gebruikers in Suid-Afrika, is dit waarskynlik dat - outeursreggeskille met betrekking tot die Internet binnekort ook hier gaan ontwikkel. In hierdie verhandeling gaan die "wêreld" van die Internet en sy wettigheid onder bestaande Suid-Afrikaanse outeursregwetgewing ondersoek word. In die ondersoek word gepoog om vas te stelof Suid-Afrikaanse outeursregwetgewing geskik is om die Internetprobieme wat tans bestaan te hanteer en of dit lei tot aanvaarbare resultate. Die eerste hoofstuk van die verhandeling sal In oorsig gee van die basiese beginsels van die Internet, insluitende die geskiedenis, ontwikkeling en funksie van die Internet. Verder sal die veranderende aspekte as gevolg van digitale tegnologie bespreek word. Die wêreldkarakter van die Internet gee aanleiding tot "internasionale" inbreukmakings en om hierdie rede oorweeg regerings die moontlikheid van internasionale ooreenkomste oor die beskerming van intellektuele eiendom in die digitale era. In hoofstuk twee word die bestaande internasionale harmonisering van outeursreg bespreek. Veral die vinnige aanname van die World Intellectual Property Organisation se verdrae in Desember 1996, illustreer dat daar In internasionale bewustheid is dat iets in die verband gedoen moet word. In die derde hoofstuk word die aanwending van die Suid-Afrikaanse outeursreg met betrekking tot die Internet bespreek. Eerstens word ondersoek of a digitale werk op die Internet op dieselfde wyse as 'n "tradisionele" werk beskerm kan word. Tweedens word die verskillende regte van die outeursreghebbende in verband met die gebruik van 'n werk op die Internet, bespreek. Derdens word die potensiële aanwending van die eksklusiewe regte van die outeursreghebbende op verskillende aksies op die Internet, soos byvoorbeeld kasberging, web koppeling en die werking van 'n gekoppelde diens, bespreek. Die Internet is 'n wêreldwye verskynsel en sodanig is outeursreginbreukmaking op hierdie stelsel 'n internasionale probleem. Die scenario van 'n wêreldwye, gelyktydige uitbuiting van werke op die Internet is in skerp konflik met die huidige stelsel van internasionale outeursregbeskerming wat stewig gegrond is op nasionale wetgewing met territoriale werking. Hoofstuk vier bied daarom 'n oorsig oor die toepaslike reg op 'n internasionale netwerk en analiseer die nodigheid en ook grense van beskerming.
Achieng, Spance Joy. "SOFTWARE PATENTS : A study on the patentability of software inventions." Thesis, Uppsala universitet, Juridiska institutionen, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-324267.
Full textTemur, Nuri. "Computer Crime as a Barrier to Electronic Commerce: New Solutions for Public Law Enforcement." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3171/.
Full textMabeka, Nombulelo Queen. "When does the conduct of an employer infringe on an employee's constitutional right to privacy when intercepting or monitoring electronic communications?" Thesis, University of the Western Cape, 2008. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_5883_1253850534.
Full text"
The Regulation of Interception of Communications and Provision of Communication Related Information Act 70 of 2002 (RICA) that regulates the monitoring of electronic communications has not yet been tested by our courts. This paper explores the likelihood of an infringement of an employee's right to privacy by an employer in the process of intercepting the latters electronic communications. It is argued that there is no explicit provision of the protection of the right to privacy that is provided in the LRA. It is further argued that the provisions of section 4, 5 and 6 of RICA as they stand do not necessarily provide for the protection of an employee's right to privacy, but the incorporation of these sections could be construed as meaning that the legislature or the framers of the legislation intended to limit the employers right to trade freely, at the same breath, limit the employees right to privacy. It is argued that RICA does not provide protection for the right to privacy wherein consent has been obtained under duress or based on misrepresentation of facts. It is contended that the interception of employees electronic communications in such circumstances would be regarded as an infringement of such employees right to privacy. The burden of proving duress or misrepresentation of facts rests on the employee who alleges that such consent was obtained under duress or based on misrepresentation of facts. It is also argued that RICA does not define the meaning of the words in the course of carrying on of business or reasonable steps provided in section 6 of RICA. It is argued that the meaning of in the course of carrying on of business would be determined by the type of the industry upon which the business operates, as well as the circumstances of the case. Reasonable steps would be regarded as being taken if employers notify employees that their electronic communications would be intercepted..."
Ferreira, Ana. "Modelling access control for healthcare information systems : how to control access through policies, human processes and legislation." Thesis, University of Kent, 2010. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529399.
Full textBirkenfeld, Daniela H. "The protection of computer software : a comparative study of the American and German law." Thesis, McGill University, 1986. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=65509.
Full textBruneau, Mathieu. "Straddling the fence of computer programs' patentability: how to foster software invention and innovation." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=117222.
Full textCe mémoire identifie des moyens accessibles aux décideurs politiques et aux acteurs de l'industrie informatique pour promouvoir l'inventivité et l'innovation de logiciels. Pour ce faire, la clôture de la brevetabilité des programmes informatiques est chevauchée : ne prenant pas parti à ce débat, le point de vue qu'elle procure est utilisé pour apprécier sur deux volets des outils favorisant l'inventivité et l'innovation de logiciels. D'abord, leur faisabilité est évaluée de façon pragmatique en analysant la superstructure du droit international de la propriété intellectuelle, principalement l'Accord sur les aspects des droits de propriété intellectuelle qui touchent au commerce, qui prévoit des dispositions auxquelles les Membres de l'Organisation mondiale du commerce doivent donner effet. Ensuite, des intérêts bénéfiques potentiels de ces mesures sont discutés en lien avec quatre éléments qui justifient la non-brevetabilité des sujets abstraits à l'intérieur de la logique utilitaire des systèmes canadien et américain des brevets, soit la préemption issue de l'exclusivité octroyée par les brevets, la structure par combinaison et accumulation de l'inventivité, les obstructions causées par un trop grand nombre de brevets et la désincarnation. Parmi ces instruments, sont notamment discutés les normes de brevetabilité des programmes informatiques, la prescription d'exploitation des brevets, la révocation de brevets, l'ingénierie inversée, la dépendance au sentier, les clauses de non-concurrence, les effets de l'entreprise réseau sur l'innovation, les pratiques contractuelles en lien avec les brevets, les autorités de concurrence et la rivalité entre les deux principales approches en développement de logiciels : l'appropriation privative et le logiciel libre et ouvert.
Marsh, David William Roff. "Program refinement using a universal law : language specification and prototype tool." Thesis, University of Southampton, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.312873.
Full textFrantz, Courtney Siler. "An electronic storage and access system for special education legislation." W&M ScholarWorks, 1995. https://scholarworks.wm.edu/etd/1539618425.
Full textSteh, Stephen R. "Unauthorized Access Crimes." Youngstown State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.
Full textO'Brien, N. D. "The liability of Internet service providers for unlawful content posted by third parties." Thesis, Nelson Mandela Metropolitan University, 2010. http://hdl.handle.net/10948/1149.
Full textClark, Robert Franklin. "A study of the legal implications of copyright law to the use of computer software in public education." Diss., Virginia Polytechnic Institute and State University, 1985. http://hdl.handle.net/10919/54278.
Full textEd. D.
Upton, Oren K. "Asserting national sovereignty in cyberspace : the case for Internet border inspection." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FUpton.pdf.
Full textChen, Yi-Jen. "Antitrust enforcement in the software market : a study of the Microsoft cases in the United States /." [St. Lucia, Qld.], 2005. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe18697.pdf.
Full textAhmad, Saghir. "Legal protection for computer programmes in EU, US and Pakistan : software piracy as a challenge in Pakistan /." Oslo : Faculty of Law, Universitetet i Oslo, 2008. http://www.duo.uio.no/publ/jus/2008/87514/87514.pdf.
Full textFunk, Antje Elisabeth Margarete. "Criminal liability of Internet providers in Germany and other jurisdictions." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/70134.
Full textENGLISH ABSTRACT: This thesis deals with the criminal liability of Internet providers. The focus is on Germany, but the analysis is put in a wider, comparative context. This is done with reference to South Africa, as well as Europe and the American system. This thesis demonstrates and discusses the existing legal norms to regulate Internet provider liability for illegal content on the Internet and the international efforts to deal with this issue. In the introduction it is shown how the Internet has given rise to a new form of global communication and the accompanying legal problems. This is followed by an examination of the different functions Internet providers have. A survey of some of the important crimes affecting the Internet and also some Internet-specific offences put the more general issue of liability in a more specific context. Traditional and new forms of crimes are discussed. This section is followed by an analysis of Internet provider liability under German criminal law and Germany's Teleservices Act. From an international criminal law perspective some international instruments, like the Cybercrime Convention of the Council of Europe, is discussed. National legislation, especially in the context of the European Union, must always be put in the proper regional and international context. The thesis concludes with some thoughts on alternative, or perhaps complementary, methods to fight illegal and criminal conduct on the Internet. This is done not as a critique of the responses to Internet crime, but rather to strengthen the many hands trying to reduce Internet crime.
AFRIKAANSE OPSOMMING: Hierdie tesis handeloor die strafregtelike aanspreekliheid van Internet diensverskaffers. Die fokus val op Duitsland, maar die analise word ook geplaas in 'n wyer, vergelykende konteks. Dit word gedoen met verwysing na Suid-Afrika, sowel as Europa en die VSA. Die tesis demonstreer en bespreek die bestaande regsnorme wat Internet diensverskaffers reguleer met spesifieke verwysing na aanspreeklikheid vir onwettige inhoud op die Internet en internasionale pogings om hierdie probleem aan te spreek. Ter inleiding word daar aangetoon hoe die Internet aanleiding gee tot nuwe vorme van globale kommunikasie en die regsprobleme wat dit tot gevolg het. Dit word gevolg deur 'n ondersoek na die verskillende funksies van Internet verskaffers. 'n Ontleding en bespreking van Internet-spesifieke misdrywe plaas die meer algemene vraagstuk in 'n meer gefokusde konteks. Tradisionele en nuwe vorme van misdaad word bespreek. Hierdie afdeling word gevolg deur 'n ontleding van Internet diensverskaffer aanspreeklikheid ingevolge Duitse reg en die Duitse wetgewing op die terrein van telediens. Uit 'n internasionale strafreg oogpunt word sekere internasionale instrumente, soos die Cybercrime Convention van die Raad van Europa, bespreek. Nasionale wetgewing, veral in die konteks van die Europese Unie, word ook in die relevante regionale en internasionale konteks geplaas. Die tesis word afgesluit met sekere gedagtes oor alternatiewe, of moontlik komplimentêre, metodes in die stryd teen Internet-kriminaliteit. Dit moet nie gesien word as kritiek op die huidige stand van sake nie, maar eerder as 'n poging om die talle rolspelers in die stryd teen Internet misdaad se hande te sterk.
Saganich, Robert Lee. "An investigation of electronic Protected Health Information (e-PHI) privacy policy legislation in California for seniors using in-home health monitoring systems." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1075.
Full textGottschalk, Jason Howard. "Towards an evaluation and protection strategy for critical infrastructure." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018793.
Full textMostert, Charl. "The benefits of contractual causes in mitigating project failures using business system projects." Thesis, Cape Peninsula University of Technology, 2014. http://hdl.handle.net/20.500.11838/1778.
Full textThis study evaluates the utilisation and effectiveness of contract clauses in Information Technology (IT) and Information System (IS) projects in South Africa to address and mitigate key risks associated with these types of projects. This study established whether specific clauses were being utilised to address key risks, and where clauses were being utilised, whether these clauses were effective in addressing and mitigating the impact of these key risks. The need for the study arose because the researcher had experienced on several occasions in his workplace that contracts which appeared fail-safe during the negotiation stage did not reach the proposed targets, let alone maturity of the agreement. To establish whether colleagues in similar positions in computer-based organisations experienced similar disruptions a quantitative questionnaire was distributed to organisations in the Johannesburg area to gain an insight into their risk profile. Risk could arise from the contract construction and/or wording. Reference was made to the contracts in the engineering environment where standard contracts have been in place for a number of years. Specifically the New Engineering Contract (NEC) of 2011 and the Professional Services Contract were consulted. The study concentrated on four categories of risk identified in a literature review, namely corporate management risk, project management risk, resource utilisation risk and technology risk, which resulted in 42 sub-factors examined. The population of suitable and relevant IT and IS companies could not be definitely established but the researcher made telephonic contact with known organisations and 24 participants agreed to participate in the exercise; 12 service providers and 12 clients of providers, where 78% of participants experienced one or more of the risk factors, and 53% used NEC standard contracts.
Francisco, Andreia Marlene Correia. "A proteção jurídica de software na Europa: um percurso legislativo controverso." Dissertação, Faculdade de Direito da Universidade do Porto, 2010. http://hdl.handle.net/10216/63920.
Full textLaw
O principal objectivo desta dissertação é analisar o panorama legislativo actual, no seio da Europa e, com especial incidência na União Europeia, relativo à protecção jurídica dos programas de computador, bem como os tipos de regime que foram sendo adoptados, nomeadamente, pelos países europeus, desde o surgimento do programa de computador. Os programas de computador são obras funcionais e aparentam ser obras literárias, pois apresentam-se numa expressão linguística. Contudo, têm uma espinha dorsal de natureza maquinal : são o suporte lógico, o cérebro dos computadores 1. A dissertação centra-se na protecção dos programas de computador pelos Direitos de Autor e pelo Direito de Patentes, os dois meios de protecção reconhecidos como mais adequados pela maioria da doutrina, com manifesta expressão na legislação. Analisa-se, também, de forma breve, o panorama legislativo referente à protecção conferida aos programas de computador, a nível nacional, assim como a evolução nos Estados Unidos da América. Mediante a análise de um Caso de estudo, reconhece-se a importância da previsão legal da protecção das invenções implementadas por computador, bem como a possibilidade de concessão de uma patente única, no sentido de garantir às empresas europeias oportunidades de negócio e uma protecção eficaz das suas invenções
The main goal of this dissertation is to analyze the current legal scenery, within Europe and, with particular focus on European Union, concerning the legal protection of computer programs, as well as the types of arrangements that have been adopted, particularly by European countries, since the advent of the computer program. Computer programs are functional works and appear to be literary works, because they present themselves in a linguistic expression. However, they have a backbone of 'mechanical' nature: they are the logical foundation, they are computer s brains 2. The dissertation focuses on the protection of computer programs by Copyright and the Patents law, the two means of protection recognized as the most appropriate for the majority of the doctrine, with a clear expression in the legislation. We also briefly analyzed the regulatory scenery concerning the protection afforded to computer programs, on a national level as well as developments in the United States of America. Through analysis of a case study, the importance of the legal provision of computer-related inventions protection is recognized, as well as the possibility of granting a single patent to ensure business opportunities for European companies and effective protection for their inventions.
Francisco, Andreia Marlene Correia. "A proteção jurídica de software na Europa: um percurso legislativo controverso." Master's thesis, Faculdade de Direito da Universidade do Porto, 2010. http://hdl.handle.net/10216/63920.
Full textLaw
O principal objectivo desta dissertação é analisar o panorama legislativo actual, no seio da Europa e, com especial incidência na União Europeia, relativo à protecção jurídica dos programas de computador, bem como os tipos de regime que foram sendo adoptados, nomeadamente, pelos países europeus, desde o surgimento do programa de computador. Os programas de computador são obras funcionais e aparentam ser obras literárias, pois apresentam-se numa expressão linguística. Contudo, têm uma espinha dorsal de natureza maquinal : são o suporte lógico, o cérebro dos computadores 1. A dissertação centra-se na protecção dos programas de computador pelos Direitos de Autor e pelo Direito de Patentes, os dois meios de protecção reconhecidos como mais adequados pela maioria da doutrina, com manifesta expressão na legislação. Analisa-se, também, de forma breve, o panorama legislativo referente à protecção conferida aos programas de computador, a nível nacional, assim como a evolução nos Estados Unidos da América. Mediante a análise de um Caso de estudo, reconhece-se a importância da previsão legal da protecção das invenções implementadas por computador, bem como a possibilidade de concessão de uma patente única, no sentido de garantir às empresas europeias oportunidades de negócio e uma protecção eficaz das suas invenções
The main goal of this dissertation is to analyze the current legal scenery, within Europe and, with particular focus on European Union, concerning the legal protection of computer programs, as well as the types of arrangements that have been adopted, particularly by European countries, since the advent of the computer program. Computer programs are functional works and appear to be literary works, because they present themselves in a linguistic expression. However, they have a backbone of 'mechanical' nature: they are the logical foundation, they are computer s brains 2. The dissertation focuses on the protection of computer programs by Copyright and the Patents law, the two means of protection recognized as the most appropriate for the majority of the doctrine, with a clear expression in the legislation. We also briefly analyzed the regulatory scenery concerning the protection afforded to computer programs, on a national level as well as developments in the United States of America. Through analysis of a case study, the importance of the legal provision of computer-related inventions protection is recognized, as well as the possibility of granting a single patent to ensure business opportunities for European companies and effective protection for their inventions.
Basilio, Bernardo I. "Knowledge-based classification scheme for regulating the flow of hazardous materials through tunnels." Thesis, Virginia Polytechnic Institute and State University, 1987. http://hdl.handle.net/10919/91097.
Full textM.S.
Witthammar, Anna. "EU-patent på datorrelaterade uppfinningar : en rättsekonomisk analys." Thesis, Linköping University, Department of Management and Economics, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2229.
Full textComputer programs must give a technical effect that goes beyond"normal physical interaction"to be considered to belong to a technical field. The invention shall be be susceptible of industrial application, which means that it should be possible to reproduce or use in any other industrial way. The reqirement that the invention shall be new means that the technique must not be previously known because of patents, published articles, etc. That an invention shall be a contribution to the state of the art in a technical field means that the invention shall not be obvious to invent for a person skilled in the art. Patents do effect the innovation among the inventers, but in most industries most inventions would be invented independent if there was a patent system or not. Only in pharmaceuticals- and chemicals industries, the patent is of a great importance. Patents are probably of lesser importance for the computer industry than for those industries, even though the industry is of great importance for many other industries and therefor, the patent system can be of great importance for some computer-implemented inventions as well. There is a risque the the competition is negatively affected by the patent system, becuase of the monopoly it gives. I believe, though, that the gain of the patent system compensates for the risque of imperfections in the market. The free movement for goods, persons, services and capital will probably not be affected if the proposal of the directive about patentibility of computer-implemented invention will get passed.
Krein, Jonathan L. "Replication and Knowledge Production in Empirical Software Engineering Research." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/4296.
Full textBalan, Júnior Osvaldo [UNESP]. "O estabelecimento virtual na sociedade técnica: a necessária busca de segurança jurídica nas transações comerciais." Universidade Estadual Paulista (UNESP), 2011. http://hdl.handle.net/11449/98930.
Full textO presente trabalho buscará trazer uma profunda reflexão sobre o avanço técnico na sociedade moderna do instituto denominado estabelecimento virtual, assim como seus reflexos nas mais variadas searas. Buscar-se-á compreender este fenômeno através do estudo da técnica, tudo com base nas obras do pensador Jacques Ellul, que trilhou sobre as mais diversas áreas do conhecimento no século passado, com extremo brilhantismo, podendo, além disso, ser considerado um visionário. Mostrar-se-ão os problemas que o avanço tecnológico vem trazendo, os quais complicam o ser humano em sua vida particular, criando neuroses, fruto da adaptação deste ao mundo moderno. Para tanto e de forma mais analítica estudar-se-ão as características da técnica moderna, as quais permitem entender como se dá o desenvolvimento da técnica. Buscar-se-á compreender também o que vem a ser a informação, a principal técnica da atualidade, e as diferentes concepções sobre a sociedade contemporânea. Além disso, analisar-se-á a influência da imagem na sociedade técnica e sua predominância em relação à palavra. Necessária também se mostrou a análise do que vem a ser o comércio eletrônico, o novo modelo de realizações negociais, que se apresenta em franco crescimento. Assim, o estabelecimento virtual surge dentro deste contexto, não permitindo a criação de obstáculos, se encontrando atualmente em todo o mundo, sem enxergar as diferenças culturais e as menosprezando, trazendo uma uniformidade ao mundo, tanto pela forma de comercializar, como pelos produtos que expõe. Mas não são todas as pessoas do globo que tem acesso a este, sendo este outro grande problema apresentado pelo estabelecimento virtual: a exclusão digital. Por conseguinte, demonstrar-se-á...
The present study will try to create a profound reflexion about the technical advance in the modern society of the institute known as virtual establishment, and also its reflexes in a variety of associations. One of the objectives, is to understand this phenomenon thought the study of the technique, all based on the publications of the philosopher Jacques Ellul, who disserted about the various parts of knowledge in the last century with extreme brilliance,making him a true visionary. The problems brought by technological advances will be shown, these can complicated one´s private life, generating neurosis, a product of its adaptation to the modern world. To do so in an analytical form, the characteristics of the modern technique will be studied, permitting tounderstand the development of the technique. The meaning of information, the principal technique used in the actuality, and its different conceptions in contemporaneous society will be explained, and also, the influence of image in the technical society and its predominance in relation with words will be analyzed. The analyses of what is electronic marketing, a new model of business transactions that is in fast growth should also be done. The virtual market appears inside this context, without obstacles, spreading to the entire globe, with no eyes for cultural differences, bringing uniformity to the world, not just in the way to shop but also on the products available. But not everyone has access to it, being this a big problem presented by the virtual establishment: the digital exclusion. In this work, there will be shown the necessity of development of ways to advance in the virtual technique, ways that show be the result of a critical and reflexive posture of the man, which is rarely seen now a days. This work will be based on comparison of the traditional establishment... (Complete abstract click electronic access below)
Sundstrom, Linda-Marie. "Internet radio: Identifying administrative and regulatory gaps in a cyberspace world without borders." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2137.
Full textDesai, Mohammed Reza. "An integrated approach for information security compliance in a financial services organisation." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2396.
Full textThe aim of this research is to identify and explore the factors affecting information security compliance of information security policies and regulations, in a financial services organisation. The organisation has to comply with information security regulations and legislations by righteousness of its operations in light of the fact that any wrong doing together with misuse of data, are continually expanding. Corporate embarrassments comes about due to rupture of security, results in expanded thoughtfulness regarding corporate consistency. Legislature and policies have been set up to counter information security issues. This legislature and policies are not adequately addressing the compliance issues that arise, but are needed within organisations. Compliance targets are not met due to inconsistent guidelines that turns out to be significant in diminishing the financial position, reputation and security of information. This research further aims to explore whether employees comply with laws and regulations regarding information in an organisation. This is done in order to confirm whether governance and human factors play any significant part in compliance. The research is an exploratory study and specifically analyses the governance function and which stakeholders influence its operations in information compliance. The research investigates certain questions on organisational culture and the human factor, do influence employee’s compliance to laws and regulations. The objectives of the research are to investigate which factors, and how such factors influence compliance of information security policies and compliance with the goal of designing an integrated framework to assist in counteracting these findings. The research is underpinned by the Neo-institutional theory, Agency Theory and Rational choice theory. The Denison organisational cultural model and a framework proposed by von Solms are used as lenses to interpret the data of the research.
孫陸陽. "暗網絡犯罪的刑法問題研究 =Research on criminal law of dark network crime." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950654.
Full textBalan, Júnior Osvaldo. "O estabelecimento virtual na sociedade técnica : a necessária busca de segurança jurídica nas transações comerciais /." Franca : [s.n.], 2011. http://hdl.handle.net/11449/98930.
Full textBanca: Rui Décio Martins
Banca: Jorge Luis Mialhe
Resumo: O presente trabalho buscará trazer uma profunda reflexão sobre o avanço técnico na sociedade moderna do instituto denominado estabelecimento virtual, assim como seus reflexos nas mais variadas searas. Buscar-se-á compreender este fenômeno através do estudo da técnica, tudo com base nas obras do pensador Jacques Ellul, que trilhou sobre as mais diversas áreas do conhecimento no século passado, com extremo brilhantismo, podendo, além disso, ser considerado um visionário. Mostrar-se-ão os problemas que o avanço tecnológico vem trazendo, os quais complicam o ser humano em sua vida particular, criando neuroses, fruto da adaptação deste ao mundo moderno. Para tanto e de forma mais analítica estudar-se-ão as características da técnica moderna, as quais permitem entender como se dá o desenvolvimento da técnica. Buscar-se-á compreender também o que vem a ser a informação, a principal técnica da atualidade, e as diferentes concepções sobre a sociedade contemporânea. Além disso, analisar-se-á a influência da imagem na sociedade técnica e sua predominância em relação à palavra. Necessária também se mostrou a análise do que vem a ser o comércio eletrônico, o novo modelo de realizações negociais, que se apresenta em franco crescimento. Assim, o estabelecimento virtual surge dentro deste contexto, não permitindo a criação de obstáculos, se encontrando atualmente em todo o mundo, sem enxergar as diferenças culturais e as menosprezando, trazendo uma uniformidade ao mundo, tanto pela forma de comercializar, como pelos produtos que expõe. Mas não são todas as pessoas do globo que tem acesso a este, sendo este outro grande problema apresentado pelo estabelecimento virtual: a exclusão digital. Por conseguinte, demonstrar-se-á... (Resumo completo, clicar acesso eletrônico abaixo)
Abstract: The present study will try to create a profound reflexion about the technical advance in the modern society of the institute known as virtual establishment, and also its reflexes in a variety of associations. One of the objectives, is to understand this phenomenon thought the study of the technique, all based on the publications of the philosopher Jacques Ellul, who disserted about the various parts of knowledge in the last century with extreme brilliance,making him a true visionary. The problems brought by technological advances will be shown, these can complicated one's private life, generating neurosis, a product of its adaptation to the modern world. To do so in an analytical form, the characteristics of the modern technique will be studied, permitting tounderstand the development of the technique. The meaning of information, the principal technique used in the actuality, and its different conceptions in contemporaneous society will be explained, and also, the influence of image in the technical society and its predominance in relation with words will be analyzed. The analyses of what is electronic marketing, a new model of business transactions that is in fast growth should also be done. The virtual market appears inside this context, without obstacles, spreading to the entire globe, with no eyes for cultural differences, bringing uniformity to the world, not just in the way to shop but also on the products available. But not everyone has access to it, being this a big problem presented by the virtual establishment: the digital exclusion. In this work, there will be shown the necessity of development of ways to advance in the virtual technique, ways that show be the result of a critical and reflexive posture of the man, which is rarely seen now a days. This work will be based on comparison of the traditional establishment... (Complete abstract click electronic access below)
Mestre
劉漢傑. "電腦犯罪若干問題研究 =Research into the some question of computer crime." Thesis, University of Macau, 2016. http://umaclib3.umac.mo/record=b3570914.
Full textJeppson, Jonas. "The OECD cryptography policy guidelines and their implementation /." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=31164.
Full textHargreaves, C. J. "Assessing the Reliability of Digital Evidence from Live Investigations Involving Encryption." Thesis, Department of Informatics and Sensors, 2009. http://hdl.handle.net/1826/4007.
Full textHargreaves, Christopher James. "Assessing the reliability of digital evidence from live investigations involving encryption." Thesis, Cranfield University, 2009. http://dspace.lib.cranfield.ac.uk/handle/1826/4007.
Full textAsubiaro, Omowumi Modupe. "www.crimesagainstchildren.com : addressing child pornography via the Internet in Africa." Thesis, University of the Western Cape, 2004. http://etd.uwc.ac.za/index.php?module=etd&.
Full textSouza, Ricardo Vieira de. "O ciberespaço e a jurisdição transnacional: necessidade de regulação." Pontifícia Universidade Católica de São Paulo, 2018. https://tede2.pucsp.br/handle/handle/21438.
Full textMade available in DSpace on 2018-09-26T10:04:28Z (GMT). No. of bitstreams: 1 Ricardo Vieira de Souza.pdf: 1123440 bytes, checksum: e5ceefcb485691ee0e19257f666d7604 (MD5) Previous issue date: 2018-08-24
This work is based on the concern about the practice of illicit at the transnational level facilitated by the incessant and always renewed improvement of communication through the world wide web. If on the one hand, the internet, an indisputable product of this network, has favored the connection between people from different parts of the world, on the other hand, has brought cyber-crime to the forefront, which at the same time challenges the establishment of a criminal guardianship for cyberspace in impunity. This is due to the phenomenon of globalization, which has shortened distances in the face of technological and social advances, and the consequences of criminal law. The present research sought to justify how it is possible before the classical concepts of sovereignty that a state effectively combats transnational cyber crime. For that, points were developed as to how the classic concept of sovereignty is found; the characteristics of cyberspace; and the concepts of jurisdiction and criminal jurisdiction. Thus, a dogmatic criminal and procedural criminal analysis will be carried out if it is possible to establish a transnational criminal jurisdiction as a way of regulating cyberspace
Este trabalho parte da preocupação com a prática de ilícitos em nível transnacional facilitada pelo aprimoramento incessante e sempre renovado da comunicação através da rede mundial de computadores. Se de um lado, a internet, produto indiscutível dessa rede, favoreceu a conexão entre as pessoas de diversas partes do mundo, de outro, trouxe à baila a criminalidade cibernética, que contemporaneamente desafia o estabelecimento de uma tutela penal para o ciberespaço no que tange a impunidade. Isso decorre do fenômeno da globalização, a qual encurtou distâncias em face dos avanços tecnológicos e sociais, e as consequências causadas ao direito penal. A presente pesquisa buscou fundamentar como é possível ante os conceitos clássicos de soberania, que um Estado combata a criminalidade cibernética transnacional de maneira efetiva. Para tanto, foram desenvolvidos pontos de como encontra-se o conceito clássico de soberania; as características do ciberespaço; e os conceitos de jurisdição e competência penal. Torna-se assim efetuar uma análise dogmática penal e processual penal se é possível se instituir uma jurisdição penal transnacional como forma de regular o ciberespaço
Breindl, Yana. "Hacking the law: an analysis of internet-based campaigning on digital rights in the European Union." Doctoral thesis, Universite Libre de Bruxelles, 2011. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/209836.
Full textThe belief in values of freedom, decentralisation, openness, creativity and progress inspires a particular type of activism, which promotes autonomy, participation and efficiency. The empirical evidence suggests that this set of principles can, at times, conflict with practices observed in the field. This has to do with the particular opportunity structure of the European Union and the characteristics of the movement. The EU favours functional integration of civil society actors who are expected to contribute technical and/or legal expertise. This configuration challenges internet-based protest networks that rely on highly independent and fluctuating engagement, and suffer from a lack of diversity and cohesion. The internet does not solve all obstacles to collective action. It provides, however, a networked infrastructure and tools for organising, coordinating and campaigning. Online and offline actions are not only supportive of each other. Internet-based campaigning can be successful once it reaches out beyond the internet, and penetrates the corridors of political institutions.
Doctorat en Information et communication
info:eu-repo/semantics/nonPublished
Spencer, Logan Lemuella C. "Changing from the silo model to the horizontal layers model in public policy regulations : the implications and potential for the telecommunications industry /." Thesis, Available online, Georgia Institute of Technology, 2005, 2005. http://etd.gatech.edu/theses/available/etd-11282005-192311/.
Full textStockl, Daimon. "Aspects of the registration of software as patents." Thesis, 2014. http://hdl.handle.net/10210/9499.
Full textThroughout the history of mankind and the countless ages in which law has found a voice, there has existed a need to achieve and maintain a balance between conflicting interests. In this everchanging and dynamic society the need for a balance is paramount. Although it may seem that the various conflicting interests are predominately of a private nature, many of these conflicting interests have consequences that have a salient impact on social welfare. One such branch of the law in which conflicting interests between various interested parties surface is patent law, and the controversial issue of software programs. The current socio-economic environment has experienced exponential technological growth, with substantial advancements not only in the field of hardware but also in the field of software. However, this same rapid growth is not always true when it comes to the law which, in certain fields may be remarked to unfortunately be lagging behind in the degree of protection it affords. The consequences of this may be dire in the case of technological developments, for it is the protection afforded that is in part responsible for the advancements in technology. This once again draws into account the fine line in the balance of rights between various conflicting interests, namely the protection of an individual’s creativity versus that of social welfare. In certain cases, regardless of how innovative or unique certain discoveries or developments may be, if they are important to the social welfare, then an individual’s rights or need for protection must give way. Having said this, one needs to evaluate where software programs fall within this delicate balance of rights. The legal position with regard to software programs in South African intellectual property law is found within the legislation. Namely, the protection afforded to software programs in the Copyright Act,1 and the exclusion of protection in the Patents Act.2 In light of this, why software programs are expressly excluded from protection in the Patents Act will be analysed. It will also be determined if, and to what extent, the Patents Act can be said to afford protection to software
Dagada, Rabelani. "Legal and policy aspects to consider when providing information security in the corporate environment." Thesis, 2014. http://hdl.handle.net/10500/18839.
Full textSchool of Computing
D. Phil. (Information Systems)