Academic literature on the topic 'Copyright Copyright Downloading of data Copyright infringement'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Copyright Copyright Downloading of data Copyright infringement.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Copyright Copyright Downloading of data Copyright infringement"

1

Leuwol, Chrisna Arwiandra, Ludevikus Limdianda, and Arjuna Rizky Dwi Krisnayana. "Legal Protection of Song Copyrights in Digital Form." Media Iuris 3, no. 1 (2020): 1. http://dx.doi.org/10.20473/mi.v3i1.17850.

Full text
Abstract:
The development of advanced technology and faster, ease of accessing the virtual world leads to equal public access to information collected on the internet, one of which is a song, a recording of rhythmic sound that was originally shaped physics from the record vinyl then to become a tape cassette for radio tape and now evolved along with technology into digital media like DVD, Flash disk, and Hard disk. The Internet connects the global world to a single location. Based on this case KEMENKOMINFO (Ministry of Communication and Informatics) has attempted to enforce the closure of a number of si
APA, Harvard, Vancouver, ISO, and other styles
2

Alawsi, Dr Husham. "The Role of Bahraini Law on Online Copyright Infringement." International Business & Economics Studies 2, no. 4 (2020): p23. http://dx.doi.org/10.22158/ibes.v2n4p23.

Full text
Abstract:
The main aim of this research paper is to look at the role of Bahraini law in copyright infringement. In Bahrain, many commercially pirated audio and video markets have been eliminated through various laws. However, video, software and audio piracy by end-users is still a huge problem. A copyright infringement is considered to be a violation of an organization or individual’s copyright. It describes the copyrighted material’s unauthorized use, such as images, text, videos, software, music and other original content. Copyright infringements have been formally addressed through various copyright
APA, Harvard, Vancouver, ISO, and other styles
3

Muswaka, Linda. "Unauthorised adaptation of computer programmes - is criminalisation a solution? Haupt T/A Softcopy v Brewers Marketing Intelligence (Pty) Ltd 2006 4 SA 458 (SCA)." Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad 14, no. 7 (2017): 210. http://dx.doi.org/10.17159/1727-3781/2011/v14i7a2623.

Full text
Abstract:
In Haupt t/a Softcopy v Brewers Marketing Intelligence (Pty) Ltd 2006 4 SA 458 (SCA) Haupt sought to enforce a copyright claim in the Data Explorer computer programme against Brewers Marketing Intelligence (Pty) Ltd. His claim was dismissed in the High Court and he appealed to the Supreme Court of Appeal. The Court held that copyright in the Data Explorer programme vested in Haupt. Haupt acquired copyright in the Data Explorer programme regardless of the fact that the programme was as a result of an unauthorised adaptation of the Project AMPS programme which belonged to Brewers Marketing Intel
APA, Harvard, Vancouver, ISO, and other styles
4

D'Rosario, Michael. "Fair Use Defences During Copyright Litigation." International Journal of Strategic Decision Sciences 8, no. 2 (2017): 31–51. http://dx.doi.org/10.4018/ijsds.2017040103.

Full text
Abstract:
The prediction of legal outcomes and other legal domain related variables has served as the basis of a number of recent studies. While recent studies have estimated standardised variables and dichotomous outcomes such as the outcome of a judicial decision process, few studies have employed dichotomous data and categorical data to predict the basis of a legal defense strategy or the likelihood of trial success. Empirical research within the judicial sciences continues to employ a limited subset of empirical methods. This article reasserts the benefits of several artificial intelligence based no
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Yanhui, Jianbiao Zhang, Shupei Wu, and Muhammad Salman Pathan. "Research on digital copyright protection based on the hyperledger fabric blockchain network technology." PeerJ Computer Science 7 (September 17, 2021): e709. http://dx.doi.org/10.7717/peerj-cs.709.

Full text
Abstract:
With the recent development in network technology over a few years, digital works can be easily published online. One of the main issues in the field of digital technology is the infringement of digital works, which can seriously damage the data owners’ rights and affects the enthusiasm of the owners to create original work. Thus, more attention is required for the protection of digital copyright as it has a great impact on the development of society. Many digital copyright protection techniques were developed in the past, but still, there are many loopholes in the protection systems to be cov
APA, Harvard, Vancouver, ISO, and other styles
6

Zhao, Bo, Liming Fang, Hanyi Zhang, et al. "Y-DWMS: A Digital Watermark Management System Based on Smart Contracts." Sensors 19, no. 14 (2019): 3091. http://dx.doi.org/10.3390/s19143091.

Full text
Abstract:
With the development of information technology, films, music, and other publications are inclined to be distributed in digitalized form. However, the low cost of data replication and dissemination leads to digital rights problems and brings huge economic losses. Up to now, existing digital rights management (DRM) schemes have been powerless to deter attempts of infringing digital rights and recover losses of copyright holders. This paper presents a YODA-based digital watermark management system (Y-DWMS), adopting non-repudiation of smart contract and blockchain, to implement a DRM mechanism to
APA, Harvard, Vancouver, ISO, and other styles
7

Vasiu, Ioana, and Lucian Vasiu. "Criminal Enforcement of Copyright as an Important Safeguard for Economic and Security Interests." European Journal of Sustainable Development 8, no. 3 (2019): 228. http://dx.doi.org/10.14207/ejsd.2019.v8n3p228.

Full text
Abstract:
Copyright industries represent an important part of the developed economies. The effective protection of copyright fulfills an important role in the advancement of innovation and economic development. However, in the digital economy, the protection of copyrighted works poses numerous and very difficult challenges. The protected works usually targeted by criminals are computer programs, motion pictures, video games, and musical compositions. The estimated or actual harm to copyright owners can amount to billions of dollars. Moreover, these offenses are sometimes perpetrated in connection with o
APA, Harvard, Vancouver, ISO, and other styles
8

Hoang, Thao Thi Phuong, and Hieu Huy Ha. "ATTITUDE AND INTENTION TO INFRINGE SOFTWARE COPYRIGHT OF VIETNAMESE STUDENTS." Science and Technology Development Journal 17, no. 4 (2014): 83–95. http://dx.doi.org/10.32508/stdj.v17i4.1547.

Full text
Abstract:
The article explores factors influencing Vietnamese students’ attitude and intention to infringe software copyright, on the basis of applying the Social Cognitive Theory (SCT) and related studies. The research sample consists of 358 students in universities in Ho Chi Minh City. Data is analyzed using the Structural Equation Modeling (SEM). The results indicate that factors affecting the intention to violate the software copyright are social norms, incentive, deterrents, attitude and moral disengagement, in which the moral disengagement is the most important factor. The research proposes some m
APA, Harvard, Vancouver, ISO, and other styles
9

Moiny, Jean-Philippe. "Are Internet protocol addresses personal data? The fight against online copyright infringement." Computer Law & Security Review 27, no. 4 (2011): 348–61. http://dx.doi.org/10.1016/j.clsr.2011.05.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Reid, Amanda, and Alex Kresovich. "Copyright as a Barrier to Music Therapy Telehealth Interventions: Qualitative Interview Study." JMIR Formative Research 5, no. 8 (2021): e28383. http://dx.doi.org/10.2196/28383.

Full text
Abstract:
Background Music therapy is a multifaceted discipline that harnesses the power of music to treat a wide range of patient populations. A therapist who plays music in a private room for a patient is not subject to copyright restrictions on public performances. However, in the wake of the COVID-19 pandemic, music therapy is no longer strictly confined to the face-to-face setting. This study explores music therapists’ perceptions of copyright law with respect to their ability to provide mediated services to their clients. Objective The objectives of our study were two-fold. The first was to invest
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Copyright Copyright Downloading of data Copyright infringement"

1

Ieong, Sze-Chung Ricci. "Dispute resolution against copyright infringement through internet download?" access abstract and table of contents access full-text, 2007. http://libweb.cityu.edu.hk/cgi-bin/ezdb/dissert.pl?ma-slw-b21844173a.pdf.

Full text
Abstract:
Thesis (M.A.)--City University of Hong Kong, 2007.<br>"Master of Arts in arbitration and dispute resolution dissertation, City University of Hong Kong" Title from PDF t.p. (viewed on May 22, 2007) Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
2

Linden, Eric S. "Illegal file-sharing in the academy : assessment, implications, and policy responses /." Link to online version, 2005. https://ritdml.rit.edu/dspace/handle/1850/1130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fisk, Nathan W. "Social learning theory as a model for illegitimate peer-to-peer use and the effects of implementing a legal music downloading service on peer-to-peer music piracy /." Online version of thesis, 2006. https://ritdml.rit.edu/dspace/handle/1850/2737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Super, Mathew Anthony. "Why you might steal from Jay-Z an examination of filesharing using techniques of neutralization theory /." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gillespie, Tarleton. "Sleight of hand : law, technology, and the moral deployment of authorship in the Napster and DeCSS copyright cases /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2002. http://wwwlib.umi.com/cr/ucsd/fullcit?p3036996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sirois, Andre. "Copyright Law Inadequacies in the Case of Digital Sampling: Adding Color to a Grey Area." Fogler Library, University of Maine, 2005. http://www.library.umaine.edu/theses/pdf/SiroisA2005.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chan, Lai-sha, and 陳麗莎. "A study of the copyright protection in the digital environment in HongKong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46779632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bazarsky, Jason. "The effect of illegal music downloading and iTunes Store on CD collection size." Diss., Connect to the thesis, 2008. http://hdl.handle.net/10066/1569.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Galway, Angelene J. "Copyright law, digital technology and the future of entertainment." 2005. http://link.library.utoronto.ca/eir/EIRdetail.cfm?Resources__ID=362530&T=F.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Botes, Isabe. "Mapping South African internet user's opinions about the use of peer-to-peer file sharing technology to infringe on copyrighted films and/or television series content." Diss., 2018. http://hdl.handle.net/10500/25878.

Full text
Abstract:
The aim of this study was to investigate the various reasons consumers continue to infringe on copyrighted content, specifically in the South African context, even if the law forbids it. This investigation is two-fold since it also recognises that there are many individuals who do not infringe on copyrighted content even though they have access to peer-to-peer file sharing technology. This information could prove valuable since it can then be used to find comprehensive market-led solutions to the problem that targets the end-user. This study adopted a mixed method approach in order to cross va
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Copyright Copyright Downloading of data Copyright infringement"

1

Office, General Accounting. File sharing: Selected universities report taking action to reduce copyright infringement : report to congressional requesters. U.S. General Accounting Office, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Agnès, Granchet, ed. Lutte contre le téléchargement illégal: Lois Dadvsi et Hadopi. Lamy, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

(South), Korea, ed. Ollain chŏjakkwŏn: Online copyright. Hanul Ak'ademi, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Digital copyright protection. AP Professional, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rieder, Christian. Copyrightverletzungen in der Online-Kommunikation nach US-amerikanischen Recht. Carl Heymanns, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

WIPO, International Forum on the Exercise and Management of Copyright and Neighboring Rights in the Face of the Challenges of Digital Technology (1997 Sevilla Spain). WIPO international Forum on the Exercise and Management of Copyright and Neighboring Rights in the Face of the Challenges of Digital Technology =: Forum international de l'OMPI sur l'exercice et la gestion du droit d'auteur et des droits voisins face aux défis de la technique numérique = Fórum internacional de la OMPI sobre el ejercicio y la administración del derecho de autor y los derechos conexos ante los desafíos de la technología digital. WIPO, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Electronic highway robbery: An artist's guide to copyrights in the digital era. Peachpit Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

The electronic pirates: DIY crime of the century. Routledge, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bitan, Hubert. Protection et contrefaçon des logiciels et des bases de données: [directives européennes et transpositions, protections techniques et interopérabilité, expertise, jurisprudences française et anglo-saxonne]. Lamy, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Patents, Copyrights, and Trademarks. News monitoring: Hearing before the Subcommittee on Patents, Copyrights, and Trademarks of the Committee on the Judiciary, United States Senate, One Hundred Second Congress, second session, on S. 1805, a bill to amend Title 17, United States Code, to clarify news reporting monitoring as a fair use exception to the exclusive rights of a copyright owner, June 16, 1992. U.S. G.P.O., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Copyright Copyright Downloading of data Copyright infringement"

1

Agrawal, Swati, and Ashish Sureka. "Copyright Infringement Detection of Music Videos on YouTube by Mining Video and Uploader Meta-data." In Big Data Analytics. Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-03689-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Riordan, Jaani. "Copyright." In The Liability of Internet Intermediaries. Oxford University Press, 2016. http://dx.doi.org/10.1093/oso/9780198719779.003.0006.

Full text
Abstract:
Copyright, it is said, is one of the great balancing acts of the law. The rights it confers embody the basic tension between encouraging optimal creation and consumption of works; their boundaries reflect delicate compromises between creators, consumers, disseminators, and many other interest groups. These conflicts are exemplified in the enforcement of copyright against internet intermediaries. Copyright owners assert that almost one-quarter of global internet traffic, 80 per cent of YouTube videos, and 97 per cent of BitTorrent transmissions infringe their copyrights. Although the prevalence of unauthorised content appears to be declining with the growth of legitimate services, digital piracy remains widespread. The services responsible for routing, storing, and processing these data deny responsibility for policing infringements, citing the impracticability of monitoring and their inability to adjudicate claims of infringement, while internet users fear disproportionate interferences with privacy, internet access, and innovation.
APA, Harvard, Vancouver, ISO, and other styles
3

Karapapa, Stavroula. "Public Policy Privileges." In Defences to Copyright Infringement. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198795636.003.0007.

Full text
Abstract:
A substantial body of copyright infringement defences is primarily available to institutional users, such as educational establishments, libraries, and archives. In light of the advent of the Internet and mass digitization, the availability of defences has been enlarged through a set of legislative instruments, such as the Orphan Works Directive and the Directive on Copyright in the Digital Single Market. Public policy privileges are meant to make allowances for modern methods of teaching provision, such as online courses, distance learning, and cross-border education programmes, as well as exempt from infringement new methods of carrying out research, such as text mining and data analytics, and enable value extraction from the plethora of works that are currently out of print. Although the policy reason behind the expansion of available defences has been the promotion of growth in the educational and cultural sector, there is a strong public interest underpinning the very presence of these exceptions in the statute. This has to do with the promotion of a rigorous public domain, whereby certain works shall be made more accessible for users to use and re-use. Subject to examination in this chapter is the breadth of these permissible activities and their ability to accommodate modern online services, including also the defences available for uses made by public administration.
APA, Harvard, Vancouver, ISO, and other styles
4

D'Rosario, Michael. "Fair Use Defences During Copyright Litigation." In Natural Language Processing. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-0951-7.ch027.

Full text
Abstract:
The prediction of legal outcomes and other legal domain related variables has served as the basis of a number of recent studies. While recent studies have estimated standardised variables and dichotomous outcomes such as the outcome of a judicial decision process, few studies have employed dichotomous data and categorical data to predict the basis of a legal defense strategy or the likelihood of trial success. Empirical research within the judicial sciences continues to employ a limited subset of empirical methods. This article reasserts the benefits of several artificial intelligence based non-parametric techniques that are better suited to the discipline than many of the common methods employed within the literature. The article considers the predictability of fair use defense within the U.S. during copyright infringement proceedings, and the likelihood of trial success.
APA, Harvard, Vancouver, ISO, and other styles
5

He, Tianxiang. "Copyright Exceptions Reform and AI Data Analysis in ChinaA Modest Proposal." In Artificial Intelligence and Intellectual Property. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198870944.003.0010.

Full text
Abstract:
The development of artificial intelligence (AI) technology is firmly connected to the availability of big data. However, using data sets involving copyrighted works for AI analysis or data mining without authorization will incur risks of copyright infringement. Considering the fact that incomplete data collection may lead to data bias, and since it is impossible for the user of AI technology to obtain a copyright licence from each and every right owner of the copyrighted works used, a mechanism that can free the data from copyright restrictions under certain conditions is needed. In the case of China, it is crucial to check whether China’s current copyright exception model can take on the role and offer that kind of function. This chapter suggests that a special AI analysis and data mining copyright exception that follows a semi-open style should be added to the current exceptions list under the Copyright Law of China.
APA, Harvard, Vancouver, ISO, and other styles
6

Seng, Daniel. "Detecting and Prosecuting IP Infringement with AICan the AI Genie Repulse the Forty Counterfeit Thieves of Alibaba?" In Artificial Intelligence and Intellectual Property. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198870944.003.0014.

Full text
Abstract:
Drawing from available quantitative and qualitative data, this chapter briefly identifies and describes the automated as well as the more sophisticated AI-driven systems deployed to detect and enforce intellectual property rights (IPR) infringement by trademark and copyright holders in the online environment. It studies the legal basis for the use of such automated systems in copyright and trademark laws, and examines how such automated systems have upended, refocused, and altered many of the issues of IPR infringement and their enforcement. This chapter will also look at the problems of non-compliant Digital Millennium Copyright Act takedown notices, opportunistic copyright trolls, and non-interventionist Internet intermediaries, review the relevant judicial and legislative treatments including those in the Directive on Copyright in the Digital Single Market, and propose possible solutions to these problems.
APA, Harvard, Vancouver, ISO, and other styles
7

Press, Tim. "3. Computer programs and databases." In Intellectual Property Law Concentrate. Oxford University Press, 2017. http://dx.doi.org/10.1093/he/9780198803881.003.0003.

Full text
Abstract:
This chapter deals with copyright in computer programs and databases for which the EU Software and Database Directives set special rules, which are implemented in the Copyright, Design and Patents Act 1988 (CDPA). It also deals with database right, also created by the Directive, which is implemented by the Copyright and Rights in Databases Regulations 1997. There are particular defences to copyright infringement in relation to computer programs that allow decompilation and the development of compatible software. Database right is intended to protect the investment in gathering the data into a database; it does not protect data that is created by the database owner. Database right protects against the extraction or re-utilization of the contents of the database for a period of 15 years.
APA, Harvard, Vancouver, ISO, and other styles
8

Press, Tim. "3. Computer programs and databases." In Intellectual Property Concentrate. Oxford University Press, 2019. http://dx.doi.org/10.1093/he/9780198840640.003.0003.

Full text
Abstract:
This chapter deals with copyright in computer programs and databases for which the EU Software and Database Directives set special rules, which are implemented in the Copyright, Designs and Patents Act 1988 (CDPA). In addition, it deals with database right, also created by the Directive, which is implemented by the Copyright and Rights in Databases Regulations 1997. There are particular defences to copyright infringement in relation to computer programs that allow decompilation and the development of compatible software. Database right is intended to protect the investment in gathering the data into a database; it does not protect data that is created by the database owner. Database right protects against the extraction or re-utilization of the contents of the database for a period of 15 years.
APA, Harvard, Vancouver, ISO, and other styles
9

Marson, James, and Katy Ferris. "24. Intellectual Property and Data Protection." In Business Law. Oxford University Press, 2020. http://dx.doi.org/10.1093/he/9780198849957.003.0024.

Full text
Abstract:
The final chapter in the book examines matters relating to the intellectual property created and/or owned by a business and their responsibilities for the data they access and/or produce. Given the value of the outputs from the intellectual creativity of persons (software programs, books, music recordings etc.), this chapter outlines the rights available to protect them and the consequences for infringement. It first identifies the law surrounding creative ideas and work (copyright) before a product’s appearance (design rights) is considered. The chapter continues by assessing the protection of a brand name and image (trademarks) and finishes the substantive issues through examination of inventive ideas and works (patents). Confusion of the public through the unlawful use of an existing business’ name or product can result in the tortious liability of ‘passing-off’. Intellectual property is produced by employees and the consequences of employment status for the rights to exploit the property must be effectively managed. The chapter concludes with an assessment of developments in data protection—the GDPR, Data Protection Act, and the tactics available to businesses to avoid transgression of the law.
APA, Harvard, Vancouver, ISO, and other styles
10

Bently, L., B. Sherman, D. Gangjee, and P. Johnson. "9. Defences." In Intellectual Property Law. Oxford University Press, 2018. http://dx.doi.org/10.1093/he/9780198769958.003.0009.

Full text
Abstract:
This chapter deals with the exceptions that a person may invoke in defence when sued for copyright infringement. Most of these exceptions are referred to as ‘permitted acts’ in Chapter III of Part 1 of the Copyright, Designs and Patents Act 1988 (CDPA 1988). The chapter begins by introducing six concepts that feature in many of the exceptions set out in the CDPA 1988: fair dealing, non-commercial use and not-for-profit users, lawful use, sufficient acknowledgment, relationship with contract, and dealings with copies made under exceptions. It then cites exceptions relating to personal copying for private use; non-commercial research or private study; text and data analysis; criticism or review; disclosure in the public interest; uses of works for people with disabilities; public administration; databases, computer programs, and electronic programs; and artistic works and broadcasts. A section on miscellaneous defences concludes the chapter.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Copyright Copyright Downloading of data Copyright infringement"

1

Zhang, Daniel Yue, Lixing Song, Qi Li, Yang Zhang, and Dong Wang. "StreamGuard: A Bayesian Network Approach to Copyright Infringement Detection Problem in Large-scale Live Video Sharing Systems." In 2018 IEEE International Conference on Big Data (Big Data). IEEE, 2018. http://dx.doi.org/10.1109/bigdata.2018.8622306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!