To see the other types of publications on this topic, follow the link: Illegal download.

Journal articles on the topic 'Illegal download'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Illegal download.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Jonas, Oliver, and Ibrahim Sirkeci. "Understanding determinants of illegal e-book downloading behaviour in the UK and Germany." Transnational Marketing Journal 6, no. 2 (November 1, 2018): 79–100. http://dx.doi.org/10.33182/tmj.v6i2.595.

Full text
Abstract:
With the success of e-books in the last decade, e-book piracy has become increasingly prevalent. This is a significant threat to the publishing industry, publishers and authors alike. Despite efforts to inhibit illegal downloading of e-book files, unauthorized download platforms have not lost much popularity. One of the underlying problems is a limited understanding of the determinants that drive consumers in their choice between legal and illegal download options. This article identifies and critically evaluates the key product attributes in the decision-making process of consumers downloading e-books from legal and illegal sources. By providing consumer insights, the publishing industry and e-book sellers can be guided to meet consumer demand better and design marketing plans to attract consumers towards legal download sources and discourage e-book piracy. The consumer choice between legal and illegal e-book download platforms is analysed using the multi-attribute theory for consumer decision making. 23 attributes were tested using an online questionnaire and analysed by logistic regression. Three attributes were found to be significant in determining the choice of download platforms: A low perception of the importance of copyright compliance, dissatisfaction with the security of download platforms and dissatisfaction with e-book prices in online stores.
APA, Harvard, Vancouver, ISO, and other styles
2

Yeom, Sung-Won. "A study on Public Service Advertising of Preventing the Illegal Download." Korean Journal of Advertising 27, no. 4 (May 31, 2016): 7–24. http://dx.doi.org/10.14377/kja.2016.5.31.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jochheim, T. "Illegal download of a cinematographic work in a different language version." Journal of Intellectual Property Law & Practice 9, no. 6 (April 10, 2014): 460–61. http://dx.doi.org/10.1093/jiplp/jpu051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Grigas, Vincas, Arūnas Gudinavičius, and Emilija Černevičiūtė. "Use of Illegally Distributed Books in Lithuania." Informacijos mokslai 91 (June 11, 2021): 83–99. http://dx.doi.org/10.15388/im.2021.91.53.

Full text
Abstract:
This study seeks to reveal the attitudes of the Lithuanian adult population on using digital books and illegally distributed books and seeks to provide possible solutions to Lithuanian publishers and other institutions combating this phenomenon. A quantitative survey of 322 respondents was conducted. The analysis of the results was based on the Technology Acceptance Model, the theory of self-efficacy and the theory of planned behaviour. The results show that the ability to use digital technologies encourages the use of digital books. The perception of digital books as having value reduces the tendency to download them from illegal distribution channels. Legislative regulation does not have a significant impact on the intention not to use digital books from illegal distribution channels. It is likely that a negative assessment of the phenomenon in the immediate environment will have a greater impact on refusing to use illegally distributed books. In order to compete with illegal distribution channels, the channels for legally distributed books need to be more convenient and provide more content.
APA, Harvard, Vancouver, ISO, and other styles
5

Clement, Michel, Arvind Rangaswamy, and Srikant Vadali. "Consumer Responses to Legal Music Download Services that Compete with Illegal Alternatives." Service Science 4, no. 1 (March 2012): 4–23. http://dx.doi.org/10.1287/serv.1120.0005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ryu, Sunghan, and Byungho Park. "Do I want to pay to download movies." Journal of Information, Communication and Ethics in Society 16, no. 1 (March 12, 2018): 45–60. http://dx.doi.org/10.1108/jices-03-2017-0019.

Full text
Abstract:
Purpose The purpose of this study is to understand the nature and characteristics of legal movie download services and to explore the factors that influence user acceptance of the services. Design/methodology/approach The authors analyzed the three aspects (i.e. hedonic information systems, ethical and legal consideration and user characteristics) of legal movie download services and empirically examined how they affect the potential users’ behavioral intent to adopt the services based on the theory of reasoned action (TRA). An online survey of 142 respondents about a real legal movie download services, currently operated by a major online service provider, was conducted. Findings Perceived playfulness and perceived usefulness had statistically significant effects on attitude. The relationships between subjective norms and its influencers are validated for moral judgment as well as risk aversion. The influence of price consciousness and past experience on behavioral intent to adopt the service are both supported. In the TRA model, attitude and subjective norms had statistically significant influence on behavioral intent to adopt the services. Originality/value The authors contribute to extending the literature on online pirating behavior from the different perspective, i.e. adoption of new legal alternatives. The study shows that the specific boundary conditions, i.e. hedonic attribute of information systems and existence of illegal alternatives, would generate the different results from the theories and previous literature.
APA, Harvard, Vancouver, ISO, and other styles
7

박준석. "Is it illegal to download illegal material from internet?- In relation to the requirement of Reproduction for Private Use exception in Korean Copyright Act." Korean Lawyers Association Journal 59, no. 1 (January 2010): 241–99. http://dx.doi.org/10.17007/klaj.2010.59.1.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ullman, Joanne R., and N. Clayton Silver. "Perceived Effectiveness of Potential Music Piracy Warnings." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 62, no. 1 (September 2018): 1353–57. http://dx.doi.org/10.1177/1541931218621309.

Full text
Abstract:
Because music piracy from the internet imposes fines upon individuals, it is important to construct and test warnings in an effort to curb potentially illegal behavior. Each icon contained an eighth note to denote music, action symbol ( upload or download), a prohibition symbol ( slash or cross), and/or a computer for context. Four icons that initially met the ISO 67% comprehension rate were combined with various signal word and consequence messages, yielding 60 test stimuli. Results revealed that participants generally viewed the icon with a computer for context and download symbol with a prohibitive slash as opposed with a cross (“X”) symbol as more effective, than icons with an upload symbol. Signal words conveying the presence of a risk (i.e., IMPORTANT and STOP) received higher perceived effectiveness ratings than NOTICE. Increasing the number of consequences in the warning led to greater perceived warning effectiveness ratings. Hence, a possible warning for music piracy is suggested, with its implications discussed.
APA, Harvard, Vancouver, ISO, and other styles
9

Naumov, Mikhail. "“Elsevier inc. v. sci-hub”: some aspects of copyright infringement in digital space." SHS Web of Conferences 109 (2021): 01027. http://dx.doi.org/10.1051/shsconf/202110901027.

Full text
Abstract:
Many scientists are faced with the problem of finding the necessary scientific papers to use their work. In this regard, most of them resort to the opportunities provided by «scientific pirates». In connection with the digitalization of science, many scientists have the opportunity to download paid articles on specialized pirate sites. Such piracy activity is illegal and violates copyright. At the same time, neither legislation nor specific court orders can stop the illegal activities of such sites. In this article, using the example of one of the most famous copyright infringement case “Elsevier Inc. v. Sci-hub” conducted a comparative legal analysis of the copyright laws of the United States (a developed country) and Russia (a developing country), revealed weaknesses in the laws of both countries and concluded that the current state of copyright does not keep pace with the digitalization of science, and such inflexibility adversely affects not only the prestige of copyright itself, but also the research and investment climate in the state.
APA, Harvard, Vancouver, ISO, and other styles
10

Venčkauskas, Algimantas, Vacius Jusas, Kęstutis Paulikas, and Jevgenijus Toldinas. "Investigation of Artifacts Left by BitTorrent Client on the Local Computer Operating under Windows 8.1." Information Technology And Control 44, no. 4 (December 18, 2015): 451–61. http://dx.doi.org/10.5755/j01.itc.44.4.13082.

Full text
Abstract:
BitTorrent client application is a popular tool to download large files from Internet, but this application is quite frequently used for illegal purposes that are one of the types of cybercrimes. If order to fight against this type of cybercrime we carried out the research, during which we investigated the evidences left by BitTorrent client application in registry under Windows 8.1 operating system. The experiment was carried out in three steps: installation, download, and uninstallation. The snapshots of registry were taken and compared prior and after each step. Changes in Windows registry were collected and joined into tables. The experiment revealed that BitTorrent client application creates Windows registry artefacts that can contain information which might be used as evidence during an investigation. The evidence remains in the registry even after the removal of the application, although it can really prove the fact of usage of the application only. The investigation of file system can reveal the purpose and the contents of the BitTorrent client session.DOI: http://dx.doi.org/10.5755/j01.itc.44.4.13082
APA, Harvard, Vancouver, ISO, and other styles
11

Lee, Seongsik, Hayoung Jang, and Sookyung Lim. "A Test of a Model for Causes and Counterpart in Digital Piracy: Comparing Illegal Download with Upload Behavior." Journal of Public Policy Studies 38, no. 2 (August 31, 2021): 135–59. http://dx.doi.org/10.33471/ila.38.2.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Adi Suliantoro, Alfin Andrey Ryanto,. "PERLINDUNGAN HUKUM BAGI PENCIPTA LAGU PADA MEDIA INTERNET (Kajian Yuridis Sosiologis)." Jurnal Ilmiah Dinamika Hukum 20, no. 2 (August 14, 2019): 48–57. http://dx.doi.org/10.35315/dh.v23i2.8267.

Full text
Abstract:
Permasalahan terkait ilegal downloading masih menjadi masalah bagi para pencipta lagu atau musisi di Indonesia. Dalam UUHC dan UU ITE juga telah diatur terkait perlindungan terhadap pelanggaran hak cipta melalui media internet, Pada kenyataanya, pemberlakuan UU tersebut kurang tegas. Berdasarkan penjelasan yang diberikan terhadap uraian diatas, maka penelitian ini diberi judul “Perlindungan Hukum Bagi Pencipta Lagu Pada Media Internet (Kajian Sosiologi Hukum).” Perumusan masalah penelitian ini adalah bagaimana perlindungan hukum bagi pencipta lagu pada media internet, bagaimana tanggung jawab pihak penyedia jasa Download Mp3 lagu gratis terhadap pelanggaran hak cipta melalui media internet terhadap pencipta lagu, Persepsi masyarakat terkait perlindungan terhadap lagu-lagu yang diedarkan di media internet. Metode pendekatan yang digunakan dalam penelitian ini adalah yuridis sosiologis. Spesifikasi penelitian dilakukan secara deskriptif analitis. Metode penyajian data dalam penelitian ini dilakukan dengan cara wawancara langsung dengan masyarakat atau mengisi kuisioner di internet. Analisis yang dipergunakan dalam penulisan ini adalah kualitatif. Hasil penelitian menunjukkan bahwa perlindungan hukum pencipta lagu sudah otomatis dilindungi oleh UUHC, pemerintah juga sudah mengupayakan untuk pemblokiran situs download lagu ilegal tetapi realitanya masyarakat masih banyak mengunduh lagu ilegal pada media internet,Pertanggungjawaban situs penyedia jasa download lagu gratis, dalam perkembangan pelanggaran hak cipta melalui media internet biasanya dibebankan kepada Internet Service Provider (ISP) jika provider menyediakan fasilitas yang memungkinkan terjadinya pelanggaran hak cipta. Penyedia situs justru menjadi sebuah penyimpangan, situs tersebut mengalihkan kedudukannya sebagai situs illegal menjadi situs legal dengan memposisikan diri mereka sebagai situs pencari lagu, penyedia lagu dalam hal tersebut telah bertentangan dengan Undang-undang. Persepsi masyarakat tentang individu yang melakukan download lagu hal yang salah karena melanggar UU Hak Cipta. Masyarakat sadar pelanggaran Hak Cipta, namun menurut fakta di lapangan masyarakat masih mendownload lagu tanpa izin. Perilaku ini dilakukan karena perlindungan lagu oleh Pemerintah kurang kuat. Belum ada sanksi yang tegas untuk penyedia lagu gratis di internet dan pengunduh lagu gratis di internet. Kata Kunci : Perlindungan UUHC,Download Lagu,Penyedia Jasa pada Media Internet
APA, Harvard, Vancouver, ISO, and other styles
13

Ouellet, Jean-François. "The purchase versus illegal download of music by consumers: the influence of consumer response towards the artist and music." Canadian Journal of Administrative Sciences / Revue Canadienne des Sciences de l'Administration 24, no. 2 (2007): 107–19. http://dx.doi.org/10.1002/cjas.16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Henkel, Leah, Melanie James, and Nic Croce. "Would You Like Popcorn with That Download? A Uses and Gratifications Study Into the Motivations of Legal and Illegal Film Consumption." Quarterly Review of Film and Video 33, no. 1 (November 30, 2015): 46–63. http://dx.doi.org/10.1080/10509208.2015.1086256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Choi, Hyoung-Bae, Rak-Gun Hwang, and Young-Taek Kim. "A Study on Intention to Switch from Illegal Download to Subscription-based Music Service : based on Customers’ Cognition on Anti-piracy Solutions." Joural of the Korea Entertainment Industry Association 6, no. 4 (December 31, 2012): 170. http://dx.doi.org/10.21184/jkeia.2012.12.6.4.170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Metaxa, Eleni, Miltiadis Sarigiannidis, and Dimitris Folinas. "Legal Issues of the French Law on Creation and Internet (Hadopi 1 and 2)." International Journal of Technoethics 3, no. 3 (July 2012): 21–36. http://dx.doi.org/10.4018/jte.2012070102.

Full text
Abstract:
The French law on “Creation and Internet,” or more commonly known as the “Hadopi 1” Law, passed on June 2009, and its complementary, the “Law for the Protection under Criminal Law of Artistic and Literary Works on the Internet” (“Hadopi 2”), passed on October 2009, were intended to put an end to the illegal distribution of creative works on the Internet and at the same time control the internet access for every user. However, the implementation decree of March 2010 on the “specific negligence” aims exclusively at the peer-to-peer networks, leaving out of the criminal framework the direct download and the streaming options. After presenting and analyzing the French laws “Hadopi 1 & 2,” the authors discuss the controversial findings of a recent French research of the first months of their application in France and eventually question the achievement of the ultimate goal, which is the protection of the French intellectual property rights on the Internet.
APA, Harvard, Vancouver, ISO, and other styles
17

Kim, Dong-Tae. "The Relationship between Social Norm and Intention to Use Illegal Download : Focused on Moderating Effects of Attitude to Copyright Law and Perceived Price Importance." Journal of the Korea Contents Association 16, no. 8 (August 28, 2016): 97–106. http://dx.doi.org/10.5392/jkca.2016.16.08.097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Reardon, James, Denny McCorkle, Anita Radon, and Desalegn Abraha. "A global consumer decision model of intellectual property theft." Journal of Research in Interactive Marketing 13, no. 4 (November 20, 2019): 509–28. http://dx.doi.org/10.1108/jrim-07-2018-0093.

Full text
Abstract:
Purpose Intellectual property theft amounts to billions of dollars per year worldwide. The first step in stemming this loss is to understand the underlying precursors of this behavior. This paper aims to propose and test a model of consumer choice to purchase or pirate intellectual property, specifically music. This paper combines and applies the theory of reasoned action (TRA) and Becker’s theory of crime to develop a more comprehensive model of digital piracy behavior. Culture was tested as an antecedent to the attitudes and the perceptions of risk associated with music piracy. Design/methodology/approach A survey of 4,618 participants was conducted across 23 countries. Construct measures were validated using confirmatory factor analysis in LISREL. A conceptual model was tested using logistic structural equation modeling in MPlus. Respondents were asked about the last music they acquired to test a behavioral model of music piracy. Findings The results indicated that culture, specifically rule orientation and uncertainty avoidance, had a significant impact on attitudes toward the music industry, ethical perceptions of music piracy and risk perceptions. Respondents’ ethical perceptions of downloading had the highest impact on music piracy behavior. The personal/copy risk associated with the illegal downloading of music had a significant impact while the relative channel risk did not. The market value, quality and selection also had a significant impact on downloading behavior, as did the respondent's ability to find and download music. Research limitations/implications While this paper was limited by focusing on the illegal downloading of music, the results can provide guidance in the design of future research concerning the piracy and unlicensed downloading of other types of intellectual properties such as movies/videos, TV, paywall content and e-books. Practical implications In recent years, improved access to music and video through online streaming and online stores has significantly decreased music piracy. This research indicated that further inroads into this behavior could be made through better online purchase access and through consumer education about the ethics and results of digital downloading. Further, efforts are more efficient by targeting cultures with lower levels of rule orientation with ethics education and targeted risk messages in countries with higher uncertainty avoidance. Social implications Yearly losses to the music industry amount to about $5-29bn. Many find music and video downloading and “sharing” as acceptable. The model developed in this research has implications to affect this mass loss of revenue to the music industry and perhaps the societal view of downloading behavior that is illegal but commonly accepted. Originality/value This model is the first to integrate cultural aspects into models of digital piracy. In addition, the model is developed from a strong theoretical base (TRA and Becker’s theory of crime) to integrate multiple antecedents to intellectual property theft research.
APA, Harvard, Vancouver, ISO, and other styles
19

Zakariya, Hafid. "Perlindungan Hukum Hak Cipta Terhadap Musik Di Indonesia Yang Di Upload Di Media Massa." Jurnal Panorama Hukum 4, no. 1 (June 27, 2019): 57–63. http://dx.doi.org/10.21067/jph.v4i1.3307.

Full text
Abstract:
In this era of globalization, people are pampered with any technology made easy with technological developments. With this technology able to create many opportunities one of them for the development of music in Indoneisa with social media in Indonesia can be rapidly spread and can be accessed by everyone so that the music can be Opportunities for artists to be commercialized. But with these developments many Parties are not responsible by doing music piracy by downloading so as to save or record with recording technology and storage nowadays, such as Memory card or flash disk with different types of brands. The advancement of storage technology has made it easier for users to record or duplicate a large number of creations that appear on internet media with ease and cheap cost even free, thus it does not comply with article 9 paragraph (3) UUHC Number 28 Year 2014: Any person without permission the creator or copyright holder is prohibited from making a reproduction and/or commercial use of the creation. And article 4 Law No 28 year 2014 part of article by article is a right that is only intended for the author, so that no other party can exploit that right without the permission of the creator. Copyright holders who are not creators only have a portion of the exclusive right of economic rights. Legal protections that government grants to songwriters or rights holders are now in two ways, first being a site blocking that is deemed to commit copyright infringement despite not running maximally and not reducing The occurrence of violations, and the second is to socialize both the songwriters or the rightsholders on the importance of registering the creation, as well as to the public about the culture respecting the work of the nation for law enforcement rights Intellectual property can be implemented well and currently the government has established a new institution of non-Ministry called Creative Economic Agency (BEKRAF). The liability made by the provider of free download sites is not compliant with the law. Providers of illegal sites even circumcarent their existence as illegal sites by way of positioning itself as a song search site that does not upload songs in the site but rather equate its site with search sites such as Google and Ymail.
APA, Harvard, Vancouver, ISO, and other styles
20

Clark, B. "Illegal downloads: sharing out online liability: sharing files, sharing risks." Journal of Intellectual Property Law & Practice 2, no. 6 (May 3, 2007): 402–18. http://dx.doi.org/10.1093/jiplp/jpm070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Han, Yongman, Jongcheon Choi, Seong-Je Cho, Haeyoung Yoo, Jinwoon Woo, Yunmook Nah, and Minkyu Park. "A new detection scheme of software copyright infringement using software birthmark on windows systems." Computer Science and Information Systems 11, no. 3 (2014): 1055–69. http://dx.doi.org/10.2298/csis130918064h.

Full text
Abstract:
As software is getting more valuable, unauthorized users or malicious programmers illegally copies and distributes copyrighted software over online service provider (OSP) and P2P networks. To detect, block, and remove pirated software (illegal programs) on OSP and P2P networks, this paper proposes a new filtering approach using software birthmark, which is unique characteristics of program and can be used to identify each program. Software birthmark typically includes constant values, library information, sequence of function calls, and call graphs, etc. We target Microsoft Windows applications and utilize the numbers and names of DLLs and APIs stored in a Windows executable file. Using that information and each cryptographic hash value of the API sequence of programs, we construct software birthmark database. Whenever a program is uploaded or downloaded on OSP and P2P networks, we can identify the program by comparing software birthmark of the program with birthmarks in the database. It is possible to grasp to some extent whether software is an illegally copied one. The experiments show that the proposed software birthmark can effectively identify Windows applications. That is, our proposed technique can be employed to efficiently detect and block pirated programs on OSP and P2P networks.
APA, Harvard, Vancouver, ISO, and other styles
22

Greshake, Bastian. "Looking into Pandora's Box: The Content of Sci-Hub and its Usage." F1000Research 6 (April 21, 2017): 541. http://dx.doi.org/10.12688/f1000research.11366.1.

Full text
Abstract:
Despite the growth of Open Access, potentially illegally circumventing paywalls to access scholarly publications is becoming a more mainstream phenomenon. The web service Sci-Hub is amongst the biggest facilitators of this, offering free access to around 62 million publications. So far it is not well studied how and why its users are accessing publications through Sci-Hub. By utilizing the recently released corpus of Sci-Hub and comparing it to the data of ~28 million downloads done through the service, this study tries to address some of these questions. The comparative analysis shows that both the usage and complete corpus is largely made up of recently published articles, with users disproportionately favoring newer articles and 35% of downloaded articles being published after 2013. These results hint that embargo periods before publications become Open Access are frequently circumnavigated using Guerilla Open Access approaches like Sci-Hub. On a journal level, the downloads show a bias towards some scholarly disciplines, especially Chemistry, suggesting increased barriers to access for these. Comparing the use and corpus on a publisher level, it becomes clear that only 11% of publishers are highly requested in comparison to the baseline frequency, while 45% of all publishers are significantly less accessed than expected. Despite this, the oligopoly of publishers is even more remarkable on the level of content consumption, with 80% of all downloads being published through only 9 publishers. All of this suggests that Sci-Hub is used by different populations and for a number of different reasons, and that there is still a lack of access to the published scientific record. A further analysis of these openly available data resources will undoubtedly be valuable for the investigation of academic publishing.
APA, Harvard, Vancouver, ISO, and other styles
23

Camarero, Carmen, Carmen Antón, and Javier Rodríguez. "Technological and ethical antecedents of e-book piracy and price acceptance." Electronic Library 32, no. 4 (July 29, 2014): 542–66. http://dx.doi.org/10.1108/el-11-2012-0149.

Full text
Abstract:
Purpose – The purpose of this paper is to analyse the driving factors of e-books’ illegal downloading and price acceptance from a theoretical perspective that embraces ethical and technological aspects. The diffusion of e-readers and tablets has led to a spate of pirated copies of books. Design/methodology/approach – The proposed model holds that normative and value consciousness, as well as the self-efficacy, the usefulness and the use of the new technology, are determinants of the trend towards free downloads and the maximum acceptable price for e-books. Data are collected from a sample of 227 users of e-book reader devices. Findings – The results provide evidence that individuals are inclined towards piracy when they use and control the technology, whereas value consciousness mitigates illegal downloading and is basic to the individuals’ acceptance of a higher price. Implications – Bearing in mind that the spread of electronic devices has led to an increase in downloads, raising awareness of the norms among individuals is essential if piracy is to be curtailed. In addition, actions aimed at endowing electronic books with value would encourage consumers to pay a higher price for them. Originality/value – Few attempts have been made to apply ethics theories and the technology acceptance model to the context of e-books’ piracy, and even less effort has been devoted to analyse consumers’ price acceptance in the e-book industry.
APA, Harvard, Vancouver, ISO, and other styles
24

Derakhti, Arman, Catalina Ramírez-Rivas, and Patricio Esteban Ramírez-Correa. "Streaming or misbehavior, investigation on movie streaming or movie piracy." DYNA 87, no. 215 (November 5, 2020): 102–8. http://dx.doi.org/10.15446/dyna.v87n215.84541.

Full text
Abstract:
Nowadays, movie streaming is ubiquitous amongst the younger population, and it is a supposed substitute for movie piracy. Without prejudice to the previous, reasons of various kinds may cause users to download their favorite movies illicitly. The objective of this study is to identify if movie streaming increases movie piracy. For this purpose, an online survey of potential users of movie streaming services was conducted in Chile. The sample was divided into students and not students, and logit models were used to analyze the data obtained. The results indicate that, on one hand, movie streamers are intentions to engage the download movie illegally, and on the other hand, peer pressure explains movie piracy among students.
APA, Harvard, Vancouver, ISO, and other styles
25

Duarte-Hueros, Juliana, Ana Duarte-Hueros, and Soledad Ruano-López. "The audiovisual content downloads among university students." Comunicar 24, no. 48 (July 1, 2016): 49–57. http://dx.doi.org/10.3916/c48-2016-05.

Full text
Abstract:
This article analyses the phenomenon of downloading audio-visual content –movies and television series– which is habitually practiced by university students via the Internet; their attitudes towards illegal downloads; and the education/training that they have about the legal status of this activity. These issues are a frequent reality but are little discussed in our academic context. Data was obtained from a questionnaire designed ad hoc. This was administered to students enrolled in different university degrees (Audio-visual Communication, Primary Education and Social Education). We believe that these college degrees require ethical and legal training on the issues regarding downloading of content from the web. This education is an urgently needed training for young people who will work in educating and informing the citizens of the 21st century. The study results show that university students habitually consume a high percentage of online content from the audio-visual industry (films and television series). Students have clearly favourable attitudes towards this form of consumption. However, students show little regards to the ethical and legal issues surrounding downloading from the Internet. In addition, they have a very low degree of education and training on these issues. The results suggest the need to implement training programs and to conduct information campaigns to improve their information and digital literacy. El presente trabajo analiza el fenómeno de las descargas de contenidos audiovisuales –películas y series de televisión– que habitualmente practican los universitarios a través de Internet; sus actitudes ante las descargas ilegales y la formación que tienen en relación a la situación legal de las mismas. Estas cuestiones conforman una realidad que aunque a priori parece ser demasiado frecuente, se encuentra todavía muy poco explorada y es escasamente tratada desde una perspectiva científica en nuestro contexto. Los datos se obtuvieron a partir de un cuestionario diseñado ad hoc, administrado a estudiantes de tres Grados universitarios (Comunicación Audiovisual, Educación Primaria y Educación Social), por considerar que se trata de titulaciones en las que un conocimiento de base ético y legal ante las descargas de contenidos en la red es urgente y necesario para unos jóvenes que se están preparando con el propósito de dedicarse a la formación e información de los futuros ciudadanos del siglo XXI. Los resultados del estudio muestran cómo el consumo de contenidos procedentes de la industria audiovisual (televisiva y cinematográfica), es una práctica asentada entre los universitarios, que tienen actitudes claramente favorables hacia ella pero que prestan escasa importancia a cuestiones éticas y legales ante las descargas no legales, además de tener muy baja formación en estas cuestiones. Los resultados sugieren la necesidad de poner en marcha acciones educomunicativas para mejorar sus competencias informacionales y digitales.
APA, Harvard, Vancouver, ISO, and other styles
26

Holm, Peter. "Piracy on the simulated seas: the computer games industry's non-legal approaches to fighting illegal downloads of games." Information & Communications Technology Law 23, no. 1 (January 2, 2014): 61–76. http://dx.doi.org/10.1080/13600834.2014.899770.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Wang, N., and R. Yang. "THE APPLICATION OF CHINESE HIGH-SPATIAL-RESOLUTION REMOTE SENSING SATELLITE IMAGE IN LAND LAW ENFORCEMENT INFORMATION EXTRACTION." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLII-3 (April 30, 2018): 1751–55. http://dx.doi.org/10.5194/isprs-archives-xlii-3-1751-2018.

Full text
Abstract:
Chinese high -resolution (HR) remote sensing satellites have made huge leap in the past decade. Commercial satellite datasets, such as GF-1, GF-2 and ZY-3 images, the panchromatic images (PAN) resolution of them are 2 m, 1 m and 2.1 m and the multispectral images (MS) resolution are 8 m, 4 m, 5.8 m respectively have been emerged in recent years. Chinese HR satellite imagery has been free downloaded for public welfare purposes using. Local government began to employ more professional technician to improve traditional land management technology. This paper focused on analysing the actual requirements of the applications in government land law enforcement in Guangxi Autonomous Region. 66 counties in Guangxi Autonomous Region were selected for illegal land utilization spot extraction with fusion Chinese HR images. The procedure contains: A. Defines illegal land utilization spot type. B. Data collection, GF-1, GF-2, and ZY-3 datasets were acquired in the first half year of 2016 and other auxiliary data were collected in 2015. C. Batch process, HR images were collected for batch preprocessing through ENVI/IDL tool. D. Illegal land utilization spot extraction by visual interpretation. E. Obtaining attribute data with ArcGIS Geoprocessor (GP) model. F. Thematic mapping and surveying. Through analysing 42 counties results, law enforcement officials found 1092 illegal land using spots and 16 suspicious illegal mining spots. The results show that Chinese HR satellite images have great potential for feature information extraction and the processing procedure appears robust.
APA, Harvard, Vancouver, ISO, and other styles
28

Murphy, Lindsay Renee, and David Rose. "Are Private Universities Exempt from Student Concerns About Textbook Costs? A Survey of Students at American University." Open Praxis 10, no. 3 (November 14, 2018): 289. http://dx.doi.org/10.5944/openpraxis.10.3.866.

Full text
Abstract:
A survey conducted in the fall of 2015 at American University in Washington, DC shows that rising textbook prices similarly affect students at an expensive private university as those at community colleges and state schools. Research on high textbook costs that has demonstrated corollary unwanted behavior changes in students, including not purchasing the book, resorting to illegal online downloads, and poor study habits, were confirmed at American University as well. Solutions that have been proposed to this problem of prohibitive textbook prices, including Open Educational Resources (OER), could have an equally profound impact at American University, and potentially similar private universities, as has been demonstrated at less selective and more affordable counterparts.
APA, Harvard, Vancouver, ISO, and other styles
29

Bouhnik, Dan, and Mor Deshen. "Adolescents' perception of illegal music downloads from the internet: An empirical investigation of Israeli high school students' moral atittude and behviour." Proceedings of the American Society for Information Science and Technology 50, no. 1 (2013): 1–11. http://dx.doi.org/10.1002/meet.14505001043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Lalović, Gordana, Saule Amirebayeva Reardon, Irena Vida, and James Reardon. "Consumer Decision Model of Intelectual Property Theft in Emerging Markets." Organizations and Markets in Emerging Economies 3, no. 1 (May 31, 2012): 58–74. http://dx.doi.org/10.15388/omee.2012.3.1.14275.

Full text
Abstract:
The increasing importance of digital piracy has prompted research on the behavioural and economics origins of illegal downloading activities. This research focuses on the potential impact of various economic, psychological and social factors on the consumer decision whether to buy or to steal music in emerging markets. These markets present specific difficulties for owners of intellectual property rights due to the high level of both downloading and ‘sharing’ of digital property. Results indicate impacts of price, downloaded music quality, ease of Internet use, attitudes toward music industry and ethical perception of music downloading on consumer purchase or pirate decision.
APA, Harvard, Vancouver, ISO, and other styles
31

Lamothe, Alain R. "The Importance of Identifying and Accommodating E-Resource Usage Data for the Presence of Outliers. The Negative Impacts of Inaccurate E-Journal Usage Data." Information Technology and Libraries 33, no. 2 (June 22, 2014): 31. http://dx.doi.org/10.6017/ital.v33i2.5341.

Full text
Abstract:
<p>This article presents the results of a quantitative analysis examining the effects of abnormal and extreme values on e-journal usage statistics. Detailed are the step-by-step procedures designed specifically to identify and remove these values, termed outliers. By greatly deviating from other values in a sample, outliers distort and contaminate that data. Between 2010 and 2011, e-journal usage at the J.N. Desmarais Library spiked as a result of illegal downloading. The identification and removal of outliers had a noticeable effect on e-journal usage levels. They represented over 100,000 erroneous articles downloaded in 2010 and nearly 200,000 erroneous downloading in 2011.</p>
APA, Harvard, Vancouver, ISO, and other styles
32

Maiano, Luca, Irene Amerini, Lorenzo Ricciardi Celsi, and Aris Anagnostopoulos. "Identification of Social-Media Platform of Videos through the Use of Shared Features." Journal of Imaging 7, no. 8 (August 8, 2021): 140. http://dx.doi.org/10.3390/jimaging7080140.

Full text
Abstract:
Videos have become a powerful tool for spreading illegal content such as military propaganda, revenge porn, or bullying through social networks. To counter these illegal activities, it has become essential to try new methods to verify the origin of videos from these platforms. However, collecting datasets large enough to train neural networks for this task has become difficult because of the privacy regulations that have been enacted in recent years. To mitigate this limitation, in this work we propose two different solutions based on transfer learning and multitask learning to determine whether a video has been uploaded from or downloaded to a specific social platform through the use of shared features with images trained on the same task. By transferring features from the shallowest to the deepest levels of the network from the image task to videos, we measure the amount of information shared between these two tasks. Then, we introduce a model based on multitask learning, which learns from both tasks simultaneously. The promising experimental results show, in particular, the effectiveness of the multitask approach. According to our knowledge, this is the first work that addresses the problem of social media platform identification of videos through the use of shared features.
APA, Harvard, Vancouver, ISO, and other styles
33

Pašalić, Daria, and Vesna Šupak Smolčić. "Copyright violation of predators in scientific publishing - Biochemia Medica’s harmful experience and proposed solution." Biochemia medica 30, no. 2 (June 14, 2020): 196–201. http://dx.doi.org/10.11613/bm.2020.020201.

Full text
Abstract:
Biochemia Medica is an open access journal that does not charge manuscript processing or publishing. All editorial staff are continuously educated and directed to follow the highest ethical and scholarly publishing standards in all steps of the manuscript processing. They are all laboratory medicine professionals, who apart from their regular jobs, are in charge of different phases in Journal processing as volunteers. The publisher of the Journal is scientific and professional association of laboratory medicine professionals, Croatian Society of Medical Biochemistry and Laboratory medicine (CSMBLM). During November and December 2018, without knowledge of the editorial staff, unknown perpetrator(s) downloaded a respectable number of articles published in Biochemia Medica as PDF and launched an illegal web page under the same journal name with downloaded articles. Although this was a very harmful experience, we have learned a lot from it and we would like to share this with scientific journals’ community. Therefore, we would like to share this harmful experience, and to present a short workflow on how to manage situations like this if it will be necessary for any scientific journal in the future.
APA, Harvard, Vancouver, ISO, and other styles
34

Li, Qiwei, Jihong Wu, Yesheng Wang, Xiaoming Lian, Feilong Wu, Lin Zhou, Zebo Huang, and Shuang Zhu. "The phylogenetic analysis of Dalbergia (Fabaceae: Papilionaceae) based on different DNA barcodes." Holzforschung 71, no. 12 (November 27, 2017): 939–49. http://dx.doi.org/10.1515/hf-2017-0052.

Full text
Abstract:
AbstractThe genusDalbergiacontains approximately 250 species with many valuable trees being destroyed by targeted and illegal logging. DNA barcoding is a reliable method for the molecular identification of different species and resources conservation. In the present study, the specimen discrimination ability of internal transcribed spacer (ITS),matK,rbcL andpsbA-trnH barcoding were tested onDalbergiasequences, downloaded from the National Center for Biotechnology Information (NCBI), and the combined barcoding ITS+matK+rbcL was used to identify unknown specimens. It was found that ITS+matK+rbcL have good discrimination rates based on the analysis methods best match (BM) and best close match (BCM). These barcodes also have the best performance concerning barcode gap distribution, and are able to discriminate unknown specimens from South-China. Furthermore, it was demonstrated thatD. tamarindifoliaandD. rubiginosaare also relatively close to sister-speciesD. pinnataandD. candenatensiswithin the phylogeneticDalbergiatree. Considering the overall performance of these barcodes, we suggest that the ITS+matK+rbcL region is a suitable barcode for identifyingDalbergiaspecies.
APA, Harvard, Vancouver, ISO, and other styles
35

Kayombo, Canisius John, Henry Joseph Ndangalasi, Cosmas Mligo, and Richard A. Giliba. "Analysis of Land Cover Changes in Afromontane Vegetation of Image Forest Reserve, Southern Highlands of Tanzania." Scientific World Journal 2020 (May 15, 2020): 1–13. http://dx.doi.org/10.1155/2020/7402846.

Full text
Abstract:
An analysis of land cover changes (LCCs) was done in Image Forest Reserve (IFR) from August to October 2019. Free satellite images for 1990, 2004, and 2018 were downloaded from Landsat 5 (TM) and Landsat 8 (OLI) available through the USGS portal. Ground surveys were conducted using systematically set plots of 20 m × 40 m to identify the existing land cover types and human illegal activities. Geographical coordinates for each of these plots were recorded using handheld GPS. We witnessed the changes of land cover types in the three decades. Forest had contracted, while shrubland and grassland and woodland had expanded within IFR. Between 1990 and 2004, woodland, bareland and rocky outcrops, shrubland, and grassland had consistently decreased though at a different rate of change, while forest has increased between the same assessment periods. The period of 2004–2018 has shown a consistent increase at different rates in woodland, bareland and rocky outcrops, shrubland, and grassland at a different rate of change, while forest has decreased between the same assessment periods. Further study is needed, bylaws and laws should be implemented, participatory forest management should be encouraged, beekeeping and ecotourism should be introduced, provision of regular education to the community by the Tanzania Forest Service (TFS) should be encouraged, and awareness creation should be made.
APA, Harvard, Vancouver, ISO, and other styles
36

He, Tuo, Lichao Jiao, Min Yu, Juan Guo, Xiaomei Jiang, and Yafang Yin. "DNA barcoding authentication for the wood of eight endangered Dalbergia timber species using machine learning approaches." Holzforschung 73, no. 3 (March 26, 2019): 277–85. http://dx.doi.org/10.1515/hf-2018-0076.

Full text
Abstract:
AbstractReliable wood identification and proof of the provenance of trees is the first step for combating illegal logging. DNA barcoding belongs to the promising tools in this regard, for which reliable methods and reference libraries are needed. Machine learning approaches (MLAs) are tailored to the necessities of DNA barcoding, which are based on mathematical multivaried analysis. In the present study, eightDalbergiatimber species were investigated in terms of their DNA sequences focusing on four barcodes (ITS2,matK,trnH-psbA andtrnL) by means of the MLAs BLOG and WEKA for wood species identification. The data material downloaded from NCBI (288 sequences) and taken from a previous study of the authors (153 DNA sequences) was taken as dataset for calibration. The MLAs’ effectivity was verified through identification of non-vouchered wood specimens. The results indicate that the SMO classifier as part of the WEKA approach performed the best (98%~100%) for discriminating the eightDalbergiatimber species. Moreover, the two-locus combination ITS2+trnH-psbA showed the highest success rate. Furthermore, the non-vouchered wood specimens were successfully identified by means of ITS2+trnH-psbA with the SMO classifier. The MLAs are successful in combi- nation with DNA barcode reference libraries for the identification of endangeredDalbergiatimber species.
APA, Harvard, Vancouver, ISO, and other styles
37

Baloch, Abdul Rasheed, Ubaidullah Alias Kashif, Kashif Gul Chachar, and Maqsood Ali Solangi. "Video Copyright Detection Using High Level Objects in Video Clip." Sukkur IBA Journal of Computing and Mathematical Sciences 1, no. 2 (December 31, 2017): 95. http://dx.doi.org/10.30537/sjcms.v1i2.33.

Full text
Abstract:
Latest advancements in online video databases have caused a huge violation of copyright material misuse. Usually a video clip having a proper copyright is available in online video databases like YouTube without permission of the owner. It remains available until the owner takes a notice and requests to the website manager to remove copyright material. The problem with this approach is that usually the copyright material is downloaded and watched illegally during the period of upload and subsequent removal on request of the owner. This study aims at presenting an automatic content based system to detect any copyright violation in online video clips. In this technique, a video clip is needed from original video that is used to query from online video to find out shot similarity based on high level objects like shapes.
APA, Harvard, Vancouver, ISO, and other styles
38

Ruffinatto, Flavio, Gaetano Castro, Corrado Cremonini, Alan Crivellaro, and Roberto Zanuttini. "A new atlas and macroscopic wood identification software package for Italian timber species." IAWA Journal 41, no. 4 (October 21, 2019): 393–411. http://dx.doi.org/10.1163/22941932-00002102.

Full text
Abstract:
Abstract Wood identification has never been more important to serve the purpose of global forest protection, by controlling international illegal timber trade and enabling the enforcement of timber trade regulations. Macroscopic wood identification is the fastest method for the first identification of an unknown timber and, with proper training, it can be performed by operators in the timber industry, restorers and curators of cultural heritage, wood traders, designers, students and customs officers. Here we describe a wood atlas and accompanying software, SIR-Legno, developed for the identification of 48 Italian timber species based on a recently proposed list of macroscopic features for wood identification. For each species the atlas provides a complete macroscopic description plus information on natural durability, end-use class, physico-mechanical properties, conservation status, maximum diameter of the bole and most frequent uses. For each genus covered by the atlas, information about species number, CITES-listed species, main commercial timbers, similarly-named timbers from other genera, geographical distribution and notes on species or species group recognition at macroscopic and microscopic level are provided. SIR-Legno is an educational product, a handy identification key and a tool to search woods by their natural durability, end-use class and physico-mechanical properties. Both the atlas and the software can be freely downloaded from the web. Thanks to the adoption of a codified list of characters and a transferable design, SIR-Legno can be easily replicated or expanded to other databases in order to include new species. SIR-Legno is freeware and works on any version of Windows.
APA, Harvard, Vancouver, ISO, and other styles
39

Giverts, P. "HOMEMADE FIREARMS PRODUCED USING THE 3D PRINTING METHOD – THEIR CONSTRUCTION AND THE PECULIARITIES OF FORENSIC EXAMINATION." Criminalistics and Forensics, no. 65 (May 18, 2020): 381–92. http://dx.doi.org/10.33994/kndise.2020.65.37.

Full text
Abstract:
The development of a new technology of material processing known as 3D printing in 2013 lead to posting on the Internet blueprints of the first pistol made with the use this technology. The pistol got the name Liberator. Within the first two days after the post, the blueprints of this pistol were downloaded more than a hundred thousand times. The difference of this construction from other constructions is that all the parts, except the firing pin, are printed on the 3D printer. For manufacturing this type of pistols special equipment (which has become easily available lately) is needed, as well as the knowledge and skill to operate it. At the same time, no special knowledge about the development and manufacturing of firearms is necessary. Availability of ready blueprints (the programs for printing the elements in 3D printer) without the need to do manual or machine treatment, lead to the wide spread of this type of homemade firearms. The law enforcements of many countries have already got cases of illegal trafficking of homemade firearms made with the use of 3D printing technology. The article discusses the construction features of Liberator pistol, as well as the peculiarities of its forensic examination. Special attention is paid to the problem of reliability and durability of this type of pistols. The possibility of damage or destruction of the pistol construction during a shot was investigated. The influence of different parameters, such as the size of the pistol, the material of its elements, the caliber of the cartridge on the possible destruction of the pistol, was also discussed. The damages in the pistols, made of different polymers, were illustrated in this article by the results of investigations taken from a few foreign professional sources. The problem of establishing the fact of a shot, which had been made from pistol printed in 3D printer, before the evidence came for forensic examination, was discussed. The article deals with the problem of the influence of this shot on the possibility of determination of the constriction durability and with the question if the evidence meets the criteria of firearms. Possible defects in the examined evidences, which should be checked be the examiners before the experimental shot, were pointed out.
APA, Harvard, Vancouver, ISO, and other styles
40

Setiawan, Andry. "DISSEMINATION OF COPYRIGHT LAW IN DIGITAL PRODUCTS IN SEMARANG CITY." Journal of Private and Commercial Law 2, no. 1 (June 28, 2018): 47–54. http://dx.doi.org/10.15294/jpcl.v2i1.14217.

Full text
Abstract:
A creative work created by its creator based on his sense and intention which is supported by his creativity will become an intellectual work with a high economic value. Such creators are like book and song writers who have an ability and idea to produce a work that can be enjoyed by everyone. Based on the principle of justice, it is understood that to produce such work is not an easy task because it requires sacrifice. Therefore, the creator is entitled to economic benefits for his work. An intellectual work having a very high economic value is supposed to get adequate legal protection supported by a sense of justice as the reward of the creator’s intellectual products. In addition to physical copyrighted work products, there are also digital products on which the creator owns a copyright. There are examples of digital products which follow the development of technology such as song files, e-books, software, etc. One of the problems that exists in the community is that the digital product becomes easier to be pirated or illegally downloaded through the internet. How is copyright protection in digital products as the embodiment of the creator's creative works. Copyright protection against creators and copyright holders pursuant to Act No. 28 of 2014 on Copyright. Article 1 number 1 and Article 24 paragraph (1) and (2). The creator or copyright holder has rights to be protected by the government, namely economic rights and moral rights. The existence of economic rights and moral rights is then someone's creative work will have its own values, so it is not easy to use his property for commercial purposes by the parties who are not responsible.
APA, Harvard, Vancouver, ISO, and other styles
41

KIMMEL, Douglas P., and Yan-Hai WAN. "同性戀作為一種精神病: 從歷史的角度來看." International Journal of Chinese & Comparative Philosophy of Medicine 1, no. 4 (January 1, 1998): 167–75. http://dx.doi.org/10.24112/ijccpm.11354.

Full text
Abstract:
LANGUAGE NOTE | Document text in Chinese; abstract also in English.本文從歷史的角度考容了西方社會對待同性戀的態度的演化,從同性戀被譴責為罪惡到被認為是一種精神疾病,一直到最近根據經驗研究和跨文化研究,國際醫學和心理學共同體確認人類性傾向的多樣性是一種正常現象,同性戀與異性戀一樣是自然的。The term 'homosexuality' was invented by 19 century German physician Benkert. It means that a man cannot respond to opposite sex, but is attracted by the other of same sex. Before Benkert homosexuality was condemned as a sin by Christian church, and even illegal in some European countries. With the industrial revolution the condemnation against homosexuality came from civil society and medical profession rather than religion.In the end of the 19th century there was a tendency in which homosexual orientation was taken as a diagnostic unit in European and American countries. In 1920s a movement of homosexuality was born in Germany, but the Nazi regime promulgated a law to prohibit it, thousands of homosexuals were arrested and died in concentration camps. Then Freud fled to Britain and announced that homosexuality is not a pathological phenomenon in the sense of psychiatry.While men and women joined together in an unprecedented way in the Second World War, but in 1950s homosexuality as well as communists was cracked down in a movement initiated by Joseph McCarthy in United Sates. However, Alfred Kinsey and his associates found many men have experienced homosexual behaviour. Then many physicians and psychiatrists made great efforts to treat homosexuality with hormones, shock therapy, castration and even surgery, but failed eventually.In 1970s psychologists and psychiatrists came to realize that · homosexuality is not a mental illness on the basis of empirical studies. ln 1980s three empirical studies led international medical community and psychological community to the consensus that homosexuals are as normal and natural as heterosexuals.DOWNLOAD HISTORY | This article has been downloaded 73 times in Digital Commons before migrating into this platform.
APA, Harvard, Vancouver, ISO, and other styles
42

LU, Weibo. "中西醫結合述評." International Journal of Chinese & Comparative Philosophy of Medicine 1, no. 2 (January 1, 1998): 31–44. http://dx.doi.org/10.24112/ijccpm.11333.

Full text
Abstract:
LANGUAGE NOTE | Document text in Chinese; abstract also in English.中西醫結合包含中醫和西醫之間的團結合作,但更重要的是中醫學和西醫學之間的互相結合。在世界上對傳統醫學曾有過三種方針,即“否定”,“容忍”和“平行”的方針,均不能充分發揮傳統醫學的作用和潛力。中國採取“結合”的方針,較好地解決了這一問題,不僅滿足當前醫療工作的需要,更重要的是在科學研究中,強調創新,兩種醫學的觀點、方法、優勢互補,獲得大量新的研究成果,如針刺原理和針麻研究,青萬素的發現,瘀血證研究等。雖然現代醫學是主流醫學,但尚不足以解決所有問題,如慢性病,老年病等。用結合的思想可以更好地解決各種難題,使醫學科學更快地向前發展,造福於人民。What attitude should we take toward traditional medicine? There have been three types of policies in this regard all over the world. First, the excluding policy prohibits practicing any traditional medicine. Traditional physicians are not qualified to possess the title of physician, and their practice is illegal. Second, the tolerating policy does not make illegal traditional medical practice, but it does not formally affirm the practice. Third, the paralleling policy allows both traditional and modem medical practices, but their use may not overlap. For example, traditional physicians may not use modem medical facilities.Since the establishment of the People’s Republic of China in 1949, a unique policy of integration has been adopted in China. This policy assumes that both traditional Chinese medicine and modern Western medicine have strengths and weaknesses. It requires that both types of medicine be integrated so as to develop more effective methods in treating diseases and preserving health.There are two senses of the integration of traditional Chinese and modern Western medicine. The first sense refers to the integration of the two types of the physicians, i.e., the cooperation between traditional Chinese practitioners and modern Western medical professionals. The second sense refers to the integration of the two disciplines; i.e., to use both traditional Chinese and modern Western medical theories and practices to create new forms of diagnostic and therapeutic approaches and means. The hope was to have the perspectives, methods, and solutions of both types of medicine complement each other.Under the integrating policy, traditional Chinese medicine has been developed tremendously in mainland China. 30 traditional Chinese medical colleges, 2457 traditional Chinese medical hospitals, and 170 traditional Chinese medical research institutions have been established. A number of well-known medical achievements, such as acupunctural analgesia and anesthesia, the discovery of a new type of anti-malaria drug - Qinghaosu (artemisinin), and the study of blood stasis syndrome, have been made by following the integrating strategy.With the rapid growth and development of the diagnostic and therapeutic technologies in modern Western medicine, some individuals are doubtful of the prospect of traditional Chinese medicine and of the necessity of China’s integrating strategy. However, no matter how advanced modern Western medicine as a form of medicine has become, it will not be able to handle all diseases or medical problems effectively and appropriately. The human body and medical reality are too complicated to be fixed by modern medicine once and for all. For instance, in the present time, chronic and geriatric diseases pose perplexing challenges to modern medicine. Possibilities are always open for traditional Chinese medicine as well as the integrated traditional Chinese and modern medicine to make their valuable contributions.DOWNLOAD HISTORY | This article has been downloaded 69 times in Digital Commons before migrating into this platform.
APA, Harvard, Vancouver, ISO, and other styles
43

WANG, Jin-Ling. "中國大陸的艾滋病與賣淫婦女: 女性主義的視角." International Journal of Chinese & Comparative Philosophy of Medicine 1, no. 4 (January 1, 1998): 123–40. http://dx.doi.org/10.24112/ijccpm.11352.

Full text
Abstract:
LANGUAGE NOTE | Document text in Chinese; abstract also in English.通過對中國大陸艾滋病蔓延途徑以及商業性性交易與艾滋病傳播相關關係的分析,本文指出了中國大陸現行艾滋病控制政策的缺陷,建議在承認現實的基礎上,根据倫理原則來重新界定政府、社會、個人在艾滋病控制中的價值,修改、改良直至重構現行的某些法律規定、公共政策以及大眾傾向。The conception that commercial sex is a high risky behavior and prostituting women are one of major high risky group has been prevalent in mainland of China and formed one of the conceptual basis on which public policy of HIV prevention was shaped. But it should be challenged as it is not sound and fair.There are safe protective measures that can reduce HIV infection and control HIV transmission. HIV was transmitted between prostitutes and clients due to the shortage of protective measures. Surveys that there are many cases ranging from 65.6% to 98.4% in which condom is never used in commercial sex. The reason is mainly that male clients refused to use condom when prostitutes asked them to wear. Prostituting women are powerless in the bargain with clients on the use of condom. So it is clients who should be mainly responsible for HIV infection and transmission in commercial sex. There are some cases in which clients are infected with HIV by their prostitutes, but more cases show that prostitutes are infected with HIV by their clients. Clients constitute more risky group than prostitutes and should be main target in HIV prevention.In mainland of China AIDS/HIV is taken as associated with immoral and illegal behaviour first, and then as disease. And persons living with AIDS/HIV are taken as sex wrongdoers, and then as patients. So they have to get access to medical advocacy only after they are morally blamed. And prostitutes are morally condemned much more than they clients are. But AIDS is first a disease, and it cannot form a premise on which a moral judgement is made. Secondly, persons living with AIDS/HIV are patients, victims of a disease, not moral defendants. As prostitutes and their male clients both take risk to be infected with HIV, but the right to health care of prostituting women as well as women in general are ignored, neglected or even rejected.The unjust treatment of prostituting women highlights vulnerable powerless status of women in general. It is the gender inequality that made women in a disadvantaged position in employment and education, and thus pushed them enter into prostitution. The society should be accountable for that. But instead the society condemned them, treated them as criminals. Policy and law involving HIV prevention should be reformed on the basis of conceptual change.DOWNLOAD HISTORY | This article has been downloaded 32 times in Digital Commons before migrating into this platform.
APA, Harvard, Vancouver, ISO, and other styles
44

Coelho, Iandra Maria Weirich da Silva. "As competências básicas no processo de ensino e aprendizagem de línguas: um estudo pautado no domínio comunicativo-digital (Basic competences in the teaching-learning process of language: a study based on the communicative-digital domain)." Revista Eletrônica de Educação 14 (May 7, 2020): 2820081. http://dx.doi.org/10.14244/198271992820.

Full text
Abstract:
This paper presents a theoretical investigation with the objective of identifying the basic competences to be acquired and developed in the language teaching-learning process, especially in virtual contexts. The study herein presented, of bibliographic nature, evidences a discussion and reflections on the theme competences and the representativeness of the communicative-digital domain, in the production and sharing of information, in the written and oral modality. The results achieve three basic skills : interacion through Information and Communication Technologies, creation of digital contents and sharing digital contents in the target language.ResumoEste artigo apresenta uma investigação teórica, com o objetivo de identificar as competências básicas a serem adquiridas e desenvolvidas no processo de ensino-aprendizagem de línguas, especialmente em contextos virtuais. O estudo em questão, de natureza bibliográfica, evidencia uma discussão e reflexões sobre a temática competências e a representatividade do domínio comunicativo-digital na produção e compartilhamento de informações, na modalidade escrita e oral. Os resultados evidenciam três competências básicas: interação por meio das Tecnologias de Informação e Comunicação, criação de conteúdos digitais e compartilhamento de conteúdos na língua-alvo.Resumen Este artículo presenta una investigación teórica con el objetivo de identificar las competencias básicas que vayan a ser adquiridas y desarrolladas en el proceso de enseñanza y aprendizaje de lenguas, especialmente en contextos virtuales. El estudio en cuestión, de naturaleza bibliográfica, evidencia una discusión y reflexiones sobre el tema competencias y la representatividad del dominio comunicativo-digital, en la producción y el intercambio de información, en la modalidad escrita y oral. Los resultados comprenden tres competencias básicas: interacción por medio de las Tecnologías de Información y Comunicación, creación de contenidos digitales e intercambio de contenidos en la lengua.Palavras-chave: Ensino de línguas, Competências, Competência comunicativa, Tecnologias.Keywords: Language Teaching, Competences, Communicative competence, Technologys.Palabras claves: Enseñanza de lenguas, Competencias, Competencia cumunicativa, Tecnologías.ReferencesALCARÁ, Adriana Rosecler et al. Fatores que influenciam o compartilhamento da informaçaõ e do conhecimento. Perspectivas em Ciência da Informação, v.14, n.1, p. 170-191, jan./abr., 2009. Disponível em: http://www.scielo.br/pdf/pci/v14n1/v14n1a12. Acesso em: 15 mar. 2019.AREA MOREIRA, Manuel. La alfabetización en la sociedad digital. In: Alfabetización digital y competencias informacionales. Colección Fundación Telefónica. Espanha: Editorial Ariel, p. 3-40, 2012.BARBERO ANDRÉS, J. et al. Las competencias básicas en el área de Lenguas Extranjeras. Cuadernos de Educación de Catábria. Cantabria: Consejería de Educación de Cantabria, 2008.BAEZA, Adrián. La enseñanza basada en Competencias. Chile: Universidad de Chile, 2006.BOLÍVAR BOTÍA, Antonio. Competencias básicas y ciudadanía. Caleidoscopio, revista de contenidos educativos del CEP de Jaén, n. 1, 2008. Disponível em: https://www.researchgate.net/publication/28241033_Competencias_basicas_y_ciudadania. Acesso em: 12 set. 2019.BRASIL. Lei nº 11.161/2005. Lei que dispõe sobre o ensino da língua espanhola, de 05 de agosto de 2005. Disponível em: http://www.planalto.gov.br/ccivil_03/_Ato2004-2006/2005/Lei/L11161.htm. Acesso em: 1 out. 2019.BRASIL. Ministério da Educação. Secretaria da Educação Básica. Fundamentos pedagógicos e estrutura geral da BNCC. Brasília, DF, 2017. Disponível em: http://portal.mec.gov.br/index.php?option=com_docman&view=download&alias=56621-bnccapresentacao-fundamentos-pedagogicos-estrutura-pdf&category_slug=janeiro 2017-pdf&Itemid=30192>. Acesso em: 12 set. 2019.CABRERIZO DIAGO, Jesús; RUBIO ROLDÁN, María Julia; CASTILLO ARREDONDO, Santiago. Programación por competencias: Formación y práctica. Madri: Pearson, Prentice Hall, 2008, 456p.CANQUIZ, Liliana; INCIARTE, Alicia. Desarrollo de Perfiles académico-profesionales basados en competencias. Maracaibo: LUZ, 2006.CANQUIZ R., Liliana; INCIARTE G., Alicia. Metodología para el diseño de perfiles basados en el enfoque de competencias. Laurus Revista de Educación, vol. 15, núm. 29, Caracas, Venezuela, p. 33-52, enero-abril, 2009. Disponível em: http://www.redalyc.org/pdf/761/76120642003.pdf. Acesso em: 12 set. 2019.CASSANY, Daniel. En-línea: leer y escribir en la red. Barcelona: Anagrama, 2012, 272 p.CHOMSKY, Noam. Aspectos da teoria da sintaxe. Arménio Amado, 1965, 372 p.COELHO, Iandra Maria Weirich da Silva. Inovação e Tecnologia: caminhos para o ensino de línguas adicionais. Curitiba: CRV, 2016, 239 p.COELHO, Iandra Maria Weirich da Silva. O domínio comunicativo-digital e as competências em línguas adicionais: conceitos e implicações pedagógicas. In: COELHO, Iandra Maria Weirich da Silva. Competências no ensino-aprendizagem de línguas: pressupostos, práticas e reflexões. Campinas-SP: Pontes Editores, 2019, p.93-119, 507 p.CONSELHO DA EUROPA. Quadro Europeu Comum de Referência para as línguas: Aprendizagem, ensino, avaliação. Porto: Asa Editores, 2001.CONSELHO DA EUROPA. Recomendación del parlamento europeo y del consejo. Las competencias clave para el aprendizaje permanente, 2006. Disponível em: http://eur-lex.europa.eu/legal content/ES/TXT/HTML/?uri=CELEX. Acesso em: 10 jan. 2020.CONSUELO PEREZ, Luiza. El uso del correo electrónico (asincrónico) y de las salas electrónicas de conversación (sincrónico) en la clase de español como lengua extranjera. ASELE – Actas, 2001. Disponível em: https://cvc.cervantes.es/ensenanza/biblioteca_ele/asele/pdf/12/12_0477.pdf. Acesso em: 12 set. 2019.DURAND, Jean-Pierre. O Modelo da competência: uma nova roupagem para velhas ideias. Revista Latinoamericana de Estudios del Trabajo, México, v. 7, n. 14, p. 203-228, 2001.FREITAS, Henrique, et al. Sphinx aprendiz. Canoas: Sphinx, 2008.GARAGORRI YARZA, Xabier. Propuestas curriculares basadas en competencias en el ámbito europeo. Aula de Innovación Educativa, n. 161, Espanha, 2007, p. 56-59. Dispnonível em: http://ardilladigital.com/DOCUMENTOS/EDUCACION%20ESPECIAL/COMPETENCIAS/Propuestas%20Curriculares%20en%20el%20ambito%20europeo%20%20Garagorri%20-%20articulo.pdf. Acesso em: 10 jan. 2020.HYMES, Dell. H. On communicative competence. In: BRUMFIT, Christopher; JOHNSON, Keith. The communicative approach to language teaching. Oxford: OUP, 1979.ILLERA, José Luis Rodríguez; ROIG, Anna Escofet. Ensino e aprendizagem de competências comunicacionais em ambientes virtuais. In: COLL, César; MONEREO, Charles (Orgs.). Psicologia da Educação Virtual: aprender e ensinar com as tecnologias da informação e da comunicação. Porto Alegre: Artmed, p. 329 – 345, 2010. INTEF. Marco Común de Competencia Digital docente. Espanha, 2017. Disponível em: http://educalab.es/documents/10180/12809/MarcoComunCompeDigiDoceV2.pdf. Acesso em: 12 set. 2019.LITTO, Fredric Michael; FORMIGA, Manuel Marcos Maciel (Orgs.). Educação a distância: o estado da arte. São Paulo: Pearson Education do Brasil, 2009, 480 p.MACHADO, Lucília Regina de Souza. O “Modelo de competências” e a regulamentação da base curricular nacional e de organização do ensino médio. Trabalho e Educação, Belo Horizonte, n. 4, p. 79-95, ago./dez. 1998. Disponível em: https://seer.ufmg.br/index.php/trabedu/article/view/7490. Acesso em: 12 set. 2019.MANRÍQUEZ PANTOJA, Luis. ¿Evaluación en competencias?. Estudios Pedagógicos, XXXVIII, Nº 1, p. 355-366, 2012.MECD. Ministerio de Educación, Cultura y Deporte. Ley Orgánica de Educación (2006/962/CE). Descreve as relações entre as competências, os conteúdos e os critérios de avaliação da Educação primária, educação secundária obrigatória e o Bachalerado. Boletín Oficial del Estado, núm. 25, p. 6986 – 7003, de 29 de janeiro de 2015. Disponível em: https://www.boe.es/buscar/doc.php?id=BOE-A-2015-738. Acesso em: 12 jan. 2020.MECD. Enseñanza tradicional versus enseñanza por competencias. Blog del Centro Nacional de Innovación e Investigación Educativa. Madri, 2013. Disponível em: http://blog.educalab.es/cniie/2013/04/21/ensenanza-tradicional-versus-ensenanza-por-competencias/. Acesso em: 10 jan. 2020.MECD. Ministerio de Educación y Ciencia de España. Evaluación General de diagnóstico 2009: Marco de la evaluación, Madri, 2009.MULLOR, María del Carmen Mondragón. Enseñanza y aprendizaje de la gramática y ortografía en la educación secundaria obligatoria a través de los libros de texto. 2013. 660 f. Tese de Doutorado. Universidade de Almería, Departamento de Filología Española y Latina, Almería, 2013.OECD. (2010). Are the New Millenium Learners Making the Grade? Technology use and educational performance in PISA. Centre for Educational Research and Innovation.ORGANIZACIÓN para la Cooperación y el Desarrollo Económico (OCDE). La definición y seleción de competencias clave: Resumen ejecutivo. 2005. Disponível em: http://deseco.ch/bfs/deseco/en/index/03/02.parsys.78532.downloadList.94248.DownloadFile.tmp/2005.dscexecutivesummary.sp.pdf. Acesso em: 5 fev. 2020.PARLAMENTO EUROPEU E CONSELHO. Recomendación del Parlamento Europeo y del Consejo sobre las competencias clave para el aprendizaje permanente, de 18 de dezembro de 2006. Diario Oficial de la Unión Europea, L394/310, 2006. Disponível em: https://eur-lex.europa.eu/legal-content/ES/TXT/?uri=celex%3A32006H0962. Acesso em: 12 set. 2019.PERRENOUD, Philippe. Dez novas competências para ensinar. Tradução de Chittoni Ramos. Porto Alegre: Artmed, 2000, 162 p.PERRENOUD, Philippe; THURLER, Monica Gather. As Competências para Ensinar no Século XXI: A Formação dos Professores e o Desafio da Avaliação. Tradução de Cláudia Schilling e Fátima Murad. Porto Alegre: Artmed Editora, 2002, 176 p.RAMOS, M. N. A. Pedagogia das competências: autonomia ou adaptação? São Paulo: Cortez, 2001.REDECKER, Christine; PUNIE Yves. European Framework for the Digital Competence of Educators: DigCompEdu, Luxembourg: Publications Office of the European Union, 2017. Disponível em: https://ec.europa.eu/jrc/en/publication/eur-scientific-and-technical-research-reports/european-framework-digital-competence-educators-digcompedu. Acesso em: 5 jan. 2020.RICHARDS, Jack C.; RODGERS,Theodore S. Enfoques y métodos em la enseñanza de idiomas. Tradução José M. Castrillo y María Condor. Madri: Edinumen, 2003, 288 p.SALGANIK, Laura Hersh et al. Proyectos sobre Competencias en el Contexto de la OCDE: Análisis de base teórica y conceptual. Neuchatel, Suiça, 1999. Disponível em: http://deseco.ch/bfs/deseco/en/index/03/02.parsys.59225.downloadList.58329.DownloadFile.tmp/1999.proyectoscompetencias.pdf. Acesso em: 15 fev. 2020.SALGANIK, Laura Hersh; RYCHEN, Dominique Simona. Las competencias clave para el bienestar personal, social y económico. José Manuel Pomares Olivares (tradução). Colección Aulae. Espanha, Andaluzia: Ediciones Aljibe, 2006, 212 p.SPRESSOLA, N. A. Instrumento para avaliar as competências no trabalho de tutoria na modalidade EAD. 2010. 114 f. Dissertação (Mestrado em Engenharia de Produção) - Escola de Engenharia de São Carlos, Universidade de São Paulo, São Carlos, 2010. Disponível em: http://www.teses.usp.br/teses/disponiveis/18/18157/tde-11012011-101157/publico/NilvaniaAparecidaSpressoladefinitiva.pdf. Acesso em: 12 jan. 2020.UNESCO. Enfoques estratégicos sobre las TICS en educación en América Latina y el Caribe. Oficina de Santiago, Chile, 2013. Disponível em: http://www.unesco.org/new/fileadmin/MULTIMEDIA/FIELD/Santiago/images/ticsesp.pdf. Acesso em: 11 jan. 2020.VERGNANO-JUNGER, Cristina. Compreensão leitora em meio virtual: a autopercepção de alunos universitários de espanhol. Abehache, ano 4, n. 7, p. 2017-235, 2014. Disponível em: http://www.hispanistas.org.br/arquivos/revistas/sumario/revista7/217-235.pdf. Acesso em: 12 set. 2019.VIVANCOS, J. Tratamiento de la información y competencia digital. Madrid: Alianza Editorial, 2010, 187 p.ZABALA, Antoni; ARNAU, Laia, Como aprender e ensinar competências. Tradução de Carlos Henrique Lucas Lima. Porto Alegre: Artmed, 2010, 198 p.e2820081
APA, Harvard, Vancouver, ISO, and other styles
45

Arora, Himanshu. "Every Illegal Download is Not a Lost Sale." SSRN Electronic Journal, 2019. http://dx.doi.org/10.2139/ssrn.3393417.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Suran Ningsih, Ayup, and Balqis Hediyati Maharani. "Penegakan Hukum Hak Cipta Terhadap Pembajakan Film Secara Daring." Jurnal Meta Yuridis, September 1, 2019, 13–32. http://dx.doi.org/10.26877/m-y.v2i1.3440.

Full text
Abstract:
Hak cipta merupakan hak eksklusif pencipta yang timbul secara otomatis berdasarkan prinsip deklaratif setelah suatu ciptaan diwujudkan dalam bentuk nyata tanpa mengurangi pembatasan sesuai dengan peraturan perundang-undangan. Pelanggaran hak cipta bisa memberi dampak buruk bagi penciptanya, sering kali pelanggaran hak cipta membuat pemilik dari hak cipta mengalami kerugian ekonomi. Dalam hal ini, tentunya perlindungan hukum hak cipta harus ditegakkan. Karya sinematografi yaitu film yang seharusnya dilindungi hak penciptanya oleh Undang-Undang Hak Cipta, tetapi dalam kenyataannya banyak yang melakukan pembajakan digital dan illegal downloading dari film aslinya. Kemajuan teknologi sekarang ini membawa dampak yang baik sekaligus dampak yang buruk. Pembajakan digital di era sekarang yang semakin marak. Kurangnya kesadaran masyarakat mengenai penegakan hukum hak cipta merupakan salah satu faktor terjadinya pelanggaran hak cipta seperti download film online. Artikel ini membahas tentang bagaimana dampak buruk download film melalui cara yang tidak legal atau pembajakan digital serta penegakan hak cipta dalam menghadapi masalah illegal downloading. Penelitian ini menggunakan metode hukum normatif dengan Statute Approach.
APA, Harvard, Vancouver, ISO, and other styles
47

"A Robust Watermarking Technique for Copyright Protection for Relational Databases." International Journal of Recent Technology and Engineering 8, no. 3 (September 30, 2019): 4040–46. http://dx.doi.org/10.35940/ijrte.c5381.098319.

Full text
Abstract:
Internet based digitization has been of rapid increase in the usage of database applications at an enormous rate in recent times. It is very difficult to secure the ownership of digital assets because all the data on the internet are available everywhere almost free of cost and anybody can access such data and claim their ownership. In current digital scenario not only images, videos, and audio are in digital form. Databases are also digitized in different models and used as a service in database applications, including areas such as finance, multimedia, personnel, etc. A huge amount of confidential and sensitive data which are available publically facing a variety of threats like illegal copying, illegal redistribution, tampering, forgery and authentication. Authenticity, integrity, confidentiality and copyright protection are most important security issues to be addressed with most importance. Copyright management is a serious issue in database applications because it is much easier for others to download and manipulate copyrighted databases from the Internet and later re-use without any control. In this paper we proposed a robust watermarking scheme for copyright protection for relational databases, which protects the copy right information of the database even if the attacker tampers the data by changing the attribute values or reordering the tuples of the database. The proposed watermarking technique is robust since the watermark will not be lost even though the attacker tampers the data. The experiments show that the new method is efficient as well as effective for maintaining copy right information there by ensuring right protection to relational databases
APA, Harvard, Vancouver, ISO, and other styles
48

Behboudi, Emad, Amrollah Shamsi, and Gema Bueno de la Fuente. "The black crow of science and its impact: analyzing Sci-Hub use with Google Trends." Library Hi Tech ahead-of-print, ahead-of-print (February 16, 2021). http://dx.doi.org/10.1108/lht-04-2020-0105.

Full text
Abstract:
PurposeIn 2016, Bohannon published an article analyzing the download rate of the top ten countries using the illegal Sci-Hub website. Four years later, this study approaches the search behavior of these ten countries as they query about Sci-Hub in Google's search engine, the world's most widely used search engine. The authors also tracked the possible consequences of using Sci-Hub, such as plagiarism.Design/methodology/approachThe search terms “Sci-Hub”, “Plagiarism” and “Plagiarism Checker” were explored with Google Trends. The queries were performed globally and individually for the ten target countries, all categories and web searches. The time range was limited between 1/1/2016 (after the date of publication of Bohannon's work) and 29/03/2020. Data were extracted from Google Trends and the findings were mapped.FindingsSearching for the word Sci-Hub on Google has increased nearly eightfold worldwide in the last four years, with China, Ethiopia and Tunisia having the most searches. Sci-Hub's search trends increased for most of the T10C, with Brazil and Iran having the highest and lowest average searches, respectively.Originality/valueAccess to the research literature is required to the progress of research, but it should not be obtained illegally. Given the increasing incidence of these problems in countries at any level of development, it is important to pay attention to ethics education in research and establish ethics committees. A comprehensive review of the research process is required to reduce the urge to circumvent copyright laws and includes training and educating research stakeholders in copyright literacy. To address these goals, national and international seriousness and enthusiasm are essential.
APA, Harvard, Vancouver, ISO, and other styles
49

Tylikina, Nataliia. "TYPES OF VIOLENCE AGAINST CHILDREN USING INFORMATION AND COMMUNICATION TECHNOLOGIES." Young Scientist 10, no. 86 (October 2020). http://dx.doi.org/10.32839/2304-5809/2020-10-86-54.

Full text
Abstract:
The level of access to Internet services of children and adolescents has been studied in the article. Children use Internet services the most frequently to play video- or computer games, or to download them; to download information for studying or entertainment, to communicate with the help of different messengers (Skype, iTalk, using a web-camera etc.). There have been studied different forms of violence, faced by children in the information and communication environment: cyber-bulling, grooming, sexual abuse (sexting) etc. There have been analyzed the risks, faced by children in the information and communication environment. It has been discovered that the most widespread are imposing of unnecessary information, interference with a digital device, spreading of false information about children and adolescents, bullying, threats, as well as communication with strangers, leading to unintended consequences. There have been identified pre-conditions and factors of emergence of cyber-bullying and other forms of violence with the use of information and communication technologies. One of the factors that children face a serious danger in the information environment is the irresponsibility of adults as well as their ignorance of the basic rules to provide a child with a safe online environment. There have been studied the most probable illegal actions, used by offenders towards children and adolescents in Internet. There have also been identified consequences for a victim of violence as well as for an offender with the use of information and communication technologies. The victim as well as the offender has low self-esteem, poor mental and physical health, issues with studying and peer communication. There have been suggested the ways to prevent violence against children with the use of information and communication technologies. One of the major objectives of reaction towards violence against children with the use of information and communication technologies has to be not only the creation of an effective system of support and handling of violence cases, but also immediate resolving of legal aspects of prevention and elimination of cyber-bullying and online sexual exploitation of children.
APA, Harvard, Vancouver, ISO, and other styles
50

Hanim, Nia Fadhillah, Sofyan Jafar, and Arif Rahman. "PERLINDUNGAN HUKUM TERHADAP PENCIPTA LAGU DALAM WEBSITE PENYEDIA JASA DOWNLOAD LAGU GRATIS BERDASARKAN UNDANG-UNDANG NOMOR 28 TAHUN 2014 TENTANG HAK CIPTA." JURNAL ILMIAH MAHASISWA FAKULTAS HUKUM UNIVERSITAS MALIKUSSALEH 2, no. 3 (October 29, 2019). http://dx.doi.org/10.29103/jimfh.v2i3.4035.

Full text
Abstract:
Hak Cipta merupakan salah satu jenis Hak Kekayaan Intelektual yang di atur dalam Undang-Undang Nomor 28 Tahun 2014 tentang Hak Cipta (selanjutnya di sebut UUHC). Perlindungan hak cipta lagu di atur dalam Pasal 40 ayat (1) huruf d UUHC yang termasuk dalam ruang lingkup Hak Cipta. Semakin canggihnya teknologi elektronik dan banyaknya pengguna lagu menggunakan website yang sebagian besar tidak diketahui domisilinya menyebabkan Pencipta atau Pemegang Hak Cipta lagu-lagu tersebut sangat kesulitan untuk melakukan perjanjian lisensi dan menarik royalti yang digunakan users. Hal tersebut yang menimbulkan pelanggaran Hak Ekonomi pencipta atau pengguna hak cipta atas karya ciptanya. UUHC telah mengatur mengenai penggunaan hak cipta, hak-hak yang terdapat dalam hak cipta, jangka waktu hak cipta, dan sanksi berupa ketentuan perdata dan pidana. Penelitian ini bertujuan untuk mengetahui bagaimana pengaturan terhadap pelanggaran hak cipta lagu yang terjadi di media internet yang dilakukan oleh pengguna internet, bentuk-bentuk pelanggaran dan upaya pemerintah dalam memberantas pelanggaran hak cipta lagu di internet. Jenis penelitian ini yaitu yuridis normatif. Pendekatan yang digunakan dalam penelitian ini adalah pendekatan perundang-undangan yaitu penelitian yang mengutamakan bahan hukum yang berupa peraturan perundang-undangan sebagai acuan dasar dalam melakukan penelitian. Sifat penelitian yang digunakan adalah deskriptif. Sumber data yang digunakan yaitu bahan hukum primer, bahan hukum sekunder, bahan hukum tersier. Dari hasil penelitian dapat di ketahui upaya pemerintah dalam melindungi hak cipta lagu dan penegakan hukum yang di atur dalam Pasal 113 ayat (1) dan (4) UUHC serta bentuk-bentuk pelanggaran yang dilakukan pelaku pelanggaran yang menimbulkan kerugian terhadap pencipta atau pemegang hak cipta atas karya ciptanya. Karena kurangnya kesadaran dari pengguna internet dalam menghargai karya cipta orang lain dan kebiasaan untuk memiliki atau mendapatkan sesuatu dengan cara gratis. Disarankan kepada Pemerintah untuk mengambil langkah serius dalam menanggapi masalah pelanggaran hak cipta lagu khususnya dalam illegal downloading. Dan diharapkan kepada pencipta atau pemegang hak cipta lagu untuk melakukan pedaftaran atas ciptaannya hal ini dapat mencapai keadaan yang kondusif dalam penanganan hak cipta.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography