To see the other types of publications on this topic, follow the link: Internet des objets – Protection.

Journal articles on the topic 'Internet des objets – Protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Internet des objets – Protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

AR, Azhari. "Perlindungan Hukum Terhadap Karya Cipta Di Media Internet." Jurnal Hukum Kaidah: Media Komunikasi dan Informasi Hukum dan Masyarakat 22, no. 2 (2023): 278–90. http://dx.doi.org/10.30743/jhk.v22i2.6492.

Full text
Abstract:
The legal aspect becomes very important because the law is expected to be able to overcome various problems that arise related to IPR. The law must be able to provide protection for a person's intellectual work, so that it is able to develop the creative power of society which ultimately leads to the goal of protecting IPR. In addition, the technological aspect is also one of the factors that becomes very dominant in the development and protection of IPR. Protection of Copyright as Movable Objects That Have no Form, that Copyright is an intangible movable object in accordance with what is stip
APA, Harvard, Vancouver, ISO, and other styles
2

Haza, Marion. "Objets culturels dystopiques et adolescence." Topique 160, no. 1 (2024): 97–110. http://dx.doi.org/10.3917/top.160.0097.

Full text
Abstract:
Après avoir redéfini utopie et dystopie, cet article déploie l’analogie entre processus pubertaire et scénario dystopique. L’adolescent est bien une figure de héros de sa propre histoire, résistant au tourment pubertaire pour s’inscrire dans la société en tant que futur adulte, parfois dans un sacrifice psychopathologique. Les objets culturels adolescents servent de portage et de protection face à ce parcours dystopique : les fictions dystopiques des adolescents contemporains (livres, manga, jeux vidéo, etc.) figurent leurs conflictualités internes, rendent possible des indentifications ou con
APA, Harvard, Vancouver, ISO, and other styles
3

Sargaldakova, Zh Z., and D. A. Kutmanalieva. "PROTECTION OF COPYRIGHT OBJECTS ON THE INTERNET." Vestnik of the Kyrgyz-Russian Slavic University 24, no. 3 (2024): 96–100. http://dx.doi.org/10.36979/1694-500x-2024-24-3-96-100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Meiller, Yannick. "La sécurité de l’information devrait être plus présente dans les programmes des écoles de management." Sécurité et stratégie 32, no. 4 (2024): 12–16. http://dx.doi.org/10.3917/sestr.032.0012.

Full text
Abstract:
Titulaire d’un doctorat en Informatique et Intelligence artificielle (systèmes industriels), obtenu à ISAE-Supaéro, Yannick Meiller est professeur à ESCP Europe . Ses travaux de recherche et ses enseignements portent pour l’essentiel sur le numérique et les domaines associés (traitements de l’information, Internet des objets, protection des données à caractère personnel, sécurité, systèmes d’information…), ainsi que sur le management de projets innovants . Il nous explique ici pourquoi la sécurité de l’information est un sujet à enseigner dans les écoles de management .
APA, Harvard, Vancouver, ISO, and other styles
5

WANG, Haixiang, Jingyi CAO, and Zhe LIU. "Energy Internet and Its Trusted Protection Architecture." Wuhan University Journal of Natural Sciences 27, no. 2 (2022): 169–76. http://dx.doi.org/10.1051/wujns/2022272169.

Full text
Abstract:
Through the combination of new energy and Internet technology, the Energy Internet deeply integrates various complex network systems such as power, transportation and natural gas, aiming to change the energy utilization model and promote the sustainable development of economy and society. The Energy Internet takes the power grid as the "Backbone Network" , integrating the autonomous units of distributed energy, and integrating information and energy through the open-peer information and energy integration architecture. Information interaction scenarios of the Energy Internet information intera
APA, Harvard, Vancouver, ISO, and other styles
6

Samahalska, Y. "Personal data protection in the Internet." Uzhhorod National University Herald. Series: Law 2, no. 82 (2024): 259–63. http://dx.doi.org/10.24144/2307-3322.2024.82.2.41.

Full text
Abstract:
A personal daily communication is connected with giving and receiving a large amount of information. A common visit to a website can provide its owner with information about its users (cookies). A registration will provide the owner with a confidential information. In this view, it became necessary to protect a person and to regulate a separate subtype of such information called “personal data”. The concept of “personal data” is not new for Ukraine. The Law “On Protection of Personal Data” was adopted in 2010, however, the practice of its realization shows that the subjects of relations relate
APA, Harvard, Vancouver, ISO, and other styles
7

KUCHUK, Andrii, and Yuliia SIHALOVA. "LEGAL REGULATION OF COPYRIGHT ON THE INTERNET: GENERAL STATE." Naukovyy Visnyk Dnipropetrovs kogo Derzhavnogo Universytety Vnutrishnikh Sprav, no. 1 (October 2, 2024): 102–7. http://dx.doi.org/10.31733/2078-3566-2023-5-102-107.

Full text
Abstract:
The urgency of the study is determined by the necessity of a systematic study of the state of copyright protection, in particular due to the constant development of the information sphere. The issue of protection of intellectual property rights (and, in particular, copyright) on the Internet is constantly a subject of discussion among legal scholars. It is indicated that access to the Internet is important for a modern person to develop his personality. Providing access to the Internet has become a necessity for many aspects of the life of a modern person. The Internet is an unlimited source o
APA, Harvard, Vancouver, ISO, and other styles
8

Logvynenko, M. I., I. V. Karikh, and A. V. Dykovets. "Problems of protection of copyright objects in the network Internet." Legal Horizons 15, no. 28 (2019): 21–25. http://dx.doi.org/10.21272/legalhorizons.2019.i15.p21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Logvynenko, M. I., I. V. Karikh, and A. V. Dykovets. "Problems of protection of copyright objects in the network Internet." Legal Horizons 15, no. 28 (2019): 21–25. http://dx.doi.org/10.21272/legalhorizons.2019.i15.p:21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kurniawan Sihombing, Agung, Rika Ratna Permata, and Tasya Safiranita Ramli. "Comparison of Digital Copyright Protection on Over the Top (OTT) Streaming Content Media in Indonesia and the United States." PADJADJARAN Jurnal Ilmu Hukum (Journal of Law) 8, no. 2 (2021): 183–212. http://dx.doi.org/10.22304/pjih.v8n2.a2.

Full text
Abstract:
In the rapid technological development, physical boundaries have begun to disappear. The internet has created a ‘free culture’. In addition, the era is challenging the copyright concept along with the emergence of ‘digital copyright’. It has become the main commodity of Over-the-Top services providing means of communication and entertainment through the internet. Content streaming service like Netflix uses films, as well as other cinematographic works, as its main commodities. OTT Streaming media helps to protect copyright holders' rights that previously have been violated by illegal streaming
APA, Harvard, Vancouver, ISO, and other styles
11

Idrisov, Hussein V. "Certain issues of legal regulation of the placement of intellectual property objects on the Internet: problematic aspects and search for solutions." Current Issues of the State and Law, no. 4 (2022): 556–66. http://dx.doi.org/10.20310/2587-9340-2022-6-4-556-566.

Full text
Abstract:
We provide a legal description of the problems that arise as a result of the placement of intellectual property objects on the Internet, mediated violations of the rights of legitimate copyright holders. The purpose of the study: to conduct a legal analysis (legal characteristics and analysis of judicial practice) of problematic issues of regulating the placement of intellectual property objects on the Internet. We point out that the legal protection of intellectual property subjects is possible through the implementation of criminal law and civil law measures adapted to the existing objective
APA, Harvard, Vancouver, ISO, and other styles
12

Et. al., Harish Kumar N,. "Mutual authentication and data security in IOT using hybrid mac id and elliptical curve cryptography." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 11 (2021): 501–7. http://dx.doi.org/10.17762/turcomat.v12i11.5913.

Full text
Abstract:
Internet of Things (IoT) is a new emergent technology of the Internet. The Internet that we use today runs with human interposing. The Internet of Things which is the extended version of the internet which aims to offer the machine to machine communication or the device may be referred to as objects we call it object to object communication, which is without the involvement of the humans. With the growth of IOT in the market there are many considerable subjects relating to privacy, authentication, data confidentiality, data protection and other problems where solutions to these issues to be de
APA, Harvard, Vancouver, ISO, and other styles
13

Utama, Andrew Shandy, Sandra Dewi, and Bagio Kadaryanto. "PERLINDUNGAN HUKUM TERHADAP PELANGGARAN HAK CIPTA MELALUI MEDIA INTERNET BERDASARKAN UNDANG-UNDANG NOMOR 28 TAHUN 2014 TENTANG HAK CIPTA." Jurnal Ilmu Hukum 7, no. 2 (2018): 209. http://dx.doi.org/10.30652/jih.v7i2.5652.

Full text
Abstract:
Initially the scope of copyright protection only focused on conventional objects of creation. However, along with technological developments and advances, the object of copyright protection is expanding on the forms of creation in the form of science, art, and literature are digitized. Copyright Laws that are currently still experiencing some problems in order to provide protection to the creative works expressed through the internet media. Therefore, it is interesting to examine the legal protection against copyright infringement through internet media based on Law Number 28 Year 2014. The me
APA, Harvard, Vancouver, ISO, and other styles
14

Filinovych, Valeriia. "VIOLATION OF COPYRIGHT AND RELATED RIGHTS ON THE INTERNET: HOW TO PROTECT YOURSELF AND YOUR CREATION." Scientific works of National Aviation University. Series: Law Journal "Air and Space Law" 4, no. 61 (2021): 144–50. http://dx.doi.org/10.18372/2307-9061.61.16362.

Full text
Abstract:
Purpose: the purpose of the research paper is to analyze reasons for the most frequent violations in the field of copyright and related rights to objects posted on the Internet, to study ways of their protection, and to provide for preventive methods of dealing with the violations of rights and freedoms of rightsholders. The methodological basis of the study comprises general scientific, philosophical, ideological, method of analysis and special methods. Results: the protection of copyright and related rights on the Internet is a complicated task because of the need to ensure a balance between
APA, Harvard, Vancouver, ISO, and other styles
15

Sidi Ahmed, Sidi Mohamed, and Sonny Zulhuda. "DATA PROTECTION CHALLENGES IN THE INTERNET OF THINGS ERA: AN ASSESSMENT OF PROTECTION OFFERED BY PDPA 2010." International Journal of Law, Government and Communication 4, no. 17 (2019): 01–12. http://dx.doi.org/10.35631/ijlgc.417001.

Full text
Abstract:
The Internet of Things (IoT) is an emerging technology of the 21st century. It is described as the first real evolution of the Internet that could positively or negatively affect all aspects of life. The basic idea of the IoT revolves around connecting things and objects (persons, animals, cars, trees, etc.) to the Internet and enabling them to communicate and then process (generate, receive, send, etc.) data about themselves and the environment surrounding them. Without a doubt, the IoT will bring countless benefits and provide timely-data and information about places and objects. However, th
APA, Harvard, Vancouver, ISO, and other styles
16

Kharchenko, Olesia, Olha Kronda, Inha Kryvosheyina, and Kostiantyn Zerov. "Protection of intellectual property rights on the Internet: new challenges." Revista Amazonia Investiga 10, no. 41 (2021): 224–36. http://dx.doi.org/10.34069/ai/2021.41.05.22.

Full text
Abstract:
Given the steady growth in demand for Internet resources (due to specific benefits for users) a significant issue is the governing regulation of relations that develop during the interaction of subjects of legal relations on this sphere. Intellectual property law expands the scope of regulation of legal relations via the Internet. In this regard, there is an essential need for a comprehensive study of theoretical and practical aspects of the protection of intellectual property rights on the Internet. During the study, a number of general scientific methods were used: method of observation, met
APA, Harvard, Vancouver, ISO, and other styles
17

E.B. Arzymatova. "PROBLEMS OF COPYRIGHT VIOLATIONS ON INTERNET." Herald of KSUCTA n a N Isanov, no. 4 (December 16, 2019): 614–17. http://dx.doi.org/10.35803/1694-5298.2019.4.614-617.

Full text
Abstract:
The brief analysis of current situation in the sphere of copyright on the Internet is examined and existing problems of law regulations are defined. Indisputable influence of principles and international copyright law regulations on relationship arising from the usage of copyright law objects on Internet are defined in this article.Solutions of the problems that allows creating a system of protection of copyright holders are given in this article.
APA, Harvard, Vancouver, ISO, and other styles
18

Inķēna, Kristiāna, and Sergejs Kodors. "E-SAFETY PROBLEMS AND PROTECTION METHODS." HUMAN. ENVIRONMENT. TECHNOLOGIES. Proceedings of the Students International Scientific and Practical Conference, no. 22 (April 25, 2018): 37–42. http://dx.doi.org/10.17770/het2018.22.3639.

Full text
Abstract:
E-security is the protection of all data stored on computer networks and computer systems against damage, loss or unauthorized access. E-security, based on the definition, is all that can be related to the safe use of the Internet, personal knowledge and behavior, and ethics on the Internet. There are examined following threats to websites - the leakage of information, cross-site scripting attacks, injection, unsafe direct object reference, CSRF, security configuration errors, unsafe cryptographic repository, and redirection and transmission without validation. The author reviews the cyber att
APA, Harvard, Vancouver, ISO, and other styles
19

Spasova, Ekaterina, Olha Kulinich, Svitlana Mazurenko, Andrii Ivanytskyi, and Olesia Izbash. "Peculiarities of protection of personal non-property intellectual rights on the internet." Cuestiones Políticas 41, no. 78 (2023): 628–48. http://dx.doi.org/10.46398/cuestpol.4178.43.

Full text
Abstract:
Using a documentary analysis method, it examines the legal issues that exist in the field of application and protection of non-proprietary personal intellectual rights on the Internet. The first section examines the legal consequences of the active development of information technologies and their impact on relations in the field of intellectual property. It identifies some issues that arise when placing intellectual property objects on the Internet. The second section of the article provides an overview of approaches to the legal regulation of intellectual property relations under the legisla
APA, Harvard, Vancouver, ISO, and other styles
20

Starchenko, O. O. "Main trends in ensuring legal protection of copyright and related rights in the digital environment." Uzhhorod National University Herald. Series: Law 1, no. 87 (2025): 293–98. https://doi.org/10.24144/2307-3322.2025.87.1.43.

Full text
Abstract:
The article is dedicated to the study of the peculiarities of legal protection of copyright and related rights in the context of the digital environment. It proposes to consider the digital environment as a unique and modern space in which processes related to the processing, storage, and transmission of information, as well as its direct creation, take place. It is noted that judicial protection of violated copyright in the Internet network is often ineffective due to the lack of specialization among judges and the unresolved issue regarding the functioning of the Higher Court for Intellectua
APA, Harvard, Vancouver, ISO, and other styles
21

VAADE, Valeria Dmitrievna Khamrakulova Nazokat Farhodovna. "ISSUES OF INTELLECTUAL PROPERTY PROTECTION IN THE GLOBAL MEDIA LANDSCAPE." EURASIAN JOURNAL OF SOCIAL SCIENCES, PHILOSOPHY AND CULTURE 3, no. 5 (2023): 81–85. https://doi.org/10.5281/zenodo.7977213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Bahromjonovich, Saidov Bobur. "PROBLEMS OF INTELLECTUAL PROPERTY RIGHTS PROTECTION IN THE DIGITAL SPACE." International Journal of Law And Criminology 4, no. 12 (2024): 98–108. https://doi.org/10.37547/ijlc/volume04issue12-16.

Full text
Abstract:
The article examines the theoretical issues of ensuring the protection of intellectual property rights in the online space, considering the variety of intellectual property objects and using the main types of violations of the interests of rightsholders associated with their use and distribution on the Internet as an example. Additionally, the international and national legal aspects of regulating relations regarding the use of intellectual activity results and mechanisms for their protection in an artificial intelligence mode are analyzed.
APA, Harvard, Vancouver, ISO, and other styles
23

Volynets, Vitalii, Andrii Popov, Tetiana Pushkar, Mykhailo Frolov, and Oleksandr Babarytskyi. "Legal Aspects of Using the Internet of Things (IOT) in Electronic Commerce." Journal of Lifestyle and SDGs Review 5, no. 2 (2024): e03657. https://doi.org/10.47172/2965-730x.sdgsreview.v5.n02.pe03657.

Full text
Abstract:
Objective: The growing reliance on digital technologies in contemporary society underscores the need for a robust legal framework to ensure security. The development of the Internet of Things (IoT) introduces various threats, highlighting the challenges in effectively utilising this technology. Background: The Internet of Things (IoT) enables electronic data exchange between remotely located objects or systems, offering numerous applications in e-commerce. However, its integration also presents legal complexities that must be addressed to ensure security and compliance. Methodology: This study
APA, Harvard, Vancouver, ISO, and other styles
24

Ennan, R. Ye. "Enforcement and protection of copyright in the digital environment (on the Internet)." Uzhhorod National University Herald. Series: Law 2, no. 86 (2025): 101–7. https://doi.org/10.24144/2307-3322.2024.86.2.16.

Full text
Abstract:
The article considers certain problematic aspects regarding the implementation and protection of copyright in the digital environment (on the Internet). It has been established that the digital sphere (digital environment, the Internet) is developing at a rapid pace and is particularly relevant in terms of the use and protection of intellectual property rights. It is proven that the development of the digital sphere (digital environment, Internet) has led to the appearance of the latest objects (in particular, multimedia and digital works), new forms of creativity, new communication media (for
APA, Harvard, Vancouver, ISO, and other styles
25

Teleshev, S. "Peculiarities of civil law protection of honor, dignity and business reputation on the internet as objects of the right of an individual to information regarding himself." Uzhhorod National University Herald. Series: Law 1, no. 78 (2023): 239–50. http://dx.doi.org/10.24144/2307-3322.2023.78.1.39.

Full text
Abstract:
The article defines the concept of information about an individual as an object of civil rights. The author analyzes the state of legislative regulation of the relationship between the concepts of “personal information” and “personal data”. The basic principles of information relations are highlighted. The issues of the right to privacy in the context of technological progress and digitalization are outlined.The author examines and analyzes a whole range of controversial issues which arise for both civil theorists and practicing lawyers and attorneys-at-law (barristers) on the issues of protec
APA, Harvard, Vancouver, ISO, and other styles
26

Xu, De Gang, Lei Hua Qin, and Jing Li Zhou. "Internet of Things: Security-Based Application Level Lookup Protocol." Applied Mechanics and Materials 411-414 (September 2013): 625–28. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.625.

Full text
Abstract:
In the emerging Internet of Things (IOT), lookup service or discovery service plays a critical role, however, current lookup services and discovery services of IoT have not been widely adopted due to some drawbacks or bottlenecks, as well as the item-level lookup service is still missing, moreover, enhancing security and privacy protection does not get enough attention. Therefore, based on the object discovery service architecture (ODSA) a distributed serial number level object discovery service architecture using Chord for the IOT, a security-based application level lookup protocol was provid
APA, Harvard, Vancouver, ISO, and other styles
27

Сідікова, В. О. "РЕАЛІЗАЦІЯ ТА ЗАХИСТ ПРАВ ЛЮДИНИ У ПРАВОВІДНОСИНАХ, ЩО ВИНИКАЮТЬ В МЕРЕЖІ ІНТЕРНЕТ: (ЗА МАТЕРІАЛАМИ ПРАКТИКИ ЄВРОПЕЙСЬКОГО СУДУ З ПРАВ ЛЮДИНИ)". Наукові записки Львівського університету бізнесу та права. Серія економічна. Серія юридична, № 32 (30 березня 2022): 52–59. https://doi.org/10.5281/zenodo.6475879.

Full text
Abstract:
In the scientific article, the general concept of the Internet was revealed. The Internet was considered as an alternative sphere of legal regulation. Using the method of the general theory of law, the peculiarities of legal relations that arise on the Internet are identified by determining specific subjects, specific objects, and the content of legal relations. It is stated that on the Internet, there may be such legal relationships that already exist offline and others specific to cyberspace. There was expressed the opinion that private or public law relations do not cease to be so in cybers
APA, Harvard, Vancouver, ISO, and other styles
28

Moskalenko, I. A. "Registration of works as a tool to protect copyright in cross-border relations (Internet)." Actual Problems of Russian Law, no. 3 (May 4, 2019): 142–50. http://dx.doi.org/10.17803/1994-1471.2019.100.3.142-150.

Full text
Abstract:
The paper analyzes copyright registration systems in the Russian Federation and abroad. The fact of creation of a work gives rise to the author a number of rights and obligations without performing any formalities, including registration of the work. There are three systems in which registration of a work creates for the copyright holder additional protection of the rights of the author, does not create negative consequences for non-compliance with the registration procedure or is provided by law only for specific copyright objects. Deposit is considered as an element of the procedure for regi
APA, Harvard, Vancouver, ISO, and other styles
29

Vasiljević, Ivana, Ratko Obradović, Isidora Đurić, et al. "Copyright Protection of 3D Digitized Artistic Sculptures by Adding Unique Local Inconspicuous Errors by Sculptors." Applied Sciences 11, no. 16 (2021): 7481. http://dx.doi.org/10.3390/app11167481.

Full text
Abstract:
In recent years, digitization of cultural heritage objects, for the purpose of creating virtual museums, is becoming increasingly popular. Moreover, cultural institutions use modern digitization methods to create three-dimensional (3D) models of objects of historical significance to form digital libraries and archives. This research aims to suggest a method for protecting these 3D models from abuse while making them available on the Internet. The proposed method was applied to a sculpture, an object of cultural heritage. It is based on the digitization of the sculpture altered by adding local
APA, Harvard, Vancouver, ISO, and other styles
30

Kivalov, Serhii. "Human Rights on the Internet under quarantine (on the example of E-Commerce): problematic aspects." Dixi 25, no. 1 (2022): 1–21. http://dx.doi.org/10.16925/2357-5891.2023.01.07.

Full text
Abstract:
As a result of the introduction of quarantine measures on the territory of Ukraine and abroad, almost all spheres of social life underwent particular changes. This led to certain restrictions on human rights, as a result of which legal science faced the task of finalizing and adapting legal regulation in the field of protection of subjective rights on the Internet to the realities caused by the coronavirus crisis. The purpose of the study is to characte-rize the legal regulation regarding restrictions and protection of consumer rights on the Internet in quarantine conditions. The object of the
APA, Harvard, Vancouver, ISO, and other styles
31

Lin, Qingxin, Kuai Xu, Yikun Huang, Feng Yu, and Xiaoding Wang. "Privacy-Enhanced Data Fusion for Federated Learning Empowered Internet of Things." Mobile Information Systems 2022 (October 3, 2022): 1–8. http://dx.doi.org/10.1155/2022/3850246.

Full text
Abstract:
IoT sensors have already penetrated into extremely broad fields such as industrial production, smart home, environmental protection, medical diagnosis, and bioengineering. Although efficient data fusion helps improve the quality of intelligent services provided by the Internet of things, because the perceived data carry the sensitive information of the perceived object, the data fusion process is prone to the risk of privacy leakage. To this end, in this paper, we proposed a privacy-enhanced federated learning data fusion strategy. This strategy adds Gaussian noise at different stages of feder
APA, Harvard, Vancouver, ISO, and other styles
32

Sun, Lei, Hong Mei Xing, and Shu Yan Zhang. "The Present Botnet Protection Situation of the Data Center." Advanced Materials Research 1044-1045 (October 2014): 1411–13. http://dx.doi.org/10.4028/www.scientific.net/amr.1044-1045.1411.

Full text
Abstract:
Protection object of data center is Botnet according to IRC (Internet Relay Chat) [2] protocol to spread. However, in order to be more covert and stronger, the design architecture and communication methods of Botnet are also constantly upgrading and innovating.
APA, Harvard, Vancouver, ISO, and other styles
33

Kovalenko, I. "Some types of works posted on the internet, and the peculiarities of their protection by Ukrainian copyright compared to US law." Uzhhorod National University Herald. Series: Law, no. 70 (June 18, 2022): 181–85. http://dx.doi.org/10.24144/2307-3322.2022.70.26.

Full text
Abstract:
The article deals with the peculiarities of protection against plagiarism of works posted on the Internet and the peculiarities of their protection by Ukrainian copyright compared with US legislation.
 The ratio of features of the computer program as an object of copyright protection is analyzed. After all, the program derived from the algorithm and is in a sense, its equivalent. This means that some basic features of algorithms are inherent in programs. The program can also be considered as a means of implementing an algorithm, and as such, characterized by certain distinct features from
APA, Harvard, Vancouver, ISO, and other styles
34

Natalia V., Buzova, and Karelina Marina M. "Some Issues of Judicial Protection of Intellectual Rights with Internet-Technologies." Rossijskoe pravosudie, no. 5 (April 25, 2022): 50–59. http://dx.doi.org/10.37399/issn2072-909x.2022.5.50-59.

Full text
Abstract:
The judicial protection of intellectual property rights contributes to the development of the economy and culture in society. Ensuring citizens’ access to justice is one of the most important tasks of any state. Digital technologies, including information and telecommunications networks, are beginning to be used both in Russia and abroad to improve access to justice. Currently, technologies already allow to carry out some procedural actions in the digital environment. However, the digitization of objects, including intellectual property, and the presentation of evidence through information and
APA, Harvard, Vancouver, ISO, and other styles
35

Wong, Kok-Seng, and Myung Ho Kim. "Towards Self-Awareness Privacy Protection for Internet of Things Data Collection." Journal of Applied Mathematics 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/827959.

Full text
Abstract:
The Internet of Things (IoT) is now an emerging global Internet-based information architecture used to facilitate the exchange of goods and services. IoT-related applications are aiming to bring technology to people anytime and anywhere, with any device. However, the use of IoT raises a privacy concern because data will be collected automatically from the network devices and objects which are embedded with IoT technologies. In the current applications, data collector is a dominant player who enforces the secure protocol that cannot be verified by the data owners. In view of this, some of the r
APA, Harvard, Vancouver, ISO, and other styles
36

Long, Rong, Xiaohui Fan, Kai Wei, Junxuan Bai, and Shanpeng Xiao. "Internet-of-Things object model." Digital Twin 2 (April 12, 2022): 5. http://dx.doi.org/10.12688/digitaltwin.17562.1.

Full text
Abstract:
Background: With the advancement of communication technology and advanced sensors, there are massive demands for Internet-of-Things (IoT) applications in buildings, communities, factories, parks, etc. Accessing IoT devices provides convenience for scene management and monitoring, ameliorating production and life intelligently. However, due to the lack of a unified model for IoT devices, data is often skipped over IoT platforms and transmitted to applications directly. This leads to the fact that each manufacturer needs to produce its devices and develop its customized software, which hugely in
APA, Harvard, Vancouver, ISO, and other styles
37

Ulitina, Olha. "Features of copyright protection of some specific works of contemporary art." Theory and Practice of Intellectual Property, no. 5 (June 11, 2021): 36–42. http://dx.doi.org/10.33731/52020.233731.

Full text
Abstract:
Ulitina O. Features of copyright protection of some specific works of contemporary art. The article is devoted to the legal protection issues of the atypical objects of copyright, which belong to modern arts. The place and role of such objects in the system of copyright objects are defined. Based on the study of doctrinal provisionson such atypical objects, their differences from traditional objects of copyright are determined. In article it is also indicated how the place of such objects in the system of contemporary art influences it.An analysis of the Ukrainian legislation and the foreign c
APA, Harvard, Vancouver, ISO, and other styles
38

Hlybovets, Andrii, Serhii Shcherbyna, and Oksana Kyriienko. "Security Vulnerabilities and Protection Solutions in Internet of Things Systems." NaUKMA Research Papers. Computer Science 7 (May 12, 2025): 89–97. https://doi.org/10.18523/2617-3808.2024.7.89-97.

Full text
Abstract:
The Internet of Things (IoT) has begun transforming our digital space, in which everyday objects are interconnected and capable of communicating with each other. This transformation not only simplifies our lives but also creates unprecedented opportunities and enhances efficiency in areas such as smart homes, healthcare, industrial manufacturing, and urban management. However, as with any technological breakthrough, IoT requires a careful and well-planned implementation. The large-scale and unregulated deployment of IoT devices raises significant security concerns that must be mitigated.At the
APA, Harvard, Vancouver, ISO, and other styles
39

Arora, Yojna, Aarti Chugh, and Charu Jain. "An Application Module of IOT for Environment Protection." ECS Transactions 107, no. 1 (2022): 5263–70. http://dx.doi.org/10.1149/10701.5263ecst.

Full text
Abstract:
Internet of Things is the connection of physical objects which are embedded with sensors and software for exchanging data with other devices over the internet. It is a collaboration of multiple technologies, such as machine learning, real time analytics, and embedded system. IOT has helped in dealing with various real world problems. One such application area is in the field of environment protection. Due to the enhanced levels of particles and toxic materials in the environment it has become essential to monitor the levels on continuous basis so that required notifications can be generated. T
APA, Harvard, Vancouver, ISO, and other styles
40

Yuldashov, Abdumumin. "LEGAL NORMS ON THE PROTECTION OF COPYRIGHT AND RELATED RIGHTS IN THE DIGITAL ENVIRONMENT IN THE LEGISLATION OF UZBEKISTAN AND INTERNATIONAL TREATIES." Jurisprudence 3, no. 2 (2023): 47–54. http://dx.doi.org/10.51788/tsul.jurisprudence.3.2./qfxg5673.

Full text
Abstract:
The article deals with the problems associated with ensuring the legal protection of objects of copyright since the last quarter of the twentieth century and related rights in information and communication networks and, in turn, issues related to the constant maintenance of a balance between authors (right holders) and users are discussed. It is known that in 1996 the World Intellectual Property Organization adopted 2 important documents - “Internet Treaties” - to ensure the legal protection of copyright and related rights on the Internet. It was the adoption of these documents that had a seri
APA, Harvard, Vancouver, ISO, and other styles
41

Salsabila, Adhek Inarania. "Legal Protection For Victims Of Crime Of Hacking." LIGAHUKUM 1, no. 2 (2021): 148–57. http://dx.doi.org/10.33005/ligahukum.v1i2.26.

Full text
Abstract:
AbstractCybercrime has become a threat to stability, so the government has difficulty to handle the crime that have been carried out with computer technology, especially the internet and internet networks. The Government issued Law Number 11 of 2008 concerning Information and Electronic Transactions which was later updated with Act Number 19 of 2016 concerning Amendments to Law Number 11 of 2008 concerning Electronic Information and Technology, which is expected to be able to anticipate developments and problems, including the impact negative abuse of the Internet with various motivations that
APA, Harvard, Vancouver, ISO, and other styles
42

Koos, Stefan. "THE INDIVIDUAL AND THE PROPERTY IN VIRTUAL WORLDS." Veritas et Justitia 8, no. 2 (2022): 267–86. http://dx.doi.org/10.25123/vej.v8i2.5627.

Full text
Abstract:
Virtual reality and augmented reality have the potential to change the economy and society as much as the internet once did. In AR, virtual objects mix with real environments and objects. In virtual reality environments, people will move around using avatars and using virtual objects and individualise their virtual spaces with virtual artworks. However, the integration of humans into virtual and semi-virtual environments also leads to an intensification of problems connected with the relationship of the individual to technology and powerful platforms. The person integrated into virtual worlds
APA, Harvard, Vancouver, ISO, and other styles
43

Delfiyanti. "Perlindungan Hak Cipta Dari Tindakan Pembajakan Software di Tinjau Dari Hukum Nasional." Unes Journal of Swara Justisia 8, no. 3 (2024): 676–88. http://dx.doi.org/10.31933/26mm0z77.

Full text
Abstract:
Technological developments give birth to new creative ideas and create something that never existed before. The digital world is the main medium to make this happen. Every day more than millions of people use or log in to the internet for various purposes, from scientific research to playing interactive games in cyberspace, or from trading or e-commerce to surfing gambling sites. In this case, there is a legal instrument Law no. 28 of 2014 concerning Copyright which applies in Indonesia where one of the objects that receives copyright protection is a computer program, in this case software. Wi
APA, Harvard, Vancouver, ISO, and other styles
44

Nan, Gong. "Protection of personal data in China: Legislation in the digital age." Vestnik of Saint Petersburg University. Law 14, no. 1 (2023): 159–72. http://dx.doi.org/10.21638/spbu14.2023.110.

Full text
Abstract:
In the development of China’s Internet industry and digital economy, great importance is attached to the protection of personal data and seriously protects the legitimate rights and interests of citizens’ personal data. Generally speaking, with the development of technology and industry, China’s personal data protection has gone from “indirect protection” to “direct protection” and then to “comprehensive protection”. In the early years of China’s Internet industry, the indirect protection of personal data was mainly achieved through the protection of the “rights to privacy” of citizens. Since
APA, Harvard, Vancouver, ISO, and other styles
45

Tan, Hua Shan, and Yang Yang. "A Software Protection Method Based on Computer Fingerprint and Asymmetric Encryption." Advanced Materials Research 756-759 (September 2013): 1215–19. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.1215.

Full text
Abstract:
Software protection is an important research area in computer field. Combined with the traditional asymmetric encryption algorithm which provides the measures of protection, computer fingerprint was employed to identify the protection object. This novel software protection method is called AEA-CF, which means asymmetric encryption algorithm based on computer fingerprint. The computers used AEA-CF should be running on Internet so that the authentication information could be provided by server. The experiments show that this method could protect software effectively.
APA, Harvard, Vancouver, ISO, and other styles
46

Grin, E. S. "Legal Protection of Copyright Works and Complex Intellectual Property Objects on Social Networks: Court Practice Issues." Lex Russica 77, no. 9 (2024): 107–15. http://dx.doi.org/10.17803/1729-5920.2024.214.9.107-115.

Full text
Abstract:
The paper examines modern approaches of court practice in order to determine the legal nature of complex intellectual property objects, as well as creative outputs generated on social networks. The author analyzes the Judicial Review of the Supreme Court of the Russian Federation 2024 and the practice of the Intellectual Property Rights Court, devoted to topical issues of judicial protection of creative outputs on the Internet, as well as doctrinal sources, foreign experience on the issues under consideration. A legal analysis of complex intellectual property objects, ways of using them on the
APA, Harvard, Vancouver, ISO, and other styles
47

Liu, Huan, and Yanling Wang. "Social Media Use and Privacy Concerns: How do College Students view Internet Privacy and Information Protection." European Journal of Humanities and Social Sciences 3, no. 2 (2023): 93–102. http://dx.doi.org/10.24018/ejsocial.2023.3.2.429.

Full text
Abstract:
The study is to prove the intermediary effect of privacy concerns, explore the attitude toward online privacy on social media, and summarize the privacy protection strategies adopted by college students on China's mainland. We used the questionnaire to collect the data from college students. The questionnaire was conducted online and offline, and students at Hebei University were randomly selected as the questionnaire object (n = 304). The results show: (1)Privacy concerns fail to mediate the effect of perceived risks on information protection. (2)Affected by perceived risks, most students are
APA, Harvard, Vancouver, ISO, and other styles
48

Dudykevych, V., H. Mykytyn, L. Bortnik, and T. Stosyk. "SECURITY METHODOLOGY OF CYBER-PHYSICAL SYSTEMS AND THE INTERNET OF THINGS IN INTELLECTUALIZATION OF INFRASTRUCTURE OBJECTS." Computer systems and network 6, no. 1 (2024): 44–53. http://dx.doi.org/10.23939/csn2024.01.044.

Full text
Abstract:
A multi-level structure of safe intellectualization of society's infrastructure 'objects - cyber-physical systems' in the functional space 'selection - exchange of information - processing - management' is proposed according to the profiles - confidentiality integrity availability for 'smart environmental monitoring' 'smart education' 'smart energy' 'intelligent transport system' and other subject areas. The multi-level structure 'objects - cyber-physical systems' of safe intellectualization is revealed by the paradigm 'multi-level cyber-physical system - multi-level information security' whic
APA, Harvard, Vancouver, ISO, and other styles
49

BAKAI, Yuliia, and Yuliia HUDZENKO. "Copyright in private international law: protection, objects, types." Economics. Finances. Law 10/1, no. - (2022): 18–21. http://dx.doi.org/10.37634/efp.2022.10(1).4.

Full text
Abstract:
The paper presents a study of the problem of protection and protection of copyright rights in international private law. It is noted that the issue of protection and protection of copyright in the modern world is very relevant and currently not fully resolved. An analysis of international treaties, to which Ukraine is a party, has been carried out. In particular, the norms of the Berne Convention, the World Geneva Convention on Copyright of 1952, the Treaty of the World Intellectual Property Organization on Copyright (BOIB Treaty), the Agreement on Trade Aspects of Intellectual Property Rights
APA, Harvard, Vancouver, ISO, and other styles
50

Konieczny, Marcin. "ANTI-OSINT METHODS ENSURING PROTECTION OF PERSONAL DATA IN THE CONTEXT OF CYBERCRIME." Roczniki Administracji i Prawa 1, no. XXV (2025): 127–44. https://doi.org/10.5604/01.3001.0055.1100.

Full text
Abstract:
The issue of anti-OSINT methods is extremely relevant in modern digital world, where the protection of personal data is becoming critical in the context of the growth of cybercrime. Therefore, the purpose of this study was to characterise anti-OSINT methods that ensure the protection of personal data in the context of cybercrime. To fulfil this purpose, a variety of scientific and legal methods were employed, including analysis and synthesis, hermeneutical, and institutional methods. It was found that by applying anonymisation, encryption, access control, and other technologies, anti-OSINT is
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!