To see the other types of publications on this topic, follow the link: Open-source software – Law and legislation.

Journal articles on the topic 'Open-source software – Law and legislation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Open-source software – Law and legislation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Khan, T. U. R., P. Davis, and F. J. Behr. "A FRAMEWORK FOR AN OPEN SOURCE GEOSPATIAL CERTIFICATION MODEL." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLI-B6 (June 17, 2016): 57–64. http://dx.doi.org/10.5194/isprs-archives-xli-b6-57-2016.

Full text
Abstract:
The geospatial industry is forecasted to have an enormous growth in the forthcoming years and an extended need for well-educated workforce. Hence ongoing education and training play an important role in the professional life. Parallel, in the geospatial and IT arena as well in the political discussion and legislation Open Source solutions, open data proliferation, and the use of open standards have an increasing significance. Based on the Memorandum of Understanding between International Cartographic Association, OSGeo Foundation, and ISPRS this development led to the implementation of the ICA-OSGeo-Lab imitative with its mission “Making geospatial education and opportunities accessible to all”. Discussions in this initiative and the growth and maturity of geospatial Open Source software initiated the idea to develop a framework for a worldwide applicable Open Source certification approach. <br><br> Generic and geospatial certification approaches are already offered by numerous organisations, i.e., GIS Certification Institute, GeoAcademy, ASPRS, and software vendors, i. e., Esri, Oracle, and RedHat. They focus different fields of expertise and have different levels and ways of examination which are offered for a wide range of fees. <br><br> The development of the certification framework presented here is based on the analysis of diverse bodies of knowledge concepts, i.e., NCGIA Core Curriculum, URISA Body Of Knowledge, USGIF Essential Body Of Knowledge, the “Geographic Information: Need to Know", currently under development, and the Geospatial Technology Competency Model (GTCM). The latter provides a US American oriented list of the knowledge, skills, and abilities required of workers in the geospatial technology industry and influenced essentially the framework of certification. <br><br> In addition to the theoretical analysis of existing resources the geospatial community was integrated twofold. An online survey about the relevance of Open Source was performed and evaluated with 105 respondents worldwide. 15 interviews (face-to-face or by telephone) with experts in different countries provided additional insights into Open Source usage and certification. <br><br> The findings led to the development of a certification framework of three main categories with in total eleven sub-categories, i.e., “Certified Open Source Geospatial Data Associate / Professional”, “Certified Open Source Geospatial Analyst Remote Sensing & GIS”, “Certified Open Source Geospatial Cartographer”, “Certified Open Source Geospatial Expert”, “Certified Open Source Geospatial Associate Developer / Professional Developer”, “Certified Open Source Geospatial Architect”. Each certification is described by pre-conditions, scope and objectives, course content, recommended software packages, target group, expected benefits, and the methods of examination. Examinations can be flanked by proofs of professional career paths and achievements which need a peer qualification evaluation. After a couple of years a recertification is required. <br><br> The concept seeks the accreditation by the OSGeo Foundation (and other bodies) and international support by a group of geospatial scientific institutions to achieve wide and international acceptance for this Open Source geospatial certification model. <br><br> A business case for Open Source certification and a corresponding SWOT model is examined to support the goals of the Geo-For-All initiative of the ICA-OSGeo pact.
APA, Harvard, Vancouver, ISO, and other styles
2

Zarubin, Mikhail, Larissa Statsenko, Pavel Spiridonov, Venera Zarubina, Noune Melkoumian, and Olga Salykova. "A GIS Software Module for Environmental Impact Assessment of the Open Pit Mining Projects for Small Mining Operators in Kazakhstan." Sustainability 13, no. 12 (June 21, 2021): 6971. http://dx.doi.org/10.3390/su13126971.

Full text
Abstract:
This research article presents a software module for the environmental impact assessment (EIA) of open pit mines. The EIA software module has been developed based on the comprehensive examination of both country-specific (namely, Kazakhstan) and current international regulatory frameworks, legislation and EIA methodologies. EIA frameworks and methods have been critically evaluated, and mathematical models have been developed and implemented in the GIS software module ‘3D Quarry’. The proposed methodology and software module allows for optimised EIA calculations of open pit mines, aiming to minimise the negative impacts on the environment. The study presents an original methodology laid out as a basis for a software module for environmental impact assessment on atmosphere, water basins, soil and subsoil, tailored to the context of mining operations in Kazakhstan. The proposed software module offers an alternative to commercial off-the-shelf software packages currently used in the mining industry and is suitable for small mining operators in post-Soviet countries. It is anticipated that applications of the proposed software module will enable the transition to sustainable development in the Kazakh mining industry.
APA, Harvard, Vancouver, ISO, and other styles
3

Alamsyah, Alamsyah, Sri Suwitri, Kismartini Kismartini, and Yuwanto Yuwanto. "Applying the Advocacy Coalition Framework to Understand the Process of Local Legislation in Indonesia." Sriwijaya Law Review 3, no. 1 (January 31, 2019): 34. http://dx.doi.org/10.28946/slrev.vol3.iss1.136.pp34-47.

Full text
Abstract:
Making regulation is the primary function of the modern state. Current praxis shows how there is positive and negative cooperation among policy participant in the process of local legislation. Many Indonesian scholars give attention to the politics of law and citizens participation in understanding this process. However, they do not give detail analysis on cooperation among policy participant during the legislation process. Drawing on qualitative methods, this article applies the Advocacy Coalition Framework (ACF) to understand the process of local legislation in South Sumatra Province. This article selects The Provincial Regulation of South Sumatera No. 8 of 2016 on the Forest Fires Mitigation as a case study due to the nature of forest fires as the public problem that obtains attention from various actors. Several key informants representing the executive and the legislative at the local level is selected using the purposive technique as a source of primary data. The secondary data is collected from the official publication of the policy participant, newspaper, and social media. Using interactive models and NVIVO software to code and analyse research data, this article finds that the secondary policy belief (SPB) among policy participant could be similar partially or wholly. This similarity is the foundation of policy participant to make an advocacy coalition. This article identifies two advocacy coalition in legislation process of The Provincial Regulation of South Sumatera No. 8 of 2016 on the Forest Fires Mitigation: ‘the local wisdom’ coalition vs. ‘the no burning policy' coalition. This article discusses the findings and propose a new agenda for further research on local legislation process
APA, Harvard, Vancouver, ISO, and other styles
4

Pissarra, Teresa C. T., Aline B. Marcussi, Gilberto da R. Leão, João A. Galbiatti, Mauricio J. Borges, and Sergio Campos. "Environmental adaptation of the source of the subbasin of Rico Stream, Monte Alto - SP, Brazil." Engenharia Agrícola 33, no. 2 (April 2013): 303–11. http://dx.doi.org/10.1590/s0100-69162013000200009.

Full text
Abstract:
The aim of this study was to define the photographic patterns that represent the use and occupation of the landcover of the "spring" of the Rico Stream subbasin, located at Monte Alto, state of São Paulo (SP), Brazil, for environmental adaptation regarding the Brazilian Forest Law. The mapping was performed using remote sensing techniques and visual interpretation of the World View image, followed by the digitalization of the net of drainage and vegetation (natural and agricultural) at the AutoCad software with documents and field work. The study area has 2141.53 ha and the results demonstrated that the main crop is sugarcane with 546.34 ha, followed by 251.22 ha of pastures, 191.71 ha of perennial crops, 57.31 ha of Eucalyptus and 49.52 ha of onion, confirming the advance of sugarcane culture in the region. The region has 375.04 ha of areas of permanent preservation (APPs), and of this area it was found that only 72.17 ha (19.24%) has arboreal vegetation or natural forest, and 302.87 ha of these areas need to be enriched and reforested with native vegetation from the region, according to the current legislation. The data of the area enable future proposals of models for environmental adaptation to the microbasin according to the current environmental legislation.
APA, Harvard, Vancouver, ISO, and other styles
5

Cron, Alan H. "From legislation to implementation." Journal of Educational Administration 54, no. 1 (February 1, 2016): 75–91. http://dx.doi.org/10.1108/jea-06-2014-0065.

Full text
Abstract:
Purpose – The purpose of this paper is to examine the leadership practice of an 11-member district team of educators assembled to respond to one of the most comprehensive bullying laws in the nation – the Massachusetts Anti-Bullying Law of 2010. This three-year case study provides school leaders and legislators with an in-depth, fine-grained analysis of how leadership was practiced by a district team of de facto leaders charged with implementing mandatory legislative policy throughout a six-school, 5,000-student, K-12 public school district. Design/methodology/approach – This three-year case study employed an analytical, distributed leadership framework to identify, categorize, and analyze key artifacts used by a team to design and implement system-wide the comprehensive requirements of legislation. Using Weft qualitative data analysis software and the open, axial, and selective coding guidelines of Strauss and Corbin, data from semi-structured interviews and document analysis revealed a number of hidden structural considerations exerting significant influence on the leadership practice of the team. Findings – Findings from this study suggest that leadership is perhaps more fluid than previously theorized. Defining leadership as a force that moves between and among organizational stakeholders (as opposed to a person or position), this study identified a number of structural considerations exerting influence on the leadership practice of a team. Furthermore, this study suggests that foreknowledge of these structural considerations may help to foster organizational learning, to leverage preexisting social and intellectual capital, and to more successfully navigate the requirements of complex organizational change such as legislative mandates and standards-based reform. Research limitations/implications – Because of the chosen research approach, the research results may lack generalizability. Therefore, researchers are encouraged to replicate this study in other school districts or large organizations who are responding to state or federal legislation. Practical implications – The paper includes implications for state and local educational leaders as they struggle with the increased demands of standards-based educational reform. Social implications – This study has implications for those seeking to understand how legislation is received and assimilated by schools as well as those seeking a greater understanding of formal and informal leadership. Originality/value – This paper fulfills an identified need to study how leadership is practiced in response to standards-based state and federal legislation.
APA, Harvard, Vancouver, ISO, and other styles
6

Mudda, Dr Mallikarjun. "Iot Based System to Avoid Open Spitting and Defeacation." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 4537–40. http://dx.doi.org/10.22214/ijraset.2021.36004.

Full text
Abstract:
This project discusses about splitting and defecation at public places or in open environment that impact environmental or the health. So to avoid this case study is to be made by Examining the existing literature, legislation, case law, and other sources of information practise, as well as analysing and proposing remedies is a far more prevalent practise than is often acknowledged. The most important attempts have been concentrated on preventing these as a tool to evade the environmental impact assessment EIA, but it is a much more complex subject, with many ways of dividing or defecating as well as reasons for doing so. Increasing the effectiveness of strategic environmental assessments For example, a higher engagement of the approving authority, precise laws, case-by-case investigations rather than thresholds, required scoping, and the avoidance of project components being excluded during the EIA are all actions that should be taken to avoid this practise. Defecation and open splits can pollute the environment and cause health issues. So the project is designed using moisture sensors that are place at a location along with ESP 32 WiFi module with camera to send picture images of the person doing so of either splitting or defecation. The system immediately takes the picture image of the person doing so and sends it to the concern authorities through IOT to the BLYNK app of the mobile. The Internet of Things (IoT) is a network of physical items that employs sensors, electronics, software, and connections to share data. There is no need for humans to interface with these systems. The way real-world systems are interconnected through the internet has been transformed by Internet of Things (IoT)-based solutions. At this time, the use of IoT-based systems has expanded to include real-time detection and warning systems. Cost, on the other hand, has been a major consideration in the development and deployment of IoT systems.
APA, Harvard, Vancouver, ISO, and other styles
7

Hon, Mun-Wai, Greg Russell, and Michael Welch. "Open Source Software Considerations for Law Enforcement." IT Professional 12, no. 6 (November 2010): 18–23. http://dx.doi.org/10.1109/mitp.2010.121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Savelyev, Alexander. "Open source: the Russian experience (legislation and practice)." Information & Communications Technology Law 22, no. 1 (March 2013): 27–44. http://dx.doi.org/10.1080/13600834.2013.778520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Henley, Mark, and Richard Kemp. "Open Source Software: An introduction." Computer Law & Security Review 24, no. 1 (January 2008): 77–85. http://dx.doi.org/10.1016/j.clsr.2007.11.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dalle, Jean Michel, Paul A. David, Matthijs den Besten, and W. Edward Steinmueller. "Empirical issues in open source software." Information Economics and Policy 20, no. 4 (December 2008): 301–4. http://dx.doi.org/10.1016/j.infoecopol.2008.09.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Kemp, Richard. "Current developments in Open Source Software." Computer Law & Security Review 25, no. 6 (November 2009): 569–82. http://dx.doi.org/10.1016/j.clsr.2009.09.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Briggs, Sue. "Avoiding madness in the method: best practice methodologies for regulatory biodiversity assessment." Pacific Conservation Biology 17, no. 2 (2011): 94. http://dx.doi.org/10.1071/pc110094.

Full text
Abstract:
IN recent years, several Australasian jurisdictions have developed methodologies for regulatory assessment of impacts of development on biodiversity. Some methodologies are gazetted (NSW Government 2005) and some are policies under legislation (Department of Natural Resources and Environment 2002; Department of Environment and Climate Change 2007; Department of the Environment, Water, Heritage and the Arts 2009; Norton 2009). Increasingly, the methodologies aim for no net loss of biodiversity or net environmental gain, or to improve or maintain environmental outcomes (Department of Natural Resources and Environment 2002; NSW Government 2005; Environmental Protection Authority 2006; Webb 2009). Some methodologies are deemed as law, while assessments under other methodologies are subject to court challenges (Meyers 1996; Cabarrus 2009). Assessments using deemed methodologies cannot be challenged in court providing the methodology is accurately followed. Some jurisdictions have deemed methodologies to assess impacts of development on biodiversity in some circumstances, more open (and legally challengeable) provisions for biodiversity assessment in other circumstances, and direct Ministerial authority in other situations (NSW Parliament 1979, 1995, 2003). Some methodologies are accompanied by software tools and datasets (NSW Government 2005; Department of Sustainability and Environment 2006; Department of Environment and Climate Change 2009). Most methodologies have been in operation for several years. During this time, much has been learnt about best practice for preparing and implementing methodologies and their accompanying tools and datasets. The purpose of this paper is to provide principles for developing and implementing best practice methodologies for assessing impacts of development on biodiversity, for policy makers and their advisors. The principles apply to assessment of individual development applications and projects, rather than to strategic assessment (see Macintosh 2010), although many are relevant for strategic assessment also. Most of the principles also apply to assessment of biodiversity for non-regulatory purposes, such as incentive schemes.
APA, Harvard, Vancouver, ISO, and other styles
13

Zerov, Konstiantyn. "Copyright protection for computer programs." Theory and Practice of Intellectual Property, no. 6 (June 16, 2021): 5–14. http://dx.doi.org/10.33731/62020.233854.

Full text
Abstract:
Zerov K. Copyright protection for computer programs. The article discusses the main approaches to the legal protection of software, particularly computer programs, in accordance with the current legislation of Ukraine and foreign practices. It is concluded that copyright allows to adequately protect the forms of expression of a computer program: object and source codes of the program. It is noted that a computer program shall be protected if it is original in the sense that it is the author's own intellectual creation, and no other criteria shall be applied to determine its eligibility for protection in Ukraine. Like any other copyright object, a computer program has «legally indifferent» and «legally significant» elements of the form of expression. The legally indifferent elements of a computer program should include a) elements dictated by the efficiency of a computer program; (b) elements that are dictated by external factors; and (c) elements that the original programmer had taken from the public domain. The main approaches to the use (copying) of the source or object code of computer programs as part of other computer programs are given: «literal copying» and «non-literal copying.» It is concluded that «non-literal copying» of a computer program cannot violate the copyright law in Ukraine since the ideas and principles on which any element of a computer program is based are not protected by copyright. It is assumed that the modification of a computer program by eliminating technical means of protection and further use of computer program gives grounds to qualify such actions as two separate types of copyright infringement: infringement of the copyright holder's property rights and deliberately circumventing technical means of copyright protection. It is noted that in some scenarios, theuse of works under the limitation of copyright without circumvention of technical means may be impossible. The proposal to legislatively provide for the possibility of a person who has the right to freely use work to contact the copyright holder with a request to remove technical means solely for such use, as well as cases of permissible circumvention of technical means, has been made.Keywords: computer program, copyright, literal copying, non-literal copying
APA, Harvard, Vancouver, ISO, and other styles
14

Comino, Stefano, and Fabio M. Manenti. "Dual licensing in open source software markets." Information Economics and Policy 23, no. 3-4 (December 2011): 234–42. http://dx.doi.org/10.1016/j.infoecopol.2011.07.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Maracke, Catharina. "Free and Open Source Software and FRAND‐based patent licenses." Journal of World Intellectual Property 22, no. 3-4 (February 25, 2019): 78–102. http://dx.doi.org/10.1111/jwip.12114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Perr, Jon, Melissa M. Appleyard, and Patrick Sullivan. "Open for business: emerging business models in open source software." International Journal of Technology Management 52, no. 3/4 (2010): 432. http://dx.doi.org/10.1504/ijtm.2010.035984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Newby, Gregory B., Jane Greenberg, and Paul Jones. "Open source software development and Lotka's Law: Bibliometric patterns in programming." Journal of the American Society for Information Science and Technology 54, no. 2 (2003): 169–78. http://dx.doi.org/10.1002/asi.10177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Kemp, Richard. "Open source software (OSS) governance in the organisation." Computer Law & Security Review 26, no. 3 (May 2010): 309–16. http://dx.doi.org/10.1016/j.clsr.2010.01.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

De Busser, Els. "Open Source Data and Criminal Investigations: Anything You Publish Can and Will Be Used Against You." Groningen Journal of International Law 2, no. 2 (December 5, 2014): 90. http://dx.doi.org/10.21827/5a86a843e5c9d.

Full text
Abstract:
Various misconceptions exist regarding open source data, what is meant by this term and how these data can legally be used. This contribution focuses on developing a comprehensive definition of the term and highlights the differences with similar – often confusing – concepts. The fact that open source data are publicly available does not mean that they can be used and processed in any way or for any purpose. As far as open sources contain personal data, the general data protection legislation (national as well as EU and Council of Europe legislation) is applicable. Several difficulties however arise, especially when different types of data are mixed. This can happen in the context of a criminal investigation. The use of personal data for the purpose of prevention, investigation or prosecution of criminal offences is protected by more specific legal provisions to protect the secrecy of the investigation as well as the fundamental rights of the suspect and the victim(s). The fair trial rights of article 6 ECHR should be respected once a criminal charge has been made. Open source data are vulnerable for abuse by any individual. Additionally, they are widely available and distributable when the internet is used. In several instances open source data have been used for the purpose of vigilantism (individuals taking law enforcement into their own hands). It is important to draw the line between a legal use of open source data, including the use of open source data for the purpose of a criminal investigation and the illegal use of open source data. This contribution combines the elements of open source data, personal data and criminal investigations. Answers to the following research questions are sought: - What are open source data? - How to protect personal data included in open source data? - How to use open source data in criminal investigations while respecting data protection legislation?
APA, Harvard, Vancouver, ISO, and other styles
20

Esteve, Asuncion. "Patent Protection of Computer-Implemented Inventions Vis-A-Vis Open Source Software." Journal of World Intellectual Property 9, no. 3 (May 2006): 276–300. http://dx.doi.org/10.1111/j.1422-2213.2006.00278.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

den Besten, Matthijs, Jean-Michel Dalle, and Fabrice Galia. "The allocation of collaborative efforts in open-source software." Information Economics and Policy 20, no. 4 (December 2008): 316–22. http://dx.doi.org/10.1016/j.infoecopol.2008.06.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Romaniv, Khrystyna. "Information and communication technologies as a means to increase the professional skills of law students." Law and innovations, no. 4 (32) (December 15, 2020): 55–61. http://dx.doi.org/10.37772/2518-1718-2020-4(32)-8.

Full text
Abstract:
Problem definition. Modern legal activities are inextricably linked with ICT, and therefore information culture as acomponent of professional legal consciousness of a law student is no less relevant, since new generation of legalprofessionals must efficiently apply the acquired knowledge, influence development of democratic, rule-of-law state andcivil society.ICT contributes to formation of a unified European educational space and professional growth of future lawyers. Inaddition, accelerating the pace of information creation and dissemination allows a law student to expand their intellectualpotential. After all, a lawyer faces processing of large amounts of legal information in the professional activity, which isassociated with various legal facts, offenses and their overcoming, various legal relations and law and order. To resolvequickly legal situations, a lawyer has to use ICT aiming at assistance in systematization and provision of quick access tolegal information. Accordingly, it is today important to teach a law student not only basic legal knowledge, but also theability to respond quickly and find solutions to various legal situations. Analysis of the last researches and publications. The issue of professional skills formation in law students usingICT has not been elaborated in scientific literature. However, some authors are close to the topic we have chosen bydisclosing such issues as: ICT use in education and legal in particular. Such researchers include: B. Hershunskyi,R. Hurevych, V. Zelinska, M. Kademiia, М. Kozer, V. Lusha, N. Lohinova, S. Netiosova, N. Rusina, І. Savchenko,О. Fedorchuk, М. Sherman, S. Shyika, О. Shmyrov et al. Article objective. Elaboration of ICT importance as a tool for learning the law through establishment of stages oflaw student’s professional skills formation. Article’s main body. Professionalism is formed primarily through education, therefore a professional lawyer is aself-establishment in the field of law through knowledge and skills. The literature analysis showed that the importance ofinformation and communication technologies as a law knowledge tool can be revealed by establishing the stages of formationof professional skills of law student, in particular: 1) preparation, receipt, collection and exchange of legal informationduring learning; 2) expanding the range of cognitive activity; 3) formation of legal knowledge, their preservation;4) formation of legal thinking in a law student; 5) formation of moral and legal ideals of the future lawyer; 6) emergenceof research and practical skills.It is revealed that the emergence of research and practical skills is evidence of information and legal competence,which is the basis of professional skills of the future lawyer. Legal competency means a set of professional knowledge related to legal information, a variety of application software skills and information skills to use the ICT to solve differentprofessional problems. Conclusions and prospects for the development. It is proved that the ICT in the preparation of law students helpsto increase the professional capacity of a young specialist to perform future legal activities and leads to enrichment ofpedagogical and organizational activity of higher educational institutions with the following opportunities: extension ofthe information component of the professional skills of the law student, which is possible through the computer use andis manifested in the following: timeliness in obtaining complete and reliable information, minimizing time when seekinglegal information; ability to process significant volumes of legal information, ability to use different types of legalinformation source, ability to create their own databases of legal information; improvement of practical skills throughmodeling of different legal situations or their computer visualization, which may arise in professional activity; expansionof orientation skills, which is the speed of responding to changes and additions in the current legislation, ability to finduseful legal information in the short term; improvement of analytical skills through continuous monitoring of legalinformation and speeding up the transfer of legal experience.
APA, Harvard, Vancouver, ISO, and other styles
23

Romaniv, Khrystyna. "Information and communication technologies as a means to increase the professional skills of law students." Law and innovations, no. 4 (32) (December 15, 2020): 55–61. http://dx.doi.org/10.37772/2518-1718-2020-4(32)-8.

Full text
Abstract:
Problem definition. Modern legal activities are inextricably linked with ICT, and therefore information culture as acomponent of professional legal consciousness of a law student is no less relevant, since new generation of legalprofessionals must efficiently apply the acquired knowledge, influence development of democratic, rule-of-law state andcivil society.ICT contributes to formation of a unified European educational space and professional growth of future lawyers. Inaddition, accelerating the pace of information creation and dissemination allows a law student to expand their intellectualpotential. After all, a lawyer faces processing of large amounts of legal information in the professional activity, which isassociated with various legal facts, offenses and their overcoming, various legal relations and law and order. To resolvequickly legal situations, a lawyer has to use ICT aiming at assistance in systematization and provision of quick access tolegal information. Accordingly, it is today important to teach a law student not only basic legal knowledge, but also theability to respond quickly and find solutions to various legal situations. Analysis of the last researches and publications. The issue of professional skills formation in law students usingICT has not been elaborated in scientific literature. However, some authors are close to the topic we have chosen bydisclosing such issues as: ICT use in education and legal in particular. Such researchers include: B. Hershunskyi,R. Hurevych, V. Zelinska, M. Kademiia, М. Kozer, V. Lusha, N. Lohinova, S. Netiosova, N. Rusina, І. Savchenko,О. Fedorchuk, М. Sherman, S. Shyika, О. Shmyrov et al. Article objective. Elaboration of ICT importance as a tool for learning the law through establishment of stages oflaw student’s professional skills formation. Article’s main body. Professionalism is formed primarily through education, therefore a professional lawyer is aself-establishment in the field of law through knowledge and skills. The literature analysis showed that the importance ofinformation and communication technologies as a law knowledge tool can be revealed by establishing the stages of formationof professional skills of law student, in particular: 1) preparation, receipt, collection and exchange of legal informationduring learning; 2) expanding the range of cognitive activity; 3) formation of legal knowledge, their preservation;4) formation of legal thinking in a law student; 5) formation of moral and legal ideals of the future lawyer; 6) emergenceof research and practical skills.It is revealed that the emergence of research and practical skills is evidence of information and legal competence,which is the basis of professional skills of the future lawyer. Legal competency means a set of professional knowledge related to legal information, a variety of application software skills and information skills to use the ICT to solve differentprofessional problems. Conclusions and prospects for the development. It is proved that the ICT in the preparation of law students helpsto increase the professional capacity of a young specialist to perform future legal activities and leads to enrichment ofpedagogical and organizational activity of higher educational institutions with the following opportunities: extension ofthe information component of the professional skills of the law student, which is possible through the computer use andis manifested in the following: timeliness in obtaining complete and reliable information, minimizing time when seekinglegal information; ability to process significant volumes of legal information, ability to use different types of legalinformation source, ability to create their own databases of legal information; improvement of practical skills throughmodeling of different legal situations or their computer visualization, which may arise in professional activity; expansionof orientation skills, which is the speed of responding to changes and additions in the current legislation, ability to finduseful legal information in the short term; improvement of analytical skills through continuous monitoring of legalinformation and speeding up the transfer of legal experience.
APA, Harvard, Vancouver, ISO, and other styles
24

Dizon, M. A. C. "Free and Open Source Software Communities, Democracy and ICT Law and Policy." International Journal of Law and Information Technology 18, no. 2 (November 23, 2009): 127–41. http://dx.doi.org/10.1093/ijlit/eap003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Wang, Jing, Patrick C. Shih, and John M. Carroll. "Revisiting Linus’s law: Benefits and challenges of open source software peer review." International Journal of Human-Computer Studies 77 (May 2015): 52–65. http://dx.doi.org/10.1016/j.ijhcs.2015.01.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Karl, Christof. "Vikrant Narayan Vasudeva: Open Source Software and Intellectual Property Rights." IIC - International Review of Intellectual Property and Competition Law 47, no. 2 (February 23, 2016): 254–57. http://dx.doi.org/10.1007/s40319-016-0446-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Sauer, R. M. "Why develop open-source software? The role of non-pecuniary benefits, monetary rewards, and open-source licence type." Oxford Review of Economic Policy 23, no. 4 (December 1, 2007): 605–19. http://dx.doi.org/10.1093/oxrep/grm034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Mustonen, Mikko. "Copyleft—the economics of Linux and other open source software." Information Economics and Policy 15, no. 1 (March 2003): 99–121. http://dx.doi.org/10.1016/s0167-6245(02)00090-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Silic, Mario. "Dual-use open source security software in organizations – Dilemma: Help or hinder?" Computers & Security 39 (November 2013): 386–95. http://dx.doi.org/10.1016/j.cose.2013.09.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Kemp, Richard, and Caspar Gibbons. "IPR indemnities in the open source and proprietary software worlds." Computer Law & Security Review 21, no. 5 (January 2005): 420–22. http://dx.doi.org/10.1016/j.clsr.2005.08.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Vlastos, Emmanouil, and Ahmed Patel. "An open source forensic tool to visualize digital evidence." Computer Standards & Interfaces 30, no. 1-2 (January 2008): 8–19. http://dx.doi.org/10.1016/j.csi.2007.03.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Vlastos, Emmanouil, and Ahmed Patel. "An open source forensic tool to visualize digital evidence." Computer Standards & Interfaces 29, no. 6 (September 2007): 614–25. http://dx.doi.org/10.1016/j.csi.2007.03.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Cibrario Bertolotti, Ivan, and Tingting Hu. "Modular design of an open-source, networked embedded system." Computer Standards & Interfaces 37 (January 2015): 41–52. http://dx.doi.org/10.1016/j.csi.2014.05.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Philip Craiger, J., Paul K. Burke, and Chris S. Marberry. "Open Source Tools for Phishing Investigations." Journal of Digital Forensic Practice 1, no. 3 (September 2006): 223–29. http://dx.doi.org/10.1080/15567280601142129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

van Wendel de Joode, Ruben, and Tineke M. Egyedi. "Handling variety: the tension between adaptability and interoperability of open source software." Computer Standards & Interfaces 28, no. 1 (July 2005): 109–21. http://dx.doi.org/10.1016/j.csi.2004.12.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Bitzer, Jürgen, and Philipp J. H. Schröder. "Bug-fixing and code-writing: The private provision of open source software." Information Economics and Policy 17, no. 3 (July 2005): 389–406. http://dx.doi.org/10.1016/j.infoecopol.2005.01.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Campbell-Kelly, Martin, and Daniel D. Garcia-Swartz. "Pragmatism, not ideology: Historical perspectives on IBM’s adoption of open-source software." Information Economics and Policy 21, no. 3 (August 2009): 229–44. http://dx.doi.org/10.1016/j.infoecopol.2009.03.006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Hahn, Erin, David Blazes, and Sheri Lewis. "Understanding How the “Open” of Open Source Software (OSS) Will Improve Global Health Security." Health Security 14, no. 1 (February 2016): 13–18. http://dx.doi.org/10.1089/hs.2015.0035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Song, Jaeyoon, and Changhee Kim. "What Is Needed for the Sustainable Success of OSS Projects: Efficiency Analysis of Commit Production Process via Git." Sustainability 10, no. 9 (August 23, 2018): 3001. http://dx.doi.org/10.3390/su10093001.

Full text
Abstract:
The purpose of this study is to investigate the relative efficiency of open source software projects, and to analyze what is needed for their sustainable success. The success of open source software is known to be attributable to a massive number of contributors engaging in the development process. However, an efficient open source software project is not guaranteed simply by active participation by many; a coordination mechanism is needed to seamlessly manage the multi-party collaboration. On this basis, this study aimed to examine the internal regulatory processes based on Git and GitHub, which serve as such a mechanism, and redefine the efficiency of open source software projects to fully reflect them. For this purpose, a two-stage data envelopment analysis was used to measure the project efficiency reflecting the internal processes. Moreover, this study considered the Kruskal–Wallis test and Tobit regression analysis to examine the effects of the participation by many on an open source software project based on the newly defined efficiency. Results show that a simple increase in contributors can be poisonous in terms of the efficiency of open source software projects.
APA, Harvard, Vancouver, ISO, and other styles
40

Edwards, Kasper. "An economic perspective on software licenses—open source, maintainers and user-developers." Telematics and Informatics 22, no. 1-2 (February 2005): 111–33. http://dx.doi.org/10.1016/j.tele.2004.06.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Bouras, Christos, Anestis Filopoulos, Vasileios Kokkinos, Sotiris Michalopoulos, Dimitris Papadopoulos, and Georgia Tseliou. "Policy recommendations for public administrators on free and open source software usage." Telematics and Informatics 31, no. 2 (May 2014): 237–52. http://dx.doi.org/10.1016/j.tele.2013.06.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Françoso, Maria Teresa, Diogenes Cortijo Costa, Mariana Mello Valin, and Rogério Rodrigues Amarante. "Free Software for Development of Web GIS in Tourism Accessibility." Applied Mechanics and Materials 256-259 (December 2012): 2953–56. http://dx.doi.org/10.4028/www.scientific.net/amm.256-259.2953.

Full text
Abstract:
Based on the concepts of social inclusion, universal design, and accessibility, this paper aims to describe the stages of the development and implementation of a Geographic Information System for the Internet (Web GIS) based on open source (OS) software. The Web GIS developed is called "Accessibility to Campinas Tourist Attractions", which provides information about cultural and natural attractions in Campinas/SP- Brazil, especially for people with disabilities or reduced mobility that prevents access these sites via public and private transportation. The verification of the existence or lack of accessibility equipment at bus stops and parking areas close to tourist attractions relies on current legislation (NBR 9050) that establishes the right to accessibility for disabled people to transportation, local culture, and leisure.
APA, Harvard, Vancouver, ISO, and other styles
43

Wang, Jing, Youguo Li, Yusong Tan, Qingbo Wu, and Quanyuan Wu. "Analysis of Open Source Operating System Evolution: A Perspective from Package Dependency Network Motif." Symmetry 11, no. 3 (February 27, 2019): 298. http://dx.doi.org/10.3390/sym11030298.

Full text
Abstract:
Complexity of open source operating systems constantly increase on account of their widespread application. It is increasingly difficult to understand the collaboration between components in the system. Extant research of open source operating system evolution is mainly achieved by Lehman’s law, which is conducted by analyzing characteristics such as line of the source code. Networks, which are utilized to demonstrate relationships among entities, is an adequate model for exploring cooperation of units that form a software system. Software network has become a research hotspot in the field of software engineering, leading to a new viewpoint for us to estimate evolution of open source operating systems. Motif, a connected subgraph that occurs frequently in a network, is extensively used in other scientific research such as bioscience to detect evolutionary rules. Thus, this paper constructs software package dependency network of open source software operating systems and investigates their evolutionary discipline from the perspective of the motif. Results of our experiments, which took Ubuntu Kylin as a study example, indicate a stable evolution of motif change as well as discovering structural defect in that system.
APA, Harvard, Vancouver, ISO, and other styles
44

Bello, Abdulmajeed Hassan. "Dynamic Approach to the Shariʿah: A Case Study of Ijtihād and its Application in Contemporary Society." Arab Law Quarterly 27, no. 3 (2013): 259–70. http://dx.doi.org/10.1163/15730255-12341264.

Full text
Abstract:
Abstract This article argues that the Shariʿah is not entirely fixed and immutable although the Qurʾān and Sunnah, which are two of its three sources, are unalterable. Ijtihād or independent reasoning, which is the third source, is mutable however. The Shariʿah delineates the areas within which a Muslim’s life may develop and flourish as well as concedes to the Muslim community an ‘open road’ for temporal legislation which would cover the contingencies deliberately left untouched by texts in the Qurʾān and Sunnah. This article concludes that, while jurists or fuqahāʾ have provided various legal theories in light of the social reality of their respective eras, the continuing process of social change always necessitates re-adjustment.
APA, Harvard, Vancouver, ISO, and other styles
45

Chan, Anita Say. "Retiring the Network Spokesman." Science & Technology Studies 20, no. 2 (January 1, 2007): 78–99. http://dx.doi.org/10.23987/sts.55213.

Full text
Abstract:
National legislation to mandate the use or consideration of Free/Libre and Open Source Software (FLOSS) in government institutions is increasingly emerging as a strategy for FLOSS advocates in Latin America and the broader developing world. Such movements for the political use and regulation of FLOSS mark a distinct turn in the objectives and work of FLOSS advocates, whose activities largely focused on the dissemination of FLOSS as a technological artifact. This paper investigates the network of diverse actors involved in promoting FLOSS legislation in Peru, one of the first nations where a movement for FLOSS legislation emerged. It emphasizes that crucial to the work of FLOSS’ network actors is not their merely technological productivity, but their cultural and political productivity – that is, their ability to produce diverse body of meaning made both evident and mobile in narratives of FLOSS use and adoption.
APA, Harvard, Vancouver, ISO, and other styles
46

Wu, Fang Jun. "Empirical Tests of Scale-Free Characteristic in Open Source Software: A Replicated Case Study." Advanced Materials Research 622-623 (December 2012): 1933–36. http://dx.doi.org/10.4028/www.scientific.net/amr.622-623.1933.

Full text
Abstract:
Open source software systems are becoming increasingly important these days and will grow stronger in the future. In order to gain more information about them, their structure characteristics and behavior characteristics need to be measured. This paper tests scale free characteristics on open source real-world software empirically. More specially, this paper checks whether Chidamber and Kemerer metrics suite follows power law or not through three versions of Weka. Our empirical results showed that the features of complex networks didn’t exist in Weka.
APA, Harvard, Vancouver, ISO, and other styles
47

Williams, Joseph, and Georgina Humphries. "Analysis of a Training Package for Law Enforcement to Conduct Open Source Research." International Journal of Cyber Research and Education 1, no. 1 (January 2019): 13–26. http://dx.doi.org/10.4018/ijcre.2019010102.

Full text
Abstract:
Law enforcement officials (LEOs) in the UK conduct open source research (OSR) as part of their routine online investigations. OSR, in this instance, refers to publicly available information that is accessed via the Internet. As part of the research, identifying and tracing the electronic suspect (RITES) course provided by the UK's College of Policing, LEOs are introduced to the open source internet research tool (OSIRT); a free software tool designed to assist LEOs with OSR investigations. This article draws on analyses from questionnaires and observations from a RITES course; mapping them to Kirkpatrick's evaluation model. Results showed the positive impact the RITES course had in transferring knowledge back on-the-job, with LEOs applying knowledge learned to real-life investigative scenarios. Additionally, results showed OSIRT integrated both in the RITES course and into the LEOs investigative routine.
APA, Harvard, Vancouver, ISO, and other styles
48

Välimäki, Mikko, and Ville Oksanen. "The impact of free and open source licensing on operating system software markets." Telematics and Informatics 22, no. 1-2 (February 2005): 97–110. http://dx.doi.org/10.1016/j.tele.2004.06.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Bamhdi, Alwi. "Requirements capture and comparative analysis of open source versus proprietary service oriented architecture." Computer Standards & Interfaces 74 (February 2021): 103468. http://dx.doi.org/10.1016/j.csi.2020.103468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

KOHRING, G. A. "COMPLEX DEPENDENCIES IN LARGE SOFTWARE SYSTEMS." Advances in Complex Systems 12, no. 06 (December 2009): 565–81. http://dx.doi.org/10.1142/s0219525909002362.

Full text
Abstract:
Two large, open source software systems are analyzed from the vantage point of complex adaptive systems theory. For both systems, the full dependency graphs are constructed and their properties are shown to be consistent with the assumption of stochastic growth. In particular, the afferent links are distributed according to Zipf's law for both systems. Using the small-world criterion for directed graphs, it is shown that contrary to claims in the literature, these software systems do not possess small-world properties. Furthermore, it is argued that the small-world property is not of any particular advantage in a standard layered architecture. Finally, it is suggested that the eigenvector centrality can play an important role in deciding which open source software packages to use in mission-critical applications. This comes about because knowing the absolute number of afferent links alone is insufficient to decide how important a package is to the system as a whole, instead the importance of the linking package plays a major role as well.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography