首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到19条相似文献,搜索用时 78 毫秒
1.
略论互联网对版权保护的挑战   总被引:1,自引:0,他引:1  
段维 《信息网络安全》2006,(3):34-35,68
分析了网络时代的版权特征和网络侵权方式,提出了网络侵权对版权保护带来的严峻挑战。  相似文献   

2.
郝燕 《软件世界》2007,(12):41-41
百度惹上了MP3版权官司,讯雷也一度因版权问题陷入窘境,许多网民“衷爱”的网站都被扣上了“侵权”的帽子,原有的版权管理已难以适应互联网时代的发展,共享版权于是应急而生。  相似文献   

3.
随着电子技术和网络平台的迅猛发展,各式各样的交流工具如雨后春笋般出现。现如今,微博在我国已经是排名第一的自媒体平台了,随着微博应用的人群范围越来越多越来越广,微博侵权的事件也开始逐渐增多。但因为是网络平台,被侵权人在被侵权后很难维护自己的权益,因此,对于微博的著作权保护问题,就显得尤为紧迫。下面我从三个方面浅析一下我对微博著作权保护问题的看法。  相似文献   

4.
目前,互联网上传播的数字内容存在大量的盗版和侵权问题,网上流传的《一个馒头引发的血案》引发了对电影作品侵权的争辩。数字版权管理的目的就是保护数字内容的版权,从技术上防止数字内容被非法修改复制、传播,只有拥有授权许可的用户才能使用数字内容。  相似文献   

5.
接连不断的侵权诉讼近年来,问络版权问题愈加突出。方正、超星、书生等在内的知名刚络图书企业都曾遭遇版权诉讼。  相似文献   

6.
针对传统音乐版权行业版权确权难、侵权监测难、维权取证难、版税结算难等问题,将区块链技术应用于数字音乐版权管理领域具有重要意义.通过使用VNT Chain区块链平台设计构建了一个数字音乐版权管理系统,在其中利用区块链技术为音乐版权提供存证性证明以及实现证据固化,采用Shazam算法为音乐版权提供原创性证明,并基于智能合约...  相似文献   

7.
《电脑爱好者》2011,(19):9-9
国内微博第一案一金山起诉奇虎360董事长周鸿讳微博名誉侵权案昨天终审判决。北京市第一中级人民法院判定周鸿讳的微博言论对金山安全造成侵权,判决周鸿讳删除相关微博文章,并在其新浪微博首页等发表致歉声明,向金山公开赔礼道歉,同时赔偿金山经济损失5万元。  相似文献   

8.
2月15日上午10时。国务院新闻办举行新闻发布会。国家版权局副局长阎晓宏介绍近期我国查处网络侵权盗版行动等方面情况。并通报了陆小亮、陈亮网络侵权盗版团伙案、“云霄阁”网站非法转载文学作品著作权案等12起网络侵权盗版重大案件。并同国家版权局新闻发育人、版权司司长王自强回答了来自中央电视台、中国国际广播电台、《中国日报》、美国合众社等国内外媒体关于网络版权方面的有关提问。本刊做为到会的唯一一家专业媒体参加了新闻发布会。[编者按]  相似文献   

9.
基于文本文档的版权保护技术研究   总被引:4,自引:0,他引:4  
胡志远  祁婷  苏鹏 《计算机工程》2002,28(1):42-43,233
为了减少因特网上侵权现象,针对文本文档,描述用来保护文本文档的版权的几种编码方式,这些文档编技术能用来确定文本文档被非法复制后的版权归属和容许执行该非法复制的合法用户。  相似文献   

10.
敏婕 《软件世界》2007,(16):85-85
由于数字内容很容易复制、修改,网络上传播的数字内容存在大量的盗版和侵权问题,数字版权管理开始成为互联网时代的一个热点话题。  相似文献   

11.
Stern  R.H. 《Micro, IEEE》1996,16(3):6-9
Looks at efforts now under way to resolve the issue of copyright infringement liability for on-line Internet access service providers. First, the Administration's Information Infrastructure Task Force (IITF) released a White Paper report recommending that present liability for copyright infringement be kept in place for Internet purposes, without change, because that would give Net access service providers an incentive to prevent and avoid infringement. Congress then introduced two bills, implementing the IITF proposals. These bills simply provided, as the IITF had recommended, that unauthorized transmission of copyrighted material between computers or over the Net was “distribution” and thus copyright infringement. The author looks at the ensuing uproar, and its resolution  相似文献   

12.
Berti  John 《IT Professional》2009,11(6):42-45
In this age of increasingly complex, Internet-based technologies, it's very difficult to protect original works of authorship. This article examines the problem of copyright infringement and the copyright law's desire to balance the interests of creators with the interests of the public. The author also offers some insight in how to reduce the problem of copyright infringement.  相似文献   

13.
This paper discusses certain copyright infringement issues regarding the liabilities of P2P network users. These issues are applicable to most P2P multimedia transmissions, as multimedia works are increasingly generating copyright disputes. The discussions will focus on the liabilities of both the distributors and end-users of P2P software via copyright law. The reason why the operations of P2P networks conflict with the regulations of copyright law is not complicated; the current copyright law evaluates infringement responsibilities via a simple copyrighted works distribution and usage dichotomy classification, and the application of P2P networks exceeds this classification. However, the copyright law was written during an analog era, and the interpretations of infringement were designed to target those who were making copies of cassettes and compact disks. A new regulation concerning digital file transactions is required; without it, due to the vagueness of the copyright law, more and more “innocent infringers” will be trapped by this pitfall called copyright protection and industries applying P2P network operations are directly threatened by trends of copyright impetus.  相似文献   

14.
Should a BB or net access provider be liable for copyright infringement when a user posts infringing material on user newsgroup or forum? Several recent court decisions have addressed the liability of bulletin board operators and related organizations for copyright infringement as a result of user postings of copyrighted material. The most recent decision (Nov. 1995) is the first to address the copyright liability of on-line service providers, at all. It is also the first to address in depth the liability of bulletin board operators who gain Internet access via such online service providers  相似文献   

15.
该文对电子商务中所涉及的知识产权问题进行了研究,根据电子商务中出现的虚假广告、泄露商业秘密、侵犯域名权、侵犯网页著作权、侵犯内容著作权、侵犯商誉、侵犯商标、抄袭网页设计版式等种种网络侵权行为的问题,提出了个人看法,对知识产权的保护起到了积极的作用。  相似文献   

16.
It is a settled rule of US, Japanese, and European copyright law that the copyright laws do not protect ideas embodied in a copyrighted work. Rather, copyright law protects only the way ideas are expressed in words, drawings, and the like. Applying this body of law to disassembly of object code in a ROM, diskette, or tape may be problematical. A trade secret case (or breach of contract case) could act as an effective substitute for a copyright infringement action  相似文献   

17.
Content providers (owners of copyright in literary material) have challenged the practice of making hyperlinks to their Internet Web sites. Some contend that any unauthorized provision of a link to their Web pages is copyright infringement. The author looks at the issues involved  相似文献   

18.
SUMMARY

Library service for distance education necessitates knowledge of important new regulations that were enforced by recent amendments to copyright law. This article begins with an overview of the copyright law of 1976 related to nonprofit educational institutions. Then the Digital Millennium Copyright Act (DMCA) of 1998 and the Technology, Education and Copyright Harmonization Act (TEACH Act) of 2002 are discussed. These acts, which amended the Copyright Act of 1976, require more rigorous measures by nonprofit educational institutions to ensure compliance. The article concludes with how to avoid copyright infringement and the necessity to educate library personnel about copyright law.  相似文献   

19.
《Information & Management》1996,30(5):211-221
In today's society, the development of new technologies generally outpaces the laws and regulations created to protect them. This is precisely what has happened in copyright cases involving the copyrightability of the “look and feel” of a program (the visual displays and specific command keystrokes that make a computer program unique). Currently, regulatory agencies and judicial interpretation of copyright law is not precise, leading to uncertainty and a lack of uniformity. Until the courts and/or agencies reach some consistency in their rulings, software developers and individual programmers are left in a quandary as to when charges of copyright infringement might be served. Although it may be difficult to achieve consistent interpretation, US case law does provide some guidance that can aid US developers in not only protecting their work, but also avoiding charges of copyright infringement. This paper examines the current US copyright laws and limitations with special attention to “look and feel.” International copyright aspects, as outlined in the Berne Convention, the General Agreement on Tariffs and Trade (GATT), and the North American Free Trade Agreement (NAFTA) are also addressed. It also reviews several cases that deal with (or have somehow impacted) questions surrounding “look and feel,” along with commentaries on their individual impacts, evaluates where copyright laws stand today, and discusses some possible alternatives for software developers based on the results of recent cases.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号