首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 875 毫秒
1.
以百度文库为代表的信息分享平台是否应该对网络用户上传的侵权内容承担侵权责任,本质上是一个信息共享与著作权保护的利益平衡问题。在充分保护著作权人包括商业利益在内的合法权益的同时,应兼顾社会公众获取、分享、合理运用各类信息的权利,以及公民合法的网络自由使用权。  相似文献   

2.
This article considers the danger of monopoly interests in data engendered by the European legal frameworks which protect the gathering and storing of information, illustrated by the intrepretation of the Court of Appeal in the United Kingdom of new sui generis database rights in British Horseracing Board v. William Hill (2001). This article also seeks to demonstrate that this is a wider issue. Paradoxically, technology both facilitates wide access to digitally stored information and gives right owners control over that access. This control is protected both by the Digital Millennium Copyright Act and the Copyright in the Information Society Directive. Competition proceedings do not provide access to a non-competitor. Alternatives lie in compulsory licenses, a 'copy-duty', or expanded copyright and database right exceptions. The Database Directive is under review. Modifying the rights' exceptions may better facilitate a suitable balance between protection and justifiable access. A WIPO Treaty could be a positive and cohesive strategy globally, harmonizing the means of access to information without eroding incentives for collating that data.  相似文献   

3.
在应用数字水印技术进行数字版权保护时,数字水印协议具有和数字水印算法同等的重要性,水印协议要解决水印的产生、保存、多水印嵌入、版权所有者和消费者的权利保护、版权确定、盗版源追踪、争端判决等等一系列问题.为进行网络环境下的数字版权保护,引入人工智能领域活跃的Agent技术,结合数字版权保护的核心技术数字水印,提出一种基于Agent技术的数字水印协议框架,详细论述了异构网络环境下的带有智能特色的数字版权保护基础设施构成和相互作用.  相似文献   

4.
A recently released US Defense Department Inspector General (IG) report cited the National Security Agency (NSA) for a variety of information security problems and violations. The 1996 report was obtained by the Federation of American Scientists pursuant to a Freedom of Information Act (FOIA) request. The report was originally labelled “For Official Use Only” with a Special Warning notice: “This report contains certain unclassified information relating to the organization and function of the National Security Agency that may be protected by Public Law 86-36, May 29, 1959. Reproduction or removal of pages is prohibited. Safeguards must be taken to prevent publication or improper disclosure of the information in this report.” Although the report, entitled, “Final Report on the Verification Inspection of the National Security Agency”, is more than a year old, it gives a rather rare official insight into the internal problems of America's chief electronic espionage outfit.  相似文献   

5.
《IT Professional》2001,3(2):11-17
As a company grows, protecting its intellectual property could be key to its valuation. We present some basics about trademarks, patents, copyrights, and contracts. Building an organization, managing and motivating people, and finding customers and investors are all difficult and important. But the most important thing you could do for your new-economy company is to protect your intellectual property. Without hard assets, protected intellectual property could ultimately determine your company's valuation and even prevent a competitor from entering the same market. Companies create intellectual property daily, and the ability to protect it directly affects its value. There are four main types of intellectual property to consider protecting: trademarks and service marks; copyrights; patents; and trade secrets. We also discuss contractual protections that apply to employing IT staffers, consultants, and subcontractors  相似文献   

6.
媒体版权管理技术(DRM)是网络环境下流媒体内容交易和传播的重要技术,用于保护流媒体内容的版权,控制流媒体的使用和传播.结合现阶段网络应用中流媒体认证技术的实际应用情况和新一代数字版权管理(DRM)技术,提出一个通用的流媒体数字版权保护架构,并最终实现了基于该方案的流媒体版权管理系统.  相似文献   

7.
Patient control over electronic protected health information (ePHI) is one of the major concerns in the Health Insurance and Accountability Act (HIPAA). In this paper, a new key management scheme is proposed to facilitate control by providing two functionalities. First, a patient can authorize more than one healthcare institute within a designated time period to access his or her ePHIs. Second, a patient can revoke authorization and add new authorized institutes at any time as necessary. In the design, it is not required to re-encrypt ePHIs for adding and revoking authorizations, and the implementation is time- and cost-efficient. Consent exception is also considered by the proposed scheme.  相似文献   

8.
Throughout the world, sensitive personal information is now protected by regulatory requirements that have translated into significant new compliance oversight responsibilities for IT managers who have a legal mandate to ensure that individual employees are adequately prepared and motivated to observe policies and procedures designed to ensure compliance. This research project investigates the antecedents of information privacy policy compliance efficacy by individuals. Using Health Insurance Portability and Accountability Act compliance within the healthcare industry as a practical proxy for general organizational privacy policy compliance, the results of this survey of 234 healthcare professionals indicate that certain social conditions within the organizational setting (referred to as external cues and comprising situational support, verbal persuasion, and vicarious experience) contribute to an informal learning process. This process is distinct from the formal compliance training procedures and is shown to influence employee perceptions of efficacy to engage in compliance activities, which contributes to behavioural intention to comply with information privacy policies. Implications for managers and researchers are discussed.  相似文献   

9.
With the recent adoption of the General Data Protection Regulation (GDPR), the European Union (EU) assigned a prominent role to parental consent in order to protect the personal data of minors online. For the first time, the GDPR requires parental consent before information society service providers can process the personal data of children under 16 years of age. This provision is new for Europe and faces many interpretation and implementation challenges, but not for the US, which adopted detailed rules for the operators that collect personal information from children under the Children’s Online Privacy Protection Act (COPPA) almost two decades ago. The article critically assesses the provisions of the GDPR related to the consent of minors, and makes a comparative analysis with the requirements stipulated in the COPPA in order to identify pitfalls and lessons to be learnt before the new rules in the EU become applicable.  相似文献   

10.
On June 24, 1993 new provisions for computer programs were inserted in the German Copyright Act which are likely to improve software protection. According to the official government notes, the recent case law and the literature—contrary to the old law—software will now, in general, be copyright protected under Section 69 a para. 3 Copyright Act. Another improvement of major practical importance is the destruction claim offered by Section 69 f Copyright Act with respect to illegal program copies as well as to any device which is destined to circumvent or to remove a program protection. Although questions of principle seem to be more or less clear further clarification by the courts will be required as to details. Before the latter is achieved there remains some uncertainty as to the precise requirements of copyrightability under Section 69 a para. 3, including the necessary substantiation and evidence, as well as to the definition of the protected expression form under Section 69 a para. 2 which will decide the scope of copyright protection. In any case, one can expect that in the long term the Copyright Act could probably be used as an additional and effective means against software pirates.  相似文献   

11.
数字水印在版权保护中广泛运用。为了提升版权信息的完整性和有效性,水印需要具备高强度的隐蔽性和抗攻击性。因此文中提出了一种结合快速响应码(QR)、混沌系统和DWT-DCT的鲁棒性水印方案。首先通过混沌系统产生的混沌序列对QR进行加密;然后将宿主图片进行DWT操作,并且对低高频子带进行4×4分割和DCT操作;最后利用水印信息产生2×2矩阵,叠加到DCT变换后矩阵的右上角。在水印信息提取时,通过对比叠加矩阵中的元素并统计元素变化率,以此确认提取的水印信息。模拟实验分析表明,该方案不仅能够增强水印信息的透明性,而且在涂画、切割、噪声、过滤和Jpeg压缩等攻击中具备较强的抗攻击能力。  相似文献   

12.
《Micro, IEEE》1999,19(4)
How should a standardization body such as the IEEE deal with patents and copyrights on technology essential to using a standard! A recent controversy within the World Wide Web Consortium over a Microsoft patent illustrates the kind of problem that can arise when intellectual property rights cloud users' right of access to a standard. As yet, the IEEE has not developed a coherent policy on this issue; nor, apparently, has any other major standardization body  相似文献   

13.
In such a competitive environment as the present one is, the managers of different organizations must not only make the right decisions, but they must also make and implement them as quickly as possible. For this reason, they need several tools to provide them with information. These tools are called Executive Information Systems (EIS).This paper intends to portray the present situation of EIS in Spain. For this purpose, we surveyed the three leading Spanish companies in every sector. This paper contains statistical material on EIS situation in Spain.  相似文献   

14.
对电子信息实施保护,使电子信息按允许的方式使用是企业和机构业务正常进行的重要需求.研究AD RMS信息授权保护的原理,阐述了信息受控发布和访问的过程,分析AD RMS信息安全保护方案,评估了信息授权服务的效能.AD RMS可以用来构建功能完菩且强大的信息权限保护系统,有效防止敏感数据通过网络、移动存储介质等各种途径的泄...  相似文献   

15.
A significant event in the legal regulation of e-commerce in Sri Lanka was the enactment of the Electronic Transactions Act in 2006. The objective of this important Act is to facilitate commercial and financial activity by removing barriers to electronic transactions and by preserving the right of individuals to engage in freedom of contract unimpeded by government regulation and bureaucracy. This objective is secured in the legislation by ensuring that transactions conducted electronically are regarded as of equal validity or legitimacy as normal paper (or documentary) transactions. Undoubtedly, the Electronic Transactions Act is a significant and quite innovative piece of legislation - one that that has considerable potential to both stimulate and further enhance economic development, as well as commercial and free enterprise activity, in a developing country like Sri Lanka. Before any form of private-sector activity or financial activity can be conducted, the necessary institutional and legal underpinnings must be established. This Act appears to be the first step towards providing the foundations of a flourishing free-market economy in Sri Lanka.

In light of these issues, this article provides an overview of the fundamental provisions of the Act and outlines its significance for the country's emerging e-commerce activity. It draws attention to certain inadequacies of the Act and briefly focuses attention on the impact of the new e-commerce laws on the economic success of Sri Lanka. This article also briefly explores other associated and parallel legislative developments in Asia that aim to promote e-commerce in the region with a view to drawing out common and emergent themes in relation to the regulation of e-commerce in developing nations.  相似文献   

16.
基于安全容器的媒体信息版权保护机制研究   总被引:3,自引:0,他引:3  
胡志远  顾君忠 《计算机工程》2002,28(7):26-27,31
根据因特网上侵权现象的越来越严重,导致许多内容提供者拒绝把有价值的媒体内容在Internet上发布,为了减少这种侵权现象,提出了一种新的版权保护技术-安全容器技术,该技术以保证媒体信息在整个生命期内都是安全的。  相似文献   

17.
A crowdsourcing environment, where there is a very large volume of diverse content resulting from the participation of a mass of unspecified individuals, has resulted in significant changes in education. This paper presents an e-learning content system to manage the inclusion of crowdsourced material on the Web within lecture materials. The e-learning content system comprises a scrape system, learning content editor, and tracing system. As Web content may change with the progress of time, teachers (and students) must check whether the Web-based materials previously used in their classes have been updated. Accordingly, we designed scrape metadata specifications for tracing the original source. These metadata include information on copyrights and tracing, rather than basic data regarding the original source, to allow users to determine whether the original source has been updated. An editor was also configured so that the scraped Web content could be immediately incorporated into the teaching materials for enhanced convenience. The change point tracing accuracy test and utility evaluation performed using this system show that the accuracy of the change point tracing was 97.1% and that this system effectively saves time as compared with checking for changes by entering each URL directly.  相似文献   

18.
近年来,具备GPS定位和互联网功能的移动设备和智能手机已经变得非常普遍,人们使用这些设备可以很方便地获取所需的信息。但是,人们在享受这些基于位置的服务的同时,也引发了严重的隐私问题。如果攻击者知晓用户的精确位置,那么他可能推测出敏感信息。因此,当人们使用LBS时有必要引入位置隐私保护机制。提出了路网环境下移动服务隐私保护的通用模型—基于星图的隐私保护模式,并通过基于Hilbert序列的星网络扩展、匿名星选择机制等满足每个用户的共匿条件。在实际道路网络上的实验评估了该隐匿模型的有效性。  相似文献   

19.
通过大量的实验,得出了图像在小波变换域是否失真的判定标准--均方差及其均方差的阈值,进而提出了临界融合的概念,并给出了相应的最大融合算法,该算法使图像的鲁棒性得到很大的提高.实验证明该算法抗图像处理和攻击的能力较强,可应用于数字图像的版权保护和信息隐藏.  相似文献   

20.
Statistical agencies collect data from individuals and businesses, and deliver information to the society based on these data. A fundamental feature to consider when releasing information is the “protection” of sensitive values, since too many details could disseminate private information from respondents and therefore violate their rights. Another feature to consider when releasing information is the “utility” to a data user, as a scientist may need this information for research or a politician for making decisions. Clearly the more details there are in the output, the more useful it is, but it is also less protected. This paper discusses a new technique called Enhanced Controlled Tabular Adjustment (ECTA) to ensure that an output is both protected and useful. This technique has been motivated by another approach in the literature of the last decade, and both are compared and evaluated on a set of benchmark instances.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号