internet piracy
Recently Published Documents


TOTAL DOCUMENTS

38
(FIVE YEARS 4)

H-INDEX

5
(FIVE YEARS 1)

Author(s):  
Ahmad Mohammad Hassan ◽  
Ayuba John

Numerous type of software piracy known today, have several prevention techniques which has been established against them. Although, different software piracy techniques have been established, but the choice of which one should be the best to develop any software is the challenge for most software developers. Consequently, example of the types of piracy in software development can be categorise as follows: cracks and serials, softlifting and hard disk loading, internet piracy and software forging, mischaneling, reverse engineering, and tampering. We have several types of prevention techniques which aimed to resolved piracy in software development, although the methods have been wrecked. In this work a critical analysis has been carryout on different software piracy techniques and a simple model software was designed using the best technique to validate the results of the analysis.


Author(s):  
Микола Логвиненко ◽  
Анна Диковець

 The article investigates the problem of copyright piracy. The concept of Internet piracy is disclosed, according to which this phenomenon can be considered, both in the broad, and in the narrow sense. Piracy in the narrow sense — activities related to the manufacture and mplementation of counterfeit copies. Considering piracy in the broad sense, it can be argued that the basis of this activity is the use of the object of copyright, without the permission of the right holders in order to profit. The signs of Internet piracy are identified, including: illegal use of copyrighted objects; realization of objects of copyright by publishing, reproduction, distribution and distribution without the consent of the author (the copyright holder); causing damage to the interests of the author (the right holder); commercialization; gaining profit or moral gain illegally. The classification of piracy has been carried out, which confirms the fact that the placement of copyright objects in the «network» is currently a very widespread phenomenon. Accordingly, piracy can be classified as: activity related to the partially legal disclosure of the object of copyright; activity that is related to the falsification of the copyright object; activities that are reflected in the illegal distribution of copies of the copyright object. The main ways of protecting copyright from piracy in the Internet in Ukraine and the problem issues in this area are determined. Accordingly, legal remedies can be applied in two forms — jurisdictional and non-jurisdictional. Jurisdictional form provides that the author (legal owner) has the right to apply to the court or other  competent or state bodies for the application of the necessary measures for the restoration of violated rights and the termination of the offense. Non-divisive way of protecting (self-defense) — the actions of a person in the protection of copyright, carried out by them on their own. Having analyzed the methods of protection, it was concluded that the non-irisbased form of protection provides more expeditious and cost-effective protection of the rights of the author. Jurisdictional way of protection is characterized by less efficiency.Because a considerable amount of time is spent on filing an action in court, hearing a complaint, making a decision and, finally, implementing this decision. The technical component of the non-jurisdiction form of protection is analyzed. Namely, technical methods of protection are defined, which can be attributed to: self-destruction of thecopyright object in case of illegal copying; placement of an object with limited functionality; use of watermarks; indication of copyrights on publications; etc. The proposals for amending the current legislation in the field of protection of copyright from piracy in the Internet are formulated. The changes should concern provisions affecting both legal and socioeconomic issues, namely: imperfection of legislation in the field of intellectual property rights (impossibility of reliable establishment of an offender who deals with Internet piracy; insufficiency of evidence base of copyright infringement; absence of judges and civil servants of specialist knowledge in the field of intellectual property rights); a highprice that makes it impossible to sell licensed products, hence, the number of sites that contain unlicensed products increases; insufficient level of financial provision of specialists who are professionals in the field of intellectual property; etc.


2019 ◽  
Vol 21 (5) ◽  
pp. 494-509 ◽  
Author(s):  
Jason M. Walter

Purpose Contemporary copyright infringement has significantly changed in the digital era, and because of the unique attributes of internet piracy and method of exchange, traditional regulatory approaches are ineffective. The characteristics of digital goods enable users to almost costlessly copy and exchange content. Much of the contemporary research fails to incorporate the necessary components of exchange that are central to digital piracy. This paper aims to examine the role of peer-to-peer network hosts and the often-omitted cyberlocker. Design/methodology/approach A simple framework is constructed that describes how these entities how these entities facilitate digital piracy and operate financially. This framework illustrates the objectives of piracy mediators, highlighting the avenues by which regulation can craft policy. Additional examination of online piracy highlights the challenges of contemporary policy to combat digital piracy due to the secondary consequences. Findings Recent policies, aimed at diminishing piracy, would infringe on consumers’ privacy, hurt business finances or strategically used by rivals to hurt the operations of legal entities. Trying to prevent illegal sources (or facilitators) of pirate goods from providing access to files continues to be challenging. In many instances, the blurry line between a legal platform for file exchange and a piracy haven creates significant regulatory problems. For known piracy promoters (host sites or cyberlockers), location and revenue streams continue to limit direct intervention. Originality/value This paper discusses the necessary path for piracy to occur by including previously omitted agents necessary for communication and/or distribution. My analysis incorporates these entities that facilitate piracy and the unique features of digital exchange, which has industrial and regulatory implications. Furthermore, my results highlight why regulators have been ineffective in crafting meaningful anti-piracy policy.


2018 ◽  
Vol XXI (Issue 4) ◽  
pp. 735-743
Author(s):  
V.A. Oganyan ◽  
M.V. Vinogradova ◽  
D.V. Volkov

2017 ◽  
Vol 8 (1) ◽  
pp. 217
Author(s):  
Ana Cláudia Corrêa Zuin Mattos Amaral ◽  
Maiara Santana Zerbini

Este artigo analisa a vulnerabilidade que os avanços tecnológicos, notadamente a conectividade em rede e a computação em nuvem, representam aos direitos de autor. Uma análise conceitualé relevante para identificar a natureza jurídica do direito autoral. Fundamentado no método dedutivo, o estudo abordaos percalços em se identificar o agente causador do dano na dimensão virtual. Identifica-se que a atividade desenvolvida trata-se de uma prestação de serviço, acarretando responsabilidade quanto à execução de seus serviços.Palavras-chaves: Direito de Autor. Tecnologia. Internet. Pirataria. Computação em Nuvem.Abstract: The study examines the vulnerability that technological advances, notably network connectivity and cloud computing, represent to copyright. A conceptual analysis is relevant to identify the legal nature of copyright. Based on the deductive method, the study addresses the mishaps in identifying the agent that causes the damage in the virtual dimension. It is identified that the activity developed is a service provision, causing responsibility for the execution of its services.Keywords: Copyright. Technology. Internet. Piracy. Cloud Computing.  


2017 ◽  
Vol 7 (2) ◽  
pp. 311
Author(s):  
Nayef Salah Ghamri

Currently, the exchange of digital knowledge is not confined to a place or time. Knowledge is being shared among peoples all over the world regardless of the geographical and political boundaries. Technology, from the time of its existence, has contributed in changing many people’s rooted concepts that they have been accustomed to in their lives. While technology has positively contributed in shortening the time and distances among nations, it has also created some negative consequences such as the difficulty of protecting the individual’s privacy. In the era of widespread technology, new types of money thefts have emerged. These thefts do not include breaking into houses and banks but rather, Internet piracy. This is one of the modern types of thefts, which is represented in many forms such as identity theft, transferring money from one bank account into another, and the thefts of sensitive and confidential information. Therefore, information technology has an important role to play in our life, and it became one of our priorities. This research study focuses on assessing the risks related to the theft of the information of the clients of the commercial banks and even considering the level of security and theft prevention of such information as one of the key factors of quality that most banks show as one of their competitive advantages which they are trying to maintain.


Author(s):  
Maurice Roche

What are the implications of the digital age and new media for media-sport and the mediation of sport mega-events like the Olympics? In this chapter we focus on the internet ‘piracy’ problem and look into recent governmental policies and practices which aim to address and curb internet piracy in both the USA and the UK. The core of the chapter addresses problems of internet piracy in the field of media-sport and the related field of major sport-events like the Olympic Games, and also high profile and high value football matches. In relation to the Olympics it looks ‘hard’ and ‘soft’ approaches by the IOC to address the internet ‘piracy’ problem. Finally, the chapter addresses the current co-existence between television and the internet-based media in the context of the Olympics, and the possibilities for a new symbiosis in this area.


2016 ◽  
Vol 7 (3) ◽  
pp. 501
Author(s):  
Sławomir Czetwertyński

This paper deals with the phenomenon of  peer production in the context of unauthorized copying of information goods. Acc. to Yochai Benkler, it is a form of production operation based on a community. It is widely applied in the Internet and consequently, such information goods as GNU/Linux and Wikipedia have been established. Although the peer production has promoted growth in importance of, among others, free software or an open source initiative, it is also related to unauthorized copying of an intellectual property commonly called Internet piracy. The huge scale of this phenomenon, which is nearly 24% of entire Internet traffic, must not be ignored. In the paper a hypothesis has been put forward that low efficiency of counteracting of intellectual property unauthorized copying results from that fact that, to a great extent, it is generated in a process of the peer production. In turn, the goal of the paper is verification of the thesis in the progress of considerations regarding the nature of both the peer production and the unauthorized copying. A research field was limited to a P2P file exchange network based on a BitTorrent protocol.


Sign in / Sign up

Export Citation Format

Share Document