scholarly journals The Last Place in the World - Copyright Protection for Computer Software in New Zealand

1997 ◽  
Vol 27 (3) ◽  
pp. 391
Author(s):  
B Cash

Computer technology - whether it is hardware, software or the internet - is the headache that just won't go away for anyone grappling with the law of intellectual property. With the Copyright Act 1994, the New Zealand legislature attempted to meet some of the challenges but it largely avoided the issue, passing the headache onto the judiciary should any tricky issues arise. One such issue is copyright protection for computer programs. The Copyright Act 1994 makes it clear that computer programs are protected as a literary work but how far does that protection extend (or how far do we carry the fiction that a computer program is literary work)? This article attempts to second guess what level of protection our courts might provide. It argues that New Zealand has shown a willingness to protect functional items and would protect the "look and feel" of a program, providing a level of protection which courts in the United States have considered undesirable.

Author(s):  
Paul Torremans

This chapter discusses five issues: the availability of patent protection for computer hardware and for computer software (computer programs); copyright in computer software; databases and the sui generis right; the Internet; and semiconductor chip protection.


2011 ◽  
Vol 23 (4) ◽  
pp. 186-191 ◽  
Author(s):  
Malini Ratnasingam ◽  
Lee Ellis

Background. Nearly all of the research on sex differences in mass media utilization has been based on samples from the United States and a few other Western countries. Aim. The present study examines sex differences in mass media utilization in four Asian countries (Japan, Malaysia, South Korea, and Singapore). Methods. College students self-reported the frequency with which they accessed the following five mass media outlets: television dramas, televised news and documentaries, music, newspapers and magazines, and the Internet. Results. Two significant sex differences were found when participants from the four countries were considered as a whole: Women watched television dramas more than did men; and in Japan, female students listened to music more than did their male counterparts. Limitations. A wider array of mass media outlets could have been explored. Conclusions. Findings were largely consistent with results from studies conducted elsewhere in the world, particularly regarding sex differences in television drama viewing. A neurohormonal evolutionary explanation is offered for the basic findings.


2021 ◽  
Vol 8 (2) ◽  
pp. 183-212
Author(s):  
Agung Kurniawan Sihombing ◽  
Rika Ratna Permata ◽  
Tasya Safiranita Ramli

In the rapid technological development, physical boundaries have begun to disappear. The internet has created a ‘free culture’. In addition, the era is challenging the copyright concept along with the emergence of ‘digital copyright’. It has become the main commodity of Over-the-Top services providing means of communication and entertainment through the internet. Content streaming service like Netflix uses films, as well as other cinematographic works, as its main commodities. OTT Streaming media helps to protect copyright holders' rights that previously have been violated by illegal streaming sites on the internet. Unfortunately, it also raises a new question: how digital copyright-objects can be protected in this kind of service. Without physical form, copyright object can be distributed easily on the internet, and it may lead to right violations. To answer this problem, the authors aim to describe the digital copyright protection on OTT Streaming Content Media in Indonesia and compare them to the 1998 Digital Millennium Copyright Act (DMCA) of the United States of America using a descriptive-analytical approach. This study employed a normative juridical approach with secondary data. The results of this study indicate that digital copyright protection in Indonesia is still centered on conventional copyright objects, and a sui generis law is needed to provide better protection for digital copyright objects.


Author(s):  
Марина Михайловна Молчанова ◽  
Патимат Абдулаевна Лекова

Исследуется кризис вербальности контента в интернет-дискурсе, его активная визуализация, связанная с новыми открытиями в области компьютерных технологий. Цель работы - дать полиаспектную характеристику этому явлению и обозначить перспективы его влияния на речемыслительную деятельность подрастающего поколения, составляющего большую часть пользователей социальных сетей. Актуальность данной проблематики обусловлена обеспокоенностью филологической общественностью тем, что мир становится все менее лингвистическим. Новизна заключается в том, что впервые интернет-дискурс рассматривается в контексте кризиса вербальности контента. При таких темпах визуализации медиатекстов вполне вероятно обострение кризиса вербальности, последствия которого могут негативно сказаться на мыслетворческой деятельности у подрастающего поколения, которая возможна только при высокой языковой компетенции. The paper examines the crisis of content verbality in the Internet discourse, its active visualization associated with new discoveries in the field of computer technology. The aim of the work is to give a multi-aspect characterization of this phenomenon and outline the prospects of its influence on the speech-thinking activity of the younger generation, which makes up the majority of users of social networks. The relevance of this issue is due to the concern of the philological community that the world is becoming less and less linguistic. The novelty lies in the fact that for the first time Internet discourse is considered in the context of the crisis of content verbality. At such a rate of visualization of media texts, it is likely that the crisis of verbality will aggravate, the consequences of which can negatively affect the thinking activity of the younger generation, which is possible only with high linguistic competence.


Author(s):  
Andrew C. Isenberg

Beginning in 1848, the circum-Pacific world experienced dozens of gold rushes; they punctuated the histories of the United States, Canada, Australia, and New Zealand. Although individual prospectors dominate the national narratives of gold rushes, by the mid-1850s, industrial mining technologies had largely replaced individual miners with their pans and shovels. Notable among these industrial technologies was hydraulic mining, which used high-pressure water hoses to flush large amounts of gold-bearing gravel into sluice boxes saturated with mercury. Industrial mining technologies were portable—engineers who perfected hydraulic mining in California exported the practice to Australia, Canada, and New Zealand. Hydraulic mining exacted startling environmental costs: floods, deforestation, erosion, and toxic pollution. This chapter is by Andrew Isenberg.


There has been a neglect on the part of Western governments with focus on the U.S. to take seriously the internet campaign that ISIS has been waging since 2014 and the affective response that still draws citizens from across the world into their promise of a civilized, united nation for Muslims. It is possible that the West, even with a severely increased commitment to fighting the Islamic State, may be too late. This chapter will explore responses by Western governments including the United States to fight internet-enabled terrorism.


Author(s):  
Rachel Baarda

Digital media is expected to promote political participation in government. Around the world, from the United States to Europe, governments have been implementing e-government (use of of the Internet to make bureaucracy more efficient) and promising e-democracy (increased political participation by citizens). Does digital media enable citizens to participate more easily in government, or can authoritarian governments interfere with citizens' ability to speak freely and obtain information? This study of digital media in Russia will show that while digital media can be used by Russian citizens to gain information and express opinions, Kremlin ownership of print media, along with censorship laws and Internet surveillance, can stifle the growth of digital democracy. Though digital media appears to hold promise for increasing citizen participation, this study will show that greater consideration needs to be given to the power of authoritarian governments to suppress civic discourse on the Internet.


2011 ◽  
pp. 267-288
Author(s):  
Jeffrey Hsu

The potential for the Internet and e-commerce in China and Chinese-speaking nations (including Hong Kong, Taiwan and Singapore) is huge. Many experts believe that China will have the second largest population of web surfers, after the United States, by the year 2005 (McCarthy, 2000). Currently, the Internet population in China is doubling every six months (CNNIC, 2001). There are many issues relating to China’s cultural aspects and society, which can impact the design and content of web sites that are directed towards Chinese audiences. Some of these issues include basic differences between Chinese and American/Western cultures, family and collective orientations, religion and faith, color, symbolism, ordering and risk/uncertainty. Attention is given to the differences between the cultures of China, Hong Kong, Taiwan, and Singapore, as well as addressing issues brought up by related theories and frameworks. A discussion of important considerations that relate to using Chinese language on the World Wide Web (WWW) is also included. Finally, insights are gained by examining web sites produced in China and Chinese-speaking countries. This chapter will focus on many of these issues and provide practical guidelines and advice for those who want to reach out to Chinese audiences, whether for e-commerce, education, or other needs.


Author(s):  
Yukiko Inoue

Twenty First Century Government is enabled by technology— policy is inspired by it, business change is delivered by it, customer and corporate services are dependent on it, and democratic engagement is exploring it. Technology alone does not transform government, but government cannot transform to meet modern citizens’ expectations without it (Cabinet Office, 2005, p. 3). According to the E-Government Readiness Ranking Report (United Nations, 2005), in 2005 the United States was the world leader followed by Denmark, Sweden, and the United Kingdom; and in 2004 the Republic of Korea, Singapore, Estonia, Malta, and Chile were also among the top 25 “e-ready” countries. The Ranking Report further emphasizes that 55 countries, out of 179, which maintained a government Web site, encouraged citizens to participate in discussing key issues of importance, and that most developing country governments around the world are promoting citizen awareness about policies, programs, approaches, and strategies on their Web sites—thus making an effort to engage multi-stakeholders in participatory decision-making. Indeed, one of the significant innovations in information technology (IT) in the digital age has been the creation and ongoing development of the Internet—Internet technology has changed rules about how information is managed, collected, and disseminated in commercial, government, and private domains. Internet technology also increases communication flexibility while reducing cost by permitting the exchange of large amounts of data instantaneously regardless of geographic distance (McNeal, Tolbert, Mossberger, & Dotterweich, 2003). In Hirsch’s (2006) words, “The Internet has finally achieved the convergence dream of the 1970s and everything that can be canned in digital form is traveling the Net” (p.3).


Author(s):  
James Weinstein

For most people the internet has been a dream come true, allowing instantaneous access to a vast array of information, opinion, and entertainment and facilitating communication with friends and family throughout the world. For others, however, the internet has wrought a nightmare, allowing often anonymous enemies a platform for vicious attacks on the character of their victims and a means for revealing to the world embarrassing private information about them. To combat these attacks, victims and law enforcement officials in the United States have employed both analogue remedies such as harassment and stalking laws as well as cyber-specific provisions. Since the attacks involve speech, however, all these remedies must comport with the First Amendment. The typical response of courts and commentators to the First Amendment issues raised in these cases is to ask whether the perpetrator’s speech falls within one of the limited and narrow traditional exceptions to First Amendment coverage, such as true threats, defamation, obscenity, or fighting words. This approach is understandable in light of unfortunate dicta in several United States Supreme Court decisions—that all content-based restrictions of speech other than speech falling within one of these exceptions are subject to “strict scrutiny,” a rigorous test that few speech restrictions can pass. This chapter argues that this approach to dealing with cyber harassment is misguided. This methodology often results in shoehorning the speech at issue into exceptions into which the speech does not fit, or worse yet, in a finding that the speech is protected by the First Amendment simply because it does not fall within a recognized exception.


Sign in / Sign up

Export Citation Format

Share Document