Piracy and Intellectual Property Theft in the Internet Era

Author(s):  
Shun-Yung Kevin Wang ◽  
Jeremy J McDaniel

Stealing ideas is not something new, but stealing and transporting ideas in a massive amount has become possible in the era of the internet. Based on the frameworks of criminological theory/thesis, this chapter intends to elaborate intellectual property theft and piracy in cyberspace. Contemporary cases of intellectual property theft and piracy are used to illustrate the blurred line between victims and offenders. The impacts of related information technology should be carefully appraised, as more and more intellectual properties are in digital format.

Author(s):  
Shun-Yung Kevin Wang ◽  
Jeremy J McDaniel

Stealing ideas is not something new, but stealing and transporting ideas in a massive amount has become possible in the era of the Internet, in which this group of incidents emerged rapidly. Based on the frameworks of criminological theory/thesis, this chapter intends to elaborate intellectual property theft and piracy emerged in the cyberspace. Contemporary cases of intellectual property theft and piracy are used to illustrate the blurred line between victims and offenders, especially in the era of Internet. The impacts of related information technology should be carefully appraised, as more and more intellectual properties are in digital format.


2019 ◽  
Vol 47 ◽  
pp. 101-118
Author(s):  
Fabienne Chamelot ◽  
Vincent Hiribarren ◽  
Marie Rodet

Abstract:With the rise of information technology, an increasing proportion of public African archives are being digitized and made accessible on the internet. The same is being done to a certain extent with private archives too. As much as the new technologies are raising enthusiasm, they have prompted discussion among researchers and archivists, on subjects ranging from matters of intellectual property to sovereignty and governance. Digital archiving disrupts archival norms and practices, opening up a field of reflection relatively little explored by historians. This article therefore seeks to reflect on the digital turn of African archives as a subject for study in its own right, located at the crossroads of political and economic interests.


2020 ◽  
pp. 223-229
Author(s):  
Ian J. Lloyd

Systems of intellectual property law date back many centuries and play a very important role in the information technology field. The main forms of intellectual property law are patents, copyright and trade marks. All play important roles and are considered in this section of the book. Patents and copyright have been applied in an IT context from the early days of the computer whilst trade marks have come to assume more significance with the commercialization of the Internet and its use by major manufacturers who typically own many trade marks developed for use in the course of their activities in the physical environment. As with many areas, the connection between the real and virtual words is not exact. The application of the law of copyright to software has seldom been in doubt. It is clear that the unauthorized copying of all of a work is unlawful. What is not clear is the extent of the protection. The famous scientist Isaac Newton is quoted as saying “If I have seen further, it is because I stood on the shoulders of giants”. Most later works build to some extent on their predecessors and there is a difficult dividing line between fair and unfair use of such works. Somewhat different issues apply in relation to patents – a branch of the law which offers the strongest protection but does require that works be innovative and produce a technical effect – that they should do something. This can be difficult to assess in respect of very fast-moving technologies.


2018 ◽  
Vol 91 (3) ◽  
pp. 266-273 ◽  
Author(s):  
Muayyad M Ahmad ◽  
Ruba Musallam ◽  
Abla Habeeb Allah

Purpose. To review literature on the nurses’ use and access to Internet Health Related Information (HRI).There is relatively little evidence in published literature on barriers, attitudes and how nurses utilize online health-related information.Methods. Literature search was carried-out on Cumulative Indexes to Nursing and Allied Health Literature (CINAHL), MEDLINE, Google Scholar, Springer and Sage publications. The search timeframe has focused on the outburst of Internet usage between the years 2000 and 2014.Results. Quality of available websites and databases containing health-related information vary widely in their accuracy, validity and reliability that require nurses to continuously evaluate their relevance.Conclusion: Emphasis on the necessity for training in the use of information technology is important to the nurses’ continuous professional development. Literature showed a strong evidence of the increased access to the Internet by nurses to retrieve information related to clinical practice, which in turns enhance the quality of care and communication among nurses.


Author(s):  
Sneha. S. Jain ◽  
Sachin. S. Bhosle ◽  
Vinayak. I. Pujari

The world is growing fast with the technology. Due to the use of information technology is increased; every activity may have to perform on the computers. The one roof covers the huge activities in the information technology. The internet has bounded the core group of people. There are the people are using social media to connect with the people in the entire world. The Social media is used to viral messages over the internet. As the social media playing the very important role in accessing and providing the related information. There are many sources of social media which are used to communication on the internet. In that Twitter, YouTube, Whatsapp, Facebook etc. are the common using applications which people are using for communicate over the internet. These application can operated from the another applications through computer. Some social media applications provide the developer tool to perform such development operations.


Crisis ◽  
2017 ◽  
Vol 38 (3) ◽  
pp. 207-209 ◽  
Author(s):  
Florian Arendt ◽  
Sebastian Scherr

Abstract. Background: Research has already acknowledged the importance of the Internet in suicide prevention as search engines such as Google are increasingly used in seeking both helpful and harmful suicide-related information. Aims: We aimed to assess the impact of a highly publicized suicide by a Hollywood actor on suicide-related online information seeking. Method: We tested the impact of the highly publicized suicide of Robin Williams on volumes of suicide-related search queries. Results: Both harmful and helpful search terms increased immediately after the actor's suicide, with a substantial jump of harmful queries. Limitations: The study has limitations (e.g., possible validity threats of the query share measure, use of ambiguous search terms). Conclusion: Online suicide prevention efforts should try to increase online users' awareness of and motivation to seek help, for which Google's own helpline box could play an even more crucial role in the future.


Author(s):  
Eter Basar ◽  
Ankur Pan Saikia ◽  
L. P. Saikia

Data Technology industry has been utilizing the customary social databases for around 40 years. Be that as it may, in the latest years, there was a generous transformation in the IT business as far as business applications. Remain solitary applications have been supplanted with electronic applications, conferred servers with different proper servers and committed stockpiling with framework stockpiling. Lower expense, adaptability, the model of pay-as-you-go are the fundamental reasons, which caused the conveyed processing are transformed into reality. This is a standout amongst the hugest upsets in Information Technology, after the development of the Internet. Cloud databases, Big Table, Sherpa, and SimpleDB are getting the opportunity to be more natural to groups. They featured the hindrances of current social databases as far as convenience, adaptability, and provisioning. Cloud databases are basically utilized for data raised applications, for example, stockpiling and mining of gigantic information or business information. These applications are adaptable and multipurpose in nature. Various esteem based data organization applications, such as managing an account, online reservation, e-exchange and stock organization, and so on are delivered. Databases with the help of these sorts of uses need to incorporate four essential highlights: Atomicity, Consistency, Isolation, and Durability (ACID), in spite of the fact that utilizing these databases isn't basic for utilizing as a part of the cloud. The objective of this paper is to discover the points of interest and disservices of databases generally utilized in cloud frameworks and to survey the difficulties in creating cloud databases


Sign in / Sign up

Export Citation Format

Share Document