Welcome to the Globethics.net Library!



    Троцюк, Ніна Валеріївна (European Science Scientific journal 3/2018, 2018-07-03)
    The article investigates separate problems of intellectual property protection on the Internet based on the analysis of the Ukrainian acts of legislation provisions as well as defines the remedies. Methods of investigation: both general- scientific and specific-legal methods of theoretical knowledge became the basis of the research. The essence of the Internet as a global net is defined through the methods of comparison and analysis in relation to the technical method. By their means, the author has also found out the peculiarities of intellectual property
 rights security and protection within the sphere of the Internet. The use of technical method enabled to determine the main types of copyright infringement on the Internet. Through the use of expectation method, the author analyses the questions of copyright infringement recording on the Internet and offers the ways of improvement of intellectual property rights legal protection within this Net. Results: problem-solving ways in the sphere of copyright protection and neighboring rights on the Internet are outlined. Discussion: ensuring proper and effective level of intellectual property rights protection on the Internet as one of the strategic directions of national legislation reforming and law enforcement practice within the sphere of copyright and neighboring rights.
  • Peer-to-Peer File Sharing and Copyright: What Could Be the Role of Collective Management?

    Dusollier, Severine; Colin, Caroline (2011)
    Whether originating from copyright scholarship or from legislative discussion, proposals to authorize the transfer of copyrighted works through peer-to-peer (“P2P“ ) networks have been abundant in the last ten years as an alternative to seemingly difficult to enforce and unsuccessful repression-based solutions. As Neil Netanel described it: P2P controversy is a story of the copyright industries‘ increasingly brazen— some say desperate—attempts to shut down P2P file-swapping networks, disable P2P technology and shift the costs of control onto third parties, including telecommunications companies, consumer electronics manufacturers, corporate employers, universities, new media entrepreneurs and the taxpayers.
  • The copyright infringement liability of online and Internet service providers : hearing before the Committee on the Judiciary, One Hundred Fifth Congress, first session, on S. 1146 ... September 4, 1997.

    United States. Congress. Senate. Committee on the Judiciary. (Washington : U.S. G.P.O. : For sale by the U.S. G.P.O., Supt. of Docs., Congressional Sales Office,, 1998)
    "Serial no. J-105-44."
  • Web site blocking as a proxy of policy alignment

    Merrill, Nick; Weber, Steven (University of Illinois at Chicago University Library, 2020-12-12)
    This work introduces a new metric of policy alignment between states: Web site blocking. Intuitively, we measure the degree to which states block similar content. This metric speaks to the flow of information in the digital layer of international politics, an element of international trade and cooperation that existing metrics fail to capture. In addition, our measure can be constantly scraped and updated, offering a higher temporal resolution than existing metrics. Our work suggests a link between Internet governance and other issues in international relations (e.g., trade). Since our metric can be updated in real time, future work could use our metric to detect geopolitical shifts more rapidly than would otherwise be possible.
  • A New Distributed Chinese Wall Security Policy Model

    Fehis, Saad; Nouali, Omar; Kechadi, Tahar (Association of Digital Forensics, Security and Law, 2018-03-21)
    The application of the Chinese wall security policy model (CWSPM ) to control the informationflows between two or more competing and/or conflicting companies in cloud computing(Multi-tenancy) or in the social network, is a very interesting solution.The main goal of the Chinese Wall Security Policy is to build a wall between the datasetsof competing companies, and among the system subjects. This is done by the applying tothe subjects mandatory rules, in order to control the information flow caused between them.This problem is one of the hottest topics in the area of cloud computing (as a distributedsystem) and has been attempted in the past; however the proposed solutions cannot dealwith the composite information flows problem (e.g., a malicious Trojan horses problem),caused by the writing access rule imposed to the subject on the objects.In this article, we propose a new CWSP model, based on the access query type of the subjectto the objects using the concepts of the CWSP. We have two types of walls placement, thefirst type consists of walls that are built around the subject, and the second around theobject. We cannot find inside each once wall two competing objects data. We showed thatthis mechanism is a good alternative to deal with some previous models limitations. Themodel is easy to implement in a distributed system (as Cloud-Computing). It is based on thetechnique of Object Oriented Programming (Can be used in Cloud computing Software asa service SaaS) or by using the capabilities as an access control in real distributed system

View more