scholarly journals Peer production in the Internet and unauthorized copying of an intellectual property in the bit-torrent network

2016 ◽  
Vol 7 (3) ◽  
pp. 501
Author(s):  
Sławomir Czetwertyński

This paper deals with the phenomenon of  peer production in the context of unauthorized copying of information goods. Acc. to Yochai Benkler, it is a form of production operation based on a community. It is widely applied in the Internet and consequently, such information goods as GNU/Linux and Wikipedia have been established. Although the peer production has promoted growth in importance of, among others, free software or an open source initiative, it is also related to unauthorized copying of an intellectual property commonly called Internet piracy. The huge scale of this phenomenon, which is nearly 24% of entire Internet traffic, must not be ignored. In the paper a hypothesis has been put forward that low efficiency of counteracting of intellectual property unauthorized copying results from that fact that, to a great extent, it is generated in a process of the peer production. In turn, the goal of the paper is verification of the thesis in the progress of considerations regarding the nature of both the peer production and the unauthorized copying. A research field was limited to a P2P file exchange network based on a BitTorrent protocol.

Author(s):  
Микола Логвиненко ◽  
Анна Диковець

 The article investigates the problem of copyright piracy. The concept of Internet piracy is disclosed, according to which this phenomenon can be considered, both in the broad, and in the narrow sense. Piracy in the narrow sense — activities related to the manufacture and mplementation of counterfeit copies. Considering piracy in the broad sense, it can be argued that the basis of this activity is the use of the object of copyright, without the permission of the right holders in order to profit. The signs of Internet piracy are identified, including: illegal use of copyrighted objects; realization of objects of copyright by publishing, reproduction, distribution and distribution without the consent of the author (the copyright holder); causing damage to the interests of the author (the right holder); commercialization; gaining profit or moral gain illegally. The classification of piracy has been carried out, which confirms the fact that the placement of copyright objects in the «network» is currently a very widespread phenomenon. Accordingly, piracy can be classified as: activity related to the partially legal disclosure of the object of copyright; activity that is related to the falsification of the copyright object; activities that are reflected in the illegal distribution of copies of the copyright object. The main ways of protecting copyright from piracy in the Internet in Ukraine and the problem issues in this area are determined. Accordingly, legal remedies can be applied in two forms — jurisdictional and non-jurisdictional. Jurisdictional form provides that the author (legal owner) has the right to apply to the court or other  competent or state bodies for the application of the necessary measures for the restoration of violated rights and the termination of the offense. Non-divisive way of protecting (self-defense) — the actions of a person in the protection of copyright, carried out by them on their own. Having analyzed the methods of protection, it was concluded that the non-irisbased form of protection provides more expeditious and cost-effective protection of the rights of the author. Jurisdictional way of protection is characterized by less efficiency.Because a considerable amount of time is spent on filing an action in court, hearing a complaint, making a decision and, finally, implementing this decision. The technical component of the non-jurisdiction form of protection is analyzed. Namely, technical methods of protection are defined, which can be attributed to: self-destruction of thecopyright object in case of illegal copying; placement of an object with limited functionality; use of watermarks; indication of copyrights on publications; etc. The proposals for amending the current legislation in the field of protection of copyright from piracy in the Internet are formulated. The changes should concern provisions affecting both legal and socioeconomic issues, namely: imperfection of legislation in the field of intellectual property rights (impossibility of reliable establishment of an offender who deals with Internet piracy; insufficiency of evidence base of copyright infringement; absence of judges and civil servants of specialist knowledge in the field of intellectual property rights); a highprice that makes it impossible to sell licensed products, hence, the number of sites that contain unlicensed products increases; insufficient level of financial provision of specialists who are professionals in the field of intellectual property; etc.


2019 ◽  
Vol 118 (1) ◽  
pp. 36-41
Author(s):  
Jung-Woo Lee ◽  
Seung-Cheon Kim ◽  
Sung-Hoon Kim ◽  
Jin-Ho Lim

Background/Objectives: In this study, research to improve efficiency of online advertising market, we would like to propose a new performance index called "Leakage Ratio" which can increase the efficiency of advertisement. Methods/Statistical analysis: Naver, the Internet portal site in Korea, is the most influential medium for online keyword search advertising. In this study, Leakage Ratio management is applied to online keyword search ads for five medium and large size online shopping malls at Naver. Based on the performance trend of each search keyword, we tried to improve the efficiency of the whole advertisement by changing the bid of the low efficiency keyword.


2019 ◽  
Vol 118 (8) ◽  
pp. 308-314
Author(s):  
Jung-Woo Lee ◽  
Seung- Cheon ◽  
Sung-Hoon Kim ◽  
Jin-Ho Lim

In this study, research to improve efficiency of online advertising market, we would like to propose a new performance index called "Leakage Ratio" which can increase the efficiency of advertisement. Methods/Statistical analysis: Naver, the Internet portal site in Korea, is the most influential medium for online keyword search advertising. In this study, Leakage Ratio management is applied to online keyword search ads for five medium and large size online shopping malls at Naver. Based on the performance trend of each search keyword, we tried to improve the efficiency of the whole advertisement by changing the bid of the low efficiency keyword.


2021 ◽  
Vol 11 (15) ◽  
pp. 7063
Author(s):  
Esmaeel Rezaee ◽  
Ali Mohammad Saghiri ◽  
Agostino Forestiero

With the increasing growth of different types of data, search engines have become an essential tool on the Internet. Every day, billions of queries are run through few search engines with several privacy violations and monopoly problems. The blockchain, as a trending technology applied in various fields, including banking, IoT, education, etc., can be a beneficial alternative. Blockchain-based search engines, unlike monopolistic ones, do not have centralized controls. With a blockchain-based search system, no company can lay claims to user’s data or access search history and other related information. All these data will be encrypted and stored on a blockchain. Valuing users’ searches and paying them in return is another advantage of a blockchain-based search engine. Additionally, in smart environments, as a trending research field, blockchain-based search engines can provide context-aware and privacy-preserved search results. According to our research, few efforts have been made to develop blockchain use, which include studies generally in the early stages and few white papers. To the best of our knowledge, no research article has been published in this regard thus far. In this paper, a survey on blockchain-based search engines is provided. Additionally, we state that the blockchain is an essential paradigm for the search ecosystem by describing the advantages.


Nanoscale ◽  
2021 ◽  
Author(s):  
Yong Kang ◽  
Zhengjun Li ◽  
Fengying Lu ◽  
Zhiguo Su ◽  
Xiaoyuan Ji ◽  
...  

Two dimensional black phosphorus nanosheets (BP NS) have attracted plenty of attentions in the research field of cancer photonic therapy. However, the poor stability and relatively low efficiency in reactive...


Author(s):  
Julia Hörnle

Jurisdiction is the foundational concept for both national laws and international law as it provides the link between the sovereign government and its territory, and ultimately its people. The internet challenges this concept at its root: data travels across the internet without respecting political borders or territory. This book is about this Jurisdictional Challenge created by internet technologies. The Jurisdictional Challenge arises as civil disputes, criminal cases, and regulatory action span different countries, rising questions as to the international competence of courts, law enforcement, and regulators. From a technological standpoint, geography is largely irrelevant for online data flows and this raises the question of who governs “YouTubistan.” Services, communication, and interaction occur online between persons who may be located in different countries. Data is stored and processed online in data centres remote from the actual user, with cloud computing provided as a utility. Illegal acts such as hacking, identity theft and fraud, cyberespionage, propagation of terrorist propaganda, hate speech, defamation, revenge porn, and illegal marketplaces (such as Silkroad) may all be remotely targeted at a country, or simply create effects in many countries. Software applications (“apps”) developed by a software developer in one country are seamlessly downloaded by users on their mobile devices worldwide, without regard to applicable consumer protection, data protection, intellectual property, or media law. Therefore, the internet has created multi-facetted and complex challenges for the concept of jurisdiction and conflicts of law. Traditionally, jurisdiction in private law and jurisdiction in public law have belonged to different areas of law, namely private international law and (public) international law. The unique feature of this book is that it explores the notion of jurisdiction in different branches of “the” law. It analyses legislation and jurisprudence to extract how the concept of jurisdiction is applied in internet cases, taking a comparative law approach, focusing on EU, English, German, and US law. This synthesis and comparison of approaches across the board has produced new insights on how we should tackle the Jurisdictional Challenge. The first three chapters explain the Jurisdictional Challenge created by the internet and place this in the context of technology, sovereignty, territory, and media regulation. The following four chapters focus on public law aspects, namely criminal law and data protection jurisdiction. The next five chapters are about private law disputes, including cross-border B2C e-commerce, online privacy and defamation disputes, and internet intellectual property disputes. The final chapter harnesses the insights from the different areas of law examined.


2018 ◽  
Vol 14 (2) ◽  
pp. NP1-NP2

James E.K. Parker, Towards an Acoustic Jurisprudence: Law and the Long Range Acoustic Device, Law, Culture and the Humanities (LCH). DOI: 10.1177/1743872115615502 The following corrections have been made to the article: Under heading III.1, another paragraph has been added. This paragraph begins ‘Whereas normal loudspeaker works…’ Under heading III.2, a paragraph has been edited: ‘In effect, what ATC did with the LRAD…’ Under heading III.2, the first sentence of the last paragraph has been expanded to clarify that the G-20 summit was held in Pittsburgh: The LRAD seems to have been used by police for the first time in Georgia in 2007, before receiving its first and most notorious outing on American soil in September 2009 at protests relating to the G-20 Summit being held in Pittsburgh.66 Under heading III.4, the sentence below in the second paragraph has been changed as follows: The law of property provides the conditions for the circulation and ownership of knowledge that enable developments in the science of acoustics at a US university in the 1950s to re-emerge as failed commercial prototypes in Japan in the 1980s only to be taken up again in 1996 by ACT before being patented, trademarked and marketed first as HSS® and then as the LRAD.82 Under heading III.4, the following has been added to the end of the paragraph ‘If the LRAD was originally imagined…’: Not that the presiding judge in the Toronto case would know however. In his discussion of a deposition by Professor David Wood, of Queen’s University, relating to ‘videos posted on the internet’ documenting the LRAD’s use at Pittsburgh, Justice Brown notes that, ‘unfortunately, Professor Wood did not attach any of those media reports or videos as exhibits to his affidavit. As a result, I cannot attach any weight to his statements.’93 Indeed, it’s not clear that any recordings of an LRAD in action were ever actually played in court. As far as I know, the LRAD has yet to feature in the ‘judicial soundscape’. In the conclusion the word ‘copyright’ has been replaced with ‘intellectual property’: The LRAD is the product of diverse institutions, jurisdictions and areas of doctrine, stretching from the law of intellectual property through the law of war to constitutional and labor law. The references and reference numbers have been updated accordingly. All the subsequent versions of the article will be corrected.


Author(s):  
Юрий Юмашев ◽  
Yuriy Yumashev ◽  
Елена Постникова ◽  
Elena Postnikova

The article deals with international law aspects of the GCL. To this aim firstly the international conventions on copyright law are analyzed, in particular: the Berne Convention for the Protection of Literary and Artistic Works in the wording of the Paris Act of 1971, the Convention on the Establishment of the World Intellectual Property Organization of 1967, the Convention for the Protection of Performers, Producers of Phonograms and Broadcasting Organizations of 1961 and Aspects of intellectual property rights (TRIPS) 1994. There is also an analysis of the EU copyright law in terms of its correlation with the law of the EU member-states and an assessment of its evolution. It is emphasized that the core fact of origin of authorship is determined on the basis of the national legislation of the Member-States. Special attention is paid to the scope of the “principle of exhausted rights”. The article also touches upon the aspect of private international law. Particular attention is paid to the legal regulation of the Internet, including Internet providers, and its impact on the formation of the GCL. The problem of combating Internet piracy is also raised, as copyright infringement often occurs in relation to works published online. In addition, the article revealed what changes were made to the GCL to comply with EU law (including secondary law acts and the practice of the EU Court). The result of the study is, among other things, the conclusion that special legal mechanisms should be developed to regulate new forms of selling works that have emerged as a result of technological progress and in the near future the Internet will undoubtedly form ways for the further development of the GCL. However, this process can negatively affect the leading role of the author as a creative person.


Sign in / Sign up

Export Citation Format

Share Document