Copyright Infringement on Music, Movie and Software in the Internet (Illegal File Sharing and Fair Use Practices in Indonesia, Japan and United States of America)
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
8. Putting Artists and Guardians of Indigenous Works First
8 Putting Artists and Guardians of Indigenous Works First: Towards a Restricted Scope of Freedom of Panorama in the Asian Pacific Region Jonathan Barrett1 1 Introduction ‘Freedom of panorama’2 permits use of certain copyright-protected works on public display; for example, anyone may publish and sell postcards of a public sculpture.3 The British heritage version of freedom of panorama, which is followed by many jurisdictions in the Asian Pacific region,4 applies 1 Copyright © 2018 Jonathan Barrett. Senior Lecturer, School of Accounting and Commercial Law, Victoria University of Wellington. 2 The term ‘freedom of panorama’ recently came into common usage in English. It appears to be derived from the Swiss German ‘Panoramafreiheit’, which itself has only been used since the 1990s, despite the exemption existing in German law for 170 years. See Mélanie Dulong de Rosnay and Pierre-Carl Langlais ‘Public artworks and the freedom of panorama controversy: a case of Wikimedia influence’ (2017) 6(1) Internet Policy Review. 3 Incidental copying of copyright works is not considered to be a feature of freedom of panorama. See Copyright Act 1994 (NZ), s 41. 4 Asian Pacific countries are those west of the International Date Line (IDL), as defined for the purposes of the Asian Pacific Copyright Association (APCA) in Brian Fitzgerald and Benedict Atkinson (eds) Copyright Future Copyright Freedom: Marking the 40 Year Anniversary of the Commencement of Australia’s Copyright Act 1968 (Sydney University Press, Sydney, 2011) at 236. 229 MAkING COPyRIGHT WORk FOR THE ASIAN PACIFIC? to buildings, sculptures and works of artistic craftsmanship on permanent display in a public place or premises open to the public.5 These objects may be copied in two dimensions, such as photographs. -
Uila Supported Apps
Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage. -
What Is Peer-To-Peer File Transfer? Bandwidth It Can Use
sharing, with no cap on the amount of commonly used to trade copyrighted music What is Peer-to-Peer file transfer? bandwidth it can use. Thus, a single NSF PC and software. connected to NSF’s LAN with a standard The Recording Industry Association of A peer-to-peer, or “P2P,” file transfer 100Mbps network card could, with KaZaA’s America tracks users of this software and has service allows the user to share computer files default settings, conceivably saturate NSF’s begun initiating lawsuits against individuals through the Internet. Examples of P2P T3 (45Mbps) internet connection. who use P2P systems to steal copyrighted services include KaZaA, Grokster, Gnutella, The KaZaA software assesses the quality of material or to provide copyrighted software to Morpheus, and BearShare. the PC’s internet connection and designates others to download freely. These services are set up to allow users to computers with high-speed connections as search for and download files to their “Supernodes,” meaning that they provide a How does use of these services computers, and to enable users to make files hub between various users, a source of available for others to download from their information about files available on other create security issues at NSF? computers. users’ PCs. This uses much more of the When configuring these services, it is computer’s resources, including bandwidth possible to designate as “shared” not only the and processing capability. How do these services function? one folder KaZaA sets up by default, but also The free version of KaZaA is supported by the entire contents of the user’s computer as Peer to peer file transfer services are highly advertising, which appears on the user well as any NSF network drives to which the decentralized, creating a network of linked interface of the program and also causes pop- user has access, to be searchable and users. -
A Comparison of the US Supreme Court's <I
Columbia Law School Scholarship Archive Faculty Scholarship Faculty Publications 2006 Inducers and Authorisers: A Comparison of the US Supreme Court's Grokster Decision and the Australian Federal Court's KaZaa Ruling Jane C. Ginsburg Columbia Law School, [email protected] Sam Ricketson [email protected] Follow this and additional works at: https://scholarship.law.columbia.edu/faculty_scholarship Part of the Comparative and Foreign Law Commons, Entertainment, Arts, and Sports Law Commons, and the Intellectual Property Law Commons Recommended Citation Jane C. Ginsburg & Sam Ricketson, Inducers and Authorisers: A Comparison of the US Supreme Court's Grokster Decision and the Australian Federal Court's KaZaa Ruling, MEDIA & ARTS LAW REVIEW, VOL. 11, P. 1, 2006; U OF MELBOURNE LEGAL STUDIES RESEARCH PAPER NO. 144; COLUMBIA PUBLIC LAW RESEARCH PAPER NO. 06-105 (2006). Available at: https://scholarship.law.columbia.edu/faculty_scholarship/1401 This Working Paper is brought to you for free and open access by the Faculty Publications at Scholarship Archive. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Scholarship Archive. For more information, please contact [email protected]. MELBOURNE LAW SCHOOL Legal Studies Research Paper Studies Paper No. 144 And COLUMBIA LAW SCHOOL Public Law and Legal Theory Research Paper Series Paper No. 06-105 Inducers and Authorisers: A Comparison of the US Supreme Court’s Grokster Decision and the Australian Federal Court’s KaZaa Ruling PROFESSOR JANE GINSBURG COLUMBIA LAW SCHOOL -And- PROFESSOR SAM RICKETSON UNIVERSITY OF MELBOURNE This paper can be downloaded without charge from the Social Science Research Network Electronic Library at: http://ssrn.com/abstract=888928. -
Importing Kazaa - Exporting Grokster Graeme W
Santa Clara High Technology Law Journal Volume 22 | Issue 3 Article 7 2006 Importing Kazaa - Exporting Grokster Graeme W. Austin Follow this and additional works at: http://digitalcommons.law.scu.edu/chtlj Part of the Law Commons Recommended Citation Graeme W. Austin, Importing Kazaa - Exporting Grokster, 22 Santa Clara High Tech. L.J. 577 (2005). Available at: http://digitalcommons.law.scu.edu/chtlj/vol22/iss3/7 This Symposium is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara High Technology Law Journal by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. IMPORTING KAZAA - EXPORTING GROKSTER Graeme W. Austint I. INTRODUCTION From reading the opinions of the Supreme Court in MGM v. Grokster,1 one might be forgiven for thinking that the legal issues generated by the advent of Peer-to-Peer (P2P) products and services are entirely domestic concerns. 2 The Grokster opinions neither take account of the global dissemination of P2P products and services nor acknowledge the broad geographic dispersion of many of those primary infringements the defendants allegedly induced. But the international aspects of P2P litigation may not remain mere back story for long; they may become an important aspect of the arduous battle that continues between the copyright industries and those who seek to develop new technologies that facilitate the copying and distribution of digital content. Users of P2P products and services are "everywhere around the world."'3 Technology entrepreneurs and their t J. -
View the Dichotomies in Computer Game Studies in More Detail
Florida State University Libraries Electronic Theses, Treatises and Dissertations The Graduate School 2008 A Burkean Analysis on the Relationship of the Image to Player Motivation in First- Person Shooter Games Toby McCall Follow this and additional works at the FSU Digital Library. For more information, please contact [email protected] FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCES A BURKEAN ANALYSIS ON THE RELATIONSHIP OF THE IMAGE TO PLAYER MOTIVATION IN FIRST-PERSON SHOOTER GAMES By TOBY MCCALL A Thesis submitted to the Department of English in partial fulfillment of the requirements for the degree of Master of Arts Degree Awarded: Summer, 2008 Copyright © 2008 Toby McCall All Rights Reserved The members of the Committee approve the thesis of Toby McCall defended on March 26, 2008. _______________________________ Kathleen Yancey Professor Directing Thesis _______________________________ Phil Steinberg Outside Committee Member _______________________________ Kristie Fleckenstein Committee Member _______________________________ Michael Neal Committee Member Approved: _______________________________ Ralph Berry Chair, Department of English The Office of Graduate Studies has verified and approved the above named committee members. ii I dedicate this work to my mother Joseyvette Jackson, who sacrificed much of her own life so that I might have opportunities she did not. Thanks Mom. iii ACKNOWLEDGMENTS I would like to thank my committee for their feedback and encouragement during this process, especially Kathleen Blake-Yancey who kept me sane and on track despite her own busy schedule; Ian Bogost, Steffen P. Walz and Noah Wardrip-Fruin for their input and time; my brother for his unending support; and my friends Chris Findeisen (Knuckles Malloy), Brianna Noll (Icechest Jones) and Dustin Atkinson (KGB Fontenot) for reminding me to relax, have fun, and play Rock Band; to Kelly Powers for his friendship and guidance. -
Orphan Works and Mass Digitization Report
united states copyright office Orphan Works and Mass Digitization a report of the register of copyrights june 2015 united states copyright office Orphan Works and Mass Digitization a report of the register of copyrights june 2015 U.S. Copyright Office Orphan Works and Mass Digitization ACKNOWLEDGMENTS This Report reflects the dedication and expertise of the Office of Policy and International Affairs at the U.S. Copyright Office. Karyn Temple Claggett, Associate Register of Copyrights and Director of Policy and International Affairs, managed the overall study process, including coordination of the public comments and roundtable hearings, analysis, drafting, and recommendations. I am also extremely grateful to Senior Counsel Kevin Amer and Attorney- Advisor Chris Weston (Office of the General Counsel), who served as the principal authors of the Report and made numerous important contributions throughout the study process. Senior Advisor to the Register Catie Rowland and Attorney-Advisor Frank Muller played a significant role during the early stages of the study, providing research, drafting, and coordination of the public roundtable discussions. In addition, Ms. Rowland and Maria Strong, Deputy Director of Policy and International Affairs, reviewed a draft of the Report and provided important insights. Barbara A. Ringer Fellows Michelle Choe and Donald Stevens provided helpful research and analysis for several sections of the Report. Senior Counsel Kimberley Isbell, Counsels Brad Greenberg and Aurelia Schultz, Attorney-Advisors Katie Alvarez and Aaron Watson, and Law Clerk Konstantia Katsouli contributed valuable research and citation assistance. Finally, I would like to thank the many interested parties who participated in the public roundtables and submitted written comments to the Office. -
IPFS and Friends: a Qualitative Comparison of Next Generation Peer-To-Peer Data Networks Erik Daniel and Florian Tschorsch
1 IPFS and Friends: A Qualitative Comparison of Next Generation Peer-to-Peer Data Networks Erik Daniel and Florian Tschorsch Abstract—Decentralized, distributed storage offers a way to types of files [1]. Napster and Gnutella marked the beginning reduce the impact of data silos as often fostered by centralized and were followed by many other P2P networks focusing on cloud storage. While the intentions of this trend are not new, the specialized application areas or novel network structures. For topic gained traction due to technological advancements, most notably blockchain networks. As a consequence, we observe that example, Freenet [2] realizes anonymous storage and retrieval. a new generation of peer-to-peer data networks emerges. In this Chord [3], CAN [4], and Pastry [5] provide protocols to survey paper, we therefore provide a technical overview of the maintain a structured overlay network topology. In particular, next generation data networks. We use select data networks to BitTorrent [6] received a lot of attention from both users and introduce general concepts and to emphasize new developments. the research community. BitTorrent introduced an incentive Specifically, we provide a deeper outline of the Interplanetary File System and a general overview of Swarm, the Hypercore Pro- mechanism to achieve Pareto efficiency, trying to improve tocol, SAFE, Storj, and Arweave. We identify common building network utilization achieving a higher level of robustness. We blocks and provide a qualitative comparison. From the overview, consider networks such as Napster, Gnutella, Freenet, BitTor- we derive future challenges and research goals concerning data rent, and many more as first generation P2P data networks, networks. -
Simulacijski Alati I Njihova Ograničenja Pri Analizi I Unapređenju Rada Mreža Istovrsnih Entiteta
SVEUČILIŠTE U ZAGREBU FAKULTET ORGANIZACIJE I INFORMATIKE VARAŽDIN Tedo Vrbanec SIMULACIJSKI ALATI I NJIHOVA OGRANIČENJA PRI ANALIZI I UNAPREĐENJU RADA MREŽA ISTOVRSNIH ENTITETA MAGISTARSKI RAD Varaždin, 2010. PODACI O MAGISTARSKOM RADU I. AUTOR Ime i prezime Tedo Vrbanec Datum i mjesto rođenja 7. travanj 1969., Čakovec Naziv fakulteta i datum diplomiranja Fakultet organizacije i informatike, 10. listopad 2001. Sadašnje zaposlenje Učiteljski fakultet Zagreb – Odsjek u Čakovcu II. MAGISTARSKI RAD Simulacijski alati i njihova ograničenja pri analizi i Naslov unapređenju rada mreža istovrsnih entiteta Broj stranica, slika, tablica, priloga, XIV + 181 + XXXVIII stranica, 53 slike, 18 tablica, 3 bibliografskih podataka priloga, 288 bibliografskih podataka Znanstveno područje, smjer i disciplina iz koje Područje: Informacijske znanosti je postignut akademski stupanj Smjer: Informacijski sustavi Mentor Prof. dr. sc. Željko Hutinski Sumentor Prof. dr. sc. Vesna Dušak Fakultet na kojem je rad obranjen Fakultet organizacije i informatike Varaždin Oznaka i redni broj rada III. OCJENA I OBRANA Datum prihvaćanja teme od Znanstveno- 17. lipanj 2008. nastavnog vijeća Datum predaje rada 9. travanj 2010. Datum sjednice ZNV-a na kojoj je prihvaćena 18. svibanj 2010. pozitivna ocjena rada Prof. dr. sc. Neven Vrček, predsjednik Sastav Povjerenstva koje je rad ocijenilo Prof. dr. sc. Željko Hutinski, mentor Prof. dr. sc. Vesna Dušak, sumentor Datum obrane rada 1. lipanj 2010. Prof. dr. sc. Neven Vrček, predsjednik Sastav Povjerenstva pred kojim je rad obranjen Prof. dr. sc. Željko Hutinski, mentor Prof. dr. sc. Vesna Dušak, sumentor Datum promocije SVEUČILIŠTE U ZAGREBU FAKULTET ORGANIZACIJE I INFORMATIKE VARAŽDIN POSLIJEDIPLOMSKI ZNANSTVENI STUDIJ INFORMACIJSKIH ZNANOSTI SMJER STUDIJA: INFORMACIJSKI SUSTAVI Tedo Vrbanec Broj indeksa: P-802/2001 SIMULACIJSKI ALATI I NJIHOVA OGRANIČENJA PRI ANALIZI I UNAPREĐENJU RADA MREŽA ISTOVRSNIH ENTITETA MAGISTARSKI RAD Mentor: Prof. -
Beat the Heat! Come Inside! Cool
PAGE TWENTY-FOUR F R ID A Y , J U L Y 18, 1989 Manrbt'Btipr lEtic^rnttg iimlb ATHRge Dait)r N et P raw Run Var The Week Ended June M, IMk The Weather Fair, .(Cooler, less humid to >15,459 day. Low In the 6(>s. High Sun day 80 to 85. ■ ManeheUer— 4 City of ViUofe Charm 1 VOL. LXXXVin. NO. 246 (SIXTEEN PAGES—TV SECnON) MANCHESTER, CONN., SA-TURDAY, JULY 19, 1969 (TMeatned AdvertWng on Page 1 8 ) PRICE TEN CENTS 8'V*-' A 'v\ V: \*/ On Tarfret ^ r ^ C \ O f ^ r i ( .............................f l l ( / 0........................................ \ .... ................................................ ........... BEAT THE HEAT! COME INSIDE! COOL OFR Moon Blots Out Sun Apollo ]^ears Goal; V SAVE WITH THESE VALUABLE COUPONS TONIGHT and SATURDAY ■sS' By HOWARD BENEDICT two days of g r ^ t human ad He also reported a brilliant AP Aerospace Writer DON'T FORGET TO CHECK ALL STORES — IF YOU FIND YOUR venture. solar corona as the moon ec SPACE CENTER, Houshm As they darted Into an arejs lipsed all but the halo of gases (A P ) — Apollo U’b explorers where the moon blotted out the surrounding the stki. NAME POSTED — YOU'RE A LUCKY WINNER! raced Into the shadow of the sunUght at 8:60 a.m. EOT, com “ It. looks like an eerie sight," moon today and reported a mander Nell A. Armstrong re the Apollo H commander said. spectacular final sighting of ported picking out lunar fea Armstrong, Edwin E. Aldrln their tatget as they prepared tures Illuminated by light re Jr. -
Diapositiva 1
TRANSFERENCIA O DISTRIBUCIÓN DE ARCHIVOS ENTRE IGUALES (peer-to-peer) Características, Protocolos, Software, Luis Villalta Márquez Configuración Peer-to-peer Una red peer-to-peer, red de pares, red entre iguales, red entre pares o red punto a punto (P2P, por sus siglas en inglés) es una red de computadoras en la que todos o algunos aspectos funcionan sin clientes ni servidores fijos, sino una serie de nodos que se comportan como iguales entre sí. Es decir, actúan simultáneamente como clientes y servidores respecto a los demás nodos de la red. Las redes P2P permiten el intercambio directo de información, en cualquier formato, entre los ordenadores interconectados. Peer-to-peer Normalmente este tipo de redes se implementan como redes superpuestas construidas en la capa de aplicación de redes públicas como Internet. El hecho de que sirvan para compartir e intercambiar información de forma directa entre dos o más usuarios ha propiciado que parte de los usuarios lo utilicen para intercambiar archivos cuyo contenido está sujeto a las leyes de copyright, lo que ha generado una gran polémica entre defensores y detractores de estos sistemas. Las redes peer-to-peer aprovechan, administran y optimizan el uso del ancho de banda de los demás usuarios de la red por medio de la conectividad entre los mismos, y obtienen así más rendimiento en las conexiones y transferencias que con algunos métodos centralizados convencionales, donde una cantidad relativamente pequeña de servidores provee el total del ancho de banda y recursos compartidos para un servicio o aplicación. Peer-to-peer Dichas redes son útiles para diversos propósitos. -
Reexamining Copyright's Incentives--Access Paradigm
Texas A&M University School of Law Texas A&M Law Scholarship Faculty Scholarship 4-1996 Reexamining Copyright's Incentives--Access Paradigm Glynn S. Lunney Jr Texas A&M University School of Law, [email protected] Follow this and additional works at: https://scholarship.law.tamu.edu/facscholar Part of the Law Commons Recommended Citation Glynn S. Lunney Jr, Reexamining Copyright's Incentives--Access Paradigm, 49 Vand. L. Rev. 483 (1996). Available at: https://scholarship.law.tamu.edu/facscholar/530 This Article is brought to you for free and open access by Texas A&M Law Scholarship. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of Texas A&M Law Scholarship. For more information, please contact [email protected]. VANDERBILT LAW REVIEW VOLUME 49 APRIL 1996 NUMBER 3 Reexamining Copyright's Incentives- Access Paradigm Glynn S. Lunney, Jr.* I. INTRODUCTION ................................................................... 485 II. THE INCENTIVES-ACCESS PARADIGM INTRODUCED ...........492 III. THE PARADIGM EXPLORED: THE ELEMENTS OF COPYRIGHT 499 A. Defining a Work's Unprotected Aspects ................. 504 1. Elements Left Unprotected to Ensure the Creation of Future Works .......................... 509 2. Aspects Left Unprotected to Avoid Undue M onopolization ........................................... 517 3. Summary: Access, Ideas, and Expression 525 B. Defining the Similarity Necessary to Establish Infringem ent ........................................................... 526 1. The Degree of Similarity Necessary to Establish an Infringement ......................... 526 2. The Type of Similarity Required to Establish an Infringing Appropriation ......533 C. Defining Fair Uses ................................................. 546 D. Summary of the Incentives-Access Paradigm........ 552 IV. AN INTERNAL CRITIQUE OF THE INCENTIVES-ACCESS PARADIGM .......................................................................... 554 A. Paradox: Incentive and Deadweight Loss............