WIPO) Treaties

Total Page:16

File Type:pdf, Size:1020Kb

WIPO) Treaties Durham E-Theses Protecting Copyright in the Digital Era in China: A Critical Analysis of the Relevant Law and Practice from a Comparative Perspective HUI, YUANYUAN How to cite: HUI, YUANYUAN (2016) Protecting Copyright in the Digital Era in China: A Critical Analysis of the Relevant Law and Practice from a Comparative Perspective, Durham theses, Durham University. Available at Durham E-Theses Online: http://etheses.dur.ac.uk/12171/ Use policy The full-text may be used and/or reproduced, and given to third parties in any format or medium, without prior permission or charge, for personal research or study, educational, or not-for-prot purposes provided that: • a full bibliographic reference is made to the original source • a link is made to the metadata record in Durham E-Theses • the full-text is not changed in any way The full-text must not be sold in any format or medium without the formal permission of the copyright holders. Please consult the full Durham E-Theses policy for further details. Academic Support Oce, Durham University, University Oce, Old Elvet, Durham DH1 3HP e-mail: [email protected] Tel: +44 0191 334 6107 http://etheses.dur.ac.uk 2 Protecting Copyright in the Digital Era in China: A Critical Analysis of the Relevant Law and Practice from a Comparative Perspective Yuanyuan Hui A thesis submitted for the degree of Doctor of Philosophy Durham Law School Durham University March 2016 TABLE OF CONTENTS CHAPTER 1 ........................................................................................................ 11 INTRODUCTION ................................................................................................. 11 Introduction to the Thesis and Overview of the Development of Copyright Protection ............................................................................................................ 11 1.1. Background Information ............................................................................ 11 1.2. Research Questions .................................................................................. 12 1.3. Research Framework ................................................................................ 15 1.4. Research Methodology.............................................................................. 19 The Development of Copyright Protection in China .............................................. 23 Exclusive Summary .......................................................................................... 23 2.1. Background Information ............................................................................ 24 2.1.1. The Origin of Copyright in China ............................................................ 24 2.1.2. The Development of Copyright Protection in China ................................ 30 2.2. International Conventions .......................................................................... 37 2.2.1. The Berne Convention ............................................................................ 37 2.2.2. Universal Copyright Convention ............................................................. 44 2.2.3. World Intellectual Property Organization (WIPO) Treaties ...................... 49 2.2.3.1. WCT .................................................................................................... 50 2.2.3.2. WPPT .................................................................................................. 52 2.2.3.3. WIPO and China ................................................................................. 54 2.2.4. Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) ............................................................................................................ 55 1 2.2.4.1. Origin of TRIPs .................................................................................... 55 2.2.4.2. The TRIPS Agreement in China .......................................................... 58 2.3. Conclusion ................................................................................................ 61 The Emergence of Peer-to-Peer Technology in the Digital Age: A Contemporary Challenge to Copyright Protection ....................................................................... 63 Exclusive Summary .......................................................................................... 63 3.1. Peer-to-Peer technology ............................................................................ 64 3.1.1. Introduction ............................................................................................ 64 3.1.2. The early stage of file sharing technology ............................................... 70 3.1.3. The modern development of file sharing technology ............................... 72 3.1.4. Peer-to-peer software distribution ........................................................... 80 3.2. Relevant Legislation on Peer-to-Peer Technology in Selected Countries .. 82 3.2.1. The U.S.A. .............................................................................................. 82 3.2.1.1. Copyright Law in the United States ...................................................... 87 3.2.1.2. The Digital Millennium Copyright Act of 1998 ...................................... 91 3.2.2. The United Kingdom ............................................................................... 98 3.2.2.1. The Statute of Anne........................................................................... 102 3.2.2.2. Copyright, Designs and Patents Act 1988 ......................................... 104 3.2.2.3. Digital Economy Act 2010.................................................................. 112 3.2.3. Canada ................................................................................................ 116 3.2.3.1. The Copyright Act of Canada ............................................................ 120 3.2.3.2. Bills to amend the Copyright Act ........................................................ 123 3.2.4. Australia ............................................................................................... 125 3.2.4.1. The Copyright Act 1968 ..................................................................... 128 3.2.4.2. Copyright Amendment (Digital Agenda) Act 2000 .............................. 131 2 3.2.5. China .................................................................................................... 134 3.2.5.1. Copyright Law of the People’s Republic of China .............................. 137 3.2.5.2. The PRC Registration of Copyright in Computer Software ................ 141 3.2.5.3. Regulation on the Protection of the Right to Network Dissemination of Information ..................................................................................................... 142 3.3. Conclusion .............................................................................................. 143 Unmasking the Normative Influence of History and Culture on the Gradual Development of Copyright Protection in China ................................................... 145 Exclusive Summary ........................................................................................ 145 4.1. Introduction ............................................................................................. 145 4.2. Copyright Protection in the Context of Chinese History and Culture ........ 147 4.2.1. Confucianism ....................................................................................... 148 4.2.2. Taoism ................................................................................................. 152 4.2.3. Traditional Cultural Notions .................................................................. 155 4.2.4. ‘Knowledge’ from a Chinese Perspective .............................................. 162 4.3. The Requirements of the New Epoch — Copyright Protection ................. 164 4.3.1. Political control ..................................................................................... 165 4.3.2. The rise of the Commercial Publishing Industry .................................... 171 4.3.3. Globalization in Modern China .............................................................. 189 4.4. Suggestions ............................................................................................ 200 4.4.1. Strengthening Legislation ..................................................................... 201 4.4.2. The Imposition of Tax ........................................................................... 201 4.4.3. Education ............................................................................................. 204 4.4.4. The Price of Copyrighted Work ............................................................. 208 4.5. Conclusion .............................................................................................. 212 3 Liability under the P2P System .......................................................................... 216 Exclusive Summary ........................................................................................ 216 5.1. Introduction ............................................................................................. 216 5.2. Primary Liability ....................................................................................... 218 5.3. Secondary Liability .................................................................................. 219 5.3.1. Definitions of Secondary Liability .........................................................
Recommended publications
  • The Wealth of Networks How Social Production Transforms Markets and Freedom
    Name /yal05/27282_u00 01/27/06 10:25AM Plate # 0-Composite pg 3 # 3 The Wealth of Networks How Social Production Transforms Markets and Freedom Yochai Benkler Yale University Press Ϫ1 New Haven and London 0 ϩ1 Name /yal05/27282_u00 01/27/06 10:25AM Plate # 0-Composite pg 4 # 4 Copyright ᭧ 2006 by Yochai Benkler. All rights reserved. Subject to the exception immediately following, this book may not be repro- duced, in whole or in part, including illustrations, in any form (beyond that copy- ing permitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. The author has made an online version of the book available under a Creative Commons Noncommercial Sharealike license; it can be accessed through the author’s website at http://www.benkler.org. Printed in the United States of America. Library of Congress Cataloging-in-Publication Data Benkler, Yochai. The wealth of networks : how social production transforms markets and freedom / Yochai Benkler. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-300-11056-2 (alk. paper) ISBN-10: 0-300-11056-1 (alk. paper) 1. Information society. 2. Information networks. 3. Computer networks—Social aspects. 4. Computer networks—Economic aspects. I. Title. HM851.B457 2006 303.48'33—dc22 2005028316 A catalogue record for this book is available from the British Library. The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources.
    [Show full text]
  • The Edonkey File-Sharing Network
    The eDonkey File-Sharing Network Oliver Heckmann, Axel Bock, Andreas Mauthe, Ralf Steinmetz Multimedia Kommunikation (KOM) Technische Universitat¨ Darmstadt Merckstr. 25, 64293 Darmstadt (heckmann, bock, mauthe, steinmetz)@kom.tu-darmstadt.de Abstract: The eDonkey 2000 file-sharing network is one of the most successful peer- to-peer file-sharing applications, especially in Germany. The network itself is a hybrid peer-to-peer network with client applications running on the end-system that are con- nected to a distributed network of dedicated servers. In this paper we describe the eDonkey protocol and measurement results on network/transport layer and application layer that were made with the client software and with an open-source eDonkey server we extended for these measurements. 1 Motivation and Introduction Most of the traffic in the network of access and backbone Internet service providers (ISPs) is generated by peer-to-peer (P2P) file-sharing applications [San03]. These applications are typically bandwidth greedy and generate more long-lived TCP flows than the WWW traffic that was dominating the Internet traffic before the P2P applications. To understand the influence of these applications and the characteristics of the traffic they produce and their impact on network design, capacity expansion, traffic engineering and shaping, it is important to empirically analyse the dominant file-sharing applications. The eDonkey file-sharing protocol is one of these file-sharing protocols. It is imple- mented by the original eDonkey2000 client [eDonkey] and additionally by some open- source clients like mldonkey [mlDonkey] and eMule [eMule]. According to [San03] it is with 52% of the generated file-sharing traffic the most successful P2P file-sharing net- work in Germany, even more successful than the FastTrack protocol used by the P2P client KaZaa [KaZaa] that comes to 44% of the traffic.
    [Show full text]
  • Distributed Hash Table - Wikipedia, the Free Encyclopedia Page 1 Sur 6
    Distributed hash table - Wikipedia, the free encyclopedia Page 1 sur 6 Distributed hash table From Wikipedia, the free encyclopedia Distributed hash tables (DHTs) are a class of decentralized distributed systems that provide a lookup service similar to a hash table: (key, value) pairs are stored in the DHT, and any participating node can efficiently retrieve the value associated with a given key. Responsibility for maintaining the mapping from keys to values is distributed among the nodes, in such a way that a change in the set of participants causes a minimal amount of disruption. This allows DHTs to scale to extremely large numbers of nodes and to handle continual node arrivals, departures, and failures. DHTs form an infrastructure that can be used to build more complex services, such as distributed file systems, peer-to-peer file sharing and content distribution systems, cooperative web caching, multicast, anycast, domain name services, and instant messaging. Notable distributed networks that use DHTs include BitTorrent's distributed tracker, the eDonkey network, the Storm botnet, YaCy, and the Coral Content Distribution Network. Contents 1 History 2 Properties 3 Structure 3.1 Keyspace partitioning 3.2 Overlay network 3.3 Algorithms for overlay networks 4 Real world DHTs and their differences and improvements over basic schemes 5 Examples 5.1 DHT protocols and implementations 5.2 Applications employing DHTs 6 See also 7 References 8 External links History DHT research was originally motivated, in part, by peer-to-peer systems such as Napster, Gnutella, and Freenet, which took advantage of resources distributed across the Internet to provide a single useful application.
    [Show full text]
  • Download Book
    Lecture Notes in Computer Science 3279 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos New York University, NY, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany Geoffrey M. Voelker Scott Shenker (Eds.) Peer-to-Peer Systems III Third International Workshop, IPTPS 2004 La Jolla, CA, USA, February 26-27, 2004 Revised Selected Papers 13 Volume Editors Geoffrey M. Voelker University of California, San Diego Department of Computer Science and Engineering 9500 Gilman Dr., MC 0114, La Jolla, CA 92093-0114, USA E-mail: [email protected] Scott Shenker University of California, Berkeley Computer Science Division, EECS Department 683 Soda Hall, 1776, Berkeley, CA 94720, USA E-mail: [email protected] Library of Congress Control Number: Applied for CR Subject Classification (1998): C.2.4, C.2, H.3, H.4, D.4, F.2.2, E.1, D.2 ISSN 0302-9743 ISBN 3-540-24252-X Springer Berlin Heidelberg New York This work is subject to copyright.
    [Show full text]
  • Classifying Illegal Activities on Tor Network Based on Web Textual Contents Mhd Wesam Al Nabki1,2, Eduardo Fidalgo1,2, Enrique Alegre1,2, and Ivan De Paz1,2
    Classifying Illegal Activities on Tor Network Based on Web Textual Contents Mhd Wesam Al Nabki1,2, Eduardo Fidalgo1,2, Enrique Alegre1,2, and Ivan de Paz1,2 1Department of Electrical, Systems and Automation, University of Leon,´ Spain 2 Researcher at INCIBE (Spanish National Cybersecurity Institute), Leon,´ Spain mnab, eduardo.fidalgo, ealeg, ivan.paz.centeno @unileon.es { } Abstract indexed by the standard search engines, such as Google or Bing. However, despite their existence, The freedom of the Deep Web offers a there is still an enormous part of the web remained safe place where people can express them- without indexing due to its vast size and the lack selves anonymously but they also can of hyperlinks, i.e. not referenced by the other web conduct illegal activities. In this pa- pages. This part, that can not be found using a per, we present and make publicly avail- search engine, is known as Deep Web (Noor et 1 able a new dataset for Darknet active do- al., 2011; Boswell, 2016). Additionally, the con- mains, which we call it ”Darknet Usage tent might be locked and requires human interac- Text Addresses” (DUTA). We built DUTA tion to access e.g. to solve a CAPTCHA or to en- by sampling the Tor network during two ter a log-in credential to access. This type of web months and manually labeled each ad- pages is referred to as ”database-driven” websites. dress into 26 classes. Using DUTA, Moreover, the traditional search engines do not ex- we conducted a comparison between two amine the underneath layers of the web, and con- well-known text representation techniques sequently, do not reach the Deep Web.
    [Show full text]
  • ELFIQ APP OPTIMIZER White Paper V1.03 - May 2015 CONTENTS Introduction
    ELFIQ APP OPTIMIZER White Paper V1.03 - May 2015 CONTENTS Introduction ...............................................................................................................................................................................3 Signature-Based Recognition vs. ACL’s ................................................................................................................3 Detection Engine ...................................................................................................................................................................3 Using Groups or Individual Applications .............................................................................................................3 Actions Once an Application is Detected ...........................................................................................................3 Appendix A: Application List ........................................................................................................................................ 4 martellotech.com elfiq.com 2 INTRODUCTION The Elfiq AppOptimizer is designed to give organizations full control over their existing and future bandwidth, guaranteeing key applications such as Citrix XenDesktop or Skype get priority treatment and undesirables such as peer-to-peer file transfers or games are limited or no longer permitted. It is an add-on-module that provides application-layer deep packet inspection (layer 7) classification and control, including Mobile, Social Networking, P2P, Instant Messaging,
    [Show full text]
  • Edonkey & Emule's
    Fundamenta Informaticae 109 (2011) 383–403 383 DOI 10.3233/FI-2011-518 IOS Press eDonkey & eMule's Kad: Measurements & Attacks Thomas Locher IBM Research, Zurich, Switzerland [email protected] Stefan Schmid∗ T-Labs & TU Berlin, Berlin, Germany [email protected] Roger Wattenhofer ETH Zurich, Zurich, Switzerland [email protected] Abstract. This article reports on the results of our measurement study of the Kad network. Al- though several fully decentralized peer-to-peer systems have been proposed in the literature, most existing systems still employ a centralized architecture. The Kad network is a notable exception. Since the demise of the Overnet network, the Kad network has become the most popular peer-to- peer system based on a distributed hash table. It is likely that its user base will continue to grow in numbers over the next few years due to the system’s scalability and reliability. The contribution of the article is twofold. First, we compare the two networks accessed by eMule: the centralized paradigmof the eDonkey network and the structured, distributed approach pursued by the Kad network. We re-engineer the eDonkey server software and integrate two modified servers into the eDonkey network in order to monitor traffic. Additionally, we implement a Kad client exploiting a design weakness to spy on the traffic at arbitrary locations in the ID space. The collected data provides insights into the spacial and temporal distributions of the peers’ activity. Moreover, it allows us to study the searched content. The article also discusses problems related to the collection of such data sets and investigates techniques to verify the representativeness of the measured data.
    [Show full text]
  • Peer-To-Peer File Sharing and the Market for Digital Information Goods,’ Harvard Business School Case 706-479
    City Research Online City, University of London Institutional Repository Citation: Casadesus-Masanell, R. and Hervas-Drane, A. (2010). Competing against online sharing. Management Decision, 48(8), pp. 1247-1260. doi: 10.1108/00251741011076771 This is the accepted version of the paper. This version of the publication may differ from the final published version. Permanent repository link: https://openaccess.city.ac.uk/id/eprint/14894/ Link to published version: http://dx.doi.org/10.1108/00251741011076771 Copyright: City Research Online aims to make research outputs of City, University of London available to a wider audience. Copyright and Moral Rights remain with the author(s) and/or copyright holders. URLs from City Research Online may be freely distributed and linked to. Reuse: Copies of full items can be used for personal research or study, educational, or not-for-profit purposes without prior permission or charge. Provided that the authors, title and full bibliographic details are credited, a hyperlink and/or URL is given for the original metadata page and the content is not changed in any way. City Research Online: http://openaccess.city.ac.uk/ [email protected] Competing Against Online Sharing Ramon Casadesus-Masanell Harvard Business School, Boston, Massachusetts, USA Andres Hervas-Drane Universitat Pompeu Fabra, Barcelona, Spain Purpose: This paper explores online sharing of copyrighted content over peer-to-peer (p2p) file sharing networks and its impact on the music industry, and assesses the viable business models for the industry going forward. Design/Methodology/Approach: We analyze the evolution of the online content market over the years that followed the widespread adoption of p2p.
    [Show full text]
  • An Investigation Into Darknets and the Content Available Via Anonymous Peer-To-Peer File Sharing
    Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 1-1-2011 An investigation into darknets and the content available via anonymous peer-to-peer file sharing Symon Aked Edith Cowan University Follow this and additional works at: https://ro.ecu.edu.au/ism Part of the Information Security Commons DOI: 10.4225/75/57b52857cd8b3 9th Australian Information Security Management Conference, Edith Cowan University, Perth Western Australia, 5th -7th December, 2011 This Conference Proceeding is posted at Research Online. https://ro.ecu.edu.au/ism/106 AN INVESTIGATION INTO DARKNETS AND THE CONTENT AVAILABLE VIA ANONYMOUS PEER-TO-PEER FILE SHARING Symon Aked School of Computer and Security Science Edith Cowan University, Perth Western Australia [email protected] Abstract Media sites, both technical and non-technical, make references to Darknets as havens for clandestine file sharing. They are often given an aura of mystique; where content of any type is just a mouse click away. However, can Darknets really be easily accessed, and do they provide access to material that would otherwise be difficult to obtain? This paper investigates which Darknets are easily discovered, the technical designs and methods used to hide content on the networks, the tools needed to join, and ultimately what type and quantities of files can be found on anonymous peer-to-peer file sharing networks. This information was gathered by conducting weekly searches for specific file extensions on each Darknet over a 4 week period. It was found that connectivity to Darknets was easy to establish, and installing peer-to-peer file sharing applications was a simple process.
    [Show full text]
  • Cross-Layer Peer-To-Peer Traffic Identification and Optimization Based on Active Networking
    Cross-Layer Peer-to-Peer Traffic Identification and Optimization Based on Active Networking I. Dedinski†, H. De Meer†, L. Han‡, L. Mathy§, D. P. Pezaros§, J. S. Sventek‡, Z. Xiaoying‡ †Department of Mathematics and Computer Science ‡Department of Computing Science University of Passau University of Glasgow Passau, Germany Scotland, UK 94032 G12 8QQ {dedinski, demeer}@fmi.uni-passau.de {lxhan, joe, xyzhan}@dcs.gla.ac.uk §Computing Department Lancaster University Lancaster, UK LA1 4WA {laurent, dp}@comp.lancs.ac.uk Abstract: P2P applications appear to emerge as ultimate killer applications due to their ability to construct highly dynamic overlay topologies with rapidly-varying and unpredictable traffic dynamics, which can constitute a serious challenge even for significantly over-provisioned IP networks. As a result, ISPs are facing new, severe network management problems that are not guaranteed to be addressed by statically deployed network engineering mechanisms. As a first step to a more complete solution to these problems, this paper proposes a P2P measurement, identification and optimisation architecture, designed to cope with the dynamicity and unpredictability of existing, well- known and future, unknown P2P systems. The purpose of this architecture is to provide to the ISPs an effective and scalable approach to control and optimise the traffic produced by P2P applications in their networks. This can be achieved through a combination of different application and network-level programmable techniques, leading to a cross- layer identification and optimisation process. These techniques can be applied using Active Networking platforms, which are able to quickly and easily deploy architectural components on demand. This flexibility of the optimisation architecture is essential to address the rapid development of new P2P protocols and the variation of known protocols.
    [Show full text]
  • Long Term Study of Peer Behavior in the KAD DHT Moritz Steiner, Member, IEEE, Taoufik En-Najjary, and Ernst W
    IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 5, OCTOBER 2009 1371 Long Term Study of Peer Behavior in the KAD DHT Moritz Steiner, Member, IEEE, Taoufik En-Najjary, and Ernst W. Biersack, Member, IEEE Abstract—Distributed hash tables (DHTs) have been actively • Frequency of the crawls, i.e. the time elapsed between two studied in literature and many different proposals have been made consecutive crawls should be short (no more than a few on how to organize peers in a DHT. However, very few DHTs have minutes) in order to achieve a high resolution for metrics been implemented in real systems and deployed on a large scale. One exception is KAD, a DHT based on Kademlia, which is part of such as session length. eDonkey, a peer-to-peer file sharing system with several million • Duration of the crawl, which should be in the order of many simultaneous users. We have been crawling a representative subset months, to be able to correctly capture the tail of the session of KAD every five minutes for six months and obtained information and inter-session length distributions. about geographical distribution of peers, session times, daily usage, and peer lifetime. We have found that session times are We have built our own crawler, which will be described in Weibull distributed and we show how this information can be Section IV, that meets all three goals. exploited to make the publishing mechanism much more efficient. While peer-to-peer systems have been explored previously Peers are identified by the so-called KAD ID, which up to now using a crawler, the duration of these crawls was limited to a was assumed to be persistent.
    [Show full text]
  • Analysis and Prevention of Malware in P2P
    Puram.Pradeep Kumar et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (1) , 2012, 3162 - 3169 Analysis and Prevention of Malware in P2P Prof.Puram.Pradeep Kumar, Naini Shekar Reddy, Saleha Saudagar, T. Puneeth Chandra, Ch. Kishor Kumar VITS Engineering College, KarimNagar. Abstract-Peer-to-Peer (P2P) Networks continue to be will launch these programs believing that they are popular means of trading content. However the files legitimate, but not realizing that a Trojans was installed. exchanged in these networks are not malicious, making them An attacker may now have remote access to an an ideal medium for spreading Malware. Some existing organization's internal Network or potentially gathering studies have shown that Malware proliferation can pose confidential user information via a spyware program. significant threats to P2P Networks, defending against such an attack are largely an open problem. This paper aims to Most organizations are under the impression that P2P develop the countermeasure that can effectively mitigate the networks can simply be stopped by blocking the default Malware proliferation while preserving P2P networks port that is required for these networks to communicate. performance and provide software implementations for Think again. Most P2P networks can be configured to P2P.Malware is highly pervasive in P2P file-sharing systems listen on TCP port 80 (HTTP). Almost every organization and is difficult to detect. To alleviate this problem, we in the world permits the use of HTTP through their analyze and provide preventive measures for Malware. firewall. Analysis include two types for detecting Malware and Along with viruses, one of the biggest threats to computer provide two basic approaches and Advanced techniques for users on the Internet today is Malware.
    [Show full text]