• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 28
  • 4
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 38
  • 38
  • 38
  • 38
  • 14
  • 14
  • 11
  • 9
  • 9
  • 9
  • 8
  • 7
  • 7
  • 7
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Transmission of copyrighted works over the internet : rights and exceptions

Tao, Hong Unknown Date (has links)
This thesis examines the balance between copyright owners and users by studying the nature of the rights and exceptions related to transmission of copyrighted works over the internet, focusing on three different jurisdictions: Australia, Japan and the United States.The choice of Japan and the United States is based on consideration of the following elements: 1. Both countries possess advanced information technology; 2. Both countries too the lead in legislating for copyright protection in the digital environment; 3. Both countries have different legal systems. In the matter of statutory reaction of transmission of works over the internet, there is no uniform solution around the world as the divergent laws in the three chosen countries demonstrate.
22

Reproduction rights in digital environment and copyrights protection : legal issues and challenges / Reproduction rights and dissemination rights in digital environment and copyrights protection : legal issues and challenges

Kam, Ka Man January 2011 (has links)
University of Macau / Faculty of Law
23

Architectural support for improving security and performance of memory sub-systems

Yan, Chenyu 17 November 2008 (has links)
This thesis explores architectural level optimizations to make secure systems more efficient, secure and affordable. It extends prior work for secure architecture in several areas. It proposes a new combined memory encryption and authentication scheme which uses very small on-chip storage area and incurs much less performance overhead compared with prior work. In addition, the thesis studies the issues of applying architectural support for data security to distributed shared memory systems. It presents a scheme which is scalable with large-scale systems and only introduces negligible performance overhead for confidentiality and integrity protection. Furthermore, the thesis also investigates another source of reducing performance overhead in secure systems through optimizing on-chip caching schemes and minimizing off-chip communications.
24

Digital rights management (DRM) : watermark encoding scheme for JPEG images

Samuel, Sindhu. January 2007 (has links)
Thesis (M.Eng. (Electrical, Electromic and Computer Engineering)) -- University of Pretoria, 2007. / Includes bibliographical references (leaves 82-87)
25

Copyright at home: copyright and the phantom public /

Bannerman, Sara, January 1900 (has links)
Thesis (M.A.)--Carleton University, 2004. / Includes bibliographical references (p. 148-155). Also available in electronic format on the Internet.
26

'Prey to thievery' the Canadian Recording Industry Association and the Canadian copyright lobby, 1997 to 2005 /

Doyle, Simon January 1900 (has links)
Thesis (M.J.) - Carleton University, 2006. / Includes bibliographical references (p. 161-175). Also available in electronic format on the Internet.
27

Alte Musik in neuem Gewand : der Schutz musikalischer Updates und der Quasischutz gemeinfreier Musikaufnahmen /

Boddien, Thomas W. January 2006 (has links)
Thesis (doctoral)--Humboldt-Universität, Berlin, 2006. / Includes bibliographical references.
28

Copyright law in the digital environment: DRM systems, anti-circumvention, legislation and user rights

Latter, Gareth Paul January 2012 (has links)
This thesis deals with the way in which copyright law is changing in the digital environment and the mechanisms which are facilitating this change. It deals with these issues by analysing the mechanisms of this change, specifically Digital Rights Management (DRM)Systems and anti-circumvention legislation, and the impact which this change is having on the rights of copyright users. The purpose of copyright is to provide an incentive to authors to continue creating while simultaneously providing a public good in allowing the public to use those creations in certain ways. Copyright achieves this purpose by granting both the author and user certain rights. The author is given a limited monopoly over their work in exchange for allowing this work to enter the public sphere and ensuring that users of that work can utilise that work in certain limited ways. The success of copyright thus rests on maintaining the balance between the rights of these parties. The rise of digital technology has created a situation in which copyright content can be easily copied by any party with a Personal Computer and disseminated around the globe instantly via the Internet. In response to these dangers, copyright owners are making use of DRM systems to protect content. DRM systems include various measures of control within its scope. Theses systems allow for copyright owners to control both access and use of content by copyright users. DRM Systems are not foolproof measures of protection however. Technologically sophisticated users are able to circumvent these protection measures. Thus, in order to protect DRM Systems from circumvention, anti-circumvention legislation has been proposed through international treaties and adopted in many countries. The combined effect of these protection measures are open to abuse by copyright owners and serve to curtail the limited rights of copyright users. The end result of this is that the balance which copyright law was created to maintain is disrupted and copyright law no longer fulfils its purpose. This thesis undertakes an analysis of these issues with reference to how these issues affect copyright users in developing countries. This is done with particular reference to possible approaches to this issue in South Africa as South Africa is a signatory to these anti-circumvention treaties.
29

A comparative study of technological protection measures in copyright law

Conroy, Marlize 30 November 2006 (has links)
Digitisation had a profound impact on the creation, reproduction, and dissemination of works protected by copyright. Works in digital format are vulnerable to infringement, and technological protection measures are accordingly applied as protection. Technological protection measures can, however, easily be circumvented, and additional legal protection against circumvention was needed. Article 11 of the WIPO Copyright Treaty (the WCT) obliges Member States to provide adequate legal protection against the circumvention of technological measures applied to works protected by copyright. Contracting parties must refine the provisions of Article 11 and provide for exceptions on the prohibition. Article 11 does not specify whether it pertains to only certain types of technological measures, nor does it prohibit the trafficking in circumvention devices. The United States implemented the provisions of Article 11 of the WCT through the Digital Millennium Copyright Act of 1998 (the DMCA). Section 1201 of the DMCA prohibits the circumvention of technological measures. It is detailed and relates to two categories of technological measures - access control and copy control. It prohibits not only the act of circumvention, but also the trafficking in circumvention devices. Article 6 of the EC Directive on the Harmonisation of Certain Aspects of Copyright and Related Rights in the Information Society of 2001 implements Article 11 of the WCT. Article 6 seeks to protect Aeffective technological measures@. It prohibits both the act of circumvention and circumvention devices. Although Article 11 of the WCT is silent on the issue of access control, it seems as if the international trend is to provide legal protection to access controls, thus indirectly creating a right to control access. South Africa has not yet implemented Article 11 of the WCT. The South African Copyright Act of 1979 does not protect technological protection measures. The Electronic Communications and Transactions Act of 2002 (the ECT Act) provides protection against the circumvention of technological protection measures applied to digital data. The definition of Adata@ is such that it could include protected works. If applied to protected works, the anti-circumvention provisions of the ECT Act would be detrimental to user privileges. As developing country, it seems to be in South Africa's best interest to the implement the provisions of Article 11 in such a manner that it still allows users access to and legitimate use of works protected by copyright. / Jurisprudence / LL.D.
30

A comparative study of technological protection measures in copyright law

Conroy, Marlize 30 November 2006 (has links)
Digitisation had a profound impact on the creation, reproduction, and dissemination of works protected by copyright. Works in digital format are vulnerable to infringement, and technological protection measures are accordingly applied as protection. Technological protection measures can, however, easily be circumvented, and additional legal protection against circumvention was needed. Article 11 of the WIPO Copyright Treaty (the WCT) obliges Member States to provide adequate legal protection against the circumvention of technological measures applied to works protected by copyright. Contracting parties must refine the provisions of Article 11 and provide for exceptions on the prohibition. Article 11 does not specify whether it pertains to only certain types of technological measures, nor does it prohibit the trafficking in circumvention devices. The United States implemented the provisions of Article 11 of the WCT through the Digital Millennium Copyright Act of 1998 (the DMCA). Section 1201 of the DMCA prohibits the circumvention of technological measures. It is detailed and relates to two categories of technological measures - access control and copy control. It prohibits not only the act of circumvention, but also the trafficking in circumvention devices. Article 6 of the EC Directive on the Harmonisation of Certain Aspects of Copyright and Related Rights in the Information Society of 2001 implements Article 11 of the WCT. Article 6 seeks to protect Aeffective technological measures@. It prohibits both the act of circumvention and circumvention devices. Although Article 11 of the WCT is silent on the issue of access control, it seems as if the international trend is to provide legal protection to access controls, thus indirectly creating a right to control access. South Africa has not yet implemented Article 11 of the WCT. The South African Copyright Act of 1979 does not protect technological protection measures. The Electronic Communications and Transactions Act of 2002 (the ECT Act) provides protection against the circumvention of technological protection measures applied to digital data. The definition of Adata@ is such that it could include protected works. If applied to protected works, the anti-circumvention provisions of the ECT Act would be detrimental to user privileges. As developing country, it seems to be in South Africa's best interest to the implement the provisions of Article 11 in such a manner that it still allows users access to and legitimate use of works protected by copyright. / Jurisprudence / LL.D.

Page generated in 0.136 seconds