• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 11
  • Tagged with
  • 13
  • 13
  • 13
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

The development of the Fair use doctrine of copyrighted materials in America

Rogeberg, Thomas Edward, January 1967 (has links)
Thesis (M.A.)--University of Wisconsin--Madison, 1967. / eContent provider-neutral record in process. Description based on print version record. Includes bibliographical references.
2

The development of the fair use in copyright law

Gross, Jeanne. January 1977 (has links)
Thesis--Wisconsin. / Includes bibliographical references (leaves 153-160).
3

Navigating fair use and copyright law a case study on how students compose multimodal compositions /

Williams, Nicole A. January 2009 (has links)
Thesis (M.A.)--Ball State University, 2009. / Title from PDF t.p. (viewed on Mar. 25, 2010). Research paper (M.A.), 3 hrs. Includes bibliographical references (p. 38-40).
4

International uncertainty in the exceptions for individual use in copyright law : a comparative study of Australia and Thailand /

Lamlert, Wariya. January 2007 (has links)
Thesis (PhD.) -- University of Canberra, 2007. / Includes bibliography (p. 225 - 240)
5

The United States copyright law dilemma: a synthesis of copyright applications that affect the use of digital print-on-demand technology

Creech, Ronald Edwin 02 October 2007 (has links)
This study explores the problem of "fair use" in copyright as it applies to the use of POD's, print-on-demand systems, by education and business entities. This qualitative research instrument offers an explanation for the discrepancy between current copyright statutes and the application of these statutes by the US Courts toward regulating the "fair use" doctrine as it applies to POD technology. This synthesis examines the "gray areas" of the US Copyright Act of 1976 and the Copyright Amendments Act of 1992 in conjunction with the ever-changing legal opinions that continuously shape and mold court opinions into copyright ideals. In order to achieve this goal, the following criteria is discussed: 1) the nights of copyright owners; 2) limitations of exclusivity in copyright; 3) judicial and statutory factors in "fair use"; 4) court rulings that affect the common educational and business use of copyright protected materials; and 5) the affect of copyright rulings upon the use of high technology equipment that is presently in use or will be introduced into the market place soon. In effect, this study responds to the copyright dilemma as it pertains to "fair use" upon POD's, digital high speed copy systems, computers/laser printers, video taping systems, audio taping systems, live presentations, transmitted presentations, and other information systems. The following questions will be considered and discussed: 1) What is the history and intent of the fair use doctrine as it applies to the Copyright Act of 1976 and Copyright Amendment Act of 1992; 2) What is the affect of present copyright laws upon POD's; 3) Has court litigation in the last decade restricted the "fair use” doctrine by limiting the uses of copyrighted materials by educational and business entities? Finally and most importantly, in the interest of preserving, improving, and perfecting the relationship between POD users, in both education and business, and the international copyright proprietors, including members of AAP and SPA, this dissertation has explored and developed a copyright user's and owner's "Model of Rights". / Ph. D.
6

Rhetorical invention in copyright imbued environments

Rife, Martine Courant. January 2008 (has links)
Thesis (PH.D.)--Michigan State University. Rhetoric and Writing, 2008. / Title from PDF t.p. (viewed on Aug. 11, 2009) Includes bibliographical references (p. 349-368). Also issued in print.
7

Copyright at home: copyright and the phantom public /

Bannerman, Sara, January 1900 (has links)
Thesis (M.A.)--Carleton University, 2004. / Includes bibliographical references (p. 148-155). Also available in electronic format on the Internet.
8

Copyright law in the digital environment: DRM systems, anti-circumvention, legislation and user rights

Latter, Gareth Paul January 2012 (has links)
This thesis deals with the way in which copyright law is changing in the digital environment and the mechanisms which are facilitating this change. It deals with these issues by analysing the mechanisms of this change, specifically Digital Rights Management (DRM)Systems and anti-circumvention legislation, and the impact which this change is having on the rights of copyright users. The purpose of copyright is to provide an incentive to authors to continue creating while simultaneously providing a public good in allowing the public to use those creations in certain ways. Copyright achieves this purpose by granting both the author and user certain rights. The author is given a limited monopoly over their work in exchange for allowing this work to enter the public sphere and ensuring that users of that work can utilise that work in certain limited ways. The success of copyright thus rests on maintaining the balance between the rights of these parties. The rise of digital technology has created a situation in which copyright content can be easily copied by any party with a Personal Computer and disseminated around the globe instantly via the Internet. In response to these dangers, copyright owners are making use of DRM systems to protect content. DRM systems include various measures of control within its scope. Theses systems allow for copyright owners to control both access and use of content by copyright users. DRM Systems are not foolproof measures of protection however. Technologically sophisticated users are able to circumvent these protection measures. Thus, in order to protect DRM Systems from circumvention, anti-circumvention legislation has been proposed through international treaties and adopted in many countries. The combined effect of these protection measures are open to abuse by copyright owners and serve to curtail the limited rights of copyright users. The end result of this is that the balance which copyright law was created to maintain is disrupted and copyright law no longer fulfils its purpose. This thesis undertakes an analysis of these issues with reference to how these issues affect copyright users in developing countries. This is done with particular reference to possible approaches to this issue in South Africa as South Africa is a signatory to these anti-circumvention treaties.
9

A comparative study of technological protection measures in copyright law

Conroy, Marlize 30 November 2006 (has links)
Digitisation had a profound impact on the creation, reproduction, and dissemination of works protected by copyright. Works in digital format are vulnerable to infringement, and technological protection measures are accordingly applied as protection. Technological protection measures can, however, easily be circumvented, and additional legal protection against circumvention was needed. Article 11 of the WIPO Copyright Treaty (the WCT) obliges Member States to provide adequate legal protection against the circumvention of technological measures applied to works protected by copyright. Contracting parties must refine the provisions of Article 11 and provide for exceptions on the prohibition. Article 11 does not specify whether it pertains to only certain types of technological measures, nor does it prohibit the trafficking in circumvention devices. The United States implemented the provisions of Article 11 of the WCT through the Digital Millennium Copyright Act of 1998 (the DMCA). Section 1201 of the DMCA prohibits the circumvention of technological measures. It is detailed and relates to two categories of technological measures - access control and copy control. It prohibits not only the act of circumvention, but also the trafficking in circumvention devices. Article 6 of the EC Directive on the Harmonisation of Certain Aspects of Copyright and Related Rights in the Information Society of 2001 implements Article 11 of the WCT. Article 6 seeks to protect Aeffective technological measures@. It prohibits both the act of circumvention and circumvention devices. Although Article 11 of the WCT is silent on the issue of access control, it seems as if the international trend is to provide legal protection to access controls, thus indirectly creating a right to control access. South Africa has not yet implemented Article 11 of the WCT. The South African Copyright Act of 1979 does not protect technological protection measures. The Electronic Communications and Transactions Act of 2002 (the ECT Act) provides protection against the circumvention of technological protection measures applied to digital data. The definition of Adata@ is such that it could include protected works. If applied to protected works, the anti-circumvention provisions of the ECT Act would be detrimental to user privileges. As developing country, it seems to be in South Africa's best interest to the implement the provisions of Article 11 in such a manner that it still allows users access to and legitimate use of works protected by copyright. / Jurisprudence / LL.D.
10

A comparative study of technological protection measures in copyright law

Conroy, Marlize 30 November 2006 (has links)
Digitisation had a profound impact on the creation, reproduction, and dissemination of works protected by copyright. Works in digital format are vulnerable to infringement, and technological protection measures are accordingly applied as protection. Technological protection measures can, however, easily be circumvented, and additional legal protection against circumvention was needed. Article 11 of the WIPO Copyright Treaty (the WCT) obliges Member States to provide adequate legal protection against the circumvention of technological measures applied to works protected by copyright. Contracting parties must refine the provisions of Article 11 and provide for exceptions on the prohibition. Article 11 does not specify whether it pertains to only certain types of technological measures, nor does it prohibit the trafficking in circumvention devices. The United States implemented the provisions of Article 11 of the WCT through the Digital Millennium Copyright Act of 1998 (the DMCA). Section 1201 of the DMCA prohibits the circumvention of technological measures. It is detailed and relates to two categories of technological measures - access control and copy control. It prohibits not only the act of circumvention, but also the trafficking in circumvention devices. Article 6 of the EC Directive on the Harmonisation of Certain Aspects of Copyright and Related Rights in the Information Society of 2001 implements Article 11 of the WCT. Article 6 seeks to protect Aeffective technological measures@. It prohibits both the act of circumvention and circumvention devices. Although Article 11 of the WCT is silent on the issue of access control, it seems as if the international trend is to provide legal protection to access controls, thus indirectly creating a right to control access. South Africa has not yet implemented Article 11 of the WCT. The South African Copyright Act of 1979 does not protect technological protection measures. The Electronic Communications and Transactions Act of 2002 (the ECT Act) provides protection against the circumvention of technological protection measures applied to digital data. The definition of Adata@ is such that it could include protected works. If applied to protected works, the anti-circumvention provisions of the ECT Act would be detrimental to user privileges. As developing country, it seems to be in South Africa's best interest to the implement the provisions of Article 11 in such a manner that it still allows users access to and legitimate use of works protected by copyright. / Jurisprudence / LL.D.

Page generated in 0.0571 seconds