617 research outputs found

    Copyright Protection In The Digital Era: A Malaysian Perspective

    Get PDF
    This paper seeks to explore the significance of copyright protection in Malaysia’s business environment of the digital era. Copyright law is increasingly being challenged with the intensification of internet use now. Issues of piracy and infringement of rights raise concerns surrounding the enforcement of legal measures for protection of copyrights. Hence the paper aim to understand the role and function of copyright in the digital era, and assessing the Malaysian society’s awareness of cyberspace copyright protection. This is an interpretive research carried out by conducting interviews, on 3 different groups of respondents, which are the dot.com companies, the IP professionals and government officials. The findings indicate there is a difference amongst the three groups in the understanding and awareness of Intellectual Property Rights and copyright protection; and that Malaysian government is not actively and effectively promoting awareness of the copyright issues to the public. Also it is imperative for Malaysian authorities to enhance protection of copyright in cyberspace.

    Is Digital Text-Watermarking the Long-Desired User Friendly Digital Rights Management? Copyright and Fundamental Values from a Comparative Perspective

    Full text link
    Many have argued that technologies used to protect copyrighted works usually go beyond the letter of the law and subsequently impinge on interests relating to freedom of information and expression, privacy and free choice. Classic examples are technologies that prevent CDs or DVDs from being accessed or copied under certain conditions, or that block or filter-out copyright-protected materials. This article assesses digital text-watermarking, which does not restrict users’ access to or use of works, but individualises every user’s copy by changing the formatting or words in a text (e.g. “not visible” for “invisible”). Every purchaser/user receives a unique version of the work, meaning that, if there is any illegal upload or usage, it is possible to determine which user the copy came from. The technology thereby allows legal (and illegal) use to be undertaken, but serves as a tool for enforcement when there is illegal use. This article assesses digital text-watermarking from a comparative law perspective, particularly the Civil Law and the Common Law traditions

    Watermarking Graph Neural Networks based on Backdoor Attacks

    Full text link
    Graph Neural Networks (GNNs) have achieved promising performance in various real-world applications. Building a powerful GNN model is not a trivial task, as it requires a large amount of training data, powerful computing resources, and human expertise in fine-tuning the model. What is more, with the development of adversarial attacks, e.g., model stealing attacks, GNNs raise challenges to model authentication. To avoid copyright infringement on GNNs, it is necessary to verify the ownership of the GNN models. In this paper, we present a watermarking framework for GNNs for both graph and node classification tasks. We 1) design two strategies to generate watermarked data for the graph classification task and one for the node classification task, 2) embed the watermark into the host model through training to obtain the watermarked GNN model, and 3) verify the ownership of the suspicious model in a black-box setting. The experiments show that our framework can verify the ownership of GNN models with a very high probability (around 95%95\%) for both tasks. Finally, we experimentally show that our watermarking approach is robust against two model modifications and an input reformation defense against backdoor attacks.Comment: 13 pages, 9 figure

    Limitation of Sales Warranties as an Alternative to Intellectual Property Rights: An Empirical Analysis of IPhone Warranties’ Deterrent Impact on Consumers

    Get PDF
    Apple\u27s success with the Apple iPhone has brought with it certain problems. Its success has engendered a community that has attempted to circumvent Apple\u27s exclusive service agreement with AT&T. Unfortunately for Apple (and similarly situated manufacturers), intellectual property law allows consumers to alter their products so as to circumvent relationships that manufacturers may have with others. The patent and copyright law first sale doctrine allows consumers to manipulate a product after it is purchased. As a result, manufacturers are increasingly turning to alternatives to intellectual property to secure control over the device after the sale. One such alternative is the exclusion of warranty under Article 2 of the Uniform Commercial Code. This iBrief considers whether limitation of warranties have the deterrence effect manufacturers desire. Said differently, it considers whether manufacturers can use warranty limitations to prevent consumers from using their products in an unauthorized manner. The iBrief presents a behavioral model based on the Triandis model of planned behavior and enhances the model by accounting for likely and unlikely benefits and detriments. The model suggests that participants weigh the probability and magnitude of the detriment against the probability and magnitude of the beneficial impact when making the decision to engage in technological piracy. This model, considered with other empirical evidence, suggests that Apple\u27s warranty could be a stronger deterrent for consumers than civil liability. The iBrief concludes that manufacturers can better protect their post-sale expectation of profits by raising consumer awareness of their warranty\u27s quality and by raising awareness of the consequences for using the product in a way that is outside the terms of the consumers\u27 authorized use

    Uncovering the Complexities of Intellectual Property Management in the era of AI: Insights from a Bibliometric Analysis

    Get PDF
    Intellectual property (IP) management has posed continuous problems in the digital world, so understanding its associated concepts and the particularities they present is crucial. Within artificial intelligence (AI), machine learning (ML) and natural language processing (NLP) have enabled the intelligent processing and analysis of large volumes of data, making them widely used tools. In order to help fill the research gap that exists due to the novelty of the concepts, a bibliometric analysis is proposed of 404 scientific documents linked to AI, ML, NLP and IP, extracted from the Web of Science (WoS) core collection repository. The results demonstrate a current trend in research on the management of IP, related to digital tools and highlight the issues that arise from the management of IP stemming from their use. This research also identifies how these tools have been used to facilitate the management and identification of IP. In this sense, this study brings originality to the field of intellectual property management by examining previous studies and proposing new avenues for future research, thus broadening the current understanding of the subject. Entrepreneurs and business leaders can benefit from this study as it uncovers the complexities of IP management and thus enhances understanding of the opportunities and challenges in the AI er

    Future of Online Music: Labels and Artists

    Get PDF
    • …
    corecore