3,573 research outputs found

    Ethical Visions of Copyright Law

    Get PDF

    Building a digital library : what to expect as a technology project manager on a library construction project

    Full text link
    The Taylor Family Digital Library is the central library opened in 2011 at the University of Calgary dedicated to supporting digital scholarship, creativity, analysis and a supportive learning environment for students. The new building is a technologically advanced converged cultural institution, with mandates to continually evolve in order to meet the needs of students and researchers. The infrastructure to support these mandates required research, collaboration and intense planning, resulting in new construction and technology standards for library renovation and construction projects. This pragmatic article is written for those who will follow in similar footsteps; it provides a roadmap for those embarking on the construction of a new technologically advanced library building

    Mirror - Vol. 29, No. 03 - September 18, 2003

    Get PDF
    The Mirror (sometimes called the Fairfield Mirror) is the official student newspaper of Fairfield University, and is published weekly during the academic year (September - May). It runs from 1977 - the present; current issues are available online.https://digitalcommons.fairfield.edu/archives-mirror/1604/thumbnail.jp

    Volume 39 - Issue 14 - Friday, January 23, 2004

    Get PDF
    The Rose Thorn, Rose-Hulman\u27s independent student newspaper.https://scholar.rose-hulman.edu/rosethorn/1263/thumbnail.jp

    Practicing CPA, vol. 5 no. 11, November 1981

    Get PDF
    https://egrove.olemiss.edu/aicpa_news/2501/thumbnail.jp

    FSTC Newsletter

    Get PDF
    Newsletter highlighting faculty development events and initiatives at Governors State University

    The Ethical Visions of Copyright Law

    Get PDF
    This symposium essay explores the imagined ethics of copyright: the ethical stories that people tell to justify, make sense of, and challenge copyright law. Such ethical visions are everywhere in intellectual property discourse, and legal scholarship ought to pay more attention to them. The essay focuses on a deontic vision of reciprocity in the author-audience relationship, a set of linked claims that authors and audiences ought to respect each other and express this respect through voluntary transactions. Versions of this default ethical vision animate groups as seemingly antagonistic as the music industry, file sharers, free software advocates, and Creative Commons. Respect copyrights, Don\u27t sue your customers, Software should be free, and I love to share are all ethical claims about copyright that share some common intuitions, even as they draw very different conclusions. The essay provides a framework for thinking about these ethical visions of intellectual property and then puts these various visions into conversation with each other

    Why the Insurance Industry Cannot Protect Against Health Care Data Breaches

    Get PDF

    Password Theft: Rethinking an Old Crime in a New Era

    Get PDF
    By putting themselves out in front as the victims, the Recording Industry Association of America (RIAA) helped reshape the governing norms of the times, and as a result, people viewed the act of file-sharing differently. By forcing people to see music downloading as a form of theft, the RIAA was quite successful in deterring it. In the process, they also proposed a radical view of theft that changes our basic economic understandings of the action[...] This paper argues that the RIAA\u27s model for deterring music theft could be successfully used to deter many other forms of computer theft, and, specifically, stealing passwords. By focusing on the victim, content-providers can alter people\u27s views of their own actions, thereby properly bringing what was once an innocuous activity into the realm of the criminal where it belongs. To accomplish this task, however, we have to comport our traditional views of theft to the realities of the Internet. First, economic notions of rivalry and non-rivalry are undermined in a digital world where data is infinitely copyable, and these notions need to be updated appropriately. Secondly, finding real space analogues to password theft is important when locating an existing legal framework in which to work. This Note attempts to do both. Part I of this Note gives a brief background and explication of rivalrous and non-rivalrous theft, and the problems that the Internet poses, specifically in the music downloading area. In so doing, I propose a new way of conceiving of rivalry that fits into the realities of digital networks. Part II is an analysis of password theft, in particular the distinction between first-party and second-party password theft. First-party password theft concerns actions--stealing personal identification numbers and the like--that are probably familiar to most readers. Second-party password theft, however, is a far more radical notion that is crucial for understanding why password theft in general is criminal, and why it can be so damaging. I analogize first and second-party password theft to larceny and embezzlement, respectively; the purpose of this is to provide a legal framework for analyzing password theft as a criminal activity. Additionally, I show how the updated views of rivalry proposed in Part I allow us to evaluate properly the harm that password theft causes. Finally, Part III argues that by following the model of the RIAA, the government, content-providers, and law enforcement can effectively deter password theft in a variety of ways
    • …
    corecore