Advertisement

Intellectual Property Rights and Computer Technology

  • Joseph Migga KizzaEmail author
Chapter
Part of the Undergraduate Topics in Computer Science book series (UTICS)

Abstract

This chapter discusses the foundations of intellectual property rights and how computer technology has influenced and changed the traditional issues of property rights. The reader is immersed into a discussion of controversial issues of ownership in a rapidly amalgamating global cultures, languages, beliefs and values as a result of rapid globalization technologies like telecommunication that is casting a far and wide net that is likely, in the near future, to create one global commons. The controversial issues focused on here include the politics and psychology of ownership and the changing infringement landscape. Another issue of interest in our focus is the intellectual property crime (IPC), activities that involve infringement, counterfeiting, piracy of products and services for profit without permission from the creator, misappropriation, misrepresentation, corruption and bribery, and espionage.

References

  1. 1.
    WIPO—World Intellectual Property Organization WIPO arbitration and mediation center. ADMINISTRATIVE PANEL DECISION HUGO BOSS Trade Mark Management, GmbH & Co. KG, HUGO BOSS AG v. Irfan ButtCase No. D2016-1123Google Scholar
  2. 2.
    Nasheri H Addressing global scope of intellectual property law. https://www.ncjrs.gov/pdffiles1/nij/grants/208384.pdf
  3. 3.
    Johnson DJ (2009) Computer ethics, 4th edn. Pearson Education, Inc., Upper Saddle River, NJGoogle Scholar
  4. 4.
    Prince J (1980) Negligence: liability for defective software. Okla Law Rev 33:848–855Google Scholar
  5. 5.
    Gow GA Copyright reform in Canada: domestic cultural policy objectives and the challenge of technological convergence. http://www.academia.edu/11974855/Copyright_Reform_in_Canada_Domestic_Cultural_Policy_Objectives_and_the_Challenge_of_Technological_Convergence
  6. 6.
    Strong, WS (2014) The copyright book: a practical guide, 6th ed. Boston: MIT PressGoogle Scholar
  7. 7.
    Neitzke FW (1984) A software primer. Van Nostrand Reinhold, New YorkGoogle Scholar
  8. 8.
    Personal identity theft on the rise. USA Today, Tech Report. 09/14/00Google Scholar
  9. 9.
    Burge DA (1984) Patent and trademarks: tactics and practice, 2nd edn. Wiley, New YorkGoogle Scholar
  10. 10.
    Scott MD (1984) Computer law. Wiley, New YorkGoogle Scholar
  11. 11.
    Davis GG (1985) Software protection. Van Nostrand Reinhold, New YorkGoogle Scholar

Further Reading

  1. 12.
    Davis R (1992) A new view of intellectual property and software. Commun ACM 39(3):21–30CrossRefGoogle Scholar
  2. 13.
    Oz E (1994) Protecting software as intellectual property. Ethics for the information age. Business and Education Technologies, Barr Ridge, pp 273–285Google Scholar
  3. 14.
    Samuelson P (1989) Information and property. Cathol Rev 38:365–410Google Scholar
  4. 15.
    Samuelson P (1991) Is information property? Commun ACM 34(10):15–18CrossRefGoogle Scholar
  5. 16.
    Samuelson P (1992) Copyright law and electronic compilations of data. Commun ACM 35(2):27–32MathSciNetCrossRefGoogle Scholar
  6. 17.
    Samuelson P (1992) Regulation of technologies to protect copyrighted works. Commun ACM 39(7):17–22CrossRefGoogle Scholar
  7. 18.
    Suapper J (1995) Intellectual property protection for computer software. In: Johnson D, Nissenbaum H (eds) Computer ethics and social values. Prentice Hall, Englewood Cliffs, pp 181–190Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.College of Engineering and Computer ScienceUniversity of TennesseeChattanoogaUSA

Personalised recommendations