Advertisement

Intellectual Property Rights and Computer Technology

  • Joseph Migga Kizza
Chapter
Part of the Undergraduate Topics in Computer Science book series (UTICS)

Abstract

This chapter discusses the foundations of intellectual property rights and how computer technology has influenced and changed the traditional issues of property rights. The reader is immersed in a discussion of controversial issues of ownership in rapidly amalgamating global cultures, languages, beliefs, and values as a result of rapid globalization technologies such as telecommunication, which is casting a net far and wide, that are likely to create one global commons in the near future. The controversial issues focused on here include the politics and psychology of ownership and the changing infringement landscape. Another issue of interest in our focus is the intellectual property crime (IPC), activities that involve infringement, counterfeiting, piracy of products and services for profit without permission from the creator, misappropriation, misrepresentation, corruption and bribery, and espionage.

Keywords

World Trade Organization Patent Protection Intellectual Property Right Trade Secret Software Piracy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Glass A (1999) Cybersquatters frustrate political candidate. Cox News Service, 7 Sept 1999Google Scholar
  2. 2.
    Nasheri H. Addressing global scope of intellectual property law. http://www.ncjrs.gov/pdffiles1/nij/grants/208384.pdf
  3. 3.
    Johnson DJ (2009) Computer ethics, 4th edn. Pearson Education, Upper Saddle RiverGoogle Scholar
  4. 4.
    Prince J (1980) Negligence: liability for defective software. Okla Law Rev 33:848–855Google Scholar
  5. 5.
  6. 6.
    Strong WE (2014) The copyright book: a practical guide, 6th edn. MIT Press, BostonGoogle Scholar
  7. 7.
    Neitzke FW (1984) A software primer. Van Nostrand Reinhold, New YorkGoogle Scholar
  8. 8.
    Personal identity theft on the rise. USA Today, Tech Report. 09/14/00Google Scholar
  9. 9.
    Burge DA (1984) Patent and trademarks: tactics and practice, 2nd edn. Wiley, New YorkGoogle Scholar
  10. 10.
    Scott MD (1984) Computer law. Wiley, New YorkGoogle Scholar
  11. 11.
    Davis GG (1985) Software protection. Van Nostrand Reinhold, New YorkGoogle Scholar

Further Reading

  1. Davis R (1992) A new view of intellectual property and software. Commun ACM 39(3):21–30CrossRefGoogle Scholar
  2. Oz E (1994) Protecting software as intellectual property. In: Ethics for the information age. Business and Education Technologies, Barr Ridge, pp 273–285Google Scholar
  3. Samuelson P (1989) Information and property. Cathol Rev 38:365–410Google Scholar
  4. Samuelson P (1991) Is information property? Commun ACM 34(10):15–18CrossRefGoogle Scholar
  5. Samuelson P (1992) Copyright law and electronic compilations of data. Commun ACM 35(2):27–32CrossRefGoogle Scholar
  6. Samuelson P (1992) Regulation of technologies to protect copyrighted works. Commun ACM 39(7):17–22CrossRefGoogle Scholar
  7. Suapper J (1995) Intellectual property protection for computer software. In: Johnson D, Nissenbaum H (eds) Computer ethics and social values. Prentice Hall, Englewood Cliffs, pp 181–190Google Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Joseph Migga Kizza
    • 1
  1. 1.Department of Computer ScienceUniversity of TennesseeChattanoogaUSA

Personalised recommendations