Sciweavers

13 search results - page 2 / 3
» Hacking intellectual property law
Sort
View
ODRL
2004
13 years 8 months ago
REAP: A System for Rights Management in Digital Libraries
This paper presents REAP, a system for rights management in digital libraries. REAP is aimed at demonstrating that intellectual property can be published in the Internet by digita...
Øyvind Vestavik
CORR
2010
Springer
132views Education» more  CORR 2010»
13 years 4 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
HICSS
2009
IEEE
99views Biometrics» more  HICSS 2009»
14 years 2 months ago
Using Knowledge Management Systems to Structure Knowledgeable Practices
The purpose of this study is to explore the role of knowledge management systems (KMS) in structuring knowledgeable practices within organizations. Specifically, we consider how i...
Chad Saunders, Mike Chiasson
DRM
2005
Springer
14 years 29 days ago
Fairer usage contracts for DRM
DRM has been widely promoted as a means to enforce copyright. In many previous papers, it has been argued that DRM gives too much power to rights holders and actually goes beyond ...
Alapan Arnab, Andrew Hutchison
AIL
2002
81views more  AIL 2002»
13 years 7 months ago
Ownership: A case study in the representation of legal concepts
This article is an exercise in computational jurisprudence. It seems clear that the field of AI and Law should draw upon the insights of legal philosophers, whenever possible. But...
L. Thorne McCarty