首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

2.
Websites play a critical role in attracting customers and providing information to assist Web customers in decision making. Despite the importance of such systems providing a satisfactory experience, as per our knowledge no effort has been made to systematically examine the underlying causal structure among important decision related variables such as perceived effort, perceived information accuracy, perceived effectiveness, and satisfaction using Web-based decision support systems (Web-based DSS) that provide information to potential customers. In this study, we develop a conceptual model for investigating cognitive antecedents to Web users’ satisfaction in the context of Web-based DSS. The empirical examination of the research model using structural equations modeling indicates that perceived effectiveness is influenced by perceived information accuracy and effort, and in turn, has positive impact on satisfaction in using Web-based DSS. The implications of this study suggest to information managers that providing customers with highly accurate information from web sites requiring lower effort is perceived as an effective system and such perception leads to increased satisfaction.  相似文献   

3.
This article reveals different patterns of scholarly communication in the XML research field on the Web and in print journals in terms of author visibility, and challenges the common practice of exclusively using the ISI’s databases to obtain citation counts as scientific performance indicators. Results from this study demonstrate both the importance and the feasibility of the use of multiple citation data sources in citation analysis studies of scholarly communication, and provide evidence for a developing “two tier” scholarly communication system.  相似文献   

4.
软件产业作为信息产业的核心和灵魂,是国民经济发展的基础性和战略性产业,是信息化建设的关键环节,然而伴随着软件产业的飞速发展,软件盗版问题也越来越严重,它已经成为威胁软件产业的主要问题。以2006年51个国家的横截面数据为研究样本,对版权保护与软件业盗版率的关系进行了实证分析。结果显示,版权保护对抑制软件业盗版具有显著影响,其弹性系数为0.524。  相似文献   

5.
Plagiarism is the misuse of and failure to acknowledge source materials. This paper questions common responses to the apparent increase in plagiarism by students. Internet plagiarism occurs in a context – using the Internet as an information tool – where the relevant norms are far from obvious and models of virtue are difficult to identify and perhaps impossible to find. Ethical responses to the pervasiveness of Internet-enhanced plagiarism require a reorientation of perspective on both plagiarism and the Internet as a knowledge tool. Technological strategies to “catch the cheats” send a “don’t get caught” message to students and direct the limited resources of academic institutions to a battle that cannot be won. More importantly, it is not the right battleground. Rather than characterising Internet-enabled plagiarism as a problem generated and solvable by emerging technologies, we argue that there is a more urgent need to build the background conditions that enable and sustain ethical relationships and academic virtues: to nurture an intellectual community.  相似文献   

6.
论学术侵权     
近年来学术研究中的抄袭、剽窃行为时有发生,这种行为违反了学术道德规范,侵犯了他人知识产权。对学术侵权行为既需要学者的自律更需要法律的他律。为此,应当依据著作权法基本原理,分析学术侵权行为的表现形式和基本特征,探讨合理引用与抄袭、剽窃行为之间的关系,确立判定抄袭、剽窃的原则和方法,明确学术侵权的法律责任。  相似文献   

7.
本文分析了网络信息资源著作权风险的特点及影响因素,阐明风险产生原因,采用系统动力学的因果关系图,分析风险影响因素以及各因素之间的相互关系,揭示风险产生的内在机理。提出应该采用宏观层面调控的方式,通过网络管理制度、法律制度以及引入著作权集体管理制度等解决风险问题。  相似文献   

8.
李首胤 《现代情报》2013,33(6):170-172
本文主要研究如何实现互联网上跟踪、发现、分析教学多媒体数字化信息资源中真伪的检测平台,并提供相应停止侵权措施的多媒体数字化信息资源版权监测系统,通过系统获得多媒体作品在互联网上的盗版传播情况,系统提供有效的技术手段来过滤和删除盗版内容。  相似文献   

9.
著作权公共领域资源是图书馆自建数据库的主要来源,数据库制作者需要熟悉这个领域所包括的资源范围并合理进行应用,本文在廓清著作权公共领域范围的基础上,根据不同资源的著作权特点提出了针对性的使用方法,为图书馆自建数据库避免侵权风险提供切实有效的帮助。  相似文献   

10.
随着全球化的发展与科学技术的进步,技术标准越来越受到各国政府的重视和大力支持。本文基于文献综述,以中国AVS标准制定过程为例,通过引入政策“过程一工具”分析框架,详尽分析了AVS标准制定过程中存在的市场和政府“双失灵”现象。指出在标准的制定过程中,应该协调市场与政府二者之间的关系,政府应该做到有所为与有所不为。  相似文献   

11.
网络时代著作权合理使用的研究   总被引:1,自引:0,他引:1  
尚月  谢卫东 《情报科学》2004,22(3):366-368
著作权合理使用制度对社会、对权利人、对著作权使用人来讲都是一个行之有效的制度,有效地促进了人类精神成果的推广和拓展。但是在网络环境和数字化的背景下,随着“盗版”定义的扩展、著作权保护手段的丰富,合理使用面临着被边缘化的危险。本文就这一问题进行探讨。  相似文献   

12.
Computer crime on the Internet poses asignificant threat to the well-being ofbusinesses and individuals, and none are immunefrom the repercussions that can result. Onetype of this unethical and unlawful activity isonline software piracy. In this work, thesignificance of piracy as a topic for academicinquiry is first presented, followed by asummary of the conflicting stances on thisissue. Then, a review of scholarly literaturepreviously conducted in this area is given toprovide a backdrop for the current research. Univariate and bivariate findings from aquantitative study of students are used todemonstrate the incidence, scope, andassociated correlates of Internet piracy in auniversity setting. Technological and ethicalpolicy solutions that an institution mightimplement are suggested and discussed inconclusion.  相似文献   

13.
[目的/意义]从风险源视角出发,构建视频类知识付费内容著作权侵权风险评价指标体系。[方法/过程]分析用户生成视频信息的传播与反馈路径,识别主要利益相关者及风险源,并构建指标体系,通过分析指标间的依存关系,构建ANP结构模型,运用超级决策软件计算出指标权重。[结果/结论]构建了包括"管理、法律、市场、技术、价值"在内的5个一级指标、16个二级指标和43个三级指标,其中,管理者最需要关注的是管理风险,其次是价值风险、市场风险、法律风险等。研究希望为推动视频类知识付费内容著作权风险的量化评估和著作权保护提供有益参考和指导。  相似文献   

14.
韩学志 《情报理论与实践》2004,27(2):141-143,147
针对网络信息服务中对作品的使用和网络作品著作权的保护,是否增加作品使用的新权利以因应作品数字化进行超范围、高速度传播的性质,是否将此种使用作品的新方式、赋予作者的新权利归结为“网络传输方式”和“网络传输权”,是信息服务中网络资源利用的一个不可回避的问题。  相似文献   

15.
基于Web的学术信息资源引文索引与分析体系   总被引:3,自引:0,他引:3  
阐述了基于Web环境下的学术信息资源引文索引与分析体系——Web of Knowledge,Citescer和Citebase的功能,并进行了比较。在此基础上,指出了开放环境下引文索引的意义及其发展方向。  相似文献   

16.
李锦兰  杨小凤 《现代情报》2015,35(12):70-75
利用网络对国内115所"211工程"高校图书馆、31所省级公共图书馆、48所中国科学院文献情报中心系统内图书馆、文献信息中心、资料室网站的版权政策进行调查研究,将国内的版权政策内容与国外图书馆相比较,指出国内图书馆版权政策只有少数几所图书馆的体系比较完善,大部分图书馆版权政策只是电子资源公告,还不是真正意义上的版权政策,从整体上来说普遍存在体系不完整,架构不科学,内容不完备,操作性不强等问题。  相似文献   

17.
Expertise seeking is the activity of selecting people as sources for consultation about an information need. This review of 72 expertise-seeking papers shows that across a range of tasks and contexts people, in particular work-group colleagues and other strong ties, are among the most frequently used sources. Studies repeatedly show the influence of the social network – of friendships and personal dislikes – on the expertise-seeking network of organisations. In addition, people are no less prominent than documentary sources, in work contexts as well as daily-life contexts. The relative influence of source quality and source accessibility on source selection varies across studies. Overall, expertise seekers appear to aim for sufficient quality, composed of reliability and relevance, while also attending to accessibility, composed of access to the source and access to the source information. Earlier claims that seekers disregard quality to minimise effort receive little support. Source selection is also affected by task-related, seeker-related, and contextual factors. For example, task complexity has been found to increase the use of information sources whereas task importance has been found to amplify the influence of quality on source selection. Finally, the reviewed studies identify a number of barriers to expertise seeking.  相似文献   

18.
本文分析了正方法,查询修正中的用户信息行为,吸收网页抓取、检索与浏览并重的思想,综合考虑用户Web搜索过程中的行为特点、查询修正所用词汇的可用来源,给出一个新的面向Web搜索的查询修正解决方案.  相似文献   

19.
鲍甬婵  高峰 《现代情报》2016,36(3):97-100
试用数据库的知识产权受法律保护, 保护模式包括版权法保护、合同法保护以及技术措施保护等。当前对试用数据库的知识产权保护方面存在诸多问题, 图书馆要采取适当的保护策略, 如发布版权公告、做好技术保护、监控并处理违规行为、加强版权教育培训以及到期及时清理等, 切实做好试用数据库的知识产权保护工作。  相似文献   

20.
面向服务架构研究综述   总被引:2,自引:0,他引:2  
阐述了面向服务架构的概念的提出与演进,以及网络服务的关键技术标准,通过比较的方法对CORBA与Web服务实现面向服务架构的技术、SOAP与PEST通讯方式、OWL-S和WSDL分别进行比较,使用综述的方法对面向服务架构国内外研究的热点进行梳理,提出关注SOA在身份和访问管理、服务管理、实体聚合和处理集成等领域显示了所需克服的重要技术难题与开放源SOA项目的应用价值.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号