Presentation is loading. Please wait.

Presentation is loading. Please wait.

Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and.

Similar presentations


Presentation on theme: "Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and."— Presentation transcript:

1 Electronic Commerce Semester 2 Term 2 Lecture 8

2 Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and licenses) are an important asset possessed by the publishers in their respective markets Protecting intellectual property rights and collecting dues from online users is proving to be quite challenging Advances in technology have raised the stakes considerably Anyone with a computer can make and distribute countless copies of anythingditital be it a book, a computer program or a piece of music

3 Online Copyright Protection Methods Unauthorised access to published content can be restricted by two methods: –Restricting access to the source of the work. This includes controlling Web server access or controlling individual document access –Restricting manipulation of the electronic file containing the work

4 Controlling Web Server Access Nearly all information providers, including online service providers, not only control access ot their systems but also vary it depending on the information a user wishes to access That is, access to certain data is conditioned on paying a higher fee, and having greater access rights Some online information providers grant full unrestricted access to any data stored on the servers Others restrict access to users with accounts or limit access to non-registered users

5 Controlling Document Access A second level of control can be exerted through measures tied to the electronic file containing the work One type of restriction can be implemented through “rendering or “viewing” software Another method of access restriction is encryption Encryption technologies can be used to deny access to a work in a usable form

6 “Rendering” or “Viewing” Software Such systems require: –A proprietary or unique file forma that can be read only by certain software and that is developed or controlled by the information provider, or –Software that incorporates both a “control” measure to prevent viewing or use of a work without authorisation from the information provider and “manipulation” functions to permit the user to view or use the work

7 Controlling Use of the Work Hardware and/or software placed in personal computers can provide protection against unauthorised uses of copyrighted work For example, files containing works can include instructions used solely to govern or control distribution of the work In addition, the copyright information can be used to limit what can be done with the original or a copy of the file containing the work – it can limit the use of the file to read only and the number of times the work can be retrieved, opened, duplicated or printed

8 Implementing Electronic Contracts Software-based systems for tracking and monitoring uses of copyrighted works are being developed by publishers A combination of access controls, encryption technologies, and digital signatures can be used by copyright owners to protect, license, and authenticate information

9 Online Liability for Copyright Infringement The question exists as to who is liable for copyright infringement on digital networks There are differences of opinion as to the extent to which online service providers should be liable for infringing materials delivered over their systems


Download ppt "Electronic Commerce Semester 2 Term 2 Lecture 8. Digital Copyrights & Electronic Publishing Intellectual property rights (copyrights, trademarks, and."

Similar presentations


Ads by Google