844 resultados para internet copyright


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fair Use Week has celebrated the evolution and development of the defence of fair use under copyright law in the United States. As Krista Cox noted, ‘As a flexible doctrine, fair use can adapt to evolving technologies and new situations that may arise, and its long history demonstrates its importance in promoting access to information, future innovation, and creativity.’ While the defence of fair use has flourished in the United States, the adoption of the defence of fair use in other jurisdictions has often been stymied. Professor Peter Jaszi has reflected: ‘We can only wonder (with some bemusement) why some of our most important foreign competitors, like the European Union, haven’t figured out that fair use is, to a great extent, the “secret sauce” of U.S. cultural competitiveness.’ Jurisdictions such as Australia have been at a dismal disadvantage, because they lack the freedoms and flexibilities of the defence of fair use.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Trans-Pacific Partnership is a sweeping trade agreement, spanning the Pacific Rim, and covering an array of topics, including intellectual property. There has been much analysis of the recently leaked intellectual property chapter of the Trans-Pacific Partnership by WikiLeaks. Julian Assange, WikiLeaks’ Editor-in-Chief, observed “The selective secrecy surrounding the TPP negotiations, which has let in a few cashed-up megacorps but excluded everyone else, reveals a telling fear of public scrutiny. By publishing this text we allow the public to engage in issues that will have such a fundamental impact on their lives.” Critical attention has focused upon the lack of transparency surrounding the agreement, copyright law and the digital economy; patent law, pharmaceutical drugs, and data protection; and the criminal procedures and penalties for trade secrets. The topic of trade mark law and related rights, such as internet domain names and geographical indications, deserves greater analysis.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fair Use Week has been celebrated this week in the United States, with great gusto and enthusiasm. At Harvard Library, Kyle Courtney commented: ‘Fair use is critical and important to innovation, scholarship and research in the United States.’ Kenneth Crews emphasized that ‘the new technological ventures, like other creative pursuits, require fair use and other copyright limitations for experimentation and success.’ Legal director Corynne McSherry of the Electronic Frontier Foundation has highlighted the significance and the importance of the defence of fair use: ‘Fair use provides breathing space in copyright law, making sure that control of the right to copy and distribute doesn’t become control of the right to create and innovate.’ For Techdirt, Mike Masnick has emphasized that fair use is a right – and not an exception or a mere defence. Peter Jaszi and Pat Aufderheide have highlighted the contextual operation of fair use in particular artistic communities. Molly Van Houweling of the Authors Alliance has written about the ecstasy of influence – the role of inspiration and appropriation in all acts of artistic creation. Fair use has been celebrated as a many-splendored legal creation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There’s nothing new about this recipe for success: toss in high-stress scenarios, flavour generously with competitive chefs, and garnish with a panel of celebrity judges. With all major broadcasters in the country now dishing up some form of reality cooking programme, Australians could be forgiven for having lost any expectation of original TV material. But that didn’t stop Channel Seven from taking Channel Nine to court last week, arguing its copyright in My Kitchen Rules had been infringed with Nine’s latest prime-time effort, The Hotplate. After the first few episodes went to air, Seven asked for an injunction to stop Nine from broadcasting any more episodes of the reality show. So let’s look at some common confusions about copyright law and how it relates to reality television. Because in this context, copyright infringement isn’t about shows sharing major similarities, or about protecting ideas, but rather the expression of these ideas in the final product. Still, stretching copyright law to protect the “vibe” of a work isn’t good for artists, TV producers or viewers: copyright was designed to nurture creativity, not stifle it.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The makers of Dallas Buyers Club have been dealt a blow in their attempt to extract payment from people alleged to have downloaded illegal copies of the movie. Voltage Pictures, which owns Dallas Buyers Club, has been trying to identify over 4,700 iiNet subscribers who it alleges downloaded illicit copies of the movie. Earlier this year, the Federal Court agreed that iiNet should hand over subscriber details, but warned that any letter sent to account holders must first be approved by the court to protect consumers from abuse of the legal system. In a win for consumer protection, the Federal Court has now rejected Voltage’s draft letters, criticising Voltage’s attempts to avoid explaining what fee it would demand.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article considers copyright law and the art of appropriation in an Australian context. It tells four stories about Australian artists - Imants Tillers, Gordon Bennett, Juan Davila and Tracey Moffatt. The stories examine the postmodern critique of copyright law, indigenous copyright and self-determination, the introduction of moral rights, and copyright, photography and film. The article concludes that the work of such contemporary artists has practical implications for the reform of copyright law.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take priority in many circumstances. As such the overall security and performance metrics of those cryptographic functions in their embedded context needs to be understood. Understanding those metrics has been the main aim of this research activity. This research reports on an implementation of one network security technology, Internet Protocol Security (IPSec), to assess security performance. This research simulates sensitive healthcare information being transferred over networks, and then measures data delivery times with selected security parameters for various communication scenarios on Linux-based and Windows-based systems. Based on our test results, this research has revealed a number of network security metrics that need to be considered when designing and managing network security for healthcare-specific or non-healthcare-specific systems from security, performance and manageability perspectives. This research proposes practical recommendations based on the test results for the effective selection of network security controls to achieve an appropriate balance between network security and performance

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2013, social networking was the second most popular online activity after internet banking for Australians (ABS, 2014). The popularity and apparent ubiquity of social media is one of the most obvious and compelling arguments for integrating such technologies into higher education. Already, social media impacts a wide range of activities ranging in scope from marketing and communication to teaching and learning in higher education (Hrastinski & Dennen, 2012). Social media presents many exciting possibilities and opportunities for higher education. This session will focus on one staff focussed and one student focussed social media innovation currently underway at QUT. First, it will focus on the actions of QUT’s social media working group. The working group’s aim is to ensure an overarching social media policy for the university is developed and implemented that supports staff in the use of social media across a range of activities. Second, it will discuss the eResponsible and eProfessional Online resources for students project. The focus of this project is to develop a suite of online resources targeted at the devel opment of social media skills for undergraduate students at QUT. These initiatives are complementary and both aim to minimise risk while maximising opportuniti es for the university

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This submission covers the following terms of reference: • the current levels of financial literacy of seniors and how that can be improved, for example by education programs; • what support and advice is available to assist seniors with their independent financial decision-making; • online and internet based vulnerabilities and the prevalence and vulnerability of seniors to scams; • agencies and organisations that provide advice and support to seniors requiring financial protection; and • the role of the financial sector in ensuring adequate safeguards for seniors in relation to financial decision-making.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose This paper aims to use the Model of Goal-Directed Behavior (MGB) to examine the factors affecting consumers’ continued use of emerging technology-based self-services (TBSSs) with credence qualities. Professional services, which traditionally require specialized knowledge and high levels of interpersonal interaction to produce owing to their credence qualities, are increasingly delivered via self-service technologies. Health services delivered via mobile devices, for example, facilitate self-care without direct involvement from health professionals. Design/methodology/approach A mental health service delivered via the Internet and mobile phone, myCompass, was selected as the research context. Twenty interviews were conducted with users of myCompass and the data were thematically analyzed. Findings The findings of the study showcase the unique determinants of consumers’ continued use of TBSSs with credence qualities relative to the more routine services which have been the focus of extant research. The findings further provide support for the utility of the MGB in explaining service continuance, although the importance of distinguishing between extrinsic and intrinsic motivational components of behavioral desire and capturing the impact of social influence beyond subjective norms is also highlighted. Originality/value This study contributes to recent research examining differences in consumer responses across TBSSs and behavioral loyalty to these services. It also provides empirical evidence for broadening and deepening the MGB within this behavioral domain.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Resources to help the older aged (≥65 year olds) manage their medicines should probably target those in greatest need. The older-aged have many different types of living circumstances. There are different locations (urban, rural), different types of housing (in the community or in retirement villages), different living arrangements (living alone or with others), and different socioeconomic status (SES) circumstances. However, there has been limited attention to whether these living circumstances affect adherence to medicines in the ≥65 year olds. Aim of the review The aim was to determine whether comparative studies, including logistic regression studies, show that living circumstances affect adherence to medicines by the ≥65 year olds. Methods A literature search of Medline, CINAHL and the Internet (Google) was undertaken. Results Four comparative studies have not shown differences in adherence to medicines between the ≥65 year olds living in rural and urban locations, but one study shows lower adherence to medicines for osteoporosis in rural areas compared to metropolitan, and another study shows greater adherence to antihypertensive medicines in rural than urban areas. There are no comparative studies of adherence to medicines in the older-aged living in indigenous communities compared to other communities. There is conflicting evidence as to whether living alone, being unmarried, or having a low income/worth is associated with nonadherence. Preliminary studies have suggested that the older-aged living in rental, low SES retirement villages or leasehold, middle SES retirement villages have a lower adherence to medicines than those living in freehold, high SES retirement villages. Conclusions The ≥65 year olds living in rural communities may need extra help with adherence to medicines for osteoporosis. The ≥65 year olds living in rental or leasehold retirement villages may require extra assistance/resources to adhere to their medicines. Further research is needed to clarify whether living under certain living circumstances (e.g. living alone, being unmarried, low income) has an effect on adherence, and to determine whether the ≥65 year olds living in indigenous communities need assistance to be adherent to prescribed medicines.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Unified communications as a service (UCaaS) can be regarded as a cost-effective model for on-demand delivery of unified communications services in the cloud. However, addressing security concerns has been seen as the biggest challenge to the adoption of IT services in the cloud. This study set up a cloud system via VMware suite to emulate hosting unified communications (UC), the integration of two or more real time communication systems, services in the cloud in a laboratory environment. An Internet Protocol Security (IPSec) gateway was also set up to support network-level security for UCaaS against possible security exposures. This study was aimed at analysis of an implementation of UCaaS over IPSec and evaluation of the latency of encrypted UC traffic while protecting that traffic. Our test results show no latency while IPSec is implemented with a G.711 audio codec. However, the performance of the G.722 audio codec with an IPSec implementation affects the overall performance of the UC server. These results give technical advice and guidance to those involved in security controls in UC security on premises as well as in the cloud.