878 resultados para IP enforcement
Resumo:
This report examines recent updates to the regulation and enforcement of intellectual property (IP) rights in Korea and China, in particular patent rights including invention, utility, and design rights. This paper also discusses some features and issues of the actual IP enforcement situation in those countries in comparison with Japan.
Resumo:
This report details research into the enforcement of intellectual property (IP). It considers the attitudes and practices of small and medium-sized enterprises (SMEs) and micro firms as well as the cost implications of the present IP enforcement system in the UK. According to an earlier report for SABIP, by Weatherall et al. 2009, in the Gowers Review of Intellectual Property questions of enforcement were largely addressed through assertion, rather than empirical research. This report aims to provide such research. Our study included both an online survey and a phone survey. These concentrated on SMEs and micro firms rather than being a comparative study with large firms. Further work obtained information on Patents and Registered Design cases listed for hearings in the Patents Court from 2003 to 2009. The analysis of this data provides some evidence that complements the results of the survey.
Resumo:
This report details research into the enforcement of intellectual property (IP). It considers the attitudes and practices of small and medium-sized enterprises (SMEs) and micro firms as well as the cost implications of the present IP enforcement system in the UK. According to an earlier report for SABIP, by Weatherall et al. 2009, in the Gowers Review of Intellectual Property questions of enforcement were largely addressed through assertion, rather than empirical research. This report aims to provide such research. Our study included both an online survey and a phone survey. These concentrated on SMEs and micro firms rather than being a comparative study with large firms. Further work obtained information on Patents and Registered Design cases listed for hearings in the Patents Court from 2003 to 2009. The analysis of this data provides some evidence that complements the results of the survey.
Resumo:
In light of the death of internet activist Aaron Swartz, there is a need to reconsider intellectual property enforcement standards in the Trans-Pacific Partnership. The 16th round of the Trans-Pacific Partnership negotiations are taking place in Singapore until March 13. There have been concerns that the Intellectual Property Chapter would “ratchet up IP enforcement at the expense of digital rights”. Maira Sutton of the Electronic Frontier Foundation fears that “the Trans-Pacific Partnership could turn Internet Service Providers into copyright cops, prompt ever-higher criminal and civil penalties for sharing content, and expand protections for Digital Rights Management”. The case of Aaron Swartz highlights the need for a reconsideration of punitive and excessive intellectual property enforcement provisions in trade agreements.
Resumo:
The EU is considered to be one of the main proponents of what has been called the deep trade agenda—that is, the push for further trade liberalization with an emphasis on the removal of domestic non-tariff regulatory measures affecting trade, as opposed to the traditional focus on the removal of trade barriers at borders. As negotiations on the Doha Development Round have stalled, the EU has attempted to achieve these aims by entering into comprehensive free trade agreements (FTAs) that are not only limited exclusively to tariffs but also extend to non-tariff barriers, including services, intellectual property rights (IPRs), competition, and investment. These FTAs place great emphasis on regulatory convergence as a means to secure greater market openings. The paper examines the EU's current external trade policy in the area of IP, particularly its attempts to promote its own regulatory model for the protection of IP rights through trade agreements. By looking at the IP enforcement provisions of such agreements, the article also examines how the divisive issues that are currently hindering the progress of negotiations at WTO level, including the demands from developing countries to maintain a degree of autonomy in the area of IP regulation as well as the need to balance IP protection with human rights protection, are being dealt with in recent EU FTAs.
Resumo:
The enforcement of Intellectual Property rights poses one of the greatest current threats to the privacy of individuals online. Recent trends have shown that the balance between privacy and intellectual property enforcement has been shifted in favour of intellectual property owners. This article discusses the ways in which the scope of preliminary discovery and Anton Piller orders have been overly expanded in actions where large amounts of electronic information is available, especially against online intermediaries (service providers and content hosts). The victim in these cases is usually the end user whose privacy has been infringed without a right of reply and sometimes without notice. This article proposes some ways in which the delicate balance can be restored, and considers some safeguards for user privacy. These safeguards include restructuring the threshold tests for discovery, limiting the scope of information disclosed, distinguishing identity discovery from information discovery, and distinguishing information preservation from preliminary discovery.
Resumo:
O fornecimento de facilidades de QoS em redes de computadores tem por objetivo introduzir níveis das garantias que são ausentes, por exemplo, no paradigma de melhor-esforço das redes IP. Diferentes arquiteturas de QoS possuem padrões diferentes para os serviços fornecidos, que conduzem a um cenário em que a QoS prevista não possa ser sempre fornecida corretamente pela arquitetura utilizada. Neste contexto, uma monitoração da QoS é necessária para verificar a QoS observada e para compará-la com a QoS esperada/ contratada. Em uma rede que utilize gerenciamento baseado em políticas, a QoS esperada é definido pelas políticas que regem o comportamento da rede. O Internet Engineering Task Force (IETF) tem padronizado vários elementos para um sistema de gerenciamento de redes baseado em políticas (PBNM), no qual políticas são definidas utilizando-se linguagem de alto nível, armazenadas em repositórios para políticas, aplicadas com o auxilio de Policy Decision Points (PDPs) e mantidas por Enforcement Points (PEPs). Pela definição do IETF, uma vez que uma política é aplicada com sucesso, o sistema de PBNM não mais checará o comportamento desta, e a QoS definida é assumida com a fornecida pela rede. De fato, isso nem sempre é verdade. A arquitetura da qual provém a QoS pode apresentar-se instável ou mediante problemas, logo a QoS esperada não seria atingida. Para verificar a degradação na QoS em ambientes de gerenciamento reais, atualmente, o administrador da rede monitora a rede e determina a QoS fornecida. Tal QoS é, por sua vez, manualmente comparada com a QoS definida pelas políticas de rede. Finalmente, se diferenças são encontradas, o administrador procede com medidas que levem a arquitetura a um estado consistente Nos dias de hoje, as definições e aplicações de políticas e monitoração de QoS são tarefas executadas separadamente pelas soluções disponíveis. Além disso, como demonstrado anteriormente, a verificação da QoS fornecida contra a QoS definida pelas políticas da rede é deixada a cargo do administrador da rede. Nesse contexto, a automação da monitoração das políticas de QoS e a integração entre as tarefas citadas são necessárias do ponto de vista do administrador da rede. Nesta dissertação, é proposta uma definição (e um sistema) para a monitoração de QoS em que as definições de políticas são dados de entrada utilizados para checar a QoS observada. No momento em que uma degradação na QoS é detectada, o sistema de monitoração notifica um gerente com suporte a SNMP utilizando mensagens do tipo InformRequest. A arquitetura do sistema é dividida internamente em monitores de QoS e controladores de monitores de QoS. Cada controlador de monitor de QoS controla vários monitores de QoS, os quais coletam dados da rede. Tais dados são comparados com as políticas traduzidas pelo controlador, e, caso sejam detectadas degradações, o controlador de monitor de QoS notifica o gerente. A comunicação entre controlador de monitores de QoS e monitores de QoS também é baseada em SNMP. O principal objetivo do trabalho é fornecer uma solução que integre monitoração de QoS e PBNM em um único ambiente de gerenciamento.
Resumo:
Despite increasingly sophisticated speed management strategies, speeding remains a significant contributing factor in 25% of Australia’s fatal crashes. Excessive speed is also a recognised contributor to road trauma in rapidly motorising countries such as China, where increases in vehicle ownership and new drivers, and a high proportion of vulnerable road users all contribute to a high road trauma rate. Speed choice is a voluntary behaviour. Therefore, driver perceptions are important to our understanding of the nature of speeding. This paper reports preliminary qualitative (focus groups) and quantitative (survey) investigations of the perceptions of drivers in Queensland and Beijing. Drivers’ definitions of speeding as well as their perceptions of the influence of legal factors on their reported speeds were explored. Survey participants were recruited from petrol stations (Queensland, n=833) and car washes (Beijing, n=299). Similarities were evident in justifications for exceeding speed limits across samples. Excessive speeds were not deemed as ‘speeding’ when drivers considered that they were safe and under their control, or when speed limits were seen as unreasonably low. This appears linked to perceptions of enforcement tolerances in some instances with higher perceived enforcement thresholds noted in China. Encouragingly, drivers in both countries reported a high perceived risk of apprehension if speeding. However, a substantial proportion of both samples also indicated perceptions of low certainty of receiving penalties when apprehended. Chinese drivers considered sanctions less severe than did Australian drivers. In addition, strategies to avoid detection and penalties were evident in both samples, with Chinese drivers reporting a broader range of avoidant techniques. Implications of the findings for future directions in speed management in both countries are discussed.
Resumo:
Research has highlighted the relationship between vehicle speed and increased crash risk and severity. Evidence suggests that police speed enforcement, in particular speed camera operations, can be an effective tool for reducing traffic crashes. A quantitative survey of Queensland drivers (n = 852) was conducted to investigate the impact of police speed enforcement methods on self-reported speeding behaviour. Results indicate that visible enforcement was associated with significantly greater self-reported compliance than covert operations irrespective of the mobility of the approach, and the effects on behaviour were longer lasting. The mobility of operations appeared to be moderated the visibility of the approach. Specifically, increased mobility was associated with increase reported compliant behaviour, but only for covert operations, and increased longevity of reported compliant behaviour, but only for overt operations. The perceived effectiveness of various speed enforcement approaches are also analysed across a range of driving scenarios. Results are discussed in light of the small effect sizes. Recommendations for policy and future research are presented.
Resumo:
Since 1986 Vietnam has been engaged in the transition from a centrally-controlled economy to a socialist-oriented market economy (the 'doi moi' renovation). The process for global economic integration has been slow given the magnitude of necessary reforms. Consequently technology entrepreneurs often discount Vietnam as a possible commercialization base which means that it is not realising its economic potential as a hub of technology transfer in the Asia-Pacific region. Three significant factors in the current uncertainty are Vietnam's laws on competition, intellectual property and technology transfer. Another problem is the lack of literature on these laws. This article first discusses the conceptual relationship between competition, intellectual property and technology transfer. Hopefully the article will provide some guidance for the technology entrepreneur considering foreign direct investment (FDI) in Vietnam. The bottom line is that these laws still need further reform to bolster entrepreneurial confidence.
Resumo:
High-rate flooding attacks (aka Distributed Denial of Service or DDoS attacks) continue to constitute a pernicious threat within the Internet domain. In this work we demonstrate how using packet source IP addresses coupled with a change-point analysis of the rate of arrival of new IP addresses may be sufficient to detect the onset of a high-rate flooding attack. Importantly, minimizing the number of features to be examined, directly addresses the issue of scalability of the detection process to higher network speeds. Using a proof of concept implementation we have shown how pre-onset IP addresses can be efficiently represented using a bit vector and used to modify a “white list” filter in a firewall as part of the mitigation strategy.