974 resultados para WIPO Copyright Treaty


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose – The purpose of this research is to show how the self-archiving of journal papers is a major step towards providing open access to research. However, copyright transfer agreements (CTAs) that are signed by an author prior to publication often indicate whether, and in what form, self-archiving is allowed. The SHERPA/RoMEO database enables easy access to publishers' policies in this area and uses a colour-coding scheme to classify publishers according to their self-archiving status. The database is currently being redeveloped and renamed the Copyright Knowledge Bank. However, it will still assign a colour to individual publishers indicating whether pre-prints can be self-archived (yellow), post-prints can be self-archived (blue), both pre-print and post-print can be archived (green) or neither (white). The nature of CTAs means that these decisions are rarely as straightforward as they may seem, and this paper describes the thinking and considerations that were used in assigning these colours in the light of the underlying principles and definitions of open access. Approach – Detailed analysis of a large number of CTAs led to the development of controlled vocabulary of terms which was carefully analysed to determine how these terms equate to the definition and “spirit” of open access. Findings – The paper reports on how conditions outlined by publishers in their CTAs, such as how or where a paper can be self-archived, affect the assignment of a self-archiving colour to the publisher. Value – The colour assignment is widely used by authors and repository administrators in determining whether academic papers can be self-archived. This paper provides a starting-point for further discussion and development of publisher classification in the open access environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis examines the early stages of the transformation of emblematic political prints into political caricature from the beginning of the Seven Years' War (1756) to the Treaty of Paris, which ended the American Revolutionary War (1783). Both contextual and iconographical issues are investigated in relation to the debates occasioned by Britain's imperial project, which marked a period of dramatic expansion during the Seven Years' War, and ended with the loss of the American colonies, consequently framing this thesis as a study of political prints during the rise and fall of the so-called 'First British Empire'. Previous studies of eighteenth-century political prints have largely ignored the complex and lengthy evolutionary process by which the emblematic mode amalgamated with caricatural representation, and have consequently concluded that political prints excluded emblems entirely by the end of the 1770s. However, this study emphasizes the significance of the Wilkite movement for the promotion and preservation of emblems, and investigates how pictorial political argument was perceived and received in eighteenth-century British society, arguing that wider tastes and opinions regarding the utilization of political prints gradually shifted to accept both modes of representation. Moreover, the marketplace, legal status, topicality, and manufacturing methods of political prints are analyzed in terms of understanding the precarious nature of their consumption and those that endeavoured to engage in political printmaking. The evolution, establishment, and subsequent appropriation of pictorial tropes is discussed from the early modern period to the beginning of the so-called Golden Age of caricature, while tracing the adaptation of representational models in American colonial prints that employed emblems already entrenched in British pictorial political debate. Political prints from the two largest print collections, the British Museum and the Lewis Walpole Library at Yale are consulted, along with a number of eighteenth-century newspapers and periodicals, to develop the earlier research by M. Dorothy George, Charles Press, Herbert Atherton, Diana Donald, Amelia Rauser, and Eirwen Nicholson.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Digitalization is, nowadays, a very important mechanism to help information get where it’s needed, thanks specially to the universality of internet access. However, it carries within the responsibility of making a good use of it, in means of copyright, guarding the existing legislation in Costa Rica and the international agreements in which the country takes part. Legislation allows, under certain premises, the use of digitalization. Nevertheless, it’s necessary to define the parameters in which these premises will be applied, so it’s used correctly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The advent of the World Network(Net) Internet and the use of the technology in the digital environment raised new challenges to the author's copyright. These worries were considered in the last international agreements, so that the warning is not true of those who postulate that the Internet is a " territory of nobody ", where the works are unprotected completely. To educate on the topic of the protection of the author's copyright and to provide with resources the instances(authorities) in charge of the observance of these rights looks like an ineluctable task.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study investigates the renegotiation of security alliances, specifically the structural conditions surrounding their revision. Although the field of international relations offers a rich discussion of the formation and violation of alliance treaties, few scholars have addressed the reasons why alliance members amend security obligations. After the formation of an alliance, a member may become dissatisfied owing to changes in the external and domestic security environments. A failure to address this discontent increases the risk of alliance breakdown. Members manage their alliance relationship through a negotiation process or intra-alliance bargaining in the search for a new arrangement that can endure. Factors that help to show commitment to the alliance and communicate a set of feasible solutions are crucial if members are to find a mutually acceptable arrangement. By taking these factors into account, allies are more likely to revise an existing treaty. Examining a set of bilateral alliances dating from 1945 to 2001, this research demonstrates that public requests for renegotiation compel allies to change the status quo. It is found that alliance-related fixed assets and the formation of external alliances increase the likelihood of treaty revision, though institutionalization of an alliance does not help to resolve interest divergence. In addition, this study examines the strategy of delay in intra-alliance bargaining. Allies may postpone a dispute by ignoring it while working to maintain the alliance. Tension among allies thus increases, but the alliance endures. I examine three alliances in order to illustrate this renegotiation process. Among these, the Anglo-Japanese alliance demonstrates two successful renegotiations that prolonged a wavering alliance relationship; the Sino-Soviet alliance is an example of failure owing to the lack of substantive cooperation; and the US-Taiwan alliance during the 1970s demonstrates successful use of a strategy of delay that appeases a dissatisfied member.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes the process of creating a controlled vocabulary which can be used to systematically analyse the copyright transfer agreements (CTAs) of journal publishers with regard to self-archiving. The analysis formed the basis of the newly created Copyright Knowledge Bank of publishers’ self-archiving policies. Self-archiving terms appearing in publishers’ CTAs were identified and classified, with these then being simplified, merged, and discarded to form a definitive list. The controlled vocabulary consists of three categories that describe ‘what’ can be self-archived, the ‘conditions’ of self-archiving and the ‘restrictions’ of self-archiving. Condition terms include specifications such as ‘where’ an article can be self archived, restriction terms include specifications such as ‘when’ the article can be self archived. Additional information on any of these terms appears in ‘free-text’ fields. Although this controlled vocabulary provides an effective way of analysing CTAs, it will need to be continually reviewed and updated in light of any major new additions to the terms used in publishers’ copyright and self-archiving policies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Advances in the technology available to consumers have fundamentally altered the relationship between authors, rights-holders and consumers with regard to copyrighted creative works. The copyright system in the UK is undergoing a gradual process of reform to reflect this new reality.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Annually, the association publishes a journal, The Proceedings, which consists of papers presented at the annual meeting. The Bryan-Chamorro Treaty by Rebecca M. Anderson – Greenwood High School Notes on the History of Public Health in South Carolina, 1670-1800 by St. Julien Ravenel Childs – The Citadel Samuel Slater, Father of American Manufactures by D.H. Gilpatrick – Furman University William Prynne, A Portrait by Laura Ellen Howard – Coker College Some Observations of Travelers on South Carolina, 1820-1860 by J. Rion McKissick – University of South Carolina

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Annually, the association publishes a journal, The Proceedings, which consists of papers presented at the annual meeting. The Protestant Missionary in China: Problems of the First Treaty Period, 1842-1860 by Gordon K. Harrington French Communism and the Non-Communist Intellectuals, 1949 by Frederick F. Ritsch The Charles Town Board of Police, 1780-1782: A Study in Civil Administration under Military Occupation by George S. McCowen, Jr. Racism in the Administrations of Governor Cole Blease by Ronald D. Burnside The Twentieth Century: Age of the Dictators by Preston W. Slosson

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Chaque année, le piratage mondial de la musique coûte plusieurs milliards de dollars en pertes économiques, pertes d’emplois et pertes de gains des travailleurs ainsi que la perte de millions de dollars en recettes fiscales. La plupart du piratage de la musique est dû à la croissance rapide et à la facilité des technologies actuelles pour la copie, le partage, la manipulation et la distribution de données musicales [Domingo, 2015], [Siwek, 2007]. Le tatouage des signaux sonores a été proposé pour protéger les droit des auteurs et pour permettre la localisation des instants où le signal sonore a été falsifié. Dans cette thèse, nous proposons d’utiliser la représentation parcimonieuse bio-inspirée par graphe de décharges (spikegramme), pour concevoir une nouvelle méthode permettant la localisation de la falsification dans les signaux sonores. Aussi, une nouvelle méthode de protection du droit d’auteur. Finalement, une nouvelle attaque perceptuelle, en utilisant le spikegramme, pour attaquer des systèmes de tatouage sonore. Nous proposons tout d’abord une technique de localisation des falsifications (‘tampering’) des signaux sonores. Pour cela nous combinons une méthode à spectre étendu modifié (‘modified spread spectrum’, MSS) avec une représentation parcimonieuse. Nous utilisons une technique de poursuite perceptive adaptée (perceptual marching pursuit, PMP [Hossein Najaf-Zadeh, 2008]) pour générer une représentation parcimonieuse (spikegramme) du signal sonore d’entrée qui est invariante au décalage temporel [E. C. Smith, 2006] et qui prend en compte les phénomènes de masquage tels qu’ils sont observés en audition. Un code d’authentification est inséré à l’intérieur des coefficients de la représentation en spikegramme. Puis ceux-ci sont combinés aux seuils de masquage. Le signal tatoué est resynthétisé à partir des coefficients modifiés, et le signal ainsi obtenu est transmis au décodeur. Au décodeur, pour identifier un segment falsifié du signal sonore, les codes d’authentification de tous les segments intacts sont analysés. Si les codes ne peuvent être détectés correctement, on sait qu’alors le segment aura été falsifié. Nous proposons de tatouer selon le principe à spectre étendu (appelé MSS) afin d’obtenir une grande capacité en nombre de bits de tatouage introduits. Dans les situations où il y a désynchronisation entre le codeur et le décodeur, notre méthode permet quand même de détecter des pièces falsifiées. Par rapport à l’état de l’art, notre approche a le taux d’erreur le plus bas pour ce qui est de détecter les pièces falsifiées. Nous avons utilisé le test de l’opinion moyenne (‘MOS’) pour mesurer la qualité des systèmes tatoués. Nous évaluons la méthode de tatouage semi-fragile par le taux d’erreur (nombre de bits erronés divisé par tous les bits soumis) suite à plusieurs attaques. Les résultats confirment la supériorité de notre approche pour la localisation des pièces falsifiées dans les signaux sonores tout en préservant la qualité des signaux. Ensuite nous proposons une nouvelle technique pour la protection des signaux sonores. Cette technique est basée sur la représentation par spikegrammes des signaux sonores et utilise deux dictionnaires (TDA pour Two-Dictionary Approach). Le spikegramme est utilisé pour coder le signal hôte en utilisant un dictionnaire de filtres gammatones. Pour le tatouage, nous utilisons deux dictionnaires différents qui sont sélectionnés en fonction du bit d’entrée à tatouer et du contenu du signal. Notre approche trouve les gammatones appropriés (appelés noyaux de tatouage) sur la base de la valeur du bit à tatouer, et incorpore les bits de tatouage dans la phase des gammatones du tatouage. De plus, il est montré que la TDA est libre d’erreur dans le cas d’aucune situation d’attaque. Il est démontré que la décorrélation des noyaux de tatouage permet la conception d’une méthode de tatouage sonore très robuste. Les expériences ont montré la meilleure robustesse pour la méthode proposée lorsque le signal tatoué est corrompu par une compression MP3 à 32 kbits par seconde avec une charge utile de 56.5 bps par rapport à plusieurs techniques récentes. De plus nous avons étudié la robustesse du tatouage lorsque les nouveaux codec USAC (Unified Audion and Speech Coding) à 24kbps sont utilisés. La charge utile est alors comprise entre 5 et 15 bps. Finalement, nous utilisons les spikegrammes pour proposer trois nouvelles méthodes d’attaques. Nous les comparons aux méthodes récentes d’attaques telles que 32 kbps MP3 et 24 kbps USAC. Ces attaques comprennent l’attaque par PMP, l’attaque par bruit inaudible et l’attaque de remplacement parcimonieuse. Dans le cas de l’attaque par PMP, le signal de tatouage est représenté et resynthétisé avec un spikegramme. Dans le cas de l’attaque par bruit inaudible, celui-ci est généré et ajouté aux coefficients du spikegramme. Dans le cas de l’attaque de remplacement parcimonieuse, dans chaque segment du signal, les caractéristiques spectro-temporelles du signal (les décharges temporelles ;‘time spikes’) se trouvent en utilisant le spikegramme et les spikes temporelles et similaires sont remplacés par une autre. Pour comparer l’efficacité des attaques proposées, nous les comparons au décodeur du tatouage à spectre étendu. Il est démontré que l’attaque par remplacement parcimonieux réduit la corrélation normalisée du décodeur de spectre étendu avec un plus grand facteur par rapport à la situation où le décodeur de spectre étendu est attaqué par la transformation MP3 (32 kbps) et 24 kbps USAC.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Copyright markets, it is said, are ‘winner takes all’ markets favouring the interests of corporate investors over the interests of primary creators. However, little is known about popular music creators’ ‘lived experience’ of copyright. This thesis interrogates key aspects of copyright transactions between creators and investors operating in the UK music industries using analysis of various copyright related documents and semi-structured interviews with creators and investors. The research found considerable variety in the types of ‘deal’ creators enter into and considerable divergence in the potential rewards. It was observed that new-entrant creators have little comprehension of the basic tenets of copyright, but with experience they become more ‘copyright aware’. Documentary and interview evidence reveals creators routinely assign copyright to third party investors for the full term of copyright in sound recordings: the justification for this is questionable. An almost inevitable consequence of this asymmetry of understanding of copyright and asymmetry of bargaining power is that creators become alienated from their copyright works. The empirical evidence presented here supports historic and contemporary calls for a statutory mechanism limiting the maximum copyright assignment period to ten-years.