Major, 1998 - Google Patents
Copyright law tackles yet another challenge: The Electronic frontier of the World Wide WebMajor, 1998
View PDF- Document ID
- 17329717315695082808
- Author
- Major A
- Publication year
- Publication venue
- Rutgers Computer & Tech. LJ
External Links
Snippet
The Internet has seen an explosion of popularity over the past few years. Government workers and university scholars of yesterday's Internet must now share today's Information Superhighway with big business, commercial industry, and hundreds of thousands of …
- 238000004880 explosion 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30011—Document retrieval systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30017—Multimedia data retrieval; Retrieval of more than one type of audiovisual media
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0722—Content
- G06F2221/0737—Traceability
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99939—Privileged access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television, VOD [Video On Demand]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Madison | Legal-ware: Contract and copyright in the digital age | |
Sag | Copyright and copy-reliant technology | |
Ginsburg | Putting cars on the information superhighway: authors, exploiters, and copyright in cyberspace | |
O'Rourke | Fencing cyberspace: drawing borders in a virtual world | |
Hamilton | The TRIPS Agreement: Imperialistic, outdated, and overprotective | |
Phan | Will fair use function on the Internet | |
Ginsburg et al. | Embedding Content or Interring Copyright: Does the Internet Need the Server Rule | |
Perritt Jr | Property and Innovation in the Global Information Infrastructure | |
Subba Rao | Copyright: its implications for electronic information | |
Major | Copyright law tackles yet another challenge: The Electronic frontier of the World Wide Web | |
Royan | Content creation and rights management: experiences of SCRAN (the Scottish Cultural Resources Access Network) | |
Carter | Copyright Ownership of Online News: Cultivating a Transformation Ethos in America's Emerging Statutory Attribution Right | |
Fraser | The copyright battle: emerging international rules and roadblocks on the global information infrastructure | |
Effross | Withdrawal of the Reference: Rights, Rules, and Remedies for Unwelcomed Web-Linking | |
MacQueen | Copyright and the Internet | |
Cavazos et al. | Copyright on the WWW: Linking and Liability | |
Driscoll | It's a small world after all: conflict of laws and copyright infringement on the information superhighway | |
Stowers | Moving governments on-line: Implementation and policy issues | |
Oppenheim | Copyright in the electronic age | |
Maloney | Intellectual property in cyberspace | |
Schmelzer | Protecting the Sweat of the Spider's Brow: Current Vulnerabilities of Internet Search Engines | |
Kerry-Tyerman | No Analog Analogue: Searchable Digital Archives and Amazon's Unprecedented Search Inside the Book Program as Fair Use | |
Dahm | Database protection v. deep linking | |
Waelde et al. | Moral Rights and the Internet: squaring the circle | |
Cornish | Copyright and document delivery in the electronic environment |