Verified Document

Intellectual Property In Cyberspace The Research Paper

In the contemporary cyber environment, innovation does not enhance success. For example, most patents such as songs and books receive low rewards. The author suggests that there is a need to make rules to enhance the bargain of intellectual property owners. Part 2

In the contemporary cyberspace and it world, the traditional copyright law has not been sufficient to protect intellectual property right in the face current development of computer and cyber technology. In the cyber world, the traditional copyright law is unable to protect the source code owners, which are the computer instructions written in human readable computer programming language. The importance of source code is that it assists computer to run several programs used for individual and business advantages. Despite the importance of source code, many penetrators have used different technological techniques to steal the source code of other people thereby infringing on the IP law.

Moreover, many legitimate websites have also being source of abuse by many penetrators. There has been an increase in the hacking of corporate websites by defacing the websites of many corporate organizations. Investigations have revealed that authors of these penetrators are from Asian countries where the U.S. IP laws do not cover. In the face of the recent cyber threats and inability of the traditional IP law to address the problem, the paper suggests that there is a need to limit the links of the cooperate website to some IP addresses. Organizations could limit the IP addresses, susceptible to infringe on the IP rights, to have access to legitimate corporate websites.

Historically, the copyright, patent and trademark...

However, the development it and cyber technology have continued to erode the traditional copyright and trademark laws. Typically, millions of copyrighted songs and movies have been downloaded illegally in the United States. With regard to the free speech rights and trademark ownership, there may be no conflict of free speech rights to trademark ownership if the free speech owner does not infringe on the trademark ownership rights.
The personality, utilitarian, labor, and social-planning theories have strengths similar to the themes of statues, judicial opinions and appellant briefs, however, the it laws have not echoed the significant number of these theories. Typically, many American courts still confuse trademark law to copyright right laws, and few IP theories pay significant attention to custom.

The Copyright Term Extension Act, which is also known as Sony Bono Copyright Term Extension Act has been an extension of copyright terms attempts to protect literary and artistic work. The Digital Millennium Act is a part of the U.S. copyright law to limit the illegal use of technology devices. All these laws attempt to protect the IP in the United States.

Reference

Bowie, N.E. (2005). Digital Rights and Wrongs: Intellectual Property in the Information Age. Business and Society Review: 110(1):77-96.

Chowbe, V.S. (2010). Intellectual Property and Its Protection in Cyberspace. The IUP Journal of Intellectual Property Rights. 9(12): 7-41.

Easterbrook, F.H. (2000). Cyberspace vs. Property Law? Texas Review of Law & Politics. Vol. 4.

Sources used in this document:
Reference

Bowie, N.E. (2005). Digital Rights and Wrongs: Intellectual Property in the Information Age. Business and Society Review: 110(1):77-96.

Chowbe, V.S. (2010). Intellectual Property and Its Protection in Cyberspace. The IUP Journal of Intellectual Property Rights. 9(12): 7-41.

Easterbrook, F.H. (2000). Cyberspace vs. Property Law? Texas Review of Law & Politics. Vol. 4.
Cite this Document:
Copy Bibliography Citation

Related Documents

IT Ethics -- Annotated Bibliography Bowie, Norman
Words: 2227 Length: 7 Document Type: Annotated Bibliography

IT Ethics -- Annotated Bibliography Bowie, Norman E. (2005). Digital Rights and Wrongs: Intellectual Property in the Information Age. Business and Society Review, 110(1), 77-96. Norman Bowie takes great pains in his peer-reviewed article to point out what is legal an what is not legal when it comes to recording / taping from television and from the Internet. In fact Bowie uses an illegal issue (downloading music from the Internet) to present a moral

Internet Governance by US Government
Words: 1763 Length: 6 Document Type: Research Paper

Internet Governance by U.S. Government An amateurish video, "Innocence of Muslims," posted on YouTube in September 2012 was the catalyst for a string of anti-American protests and riots throughout the Islamic world. The short trailer, promoting an anti-Muslim film, was attributed to a motley crew of right-wing Christians in America (Sengupta, 2012). Angry mobs in Egypt were the first to react to the video on September 11 when they breached the

Ethics and the Military As Globalism Becomes
Words: 1395 Length: 4 Document Type: Essay

Ethics and the Military As globalism becomes more of a reality, and as various developing countries increase the amount of interaction they do with developed countries, many cultural issues arise. Doing business is not the same worldwide, and as citizens of a global village, we must realize that there are different cultural norms and behaviors that are acceptable in some countries, unacceptable in others, and even expected in some. In the

Ethics in Patents in Amazon One Click
Words: 810 Length: 3 Document Type: Term Paper

Patents Ethics in Patents in Amazon One Click Patents are meant to protect the intellectual property of the people who apply for them. They are given when the process is a unique idea, or it offers an improvement to an existing idea that does not infringe on the original patent and is itself unique. The question is not whether patents themselves are ethical, but whether a business requesting a patent for a

Cybersecurity As an Organizational Strategy an Ethical and Legal...
Words: 3101 Length: 10 Document Type: Research Paper

Cybersecurity as an Organizational Strategy: An Ethical and Legal Perspective Cybersecurity as Organizational Strategy Across the board -- in business, society, and government -- the promise of cyber capabilities are matched by potential peril. The cyber environment is never static, but it is perhaps most agile in response to the continual stream of emerging cyber threats and realized cyber attacks ("PCAST," 2007). Cybersecurity must be agile. The challenges that must be met

Internet Laws
Words: 3271 Length: 8 Document Type: Term Paper

Internet Ethics and the consumer's private existence in an unstable regulatory environment -- untapped economic waters in a wild, wild west of identity theft and chronic consumption When it comes to Internet ethics, even in the absence of legal requirements, businesses must themselves self-regulate when it comes to consumer privacy. If they do not, it is likely that the government will step in to do so, as the government has done

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now