Library and Information Service >
Risk Assessment of Copyright Infringement for Network Information Resources Based on Extension Theory
Received date: 2014-04-14
Revised date: 2014-05-27
Online published: 2014-07-05
As to the copyright infringement of network information resources, this article firstly defines the infringement subjects from aspects of hardware and software service. Then it calculates the weight of indicators using AHP and builds the integrated risk assessment model by introducing extension theory, based on the established index system with incompatibility. At last, a numerical example is examined to show the effectiveness and usefulness of this method in evaluating the copyright risk of network information resources. It provides an effective assessment tool for the network service providers to know the copyright risk.
Li Chan , Zhang Wende , Lan Yixin . Risk Assessment of Copyright Infringement for Network Information Resources Based on Extension Theory[J]. Library and Information Service, 2014 , 58(13) : 22 -30 . DOI: 10.13266/j.issn.0252-3116.2014.13.004
[1] 北川善太郎. 网上信息, 著作权与契约[J]. 外国法译评, 1998 (3): 38-47.
[2] 段维. 网络版权保护论纲[M]. 武汉: 华中师范大学出版社, 2012:1-3.
[3] 冉从敬. 网络信息资源知识产权主体研究[J]. 图书情报工作, 2006,50(1): 80-93.
[4] 贺德方. 我国数字化信息资源知识产权保护问题研究[J]. 中国软科学, 2006(5): 89-95.
[5] 邱均平, 陈敬全.网络信息资源的知识产权管理研究(3)——数字图书馆著作权保护技术及其规避行为的法律对策[J]. 图书馆建设, 2003(1):31-33.
[6] Timothy L W. Intellectual property: Everything the digital-age librarian needs to know[M]. Chicago: American Library Association, 2008: 23-26.
[7] Wyatt A M, Hahn S E. Copyright concerns triggered by Web 2.0 uses[J]. Reference Services Review, 2011, 39(2): 303-317.
[8] Zimmerman D E, Muraski M. Only a click away-copyright infringement on the WWW Source[C]//IEEE Computer Society. International Professional Communication Conference. Quebec: IEEE,1998:251-258.
[9] Fernandez-Molina J C. Contractual and technological approaches for protecting digital works: Their relationship with copyright limitations[J]. Online Information Review, 2004, 28(2): 148-157.
[10] 陈传夫.数字时代信息资源知识产权制度的现状与展望[J].大学图书馆学报,2003(2):9-14.
[11] 邱均平,陈敬全.中美数字化信息资源知识产权保护的比较分析[J]. 图书与情报, 2002(2):2-4,7.
[12] 张文德, 李婵. 基于HHM框架的数字图书馆知识产权风险识别[J]. 图书情报工作, 2011, 55(15):67-71.
[13] 张文德, 袁圆. 数字图书馆知识产权风险评估[J]. 情报理论与实践, 2012, 35(5):20-22.
[14] 冉从敬. 规避数字图书馆知识产权风险的策略分析[J]. 国家图书馆学刊, 2009(2): 33-38.
[15] 陈传夫. 馆藏文献数字化的知识产权风险与对策研究[J]. 图书情报知识, 2004(5): 2-5.
[16] 陈传夫. 开放软件资源的知识产权问题研究[J]. 大学图书馆学报, 2004, 22(5): 11-15.
[17] 贺德方. 我国科技期刊著作权流转中的问题及对策研究[J]. 中国科技期刊研究, 2013, 24(1): 6-10.
[18] 刘震, 张文德. WBS-RBS 在网络信息采集著作权风险识别研究中的应用[J]. 图书情报知识, 2011(6): 86-92.
[19] 李婵, 张文德. 网络信息资源著作权风险评估指标体系构建[J]. 图书情报知识, 2014(2): 102-110.
[20] 兰晓为, 彭小坤.“网络服务提供者”之微观解析[J]. 科技与法律, 2009(5): 21-25.
[21] Developing a copyright risk management plan [EB/OL].[2013-08-27].http://www.copyright laws.com/wp-content/uploads/2010/05/Column-38-2008-3-Copyright-Risk-Management.pdf.
[22] Saaty T L. The Modern Science of Multicriteria Decision Making and its practical applications: The AHP/ANP approach[J]. Operations Research, 2013, 61(5): 1101-1118.
[23] 中华人民共和国著作权法(修正)[EB/OL]. [2013-08-27]. http://www.gov.cn/banshi/2005-08/21/content_25098.htm.
[24] 蔡文. 可拓集合和不相容问题[J]. 科学探索学报, 1983(1):83-97.
[25] 蔡文, 杨春燕. 可拓学的基础理论与方法体系[J]. 科学通报, 2013, 58(13): 1190-1199.
[26] Chao K H, Chen Jingwei. State-of-health estimator based-on extension theory with a learning mechanism for lead-acid batteries[J]. Expert Systems with Applications, 2011, 38(12): 15183-15193.
[27] Wang Menghui, Chung Yukuo. Applications of thermal image and extension theory to biometric personal recognition[J]. Expert Systems with Applications, 2012, 39(8): 7132-7137.
[28] Xu Yuan, Zhu Qunxiong. A new extension theory-based production operation method in industrial process[J]. Chinese Journal of Chemical Engineering, 2013, 21(1): 44-54.
[29] Wong Heung, Hu Baoqing. Application of improved extension evaluation method to water quality evaluation[J]. Journal of Hydrology, 2014, 509(2): 539-548.
[30] 杨玉中, 冯长根, 吴立云. 基于可拓理论的煤矿安全预警模型研究[J]. 中国安全科学学报, 2008, 18(1): 40-45.
[31] He Yongxiu, Dai Aiying, Zhu J, et al. Risk assessment of urban network planning in china based on the matter-element model and extension analysis[J]. International Journal of Electrical Power & Energy Systems, 2011, 33(3): 775-782.
[32] Zhang Limao, Wu Xianguo, Ding Lieyun, et al. A novel model for risk assessment of adjacent buildings in tunneling environments[J]. Building and Environment, 2013, 65: 185-194.
[33] 郑君君, 赵贵玉. 基于信息熵与物元可拓法的风险投资动态决策研究[J]. 经济评论, 2009(3): 122-129.
[34] 李晓峰, 徐玖平. 基于物元与可拓集合理论的企业技术创新综合风险测度模型[J]. 中国管理科学, 2011, 19(3): 104-109.
[35] Ren J, Manzardo A, Toniolo S, et al. Sustainability of hydrogen supply chain. Part II: Prioritizing and classifying the sustainability of hydrogen supply chains based on the combination of extension theory and AHP[J]. International Journal of Hydrogen Energy, 2013, 38(32): 13845-13855.
[36] 彭辉. 版权保护制度理论与实证研究[M]. 上海:上海社会科学院出版社, 2012: 16-36.
[37] 第31次互联网报告: 网民规模与结构特征. [EB/OL]. [2014-01-06]. http://it.people.com.cn/n/2013/0115/c354305-20207435-2.html.
/
〈 | 〉 |