TITLE

CD-ROM, piracy, and the emerging technology fix

AUTHOR(S)
Boden, Larry
PUB. DATE
September 1995
SOURCE
CD-ROM Professional;Sep95, Vol. 8 Issue 9, p68
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Focuses on counterfeiting of CD-ROMs. Impact of piracy on businesses; Overview of international software piracy; Fighting the good piracy fight; Examples of antipiracy enforcement at work; Serialization; Source Identification (SID) Codes; Data encryption; Noncopying embedded passwords. INSET: Piracy around the world: One war, four campaigns.; The overt....
ACCESSION #
9510025878

 

Related Articles

  • LA Law(less).  // PC Week;9/20/93, Vol. 10 Issue 37, pA/6 

    Reports on the prevalence of software piracy in Los Angeles, California. Dubious distinction of leading the nation in software piracy according to the Software Publishers Association; Pirates stealing more than $1 billion in intellectual property; Top five state offenders.

  • One Opinion, Two Controversies: 2nd Circuit limits copyright protection for software, approves court expert. DeBenedictis, Don J. // ABA Journal;Sep92, Vol. 78 Issue 9, p26 

    Reports on the federal appellate decision regarding the restriction of copyright protection for computer software in the U.S. Protection of non literal aspects of a computer program; Division of the work into different levels of abstraction.

  • CD DVD piracy. Block, Debbie Galante // EMedia Professional;Dec97, Vol. 10 Issue 12, p92 

    Details current efforts to curb software piracy in the United States and abroad. Opposing views on combatting software piracy; Impact of piracy; Anti-piracy technologies like encryption; CD replicators' role in making sure legitimate Compact Discs (CDs) get into the stores; Application of...

  • GREATER SOFTWARE PROTECTION. Wolf, Nora // ABA Journal;Oct86, Vol. 72 Issue 10, p48 

    Focuses on legislator Patricia Schroeder's introduction of a bill aimed at preventing the illegal commercial copying of software in the United States. Growth of practice of computer software rental; Increase in number of law firms using computers; Modification of 'first sale' doctrine of...

  • The Incompatibility of Copyright and Computer Software (Book). Helldorfer, Bernard G. // Business Lawyer;Feb89, Vol. 44 Issue 2, p640 

    Reviews the book 'The Incompatibility of Copyright and Computer Software: An Economic Evaluation and a Proposal for a Marketplace Solution.'

  • Software.  // Chartered Accountants Journal;Nov2001, Vol. 80 Issue 10, p79 

    Focuses on the copyright case between a Te Awamutu firm of chartered accountants and a former employee who left and set up in competition in New Zealand. Accountancy firms' copyright in software packages developed in-house; Right of accountancy firms to stop departing employees from taking the...

  • Facts, figures, & findings. Misek, Marla // EMedia Professional;Dec98, Vol. 11 Issue 12, p12 

    Highlights studies and reports concerning the electronic industries, compiled as of December 1998. Microsoft's report on the cost of software piracy in California; Business Communications Co. Inc.'s study on telecommunications equipment upgrades in the second and third worlds; Report by...

  • PREMIUM PULSE. Graser, Marc // Daily Variety;7/8/2011, Vol. 311 Issue 67, p1 

    The article reports on the closure of Hollywood's premium video on demand (PVOD) initial test run through DirectTV Inc. It mentions that 20th Century Fox's drama "Water for Elephants" was the only available Home Premiere movie which cause to believe that PVOD will close. Meanwhile, several...

  • Insider stealing. Corning, Beth // Accountancy;Oct99, Vol. 124 Issue 1274, p29 

    All companies are susceptible to sabotage and even espionage. And possibly what makes this thought even more uncomfortable is the fact that the threat can come as much from the people you work with as from outside. The first way to discourage any wrongdoing is to be able to invoke a legal...

  • Data encryption gets star treatment. Garretson, Cara // Network World;11/5/2007, Vol. 24 Issue 43, p28 

    The article reports on the consideration of encryption as a pillar of security infrastructures by enterprise security professionals in the U.S. The study of Forrester Research Inc. reveals that 62 percent of security professionals are increasing the deployments of encryption. Security project...

Share

Other Topics