Lens ID,Title,Date Published,Publication Year,Publication Type,Source Title,ISSNs,Publisher,Source Country,Author/s,Abstract,Volume,Issue Number,Start Page,End Page,Fields of Study,Keywords,MeSH Terms,Chemicals,Funding,Source URLs,External URL,PMID,DOI,Microsoft Academic ID,PMCID,Citing Patents Count,References,Citing Works Count,Is Open Access,Open Access License,Open Access Colour 000-012-051-394-918,The End of Software Piracy in Eastern Europe? A Positive Outlook with International Help,2004-12-31,2004,journal article,"Fordham Intellectual Property, Media & Entertainment Law Journal",10799699,,,Allison M. Collisson,,14,4,1005,,Economy; Political science; Globalization; Software; Berne Convention,,,,,https://paperity.org/p/145169240/the-end-of-software-piracy-in-eastern-europe-a-positive-outlook-with-international-help https://ir.lawnet.fordham.edu/iplj/vol14/iss4/4/ https://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=1289&context=iplj,https://paperity.org/p/145169240/the-end-of-software-piracy-in-eastern-europe-a-positive-outlook-with-international-help,,,1482232033,,0,,2,false,, 000-073-068-916-507,Thieves In Cyberspace: Examining Music Piracy And Copyright Law Deficiencies In Russia As It Enters The Digital Age,,2006,journal article,University of Miami International and Comparative Law Review,,,,Michael F Mertens,,14,1,139,,Political science; Law; Copyright infringement; Music piracy; Cyberspace; Copyright law,,,,,https://repository.law.miami.edu/cgi/viewcontent.cgi?article=1067&context=umiclr https://repository.law.miami.edu/umiclr/vol14/iss1/4/,https://repository.law.miami.edu/umiclr/vol14/iss1/4/,,,2115377737,,0,,1,false,, 000-415-408-709-14X,Developing countries and copyright in the information age - the functional equivalent implementation of the WCT,2017-07-10,2017,journal article,Potchefstroom Electronic Law Journal,17273781,Academy of Science of South Africa,,Tana Pistorius,Digital technology has had a profound impact on copyright law. The implementation of the WIPO Copyright Treaty (WCT) and the enforcement of technological protection measures have led to disparate forms of copyright protection for digital and analogue media. The balance between authors’ rights and the right of the public to access copyright works has been distorted. Copyright law is playing an ever-increasing crucial role in the Information Society. Developing countries are especially disadvantaged by diminished access to works. In this article it is argued that adherence to the principle of functional equivalence in implementing the anti-circumvention provisions of the WCT will ensure that the copyright balance is maintained and will advance the development agenda.,9,2,148,175,Political science; Law and economics; Law; Balance (accounting); WIPO Copyright Treaty; Information society; Enforcement; Disadvantaged; Copyright law; Public administration; Developing country; Information Age,,,,,https://www.researchgate.net/profile/Tana_Pistorius/publication/26604583_Developing_Countries_and_Copyright_in_the_Information_Age_-_The_Functional_Equivalent_Implementation_of_the_WCT/links/5472df7c0cf2d67fc035cf55.pdf?inViewer=true&pdfJsDownload=true&disableCoverPage=true&origin=publication_detail https://www.ajol.info/index.php/pelj/article/view/43448 https://perjournal.co.za/article/download/2820/2798 http://www.puk.ac.za/opencms/export/PUK/html/fakulteite/regte/per/issues/2006_2__Pistorius_art.pdf https://www.ajol.info/index.php/pelj/article/download/43448/26983 https://perjournal.co.za/article/view/2820 https://journals.assaf.org.za/per/article/download/2820/2798 https://doaj.org/article/730eb0e88c4742f49d4a45f256b20d51 https://journals.assaf.org.za/per/article/view/2820 https://repository.nwu.ac.za:443/handle/10394/1738 https://core.ac.uk/download/pdf/231093906.pdf,http://dx.doi.org/10.17159/1727-3781/2006/v9i2a2820,,10.17159/1727-3781/2006/v9i2a2820,2002085058,,0,008-334-041-104-182; 026-561-491-531-934; 060-810-883-540-538; 105-517-677-823-228; 117-303-868-104-180; 129-346-776-374-154; 133-276-265-963-84X; 156-885-849-732-840; 194-896-664-508-596,1,true,cc-by,gold 000-611-257-952-30X,Combating Maritime Piracy within the Asia and Pacific Region. Selected Issues,2012-01-21,2012,journal article,Polish Review of International and European Law,25447432; 22992170,Uniwersytet Kardynala Stefana Wyszynskiego,,Leonard Łukaszuk,,1,3-4,141,169,Economy; Ancient history; Geography; Maritime piracy,,,,,http://czasopisma.uksw.edu.pl/index.php/priel/article/view/1148,http://dx.doi.org/10.21697/priel.2012.1.3.05,,10.21697/priel.2012.1.3.05,2736276304,,0,,0,true,,bronze 001-202-857-196-367,HYBRID WARS: THE 21st-CENTURY’S NEW THREATS TO GLOBAL PEACE AND SECURITY,2015-05-20,2015,journal article,Scientia Militaria - South African Journal of Military Studies,22240020; 10228136,Stellenbosch University,,Sascha-Dominik Bachmann; Håkan Gunneriusson,"This article discusses a new form of war, ‘hybrid war’, with inclusion of aspects of ‘cyber-terrorism’ and ‘cyber-war’ against the backdrop of Russia’s ‘Ukrainian Spring’ and the continuing threat posed by radical Islamist groups in Africa and the Middle East. It also discusses the findings of an on-going hybrid threat project by the Swedish Defence College. This interdisciplinary article predicts that military doctrines, traditional approaches to war and peace and their perceptions will have to change in the future.",43,1,77,98,Political economy; Cyberwarfare; Political science; Ukrainian; Business intelligence; Process improvement; International relations; Middle East; Inclusion (disability rights),,,,,https://journals.co.za/content/militaria/43/1/EJC170866 http://eprints.bournemouth.ac.uk/22002/ https://scientiamilitaria.journals.ac.za/pub/article/view/1110 http://fhs.diva-portal.org/smash/record.jsf?pid=diva2:767664 https://www.africaneditors.org/journal/SM/abstract/93448-140132 http://www.diva-portal.org/smash/record.jsf?pid=diva2:767664 https://www.ajol.info/index.php/smsajms/article/view/117421 https://www.ajol.info/index.php/smsajms/article/download/117421/106983 https://researchprofiles.canberra.edu.au/en/publications/hybrid-wars-the-21st-centurys-new-threats-to-global-peace-and-sec https://doaj.org/article/0f9ae9155fac48359528c7a9e3bd4105 https://connections-qj.org/article/hybrid-wars-21st-centurys-new-threats-global-peace-and-security https://core.ac.uk/download/42142100.pdf,http://dx.doi.org/10.5787/43-1-1110,,10.5787/43-1-1110,3124173914,,0,069-991-135-004-994,16,true,cc-by-nc-nd,gold 001-393-346-095-251,Assessment of asset forfeiture in targeting Somali piracy ransoms,2018-10-01,2018,journal article,Journal of Money Laundering Control,13685201,Emerald,,Constance Gikonyo,"The purpose of this paper is to consider the applicability and challenges of using asset forfeiture mechanisms in taking away the illicit gains of Somali piracy for ransoms.,The paper presents a desk research on the issue. It is based on analysis of the key principles in the area and relevant literature on the subject.,Asset forfeiture mechanisms can be used to facilitate the seizure of Somali piracy proceeds. It is applicable to those who directly or indirectly benefited from piracy: the foot soldiers, financiers and other beneficiaries. This would enable withdrawal of piracy re-investment capital and hence may act as a disincentive for current and prospective offenders.,For the initiative to work, various states and other actors need to cooperate. However, incentives such as corruption, the personal interests of individuals and states that have benefited from Somali piracy, may make them unwilling to collaborate. This would definitely hinder the implementation and effectiveness of using asset forfeiture.,Much of the literature on Somali piracy for ransoms has focussed on maritime solutions. Further, authors and organisations have advocated for following the money trail. As a result, consideration of the benefits and challenges of doing so needs to be done. This paper seeks to fill this gap.",21,4,534,544,Business; Work (electrical); Law and economics; Asset (economics); Corruption; Somali; Asset forfeiture; Money laundering; Incentive; Capital (economics),,,,,https://www.emeraldinsight.com/doi/full/10.1108/JMLC-09-2017-0053 https://www.emerald.com/insight/content/doi/10.1108/JMLC-09-2017-0053/full/html,http://dx.doi.org/10.1108/jmlc-09-2017-0053,,10.1108/jmlc-09-2017-0053,2895953499,,0,000-255-494-192-238; 007-524-365-980-50X; 007-574-709-573-402; 009-565-811-712-745; 020-445-885-710-728; 020-663-212-398-691; 027-815-412-143-874; 031-972-114-385-967; 032-040-742-837-887; 032-660-778-850-116; 045-225-129-466-152; 050-005-017-617-370; 054-981-558-790-604; 056-439-560-466-97X; 057-334-021-529-770; 061-001-030-569-589; 066-993-769-552-116; 069-218-154-420-311; 071-332-036-764-800; 075-620-120-518-102; 076-979-878-065-538; 080-037-407-330-337; 084-699-115-848-730; 087-674-109-233-05X; 088-477-684-195-444; 089-874-579-658-449; 090-856-625-748-952; 091-937-540-925-965; 100-223-968-858-871; 106-071-251-815-442; 113-339-942-037-588; 122-632-900-043-241; 122-680-376-240-009; 128-747-987-422-778; 137-506-432-285-182,0,false,, 001-516-315-009-055,Fighting Software Piracy: Some Global Conditional Policy Instruments,2016-08-12,2016,journal article,Journal of Business Ethics,01674544; 15730697,Springer Science and Business Media LLC,Netherlands,Simplice A. Asongu; Pritam Singh; Sara le Roux,"This study examines the efficiency of tools for fighting software piracy in the conditional distributions of software piracy. Our paper examines software piracy in 99 countries for the period 1994-2010, using contemporary and non-contemporary quantile regressions. The intuition for modelling distributions contingent on existing levels of software piracy is that the effectiveness of tools against piracy may consistently decrease or increase simultaneously with increasing levels of software piracy. Hence, blanket policies against software piracy are unlikely to succeed unless they are contingent on initial levels of software piracy and tailored differently across countries with low, medium and high levels of software piracy. Our findings indicate that GDP per capita, research and development expenditure, main intellectual property laws, multilateral treaties, bilateral treaties, World Intellectual Property Organisation treaties, money supply and respect of the rule of law have negative effects on software piracy. Equitably distributed wealth reduces software piracy, and the tendency not to indulge in software piracy because of equitably distributed wealth increases with increasing software piracy levels. Hence, the negative degree of responsiveness of software piracy to changes in income levels is an increasing function of software piracy. Moreover the relationships between policy instruments and software piracy display various patterns, namely: U-shape, Kuznets-shape, S-shape and negative thresholds. A negative threshold represents negative estimates with increasing negative magnitude throughout the conditional distributions of software piracy. We also discuss the policy implications of our study.",152,1,175,189,Public economics; Business ethics; Per capita; Actuarial science; Economics; Rule of law; Software; Money supply; Income level; Intellectual property; Panel data,,,,,https://socionet.ru/publication.xml?h=repec:agd:wpaper:16/004 https://radar.brookes.ac.uk/radar/file/650c676b-f789-4a75-9dce-0a3dc94b5ca5/1/asongu2016fighting.pdf https://link.springer.com/article/10.1007/s10551-016-3291-7 https://econpapers.repec.org/RePEc:kap:jbuset:v:152:y:2018:i:1:d:10.1007_s10551-016-3291-7 https://radar.brookes.ac.uk/radar/items/650c676b-f789-4a75-9dce-0a3dc94b5ca5/1/ https://philpapers.org/rec/ASOFSP https://link.springer.com/article/10.1007/s10551-016-3291-7/fulltext.html https://dialnet.unirioja.es/servlet/articulo?codigo=7370342 https://mpra.ub.uni-muenchen.de/73088/ https://www.econstor.eu/handle/10419/149928 https://ideas.repec.org/a/kap/jbuset/v152y2018i1d10.1007_s10551-016-3291-7.html https://www.econstor.eu/bitstream/10419/149928/1/agdi-wp16-004.pdf,http://dx.doi.org/10.1007/s10551-016-3291-7,,10.1007/s10551-016-3291-7,2334636937,,0,002-002-118-291-029; 003-120-061-431-142; 007-559-358-394-991; 008-896-495-853-748; 012-203-539-243-07X; 013-125-830-390-142; 013-765-194-873-383; 015-808-798-057-897; 016-623-013-143-177; 017-153-449-730-092; 022-027-708-413-061; 023-508-800-329-819; 026-621-534-864-651; 027-989-705-549-237; 028-526-275-182-847; 028-630-596-457-020; 029-945-161-770-934; 030-183-927-018-066; 034-677-694-916-169; 039-883-767-744-759; 041-849-157-283-572; 041-893-696-570-720; 042-311-106-479-104; 046-534-914-774-543; 047-010-436-077-442; 047-691-102-180-446; 049-698-234-112-01X; 053-956-378-667-86X; 054-549-558-630-210; 054-663-257-958-510; 056-648-790-370-122; 058-682-219-560-287; 062-169-487-131-224; 063-085-822-993-592; 066-237-973-648-031; 066-437-311-082-91X; 072-166-078-734-816; 075-592-604-998-688; 084-276-283-502-216; 086-528-214-511-515; 087-959-536-613-70X; 088-697-167-555-207; 092-768-739-253-918; 097-165-496-887-789; 097-637-794-608-082; 103-047-934-034-494; 107-007-285-779-662; 107-884-788-436-834; 107-947-697-683-923; 108-818-932-212-722; 111-973-055-866-545; 115-121-431-459-018; 118-179-693-472-854; 118-378-886-244-26X; 124-255-772-768-353; 124-655-841-474-707; 125-495-818-933-457; 126-460-943-268-819; 129-798-330-692-606; 139-864-136-469-932; 144-135-264-427-99X; 145-811-348-738-768; 156-200-179-267-390; 159-771-177-761-457; 164-865-263-777-832; 185-197-322-646-367; 193-305-032-595-202,14,true,cc0,green 001-680-736-535-63X,Privacy and piracy in cyberspace: justice for all,2013-10-24,2013,journal article,Journal of Intellectual Property Law & Practice,17471532; 17471540,Oxford University Press (OUP),,Alexander Tsoutsanis,"This article is about how privacy and piracy lock horns in everyday practice. It outlines three challenges right holders and ISPs face every day, when piracy tries to hide behind privacy: uncertainty, costs and delay. Apart from only balancing the right of privacy against the right of (intellectual) property, the author also introduces a third element: the right to effective remedy. The article concludes that the challenge is not in the ‘if’ but in the ‘when’ and ‘how’ ISPs can be obliged to disclose personal data. This requires new research, with a more practice-oriented approach, focusing on two elements: (1) a robust uniform decision making model, allowing for a ‘fair balance between all fundamental rights’, of all stake holders involved, (‘when’); (2) such model needs to benefit from (cost-)effective procedures, to the benefit of all (‘how’).",8,12,952,956,Internet privacy; Record locking; Economic Justice; Business; Property (philosophy); Element (criminal law); Stakeholder; Cyberspace; Decision-making models; Fundamental rights,,,,,https://academic.oup.com/jiplp/article-abstract/8/12/952/2193894/ http://academic.oup.com/jiplp/article-abstract/8/12/952/2193894/ https://www.narcis.nl/publication/RecordID/oai%3Adare.uva.nl%3Apublications%2F4fc9133c-7c9a-4d0b-ba09-099f4e9f00df https://dare.uva.nl/record/1/408128 http://jiplp.oxfordjournals.org/lookup/doi/10.1093/jiplp/jpt181,http://dx.doi.org/10.1093/jiplp/jpt181,,10.1093/jiplp/jpt181,3121878769,,0,,0,false,, 001-785-256-866-537,Piracy nearly as popular as sex,,2001,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,2001,12,2,3,Computer science; Computer security; Internet privacy,,,,,,http://dx.doi.org/10.1016/s1361-3723(01)01204-0,,10.1016/s1361-3723(01)01204-0,,,0,,0,false,, 002-066-230-312-734,Piracy guide available to net surfers,,1996,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,1996,6,4,,Net (polyhedron); Computer science; Computer security; Business; Mathematics; Geometry,,,,,,http://dx.doi.org/10.1016/s1361-3723(96)90277-8,,10.1016/s1361-3723(96)90277-8,,,0,,0,false,, 002-648-571-020-043,"Regulating Jolly Roger: The Existing and Developing Law Governing the Classification of Underwater Cultural Heritage as ""Pirate-Flagged""",2015-03-17,2015,journal article,University of Massachusetts Law Review,,,,Peter Hershey,"This article explores the existing law governing Underwater Cultural Heritage (UCH) which is classified as “pirate-flagged.” First, this article discusses the discovery of the Whydah Galley, an 18 th century slave trader vessel, which was captured by pirate Captain Samuel Bellamy and transformed into the flagship of his pirate fleet, and the subsequent discoveries of additional “pirate-flagged” shipwrecks, including the international regulatory scheme governing ownership of the property on these sunken vessels. This article discusses both 20 th century international conventions which define piracy and historic case law which clarifies these definitions. Then, the article analyzes both the early American and contemporary American applications of the definition of piracy in the courts. This article concludes by evaluating the various approaches which may be used to define piracy, and thus classify a vessel as “pirate-flagged,” with an eye towards future opportunities for application of this definition and its implications on UCH which has yet to be found. The spelling and syntax of much of the source material is maintained as it originally appeared at the time of its publication.",10,1,4,,Sovereign immunity; Syntax (logic); Common law; Property (philosophy); Law; Adjudication; Spelling; Proclamation; International law; History,,,,,https://scholarship.law.umassd.edu/cgi/viewcontent.cgi?article=1079&context=umlr https://scholarship.law.umassd.edu/umlr/vol10/iss1/4/,https://scholarship.law.umassd.edu/umlr/vol10/iss1/4/,,,2994114438,,0,,1,false,, 002-763-770-612-328,Trade Secret Piracy,,1965,journal article,The Cleveland State Law Review,00098876,,,Martin A. Levitin,,14,1,157,,Information sensitivity; Business; International trade; Trade secret; Equity (finance); Confidentiality; Industrial espionage,,,,,https://engagedscholarship.csuohio.edu/cgi/viewcontent.cgi?article=3075&context=clevstlrev https://engagedscholarship.csuohio.edu/clevstlrev/vol14/iss1/12/,https://engagedscholarship.csuohio.edu/clevstlrev/vol14/iss1/12/,,,609902948,,0,,0,false,, 002-803-239-151-807,Shaping of Moral Intensity Regarding Software Piracy: A Comparison Between Thailand and U.S. Students,,2004,journal article,Journal of Business Ethics,01674544; 15730697,Springer Science and Business Media LLC,Netherlands,Ranjan B. Kini; Hindupur Ramakrishna; B.S. Vijayaraman,"Software piracy is a major global concern forbusinesses that generate their revenues throughsoftware products. Moral intensity regardingsoftware piracy has been argued to be relatedto the extent of software piracy. Anunderstanding of the development of moralintensity regarding software piracy inindividuals would aid businesses in developingand implementing policies that may help themreduce software piracy. In this research westudied the similarities and differences indevelopment of moral intensity regardingsoftware piracy among university students intwo different cultures, the U.S. and Thailand. In particular, we studied the influence of theimmediate community of individuals, such asother students, faculty, and other universityemployees, on the development of moralintensity regarding software piracy of the twogroups of students. Results indicate that, ingeneral, there are significant differences inmoral intensity regarding software piracybetween students from the US and Thailand, andthat gender differences also exist. Though theeffect of the immediate community on theself-perception of moral intensity regardingsoftware piracy of students was significant,there appears to be very little significantdifferences in this effect between the studentsin the two different countries studied. Thefindings have implications for teachingbusiness ethics, and for developing andimplementing policies to curb global softwarepiracy.",49,1,91,104,Business ethics; Business; Revenue; Software; Quality of Life Research; Moral intensity; Public relations,,,,,https://link.springer.com/article/10.1023/B%3ABUSI.0000013863.82522.98 https://link.springer.com/content/pdf/10.1023/B:BUSI.0000013863.82522.98.pdf https://www.jstor.org/stable/25123152 https://philpapers.org/rec/KINSOM,http://dx.doi.org/10.1023/b:busi.0000013863.82522.98,,10.1023/b:busi.0000013863.82522.98,1977964718,,0,010-550-777-836-966; 024-343-724-336-606; 026-283-018-089-565; 033-349-220-802-574; 107-250-046-589-490; 124-076-116-602-319; 135-800-520-334-495,94,false,, 002-892-607-711-650,Terrorism and cyber attacks as hybrid threats : defining a comprehensive approach for countering 21st century threats to global peace and security,,2013,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Sascha-Dominik Bachmann; Håkan Gunneriusson,"Multimodal, low intensity, kinetic as well as non-kinetic threats to international peace and security including cyber war, low intensity asymmetric conflict scenarios, global terrorism, piracy, tra ...",9,1,26,36,Cyberwarfare; Political science; Terrorism; Asymmetric warfare; International peace; Global terrorism; Computer security,,,,,https://ssrn.com/abstract=2252595 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2252595 https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2425749_code1563486.pdf?abstractid=2252595&mirid=1 http://www.diva-portal.org/smash/record.jsf?pid=diva2:767657 https://core.ac.uk/download/20442837.pdf,http://dx.doi.org/10.2139/ssrn.2252595,,10.2139/ssrn.2252595,1520379541,,0,005-306-229-319-057,14,true,, 003-224-067-589-203,The Security Council and the Repression of Maritime Piracy: The Case of Somalia,2020-10-23,2020,journal article,Transactions on Maritime Science,18483313; 18483305,"University of Split, Faculty of Maritime Studies",,Safwan Maqsood,"Maritime piracy in the Somali territorial waters has been the focus of attention of international society for at least twelve years, and indeed the crime of piracy threatens international peace and security in a region through which half of the world’s crude oil passes. In the three-decade absence of a Somali State, intervention by the Security Council is required to suppress such crimes and ensure freedom of maritime navigation. The Council resolutions based on Chapter VII of the UN Charter call for the Member States of the United Nations to arrest and bring to trial those accused of piracy before national courts. It is necessary for the States that are involved in anti-Somali piracy efforts to incorporate the principle of universal jurisdiction into their national laws and adopt new laws criminalizing modern piracy, which is outside the traditional notion of piracy stipulated in the United Nations Convention on the Law of the Sea 1982.",9,2,358,364,Political science; United Nations Convention on the Law of the Sea; Law; Universal jurisdiction; State (polity); Somali; Charter; Ransom; Intervention (law); Territorial waters,,,,,https://www.toms.com.hr/index.php/toms/article/view/344 https://www.toms.com.hr/index.php/toms/article/download/344/316,http://dx.doi.org/10.7225/toms.v09.n02.018,,10.7225/toms.v09.n02.018,3093737161,,0,,0,true,cc-by,gold 003-244-222-205-993,The Strategic Partnership Agreement between the EU and Japan: the pitfalls of path dependency?,2016-05-13,2016,journal article,Journal of European Integration,07036337; 14772280,Informa UK Limited,United Kingdom,Julie Gilson,"AbstractThis article examines the current attempt by the European Union and Japan to negotiate a Strategic Partnership Agreement (SPA). Sitting alongside negotiations for an Economic Partnership Agreement (EPA), this SPA represents an attempt to reignite bilateral relations between these two global powerhouses. Still confined by the origins of their institutionalised partnership in 1991, this article argues that both sides find it hard to break away from earlier functional and normative assumptions about their relative significance and about each other, in order to forge a new meaningful, overarching partnership. It examines the development of Japan–EU relations building up to the preparations for this SPA, against the background of path-dependent processes of engagement. Path dependency in its various forms ‘views institutions as ‘carriers of history,’ which maintain existing behavioural norms and cultural patterns throughout time’. Despite some of the problems such claims elicit, as will be explored bel...",38,7,791,806,Political economy; Economics; Limited partnership; Order (exchange); Negotiation; Agreement; Economic partnership agreement; European union; Normative; Economic growth; General partnership,,,,,https://research.birmingham.ac.uk/portal/en/publications/the-strategic-partnership-agreement-between-the-eu-and-japan(b05c0236-4103-4fa6-a1d3-58d91e2bb47b).html https://www.tandfonline.com/doi/full/10.1080/07036337.2016.1176027 https://research.birmingham.ac.uk/portal/files/28005522/Clean_copy_1_April_2016.pdf https://dialnet.unirioja.es/servlet/articulo?codigo=6288879 https://core.ac.uk/download/pdf/267292174.pdf,http://dx.doi.org/10.1080/07036337.2016.1176027,,10.1080/07036337.2016.1176027,2374312351,,0,002-606-093-401-259; 003-946-171-251-493; 005-456-359-696-233; 008-923-756-348-370; 016-818-813-329-949; 021-019-651-928-294; 022-453-572-028-608; 025-634-406-492-52X; 026-398-287-055-427; 030-918-780-198-254; 031-620-848-395-049; 034-079-701-421-579; 043-512-369-581-386; 050-135-925-988-893; 052-554-423-908-24X; 055-282-286-275-054; 058-008-139-806-334; 063-475-535-041-410; 069-677-439-421-070; 075-741-173-896-79X; 076-897-046-605-475; 085-796-351-446-179; 099-389-574-759-922; 100-245-160-208-339; 100-873-871-248-916; 101-365-763-255-540; 105-773-121-297-026; 107-241-668-476-058; 128-762-644-444-719; 131-350-943-246-496; 136-390-703-066-064; 148-951-251-760-479; 154-280-660-865-872; 167-100-870-038-622; 177-652-209-539-035; 188-692-566-427-352; 199-664-080-584-80X,7,true,,green 003-475-184-959-134,Incorporating societal concerns into communication technologies,,2003,journal article,IEEE Technology and Society Magazine,02780097,Institute of Electrical and Electronics Engineers (IEEE),United States,Rajiv C. Shah; Jay P. Kesan,"Considers how scientists and policy makers are designing and advocating the use of technologies to proactively protect or serve societal values. These include protecting minors from indecent content, protecting privacy, and protecting intellectual property rights.",22,2,28,33,Internet privacy; Information technology; Business; Industrial property; Intellectual property; Public relations,,,,,https://experts.illinois.edu/en/publications/incorporating-societal-concerns-into-communication-technologies-2 https://ieeexplore.ieee.org/document/1216240 https://core.ac.uk/download/4812550.pdf,http://dx.doi.org/10.1109/mtas.2003.1216240,,10.1109/mtas.2003.1216240,2114013312,,0,013-328-094-947-861; 028-743-913-460-874; 034-016-198-936-461; 035-797-810-175-234; 043-926-971-269-731; 045-353-681-525-917; 045-982-515-724-648; 047-212-099-142-105; 051-571-557-041-686; 064-834-312-002-797; 067-776-205-897-755; 071-729-059-971-525; 077-911-341-561-377; 080-350-525-746-596; 099-210-424-310-457; 108-063-237-808-732; 113-346-149-208-017; 141-905-977-812-23X; 146-202-366-780-065; 159-504-703-952-274; 162-492-531-934-055; 164-874-073-233-265; 169-518-501-898-724; 185-469-771-818-570,4,true,,green 003-516-275-785-342,THE REGULATION OF PIRACY AND ARMED ROBBERY AT SEA IN INTERNATIONAL LAW,2021-01-04,2021,journal article,Jurnal Hukum dan Peradilan,25281100; 23033274,Pusat Penelitian dan Pengembangan Hukum dan Peradilan Mahkamah Agung RI,,Gerald Aldytia Bunga,"This paper examines the regulation of piracy and armed robbery at sea in international law applicable globally and applicable only in a certain region. This research will review the elements of piracy and armed robbery at sea then made a distinction between both crimes. It will be found that there are problems that still not legally regulated in existing international regulation concerning piracy and armed robbery at sea or it has been regulated but still cause a problem in the prosecution of both crimes. It is a normative research which concludes that the regulation of armed robbery at sea is found only in regional international legal rules, unlike the regulation of piracy that exists in international rules that applied globally. The existing regulations leave problems concerning areas where a crime such as piracy-like act will be difficult to categorize as piracy or armed robbery at sea.",9,3,425,448,Political science; Normative; Law of the sea; International law; Criminology,,,,,http://www.jurnalhukumdanperadilan.org/index.php/jurnalhukumperadilan/article/view/452/253 http://www.jurnalhukumdanperadilan.org/index.php/jurnalhukumperadilan/article/download/452/253,http://dx.doi.org/10.25216/jhp.9.3.2020.425-448,,10.25216/jhp.9.3.2020.425-448,3118702477,,0,,0,false,, 003-739-887-132-340,"Entrepreneurship, Hardship, and Gamesmanship: Modern Piracy as a Dry Endeavor",2013-07-01,2013,journal article,Chicago Journal of International Law,15290816,,,Selina MacLaren,"AbstractPiracy has reemerged in the past decade, but international laws lag behind. While modern - day piracy threatens lives and industries, antipiracy efforts are constrained by international legal definitions written centuries ago to address a crime that looked radically different from its twenty-first-century counterpart. Today, piracy networks are increasingly sophisticated and land-based, but piracy laws define the crime as one occurring on the high seas. Handcuffed by the high seas requirement, nations prosecute only junior pirates while pirate kingpins operate from the safety of land.In recent months, lower piracy rates have promised stability and masked the urgency of the threat. Although attacks have decreased, ransoms have skyrocketed and antipiracy successes come from methods resting on shaky legal foundations. The false sense of complacency in the antipiracy movement only heightens the need for a new definition of piracy.This Comment seeks a solution that will maintain existing international maritime laws but interpret them in a way that extends the piracy definition to land-based activities. These adjustments will efficiently deter pirates without the legal precariousness of existing antipiracy methods. It uses maritime treaties, counterterrorism tools, and familiar legal doctrines to pull pirate kingpins into the purview of piracy laws.Selina MacLaren*I. Introduction 348II. The Evolution of Piracy 350III. Existing Antipiracy Methods 352A. Multinational Navy Patrols 352B. Armed Security 353C. Land-Based Pursuit 354IV. Territorial Sovereignty and Jus Cogens 356A. Piracy as a Peremptory Norm 356B. Somali Territorial Sovereignty 357C. Universal Jurisdiction 360V. International Maritime Law 361A. UNCLOS and the Rome Convention Compared 361B. UN Security Council Resolutions Responding to Piracy 364C. Regional Piracy Laws 366VI. A New Approach 367A. Aiding and Abetting 3671. Aiding and abetting liability and its elements in existing international treaties 3682. Challenges in applying aiding and abetting to piracy 3693. A solution that permits aiding and abetting liability to apply in the piracy context 370B. Anticipatory Self-Defense and Counterterrorism 371C. From Definitions to Prosecutions 373VII. …",14,1,11,,Sociology; International waters; United Nations Convention on the Law of the Sea; Sovereignty; Law; Universal jurisdiction; Aiding and abetting; Peremptory norm; Context (language use); International law,,,,,https://www.questia.com/library/journal/1P3-3067129971/entrepreneurship-hardship-and-gamesmanship-modern https://chicagounbound.uchicago.edu/cjil/vol14/iss1/11/ https://chicagounbound.uchicago.edu/cgi/viewcontent.cgi?article=1406&context=cjil,https://www.questia.com/library/journal/1P3-3067129971/entrepreneurship-hardship-and-gamesmanship-modern,,,774821172,,0,,0,false,, 003-772-634-169-617,Fashion piracy and artificial intelligence—does the new creative environment come with new copyright issues?,2020-03-01,2020,journal article,Journal of Intellectual Property Law & Practice,17471532; 17471540,Oxford University Press (OUP),,Heidi Härkönen,,15,3,163,172,Engineering; Data science,,,,IPR University Center and Finland’s Ministry of Education and Culture,https://research.ulapland.fi/en/publications/fashion-piracy-and-artificial-intelligencedoes-the-new-creative-e https://lacris.ulapland.fi/en/publications/fashion-piracy-and-artificial-intelligencedoes-the-new-creative-environment-come-with-new-copyright-issues(815e05c7-4ef2-4f82-9d4f-f2499ec06bb0).html https://academic.oup.com/jiplp/article/15/3/163/5804112,http://dx.doi.org/10.1093/jiplp/jpaa021,,10.1093/jiplp/jpaa021,3012418137,,0,,0,false,, 003-843-871-495-083,Receive-Only Satellite Earth Stations and Piracy of the Airwaves,1982-12-31,1982,journal article,Notre Dame Law Review,07453515,,,David Hasper,,58,1,84,,Meteorology; Satellite; Law; Earth (chemistry); Environmental science,,,,,https://scholarship.law.nd.edu/cgi/viewcontent.cgi?article=2420&context=ndlr https://paperity.org/p/84100673/receive-only-satellite-earth-stations-and-piracy-of-the-airwaves https://scholarship.law.nd.edu/ndlr/vol58/iss1/3/,https://paperity.org/p/84100673/receive-only-satellite-earth-stations-and-piracy-of-the-airwaves,,,805142635,,0,,0,false,, 003-954-032-651-42X,The Law of Piracy: The Evolution of the Concept of Piracy in England,,1988,journal article,International law studies,21546266,,,Alfred P. Rubin,,63,1,3,,Political science; Law; Hostis humani generis,,,,,https://digital-commons.usnwc.edu/ils/vol63/iss1/3/ https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1767&context=ils,https://digital-commons.usnwc.edu/ils/vol63/iss1/3/,,,2949904046,,0,,0,false,, 004-022-386-727-328,Alarming Rate of “Yahoo Plus” and Human Insecurity Dilemma in Nigeria: Implication for Counselling,2019-05-31,2019,journal article,European Scientific Journal ESJ,18577881; 18577431,"European Scientific Institute, ESI",,Comfort lawani; Gloria Osagie-Obazee,"The daily surge of cyber fraudsters popularly known as yahoo–boys which has often resulted in the loss of lives of their victims has become a new wave making round in Nigeria today. This study, therefore, seeks to unravel the nexus between the alarming rate of cyber fraudsters (yahoo-boys) and Human Insecurity Dilemma, with its corresponding implication(s) for safety and security counselling. Thirty (30) repentant yahoo boys were interviewed from the 3 states out of the 6 Geo-political zones in the country. The study employed the descriptive survey design approach. The instrument used for data collection was a structured interview with a reliability coefficient of 0.87 while the data collected were analysed using the non parametric test known as Kruskal Wallis Statistical Technique. The result revealed that some of the yahoo boys use human parts, sanitary pad, women undies and gifts, either to their parents or to their loved friends, which will serve as a contact point for money making rituals. Based on these findings, the researchers drew a caveat on the implication of taking counselling for safety and security seriously in all the states in the country, and among other things, recommends a serious awareness campaigns in all parts of the country on the negative implication(s) of the yahoo-boys activities.",15,13,385,385,Structured interview; Data collection; Nexus (standard); Psychology; Point (typography); Dilemma; Descriptive survey; Public relations; Kruskal–Wallis one-way analysis of variance,,,,,http://www.eujournal.org/index.php/esj/article/view/12044/11481 https://www.eujournal.org/index.php/esj/article/view/12044 https://core.ac.uk/download/236413169.pdf,http://dx.doi.org/10.19044/esj.2019.v15n13p385,,10.19044/esj.2019.v15n13p385,2947188058,,0,005-697-369-951-442; 030-614-655-131-701; 034-960-488-093-556; 054-150-027-956-962; 134-041-745-382-569,0,true,,bronze 004-069-279-648-809,International legal problems of the fight against piracy (in the light of the aggression of the situation in the Gulf of Guinea),,2020,journal article,"Entrepreneurship, Economy and Law",26635313,Research Institute of Private Law and Entrepreneurship named after Academician F.H. Burchak of the National Academy of Legal Sciences of Ukraine,,Olena Kuzmenko,,,11,296,301,Political science; Aggression; Criminology,,,,,http://dx.doi.org/10.32849/2663-5313/2020.11.50,http://dx.doi.org/10.32849/2663-5313/2020.11.50,,10.32849/2663-5313/2020.11.50,3111125440,,0,,0,true,,gold 004-303-561-328-035,Total losses and the peril of piracy in English law of marine insurance,2012-03-20,2012,journal article,WMU Journal of Maritime Affairs,1651436x; 16541642,Springer Science and Business Media LLC,Sweden,Gotthard Gauci,"Whereas the Marine Insurance Act 1906 provides substantial detail about total losses, very little is provided in relation to piracy in the said statute. The recent judgments in Masefield v Amlin by Steel J ([2010] 1Lloyd's Rep. IR 345) and then by the English Court of Appeal ([2011] EWCA Civ 24) have highlighted the difficulties associated with determining whether a seizure of the subject-matter of insurance, in this case cargo, by pirates, demanding a ransom, can give rise to a claim for a total loss. This is a very important matter which also raises issues of legality and public policy. This article examines the implications of this judgment against the backdrop of the English marine insurance definition of piracy and the intricacies of the law relating to constructive and actual total losses. The article concludes with the suggestion that possibly the marine insurance definition of piracy should tally with that in the domain of public international law, and further, that legislative intervention should be considered for the purpose of ascertaining the point in time whether and when seizure by pirates can constitute a total loss.",11,1,115,128,English law; Economics; Insurance law; Statute; Public international law; Law; Appeal; Principle of legality; International law; Intervention (law),,,,,https://rd.springer.com/article/10.1007/s13437-012-0024-3 https://link.springer.com/article/10.1007/s13437-012-0024-3 https://link.springer.com/article/10.1007/s13437-012-0024-3/fulltext.html https://link.springer.com/content/pdf/10.1007%2Fs13437-012-0024-3.pdf https://core.ac.uk/display/81192895 https://paperity.org/p/8755392/total-losses-and-the-peril-of-piracy-in-english-law-of-marine-insurance https://trid.trb.org/view/1411814,http://dx.doi.org/10.1007/s13437-012-0024-3,,10.1007/s13437-012-0024-3,2035592640,,0,121-833-240-669-576; 139-632-835-446-294,1,true,cc-by,hybrid 004-492-738-927-961,PIRATERIE IM LICHTE DER SEEVERSICHERUNG UNTER BERÜCKSICHTIGUNG DES LÖSEGELDS,,2018,journal article,Zbornik Pravnog fakulteta Sveučilišta u Rijeci,18468314; 1330349x,University of Rijeka Faculty of Law,Croatia,Dino Gliha,"After the 2008 Somali attacks, piracy has gained significant popularity; among scholars. However, despite lots of ongoing debates and written papers in; the last decade, some crucial issues have been left unresolved, starting from; the definition of piracy. When discussing piracy within the context of marine; insurance, certain specific characteristics of marine insurance law should be; taken into; ; consideration. Namely, international law definition, criminal law definition; and other definitions of piracy cannot properly satisfy the need of marine; insurance law. After the proper understanding of piracy within marine insurance; law is determined, there are some other important issues that need to be; discussed. Certainly, one is categorization of piracy as a peril. Question; whether piracy is a marine peril or a war peril? Further on, one of the most; discussed issue of modern piracy are ransom payments. Can they even be; considered legal? If yes, are they recoverable from marine insurers and on; which basis? Answers to previously mentioned questions will be given in the; following paper.",39,2,833,853,Payment; Insurance law; Political science; Law and economics; Ransom,,,,,https://hrcak.srce.hr/index.php?show=clanak&id_clanak_jezik=301227,http://dx.doi.org/10.30925/zpfsr.39.2.5,,10.30925/zpfsr.39.2.5,3046391944; 2905301070; 3011399513; 3010936580,,0,060-775-664-209-799; 093-135-002-741-403; 095-204-184-312-78X; 133-216-056-619-896; 147-627-392-303-772; 179-829-784-044-841; 199-400-605-547-894,0,true,cc-by-nc,gold 004-596-778-111-269,E-Security Issues,2012-10-30,2012,journal article,INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY,22773061,CIRWOLRD,,Mani Arora,"With the rapid growth of e-commerce, governmental and corporate agencies are taking extra precautions when it comes to protecting information. The development of e-security as a discipline has enabled organisations to discover a wider array of similarities between attacks occurring across their security environment and develop appropriate countermeasures. To further improve the security of information, there is a need for conceptualising the interrelationships between e-security and the major elements involved in changing a company's infrastructure. Organisations should act in an ethical manner, especially when it comes to e-security and e-privacy policies, procedures, and practices. The consequential theory of utilitarianism is used and applied to a conceptual model to help explain how organisations may develop better secured information in an information-sharing and globally networked environment. E-security is a critical concern for both consumers and business. Establishing trust between all parties in an online transaction is vital for the success of e-commerce. The public wants  full assurance that the information they supply is going to the company they think it is going to, will not be misused by that company, and that credit card information or other payment mechanisms are confidential and secure. On the other hand, companies also want that their systems must remain protected from intruders and they cannot tamper with the data. Some degree of risk is always associated with E-transactions, if security controls are not applied while engaging into such transactions. Users must be sure before engaging into transactions that they are safe and the information provided by them is not going to unauthorized people. Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000. In this paper, I have covered the e-security issues such as elements of e-security, security threats or cyber crimes, tools for e-security, precautions for secure e-commerce and various studies regarding e-security issues.",3,2,301,308,Political science,,,,,http://www.jac.cirworld.com/index.php/ijct/article/download/2889/2811 https://core.ac.uk/download/322473693.pdf,http://dx.doi.org/10.24297/ijct.v3i2c.2889,,10.24297/ijct.v3i2c.2889,2802256798,,0,,1,true,, 004-992-771-204-31X,Cyber Crime Nation Typologies: K-Means Clustering of Countries Based on Cyber Crime Rates,,,journal article,International Journal of Cyber Criminology,09742891,K. Jaishankar,India,Alex Kigerl,"IntroductionA disproportionate amount of the cyber crime attacks worldwide are accounted for by a minority of countries (Spamhaus, 2016). Many reports, mostly by cyber security firms, regularly conduct rankings of nations based on being top sources of cyber crime activity and attacks2. Nations are differentiated based on the particular type of cyber crime or offense that they are associated with (APWG, 2014; Ultrascan, 2014; V.I. Labs, 2014).However, most of the reporting is univariate and descriptive, offering a simple unidimensional listing of nations by rank via one metric at a time. The reports also offer little in the way of also ranking nations in the context of non-cyber crime variables, such as economic and technological metrics at the national level. There have been some multivariate macro-level cyber crime studies at the national level, which seek to identify inferential predictors of cyber crime rates between nations (Kigerl, 2013; 2016).Among some of the multivariate studies conducted, the degree of internet connectivity within a nation has been found to consistently predict higher levels of multiple cyber crime types, including fraud, malware, spam, and digital piracy (Kigerl, 2013; 2016). Nations that are the source of spam and digital piracy are also more likely to be wealthier countries, measured in the form of a nation's gross domestic product (GDP). However, the findings are more mixed in regards to GDP's relationship to fraud and malware.Yet these studies say little about how specific nations specialize in cyber crime, or how nations can be grouped under different typologies with varying cyber crime profiles. Predictors linked to cyber crime outcomes are assumed to be equally predictive across nations. The present research cannot describe the distinct differences between nations, only between variables.The present research seeks to address this gap by performing K-means clustering analysis at the national level among 190 countries using seven cyber crime variables capturing fraud, malware, spam, and digital piracy, as well as each nation's GDP and internet use per capita. The results are intended to better understand the differences between individual countries by assigning them to discrete categories, rather than identifying the general relationship of various economic, technological, and legal differences between nations on cyber crime outcomes. Via clustering analysis techniques, nations may be grouped together with similar nations, attempting to identify if certain countries specialize in cyber crime, or act as cyber crime generalists.Cyber crime differences between CountriesThe internet is scattered with many reports and posts about the top cyber crime countries, the biggest source of cyber attacks, and the most likely home of residence for cyber criminals themselves. Multiple cyber security firms regularly release detailed reports on the state of cyber crime activities within their networks, often including a section on countries. Symantec has created an index of cyber crime activity that includes hosting malware, botnets, phishing server hosting, and how many botnet command and control (C&C) servers there are within each nation. The top Five nations on this index include the US, China, Brazil, Germany, and India. Russia is seventh (Fossi, Turner, Johnson, Mack, Adams, et al., 2010).The harms of the various cyber crimes are well advertised in such reports. Email spam is a common attack vector for multiple types of cyber crime (Rao & Reiley, 2012). Today, spam makes up 72% of all emails sent worldwide (Gudkova, 2013). Over half of all internet traffic in general not just that of email traffic, is actually spam (Lachhwani & Ghose, 2012). Loss of human resources due to the nuisance of spam was estimated to be at $22 billion in 2004 (Lachhwani & Ghose, 2012). Some of the top spam sending countries include China, Brazil, the United States, and Russia (Project Honey Pot, 2016). …",10,2,147,,The Internet; Gross domestic product; Business; Botnet; Email spam; Context (language use); Computer security; Malware; Internet access; Phishing,,,,,https://zenodo.org/record/163399 https://www.questia.com/library/journal/1P3-4258837781/cyber-crime-nation-typologies-k-means-clustering,http://dx.doi.org/10.5281/zenodo.163399,,10.5281/zenodo.163399,2580703871,,0,001-462-280-279-07X; 020-903-926-467-943; 024-990-064-457-648; 031-112-270-923-851; 031-937-358-944-40X; 056-641-536-468-624; 088-801-066-400-473; 106-483-199-553-772; 112-119-670-549-051; 114-750-563-434-774; 123-137-942-742-700; 159-698-127-423-70X; 194-387-493-171-857,9,true,cc-by-nc-sa,gold 005-188-776-943-778,The Escalating Copyright Wars,,2004,journal article,Hofstra Law Review,00914029,,,Peter K. Yu,"Piracy is one of the biggest problems in the United States today. In 2001 alone, the United States lost more than 9 billion dollars in copyright piracy. Although these figures seem alarming, they have yet to reveal the full extent of the damages of the existing piracy problem. In a recent music conference, the head of the International Federation of the Phonographic Industry (IFPI) indicated that music piracy had threatened 600,000 jobs in the European music industry. Given the intertwining relationship between the entertainment industries and the U.S. economy, a similar number of, or even more, U.S. jobs will likely be threatened if piracy continues at the present level.",32,3,907,951,Business; International trade; Music industry; Law; Threatened species; Damages; Copyright infringement; Music piracy; Entertainment,,,,,https://works.bepress.com/peter_yu/68/ https://scholarship.law.tamu.edu/cgi/viewcontent.cgi?article=1541&context=facscholar http://www.peteryu.com/quello.pdf https://scholarlycommons.law.hofstra.edu/cgi/viewcontent.cgi?article=2581&context=hlr https://scholarlycommons.law.hofstra.edu/hlr/vol32/iss3/3/ https://scholarship.law.tamu.edu/facscholar/542/ https://works.bepress.com/peter_yu/68/download/,https://works.bepress.com/peter_yu/68/,,,3124128418,,0,,19,false,, 005-278-086-108-715,National campaign against piracy,,1994,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1994,12,5,5,Computer security; Business; Internet privacy; Computer science,,,,,,http://dx.doi.org/10.1016/0142-0496(94)90139-2,,10.1016/0142-0496(94)90139-2,,,0,,0,false,, 005-457-805-068-486,The Mobilities of Ships and Shipped Mobilities,2014-07-03,2014,journal article,Mobilities,17450101; 1745011x,Informa UK Limited,United Kingdom,Anyaa Anim-Addo; William Hasty; Kimberley Peters,"In the burgeoning field of mobilities studies, the seas and all that moves in, on, across and through them, have not been embraced with the same enthusiasm as mobilities ashore. While trains (Verst...",9,3,337,349,Engineering; Field (physics); Mobilities; Media studies; Engineering physics,,,,,https://EconPapers.repec.org/RePEc:taf:rmobxx:v:9:y:2014:i:3:p:337-349 https://livrepository.liverpool.ac.uk/3000933/ https://ideas.repec.org/a/taf/rmobxx/v9y2014i3p337-349.html https://www.tandfonline.com/doi/full/10.1080/17450101.2014.946773 https://core.ac.uk/download/80775843.pdf,http://dx.doi.org/10.1080/17450101.2014.946773,,10.1080/17450101.2014.946773,2064687789,,0,001-595-149-979-993; 010-815-444-695-705; 012-808-034-137-732; 021-085-698-807-452; 023-470-844-619-884; 024-018-014-038-357; 025-111-110-356-980; 026-647-929-446-687; 029-484-976-447-231; 030-231-372-981-37X; 032-646-361-046-156; 039-347-075-683-589; 039-386-510-787-529; 039-664-504-717-265; 042-116-768-948-199; 044-465-612-939-438; 045-001-039-498-000; 045-932-507-216-39X; 051-201-715-541-734; 051-986-842-318-933; 055-301-049-496-276; 055-674-661-532-618; 056-116-603-230-46X; 063-064-093-915-910; 064-887-757-821-567; 066-052-620-315-169; 067-584-432-631-977; 067-899-497-673-525; 069-225-211-523-428; 069-316-536-938-799; 072-013-303-569-347; 072-929-741-818-761; 073-596-293-696-388; 076-829-093-146-262; 077-250-359-166-150; 077-519-663-741-788; 079-720-753-886-478; 079-904-933-869-866; 082-011-107-171-060; 086-880-441-361-433; 088-047-016-109-782; 088-787-875-464-655; 088-825-866-536-914; 097-189-253-397-300; 098-111-975-478-969; 102-740-232-804-238; 110-622-015-129-46X; 111-947-196-115-826; 114-842-148-754-189; 115-394-632-269-089; 127-598-676-365-216; 132-806-882-664-297; 137-761-940-742-886; 138-999-769-082-203; 142-595-233-423-464; 142-669-172-542-708; 144-683-412-770-544; 145-428-423-864-931; 152-812-962-511-182; 157-150-991-037-813; 162-024-883-259-834; 164-548-046-698-637; 173-181-267-194-190; 174-227-999-514-716; 187-284-648-808-942; 189-059-629-020-561; 195-168-947-864-890; 195-350-473-292-165; 197-859-265-844-927,49,true,,green 005-475-336-970-651,Piracy In South East Asia: Indonesian & Regional Responses,2021-08-12,2021,journal article,Indonesian Journal of International Law,23565527,Indonesian Journal of International Law,,Hasjim Djalal,"Piracy in high seas has caused a problem itself because there are no particular jurisdictionof any state that governed it. This particular issue falls onto universal jurisdiction in which any state has a jurisdiction to enforce their national regulation about piracy itself. On the other hand, we don’t have sufficient international instrument which obliges the contracting states initiating a cooperation between them to combat piracy. An international cooperation, and even on regional basis (such as ASEAN and Asia-Pacific region) has already taken initiatives to combat piracy. Indonesia, as one of the states involved in international and regional basis regarding combating the piracy has its own problems concerning human resources, financial resources, and facility which caused aggravation the problem of law enforcement at sea of Indonesia. Furthermore, it would cause western waters in Indonesia as basis of activity on piracy, such as Melaca Strait, Singapore Strait, Karimata Strait and South China Sea.",1,3,419,440,Human resources; International trade; International waters; Political science; Universal jurisdiction; State (polity); Jurisdiction; Indonesian; Law enforcement; Law of the sea,,,,,http://ijil.ui.ac.id/index.php/home/article/view/399 https://www.neliti.com/publications/65238/piracy-in-south-east-asia-indonesian-regional-responses https://scholarhub.ui.ac.id/ijil/vol1/iss3/7/ http://ijil.ui.ac.id/index.php/home/article/download/399/pdf_444 http://journal.ui.ac.id/index.php/IJIL/article/view/2727/2109 http://ijil.ui.ac.id/index.php/home/article/view/399/pdf_444,http://dx.doi.org/10.17304/ijil.vol1.3.399,,10.17304/ijil.vol1.3.399,1797591536,,0,,0,true,cc-by,gold 005-916-006-528-968,The Enforcement of Intellectual Property Rights in Digital Environment Based on ACTA,2013-10-01,2013,journal article,Mediterranean Journal of Social Sciences,20399340; 20392117,Richtmann Publishing,Italy,Mohammad Bagherpour,"The most essential feature of Right in Law's domain is the appropriate enforcement of that and prohibition of third party infringement due to applying proper actions toward the right. The appropriate enforcement of the intellectual property rights since its existence either nationally or internationally- has been one of the most crucial concerns of the legislators and juristic. The intellectual property rights in physical environment did not mainly concern with its true enforcement, but by the advent of internet and the wide speared e-commerce and the simplicity of rights infringement through internet, right holders face with the new challenge has not proposed yet. Due to complexity of intellectual property in cyberspace, discussing the enforcement of it is complex too, so as TRIPS agreement has not been successful to provide an effective enforcement in this field. ACTA agreement- assigned by 8 like- minded countries in October 2011- in a particular section refers to the enforcement of the intellectual property rights in digital environment in order to provide efficient solutions against right infringement. The present article tries to study the enforcement of the intellectual property rights in cyberspace focusing on the recent agreement. DOI: 10.5901/mjss.2013.v4n11p615",4,11,615,,The Internet; Business; Order (exchange); Law; Right to property; Simplicity; Enforcement; TRIPS Agreement; Cyberspace; Intellectual property,,,,,https://www.mcser.org/journal/index.php/mjss/article/view/1347 https://www.mcser.org/journal/index.php/mjss/article/download/1347/1375 https://core.ac.uk/download/pdf/228537108.pdf,http://dx.doi.org/10.5901/mjss.2013.v4n11p615,,10.5901/mjss.2013.v4n11p615,2049267291,,0,118-483-081-967-887,0,true,, 006-238-647-203-30X,"You're a Crook, Captain Hook! Navigating a Way out of the Somali Piracy Problem with the Rule of Law",2012-12-31,2012,journal article,The Georgia Journal of International and Comparative Law,,,,Andrew Michael Bagley,,40,3,715,,Political science; United Nations Convention on the Law of the Sea; Law; Universal jurisdiction; Somali; Rule of law; Hook; Law of the sea,,,,,https://digitalcommons.law.uga.edu/cgi/viewcontent.cgi?article=1003&context=gjicl https://digitalcommons.law.uga.edu/gjicl/vol40/iss3/4/ https://paperity.org/p/81866684/youre-a-crook-captain-hook-navigating-a-way-out-of-the-somali-piracy-problem-with-the,https://digitalcommons.law.uga.edu/gjicl/vol40/iss3/4/,,,147152647,,0,,0,false,, 006-571-179-369-323,Etnografía conectiva de una práctica de intercambio de archivos: el caso búlgaro,2015-11-03,2015,journal article,Athenea Digital. Revista de pensamiento e investigación social,15788946,Universitat Autonoma de Barcelona,Spain,Maya Georgieva Ninova,"Este texto es un resumen de mi tesis doctoral en que intento mostrar algunos puntos clave del estudio. He optado por comentar de manera muy concisa las motivaciones que me han llevado a realizar el estudio en Bulgaria pero tambien mi inspiracion metodologica y el trabajo de campo que he realizado. Aqui, introduzco tambien los tres principales actores en la red construida como resultado del trabajo etnografico: Proveedores de Internet, Paginas torrent y Paginas de subtitulos.",15,3,265,278,Art; Humanities; Ethnography,,,,,https://atheneadigital.net/article/download/v15-n3-ninova/1663-pdf-es https://atheneadigital.net/article/view/v15-n3-ninova/1663-pdf-es http://www.redalyc.org/articulo.oa?id=53742530015 https://ddd.uab.cat/pub/athdig/athdig_a2015v15n3/athdig_a2015v15n3p265.pdf https://ddd.uab.cat/record/142897 https://core.ac.uk/download/pdf/39027764.pdf,http://dx.doi.org/10.5565/rev/athenea.1663,,10.5565/rev/athenea.1663,2804445349; 2156505042,,0,,0,true,cc-by,gold 006-683-439-737-310,Modify State “Piracy” After Allen : Introducing Apology to the U.S. Copyright Regime,2021-04-15,2021,journal article,Buffalo Law Review,00239356,,,Runhua Wang,,69,2,485,,Economics; Law and economics; State (polity),,,,,https://digitalcommons.law.buffalo.edu/cgi/viewcontent.cgi?article=4909&context=buffalolawreview https://digitalcommons.law.buffalo.edu/buffalolawreview/vol69/iss2/3/,https://digitalcommons.law.buffalo.edu/buffalolawreview/vol69/iss2/3/,,,3166434860,,0,,0,false,, 006-698-205-725-116,On jurisdiction over act in piracy on exclusive economic zone and territorial sea,,2010,journal article,Journal of Dalian Maritime University,,,,Shao Xiao-fan,"Despite the Article 101 of the United Nations Convention on the Law of the Sea(UNCLOS 1982),which stipulates that piracy is only committed on the high seas or in any other place outside the jurisdiction of any State,the illegal acts of violence or detention or any act of depredation,which committed on the EEZ and the contiguous zone,are also regarded as the piracy by international law based on the UNCLOS 1982 Article 58 para 2.Every State may have judicial jurisdiction to exercise the right of visit,right of hot pursuit,arrest,etc.according to the UNCLOS 1982 Article 105 and Article 107.The illegal acts of violence,detention or depredation on the territorial sea are defined as the piracy governed by the domestic law,and a coastal state may exercise the domestic jurisdiction of the State.Other States under the consultations with the coastal state or authorized by UN can also enter the territorial sea of the coastal state to crack down on piracy,but this empowerment can not be regarded as international customary law.",,,,,Exclusive economic zone; Subject-matter jurisdiction; International waters; Political science; United Nations Convention on the Law of the Sea; Convention on the Territorial Sea and the Contiguous Zone; Law; Jurisdiction; Law of the sea; Territorial waters,,,,,https://en.cnki.com.cn/Article_en/CJFDTOTAL-DLHX201005012.htm,https://en.cnki.com.cn/Article_en/CJFDTOTAL-DLHX201005012.htm,,,2352112017,,0,,0,false,, 006-845-023-357-559,Urban Guerrilla & Piracy Surveillance: Accidental Casualties in Fighting Piracy in P2P Networks in Europe,,2010,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Giancarlo Frosio,,,,,,Engineering; Privacy law; Common law; Order (exchange); Law; Copyright infringement; European union; Public domain; Data Protection Act 1998; Fundamental rights,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1545013 https://autopapers.ssrn.com/sol3/papers.cfm?abstract_id=1545013,http://dx.doi.org/10.2139/ssrn.1545013,,10.2139/ssrn.1545013,1706647306,,0,,2,false,, 006-953-217-297-804,Revisiting the Piracy Problem: Rising Risks in Counter-Piracy Operations and the Need for a Multi-Dimensional Solution,,2013,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Jenna Francine Gushue,,,,,,Software deployment; Engineering; International trade; Accountability; International community; Computer security; Restructuring; Deterrence theory; Strengths and weaknesses; Promotion (rank); Legislature,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2235673,http://dx.doi.org/10.2139/ssrn.2235673,,10.2139/ssrn.2235673,2265683053,,0,,0,false,, 007-010-745-934-291,Piracy and International Criminal Law,2013-01-20,2013,journal article,Polish Review of International and European Law,25447432; 22992170,Uniwersytet Kardynala Stefana Wyszynskiego,,Elżbieta Karska,,2,1,41,68,Political science; Public international law; Law; Criminal law; Criminology,,,,,http://czasopisma.uksw.edu.pl/index.php/priel/article/view/1135,http://dx.doi.org/10.21697/priel.2013.2.1.02,,10.21697/priel.2013.2.1.02,2767983710,,0,,0,true,,bronze 007-255-389-800-769,The Market for Digital Piracy,,1997,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Dan L. Burk,,,,,,Public economics; The Internet; Public good; Economics; Information good; Race to the bottom; Inefficiency; Competition (economics); Race to the Top; Industrial organization; Product (business),,,,,https://papers.ssrn.com/sol3/Delivery.cfm/lp9701232.pdf?abstractid=41669&mirid=3 https://www.ssrn.com/abstract=41669 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=41669,http://dx.doi.org/10.2139/ssrn.41669,,10.2139/ssrn.41669,160500220,,0,,1,false,, 007-528-823-468-617,Responding to Somali piracy by providing sustainable alternatives: addressing the motivation to offend,2019-12-16,2019,journal article,"Crime, Law and Social Change",09254994; 15730751,Springer Science and Business Media LLC,Netherlands,Jade Lindley,"Somali piracy is a complex issue that requires a complex series of responses on land and at sea. Existing responses, predominantly military-led, focus to reduce opportunity to offend, but from a criminological perspective, these responses fail to address the core motivators driving piracy to continue. As such, a knowledge gap exists of methods to address motivation to offend. This research fills the knowledge gap in three ways: first, it looks to routine activity theory as an underlying framework to explain the continuing motivation to commit Somali piracy. Second, it tests the existing responses to Somali piracy by critically analysing the matrix of activities in the international community’s toolkit to expose the paucity of responses that directly address motivations for offending. Third, it explores alternate non-military based responses that focus on addressing the issues driving motivations to offend, such as poverty and lack of education. This article concludes that unless meaningful and long term alternatives are available to those who may engage in piracy, it is likely to resurge.",73,5,531,549,Commit; Political science; Poverty; Perspective (graphical); Recidivism; Crime prevention; Somali; Routine activity theory; International community; Public relations,,,,,https://research-repository.uwa.edu.au/en/publications/responding-to-somali-piracy-by-providing-sustainable-alternatives https://link.springer.com/article/10.1007/s10611-019-09866-1,http://dx.doi.org/10.1007/s10611-019-09866-1,,10.1007/s10611-019-09866-1,2981361522,,0,005-707-110-338-960; 014-718-107-158-31X; 028-868-278-426-94X; 033-652-281-404-635; 055-738-676-093-291; 058-809-468-935-356; 070-641-683-091-027; 072-937-652-267-101; 082-797-576-367-645; 095-847-724-219-471; 101-820-017-094-759; 107-707-719-826-639; 137-701-371-644-340; 140-339-052-366-522; 160-364-865-359-776; 164-201-197-546-072,0,false,, 007-559-358-394-991,Situational determinants of software piracy: An equity theory perspective,,1996,journal article,Journal of Business Ethics,01674544; 15730697,Springer Science and Business Media LLC,Netherlands,Richard Glass; Wallace A. Wood,"Software piracy has become recognized as a major problem for the software industry and for business. One research approach that has provided a theoretical framework for studying software piracy has been to place the illegal copying of software within the domain of ethical decision making assumes that a person must be able to recognize software piracy as a moral issue. A person who fails to recognize a moral issue will fail to employ moral decision making schemata. There is substantial evidence that many individuals do not perceive software piracy to be an ethical problem. This paper applies social exchange theory, in particular equity theory, to predict the influence of situational factors on subjects' intentions to participate in software piracy. Consistent with the predictions of equity theory this study found that input and outcome situational variables significantly effect a person's intentions to commit software piracy.",15,11,1189,1198,Business ethics; Commit; Psychology; Social exchange theory; Ethical decision; Software; Copying; Public relations; Equity theory; Situational ethics,,,,,https://philpapers.org/rec/GLASDO https://link.springer.com/article/10.1007%2FBF00412817 https://www.jstor.org/stable/25072843,http://dx.doi.org/10.1007/bf00412817,,10.1007/bf00412817,2082115983,,0,001-463-209-899-123; 010-292-330-210-925; 016-628-910-429-805; 033-127-371-286-470; 036-576-410-271-494; 041-781-348-238-610; 051-169-436-356-811; 063-862-591-134-240; 065-521-850-870-400; 070-050-965-186-476; 070-524-434-297-611; 073-756-105-147-18X; 108-743-157-279-059; 111-142-307-230-707; 139-892-080-009-969; 153-552-384-031-475; 168-026-770-101-157; 176-877-270-345-361,217,false,, 007-574-709-573-402,Laundering Pirates? The Potential Role of Anti-money Laundering in Countering Maritime Piracy,2012-09-01,2012,journal article,Journal of International Criminal Justice,14781387; 14781395,Oxford University Press (OUP),United Kingdom,Mark T. Nance; Anja P. Jakobi,"Officials only recently have begun considering the use of financial investigative techniques, especially anti-money laundering (AML) tactics, in counter-piracy efforts. Europol and INTERPOL are attempting to establish coordinated law enforcement approaches to the problem of piracy, while the Financial Action Task Force on Money Laundering has generated early research on the possible use of AML in particular. Based on an analysis of the evolution of the AML regime more broadly, we suggest that a financial law enforcement approach, on paper, could be a valuable additional tool in countering piracy. To date, however, two obstacles have limited the wider acceptance of those tools. First, until very recently, no 'norm entrepreneur' has stepped forward to make financial investigative tactics a central tool in counter-piracy efforts. Secondly, while 'following the money' has much potential as a means of fighting piracy, we still know too little about the on-shore side of piracy to put those tools to use.",10,4,857,880,Norm (social); Business; Law; Money laundering; Law enforcement; Investigative Techniques; Task force; Maritime piracy,,,,,http://academic.oup.com/jicj/article-abstract/10/4/857/809022 http://jicj.oxfordjournals.org/content/10/4/857.abstract https://academic.oup.com/jicj/article-abstract/10/4/857/809022,http://dx.doi.org/10.1093/jicj/mqs035,,10.1093/jicj/mqs035,2051360996,,0,,7,false,, 007-722-033-861-624,The Global Fight against Piracy,2013-03-27,2013,journal article,Global Policy,17585880; 17585899,Wiley,United Kingdom,Christian Bueger,"Maritime piracy – hijackings, kidnapping, hostage taking and armed robbery at sea – presents an ongoing challenge for the international community. What was long perceived as a problem of the past is today recognised to be a major challenge for international security. To act against piracy has proven to be an intricate affair. The new attention to piracy and indeed the return of the problem on the agendas of global politics started with the significant increase of piracy incidents in Southeast Asia in the 1990s. Southeast Asia has since seen the creation of a regional cooperation framework that addresses piracy through information sharing, improved coordination and common strategy making. Although piracy incidents in the area still occur, a viable counterpiracy infrastructure has been put in place to address the menace, and arguably piracy is well contained in the area. Piracy in the Horn of Africa and the Western Indian Ocean region is a different story. The international community has been increasingly engaged in the area since 2007, when the UN Security Council began to approach the issue. International actors, including states and international organisations, have been quite innovative in organising the response: multilateral naval missions organised by the US, NATO and the EU have been dispatched to the area; over 30 states participate in naval counterpiracy activities; states, international organisations (including the UN, the International Maritime Organisation, Interpol and the UN Office of Drugs and Crime) and private actors (such as shipping associations) coordinate their activity in the working groups of a UN Contact Group; over 1000 pirates have been prosecuted or are awaiting trial; and a complex international counterpiracy programme mixes security and law enforcement with regional rule of law projects, maritime security sector reforms and development programmes. Yet success is still limited. According to Jack Lang, the UN special adviser on piracy, ‘the race between the pirates and the international community is progressively being won by the pirates’. 1 The authors of this special section discuss what makes it so difficult for the international community to cope with piracy. They discuss the intricacies of finding tailored strategies and the obstacles and complexities that actors face in addressing Somali piracy. The authors draw on research from the emerging inter-disciplinary field of piracy studies, which has attracted a growing number of researchers from different disciplines. 2 Piracy studies is an intellectual project that focuses on understanding the return of piracy, how piracy is organised in different parts of the world, how it is embedded in a larger historical context and as part of international dynamics, and how counterpiracy responses can be improved (Bueger, 2013). It explores the relationship between piracy and other threats, such as terrorism, and uses it as a paradigmatic example for understanding contemporary international problems. Through this lens, piracy studies facilitate a productive inter-disciplinary dialogue and bring perspectives into the conversation that have often been understood as competitors or even as incommensurable. Scholars from international law, international security, development studies, logistics, economics and technical",4,1,63,64,Political economy; Sociology; Development studies; Terrorism; Maritime security; International community; Law enforcement; Economic growth; International security; Global politics; International law,,,,,https://ideas.repec.org/a/bla/glopol/v4y2013i1p63-64.html https://orca.cf.ac.uk/46267/ https://econpapers.repec.org/article/blaglopol/v_3a4_3ay_3a2013_3ai_3a1_3ap_3a63-64.htm https://onlinelibrary.wiley.com/doi/abs/10.1111/1758-5899.12028 https://core.ac.uk/display/9719764,http://dx.doi.org/10.1111/1758-5899.12028,,10.1111/1758-5899.12028,2033556994,,0,052-627-226-126-905; 079-590-039-904-007; 104-329-271-313-805; 137-396-191-698-685; 169-516-066-822-880,2,false,, 008-142-145-285-33X,"Murder Piracy and Treason: A Selection of Notable English Trials, by Raymond Postgate",,1927,journal article,Indiana Law Journal,00196665,,,Paul L Sayre,,3,2,7,,Law; Criminology; Selection (genetic algorithm); History,,,,,https://www.repository.law.indiana.edu/ilj/vol3/iss2/7 https://www.repository.law.indiana.edu/cgi/viewcontent.cgi?article=2425&context=ilj,https://www.repository.law.indiana.edu/ilj/vol3/iss2/7,,,1592484111,,0,,0,false,, 008-252-115-538-268,US toughens piracy laws,,1993,journal article,Computer Fraud & Security Bulletin,01420496,Mark Allen Group,United Kingdom,Charlotte Klopp,,1993,2,1,2,Political science; Law,,,,,https://api.elsevier.com/content/article/PII:S0142049609900583?httpAccept=text/xml http://linkinghub.elsevier.com/retrieve/pii/S0142049609900583 http://www.sciencedirect.com/science/article/pii/S0142049609900583,http://dx.doi.org/10.1016/s0142-0496(09)90058-3,,10.1016/s0142-0496(09)90058-3,2083697850,,0,,0,false,, 008-501-971-562-679,The application of criminal sanctions against violations of cybercrime,2018-07-27,2018,journal article,Indonesia Prime,25484664; 2548317x,Indonesia Prime,,Suleman Sulaeman,"The era of globalization led to the more sophisticated information technology so that it has brought an impact on the emergence of various forms of crime which affect modern nature greater than the conventional crime. The crime using a computer since long ago is the type of crime that is difficult to classify as a criminal offence at one side of the technology can see as a means to achieve the goal. On the other hand, however, the technology can also be seen as a human activity.",2,1,56,67,Information technology; Political science; Globalization; Sanctions; Cybercrime; Criminal sanction; Criminal offence; Affect (psychology); Criminology,,,,,https://www.indonesiaprime.or.id/index.php/id/article/view/15 https://indonesiaprime.or.id/index.php/id/article/download/15/17 https://core.ac.uk/download/pdf/236077272.pdf,http://dx.doi.org/10.29209/id.v2i1.15,,10.29209/id.v2i1.15,2885337786,,0,095-375-653-769-739,2,true,cc-by,gold 008-513-208-149-029,"Economic and Demographic Characteristics of the Subjects, Operating in Digital Shadow Economy☆",,2016,journal article,Procedia Economics and Finance,22125671,Elsevier BV,,Ligita Gaspareniene; Rita Remeikiene,"Abstract This article is aimed at theoretical and empirical identification of economic and demographic characteristics of the subjects, operating in digital shadow economy. Although, in general sense, the characteristics of the subjects, operating in digital shadow economy, are not extremely different from the ones of the subjects, operating in traditional shadow economy, the expert evaluation has enabled to identify the distinctive features of an illegal digital market seller, who can be represented as a young or middle-aged male with higher education, a professional in his operational field. With reference to the research results, sellers in digital shadow economy include the entities with officially registered activities, who are trying to evade taxation of the revenues earned from the operations in e-space. On the other hand, according to the experts, the amount of the officially accounted revenue earned by these entities may reach up to 300 EUR. Hence, the defined profile of an illegal seller, as of a subject, operating in digital shadow economy, proposes that a seller in digital shadow economy is an intellectually developed person with advanced professional skills, but insufficient financial earnings.",39,,840,848,Shadow (psychology); Higher education; Economy; Economics; Marketing; Revenue; Field (Bourdieu); Earnings; Professional skills; Expert evaluation; Identification (information),,,,,https://www.sciencedirect.com/science/article/pii/S2212567116302532 https://www.sciencedirect.com/science/article/abs/pii/S2212567116302532 https://core.ac.uk/download/pdf/82050677.pdf,http://dx.doi.org/10.1016/s2212-5671(16)30253-2,,10.1016/s2212-5671(16)30253-2,2507801661,,0,000-560-347-627-052; 001-362-102-768-200; 005-745-685-547-074; 009-539-936-500-990; 013-589-273-901-40X; 028-121-088-039-564; 028-943-971-358-938; 033-515-388-967-859; 036-288-246-851-895; 037-039-268-769-648; 040-366-297-422-48X; 041-876-876-250-949; 050-817-994-537-373; 052-466-609-601-182; 052-534-058-986-689; 054-750-552-490-063; 054-907-661-692-61X; 058-806-863-894-52X; 063-597-878-494-580; 070-882-782-403-935; 071-183-254-246-319; 072-202-189-583-489; 112-404-187-876-258; 117-851-873-677-722; 118-354-305-653-457; 121-265-816-970-706; 123-538-500-409-553; 132-000-894-825-163; 139-882-015-920-036; 141-947-149-029-560; 161-446-165-980-313; 187-178-358-984-236; 187-970-893-226-751; 193-423-519-073-147,4,true,cc-by-nc-nd,gold 008-611-614-243-968,The Emergence of “Universal Jurisdiction” in Response to Somali Piracy: An Empirically Informed Critique of International Law’s “Paradigmatic” Universal Jurisdiction Crime,2019-09-01,2019,journal article,Chinese Journal of International Law,15401650; 17469937,Oxford University Press (OUP),United States,Matthew Garrod,"Since the 1980s, the idea that piracy is the “original” and “paradigmatic” universal jurisdiction crime in customary international law has been increasingly supported by weighty scholarship. In the wake of the unprecedented surge in Somali piracy, this view is gaining ground among various powerful actors in international law. Yet, remarkably little empirically grounded scholarship exists in support of universal jurisdiction. This Article provides the first comprehensive empirical analysis of state practice in response to Somali piracy in a ten-year period since 2006. Additionally, the data on Somali piracy are compared with the empirical findings of state practice regarding international crimes, which are more “heinous” than piracy, since the end of World War II to 2016. In so doing, this Article brings new insight and the first thorough critique of what virtually most scholars, governments, the UN and even the International Court of Justice have said on universal jurisdiction, its purpose and the basis for it in international law. In view of inter-state tensions and conflict caused by universal jurisdiction and a move towards law codification, there is now a pressing need for a paradigm shift in the concept of universal jurisdiction for both piracy and international crimes, a step away from conventional scholarly accounts, and the grand narratives from which they proceed, to a position that has a solid basis in the actual practice of states. Empirically and historically informed, it is proposed that “universal jurisdiction” for both categories of crime provides a basis in international law permitting the exercise national criminal jurisdiction over offences involving foreign nationals abroad that have a close nexus between the case over which jurisdiction is asserted and the state asserting jurisdiction. Common and traditionally held assumptions that universal jurisdiction is based solely on the grave nature of crimes and is applied by states absent any nexus to offences and in the interest of the international community are unfounded.",18,3,551,643,Political science; Law and economics; Universal jurisdiction; Somali; Jurisdiction; International court; International community; Customary international law; Criminal jurisdiction; International law,,,,,https://academic.oup.com/chinesejil/article/18/3/551/5625568 http://sro.sussex.ac.uk/id/eprint/83892/ http://academic.oup.com/chinesejil/article-abstract/18/3/551/5625568,http://dx.doi.org/10.1093/chinesejil/jmz025,,10.1093/chinesejil/jmz025,2951638976,,0,,1,true,,green 008-715-922-075-501,"The Law of Piracy. (International Law Studies Vol.63.). By Alfred P. Rubin. [Newport, Rhode Island: US Naval War College Press. 1988. xiv + 444 pp.]",,1989,journal article,International and Comparative Law Quarterly,00205893; 14716895,Cambridge University Press (CUP),United Kingdom,J. B. R. L. Langdon,,38,04,987,988,Political science; Law; International law,,,,,https://www.cambridge.org/core/journals/international-and-comparative-law-quarterly/article/the-law-of-piracy-international-law-studies-vol63-by-rubinalfred-p-newport-rhode-island-us-naval-war-college-press-1988-xiv-444-pp/DF8D5A1F4560458D21CE40B23EA45C82 http://journals.cambridge.org/action/displayAbstract?aid=1513304 https://www.cambridge.org/core/services/aop-cambridge-core/content/view/DF8D5A1F4560458D21CE40B23EA45C82/S0020589300049939a.pdf/div-class-title-span-class-italic-the-law-of-piracy-international-law-studies-vol-63-span-by-alfred-p-rubin-newport-rhode-island-us-naval-war-college-press-1988-xiv-444-pp-div.pdf,http://dx.doi.org/10.1093/iclqaj/38.4.987,,10.1093/iclqaj/38.4.987,2033317509,,0,,0,false,, 008-735-002-929-488,Abstract of recent article and literature: Anti-piracy alliance under fire,,1999,journal article,Computers & Security,01674048,Elsevier BV,United Kingdom,Sandy Nichol,,18,6,522,523,Political science; Alliance; Public relations; Operations research,,,,,http://www.sciencedirect.com/science/article/pii/S016740489990857X https://www.sciencedirect.com/science/article/pii/S016740489990857X,http://dx.doi.org/10.1016/s0167-4048(99)90857-x,,10.1016/s0167-4048(99)90857-x,2427836333,,0,,0,false,, 008-845-603-890-547,Negative Aspects of the Information Society Development,2018-06-30,2018,journal article,Economic and Environmental Studies,16422597; 20818319,Uniwersytet Opolski,,Stanisław Ślusarczyk; Kamila Wrzesińska,"The development of an information society leads to a shift from material civilization towards an invisible civilization which should properly be called an information civilization. The information civilization creates enormous opportunities for society and economy. Internet-based functions, such as teleworking, tele-education or tele-information have their social and economic implications. ; Goal of the article: The goal of the study is to draw attention to the social consequences of the fast development of the information society with a presentation of selected threats to children and young people in cyberspace.; Methodology: The study uses the research method based on the literature analysis of the phenomenon of threats to children and adolescents in cyberspace, results of research conducted among others by the Nobody's Children Foundation and the Central Statistical Office of Poland. ; Conclusions: Wide perception of the cyberbullying problem is needed as this issue concerns children and young people as well as parents and teachers",18,46,943,954,Internet privacy; Political science; Cybercrime; Information society; Cyberspace,,,,,https://czasopisma.uni.opole.pl/index.php/ees/article/download/108/78 http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ekon-element-000171522881 https://core.ac.uk/download/280488089.pdf,http://dx.doi.org/10.25167/ees.2018.46.29,,10.25167/ees.2018.46.29,2893139349,,0,,0,true,,gold 008-896-495-853-748,Software Piracy and Global Competitiveness: Report on Global Software Piracy,,1998,journal article,"International Review of Law, Computers & Technology",13600869; 13646885,Informa UK Limited,United Kingdom,Mark Traphagan; Anne Griffith,"This paper is a comprehensive examination of the impact of software piracy worldwide. Software piracy is defined by the American Software Publishers Association as the unauthorized duplication of computer software. Completed in April 1997, this survey examines business application software piracy in 1996. Three main messages emerge using data collected from a variety of sources and analyzed using strict research methodolog. Firstly, business application software piracy cost the industry $11.3 billion in 1996. Secondly, continued growth of the worldwide software industry is being retarded by piracy. Thirdly, governments worldwide must do more to combat piracy . 1997 piracy data have become available since this paper was submitted. 1998 data are expected in May 1999.",12,3,431,451,Application software; Variety (cybernetics); Software; Computer software; Global software; Computer security; Computer science,,,,,https://www.tandfonline.com/doi/abs/10.1080/13600869855298,http://dx.doi.org/10.1080/13600869855298,,10.1080/13600869855298,2069370272,,0,,74,false,, 009-037-251-670-524,The No Electronic Theft Act: Stop Internet Piracy!,2016-10-26,2016,journal article,"DePaul Journal of Art, Technology & Intellectual Property Law",10610553,,,Stephanie Brown,,9,1,147,,The Internet; Advertising; Business,,,,,https://via.library.depaul.edu/cgi/viewcontent.cgi?article=1310&context=jatip https://via.library.depaul.edu/jatip/vol9/iss1/6/,https://via.library.depaul.edu/jatip/vol9/iss1/6/,,,2568909682,,0,,0,false,, 009-206-145-775-95X,"Counter Piracy Armed Services, the Italian System and the Search for Clarity on the Use of Force at Sea",,2013,journal article,The Italian Yearbook of International Law Online,22116133,Brill,,Giorgia Bevilacqua,"There seems to be a broad consensus that maritime piracy is causing serious harm to life and property and to the safety of navigation. Nevertheless, it appears that the international community and affected States lack a coherent and coordinated approach to counter piracy. This article examines the increasingly emerging use of armed security services on board of civilian vessels. Italy, like other flag States fearing a significant threat to well-defined domestic interests, has begun to authorize the deployment of security personnel on national vessels navigating in international waters infested by pirates. However, according to the author, to avoid the consequent predictable escalation of violence at sea and the possible breach of human rights law applicable to suspected pirates, States are required to adopt proper legislative frameworks that duly regulate the actions of embarked armed services.",22,1,39,57,Engineering; International waters; Human rights; Public international law; Law; Use of force; Harm; Maritime security; International community; International law,,,,,http://www.sidi-isil.org/wp-content/uploads/2012/05/03_Bevilacqua.pdf https://brill.com/view/journals/iyio/22/1/article-p39_4.xml?language=en https://dialnet.unirioja.es/servlet/articulo?codigo=4568802,http://dx.doi.org/10.1163/22116133-02201004,,10.1163/22116133-02201004,2074426591,,0,,2,false,, 009-438-167-481-226,Experiences and Challenges with Using CERT Data to Analyze International Cyber Security,,2009,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Stuart E. Madnick; Xitong Li; Nazli Choucri,"With the increasing interconnection of computer networks and sophistication of cyber attacks, it is important to understand the dynamics of such situations, especially in regards to cyber international relations. The Explorations in Cyber International Relations (ECIR) Data Dashboard Project is an initiative to gather worldwide cybersecurity data publicly provided by nation-level Computer Emergency Response Teams (CERTs) and to provide a set of tools to analyze the cybersecurity data. The unique contributions of this paper are: (1) an evaluation of the current state of the diverse nation-level CERT cybersecurity data sources, (2) a description of the Data Dashboard tool developed and some interesting analyses from using our tool, and (3) a summary of some challenges with the CERT data availability and usability uncovered in our research.",,,,,Engineering; Sophistication; Usability; Dashboard (business); Data availability; Emergency response; International relations; Computer security,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1478206 https://ssrn.com/abstract=1478206 https://papers.ssrn.com/sol3/Delivery.cfm?abstractid=1478206 https://core.ac.uk/display/4414782 https://core.ac.uk/download/4414782.pdf,http://dx.doi.org/10.2139/ssrn.1478206,,10.2139/ssrn.1478206,1520887344,,0,003-889-969-056-517; 009-669-426-693-329; 016-936-847-946-037; 022-618-304-166-53X; 047-213-190-584-857; 068-415-592-001-797; 068-997-368-595-861; 143-976-694-724-126; 151-975-924-987-390,5,true,cc-by-nc-sa,green 009-617-032-558-453,The challenge of the criminalization of online piracy in Hong Kong,2008-10-01,2008,journal article,Journal of Intellectual Property Law & Practice,17471532; 17471540,Oxford University Press (OUP),,Charn Wing Wan,,3,10,666,672,Political science; Law; Criminalization,,,,,https://academic.oup.com/jiplp/article-abstract/3/10/666/845122,http://dx.doi.org/10.1093/jiplp/jpn148,,10.1093/jiplp/jpn148,2087975912,,0,,0,false,, 009-785-106-630-570,A Study on the Recognition of the Costs Paid from Piracy - Focused on the Longchamp Case -,2018-12-31,2018,journal article,THE INTERNATIONAL COMMERCE & LAW REVIEW,12292036,The Korean Research Institute Of International Commerce and Law,,Nak-Hyun Han,,80,,169,194,,,,,,https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002431184,http://dx.doi.org/10.35980/krical.2018.12.80.169,,10.35980/krical.2018.12.80.169,3039413166,,0,,0,false,, 010-023-832-539-952,The Role of International Framework in Promoting Copyright protection in Cyber space,,2016,journal article,Research Journal of Science and Technology,09754393; 23492988,A and V Publications,,Shashirekha Malagi,"The intellectual property is the wealth of nations. The misappropriation and destruction of this property can imbalance the economic infrastructure of the nation. When it comes to the copyright in cyber space, it is very much vulnerable to appropriations, as it would cheaply be reproduced. By introducing uniformity of applications to state laws internationally, the international conventions like Berne Convention, the WIPO Copyright Convention, the TRIPS Agreement, WIIPO Performances and Phonogram Treaty, 1996, have got a great role in Protection of Copyright in Cyber space. Further, USA, UK and European countries have also taken lead in this direction by enacting The Digital Millennium Copyright Act, 1998 (US), Internet and its ability of transmitting works almost at a lightning speed, copyright protection has become increasingly difficult. The problems created by recent technological developments cannot be solved by the decisions of individual countries. With the Internet, copyrighted works remain vulnerable to outside piracy even if protected in the home country. The parallel growth of state laws as well as international treaties can meet the challenges that the law faces in this modern technological era.",8,2,107,112,Sociology; International trade; Digital Millennium Copyright Act; Berne Convention; Treaty; TRIPS Agreement; Convention; Misappropriation; Intellectual property; Social science; Public domain,,,,,http://www.indianjournals.com/ijor.aspx?target=ijor:rjst&volume=8&issue=2&article=007&type=pdf,http://dx.doi.org/10.5958/2349-2988.2016.00014.0,,10.5958/2349-2988.2016.00014.0,2526070136,,0,,0,false,, 010-078-757-572-346,Combating counterfeiting and piracy: the Commonwealth initiative,,2009,journal article,Commonwealth Law Bulletin,03050718; 17505976,Informa UK Limited,United Kingdom,Margaret Bruce,"This article notes the various components of intellectual property (IP) and the traditional forms of protection for IP owners. It also explains trends in the infringement of IPR, particularly in the nature of counterfeiting and piracy, the raison d’etre and the resulting impact in Commonwealth Countries. The article also comments on the legislative developments in Commonwealth countries designed to provide a stronger deterrence and the multi‐sector approach adopted in the implementation of the legislation. Finally, it brings attention to the collective concerns of Member Countries and the recent steps taken to develop and adopt a framework of cooperation in order to combat the menace of counterfeiting and piracy.",35,4,703,711,Economics; Order (exchange); Law; Legislation; Commonwealth; Intellectual property; Deterrence theory; Legislature,,,,,https://www.tandfonline.com/doi/abs/10.1080/03050710903387840,http://dx.doi.org/10.1080/03050710903387840,,10.1080/03050710903387840,2086992233,,0,,1,false,, 010-146-711-506-660,Neutralizing Potential and Self-Reported Digital Piracy: A Multitheoretical Exploration Among College Undergraduates,2008-12-02,2008,journal article,Criminal Justice Review,07340168; 15563839,SAGE Publications,United States,Robert G. Morris; George E. Higgins,"This study explores retrospective (self-reported) and prospective (willingness to engage) participation in digital piracy via a multitheoretical approach relying on self-control, social learning, microanomie, and techniques of neutralization. Using more complete measures of digital piracy than in previous studies (illegal music, software, and movie downloading), data were collected from undergraduate students from multiple universities (n = 585). Modest support was found for neutralization theory when controlling for other theoretical variables. Modest support was also established for social learning theory. It is clear that there is an underexplored cross-theoretical dynamic in explaining self-reported piracy and willingness to engage in digital piracy. Suggestions for policy and future research are presented and limitations are accounted for.",34,2,173,195,Internet privacy; Social learning theory; Psychology; Techniques of neutralization; Cybercrime; Digital piracy; Upload; Social psychology; Social learning,,,,,http://cjr.sagepub.com/content/34/2/173.abstract http://journals.sagepub.com/doi/abs/10.1177/0734016808325034 http://journals.sagepub.com/doi/pdf/10.1177/0734016808325034 https://journals.sagepub.com/doi/abs/10.1177/0734016808325034,http://dx.doi.org/10.1177/0734016808325034,,10.1177/0734016808325034,2145342647,,0,005-136-753-965-857; 005-540-521-288-29X; 010-292-330-210-925; 011-970-832-954-189; 013-425-010-292-015; 013-446-422-693-352; 020-911-565-436-921; 020-973-534-331-792; 025-621-608-909-415; 026-283-018-089-565; 026-787-153-498-002; 029-253-343-590-961; 030-437-185-681-738; 031-480-472-677-985; 032-658-891-951-899; 036-206-197-513-432; 042-143-102-272-982; 046-989-664-357-368; 055-450-998-184-302; 056-032-125-676-126; 058-806-863-894-52X; 061-246-670-613-627; 064-455-985-564-196; 064-734-067-668-641; 067-339-005-241-596; 068-805-103-161-460; 069-497-872-046-744; 070-660-090-646-684; 072-084-774-976-983; 074-777-270-980-043; 078-108-375-970-543; 085-804-948-361-693; 094-565-529-045-486; 096-401-039-718-213; 096-762-470-199-768; 098-570-250-639-553; 099-342-173-833-089; 104-563-034-257-032; 104-904-305-990-328; 116-760-844-878-63X; 120-417-554-411-771; 124-336-028-504-75X; 126-546-293-878-638; 127-532-739-635-518; 127-593-578-276-09X; 138-200-974-413-518; 139-936-448-007-85X; 141-514-797-827-874; 144-513-489-397-58X; 150-527-549-363-854; 160-705-344-029-002; 161-493-572-775-810; 163-584-874-681-533; 165-651-170-191-915; 167-387-463-679-730; 168-714-723-917-275; 175-905-268-229-256; 178-091-174-583-771; 199-770-138-710-055,114,false,, 010-184-950-563-766,The Law of Piracy: ABBREVIATIONS,,1988,journal article,International law studies,21546266,,,Alfred P. Rubin,,63,1,8,,Political science; Law,,,,,http://digital-commons.usnwc.edu/ils/vol63/iss1/8/ https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1772&context=ils,http://digital-commons.usnwc.edu/ils/vol63/iss1/8/,,,3187049276,,0,,0,false,, 010-192-595-570-629,The Internet and the piracy of copyrightable computer software in South Africa : some comparative perspectives,,2006,journal article,South African Law Journal,19962177,,,G.J. Lidovho,"The article investigates the copyright of computer software in relation to Internet technology and the technological 'arms race' between software ; copyright owners and software pirates. Arguments are advanced that a ; potential user's decision to buy or to pirate is determined by a variety of ; factors, while the nature of piracy is such that it seems to play a dominant role ; in the promotion of computer software. The author adopts the view that ; strong criminal copyright laws directed at Internet technology activities may ; not be in the best interest of a developing country like South Africa.",123,2,338,375,The Internet; Variety (cybernetics); Business; Law; Relation (database); Software; Computer software; Arms race; Promotion (rank); Developing country,,,,,http://reference.sabinet.co.za/sa_epublication_article/ju_salj_v123_n2_a10 http://journals.co.za/content/ju_salj/123/2/EJC53692?fromSearch=true,http://reference.sabinet.co.za/sa_epublication_article/ju_salj_v123_n2_a10,,,179957935,,0,,2,false,, 010-233-896-660-204,"Piracy, Sea Robbery, and Terrorism: Enforcing Laws to Deter Ransom Payments and Hijacking",,2010,journal article,Transportation Law Journal,0049450x,,,Thaine Lennox-Gentle,"This paper focuses on U.S. and international laws that address piracy and presents several alternatives, or combinations of alternatives, that may help combat the unlawful attacks on a global level. By negatively affecting the proportionality of the pirate risk vs. reward ratio, a nation can protect itself from becoming an easy pirate target. Moreover, by enforcing current laws against terrorism, the U.S. may use its existing policy to encourage local ship owners and insurers to find alternative means to paying ransoms to pirates. Using this combination of law and policy will force carriers, owners, and insurers to create a comprehensive strategy for preventing piracy while allowing them lawful access to a government's military force in the event of an unforeseen attack.",37,3,199,217,Criminal justice; Business; Payment; Proportionality (law); Law; Terrorism; Ransom; Poison control; Injury control; International law,,,,,https://www.safetylit.org/citations/index.php?fuseaction=citations.viewdetails&citationIds[]=citjournalarticle_600745_20 https://trid.trb.org/view/1090815,https://www.safetylit.org/citations/index.php?fuseaction=citations.viewdetails&citationIds[]=citjournalarticle_600745_20,,,614986925,,0,,6,false,, 010-333-663-759-244,Anti-piracy laws won't just upset web users,,2009,journal article,New Scientist,02624079; 13648500,Elsevier BV,United States,Paul Marks,,204,2737,22,23,Business; Law; Upset; Internet service provider; Upload,,,,,https://www.sciencedirect.com/science/article/pii/S0262407909631857,http://dx.doi.org/10.1016/s0262-4079(09)63185-7,,10.1016/s0262-4079(09)63185-7,2047091673,,0,,0,false,, 010-589-336-122-210,Piracy and Armed Robbery at Sea: The Legal Framework for Counter-piracy Operations in Somalia and the Gulf of Aden,,2011,journal article,International Criminal Law Review,1567536x; 15718123,Brill,Netherlands,Douglas Guilfoyle,,11,5,910,914,Political science; Law,,,,,https://booksandjournals.brillonline.com/content/journals/10.1163/157181211x603149 https://brill.com/view/journals/icla/11/5/article-p910_6.xml?language=en,http://dx.doi.org/10.1163/157181211x603149,,10.1163/157181211x603149,2017219531,,0,,0,false,, 010-670-346-210-829,Foreword: End Game! An International Conference on Combating Maritime Piracy,,2014,journal article,Case Western Reserve Journal of International Law,00087254,,,Michael P. Scharf; Matthew E. Carlton,,46,1,1,,Political science; Law; Maritime piracy,,,,,https://scholarlycommons.law.case.edu/jil/vol46/iss1/1/ https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1026&context=jil,https://scholarlycommons.law.case.edu/jil/vol46/iss1/1/,,,2206227879,,0,,0,false,, 010-670-507-494-317,Demographic Factors Affecting Freshman Students' Attitudes towards Software Piracy: An Empirical Study,,2010,journal article,Issues in Informing Science and Information Technology,15475840; 15475867,Informing Science Institute,,Ali Acılar,"Introduction According to BSA, ""Software piracy is the unauthorized copying or distribution of copyrighted software."" Softlifting is accepted as the most common type of software piracy. It refers to illegal copying and sharing of legally licensed software (Rahim, Seyal, & Rahman, 2001; Simpson, Banerjee, & Simpson, 1994). The Sixth Annual BSA and IDC Global Software Piracy Study examined PC software piracy rates across 110 countries and reported that 41% of software installed on computers worldwide was pirated in 2008, with estimated losses at $53 billion (BSA and IDC, 2009). According to this report, piracy rate was 64 percent in Turkey, and that caused $468 million loss in 2008. Software piracy problem is worldwide phenomenon. Software piracy occurs not only in developing countries, but also in developed countries (Law & Wong, 2005). For example, piracy rates of Canada and France in 2008 were reported as 32% and 41%, respectively. Even though the United States had the lowest piracy rate (20% in 2008), worldwide software piracy caused losses of $9,143 million to the United States in 2008 (BSA and IDC, 2009). As the use of computers and the Internet has increased dramatically, so has the illegal and unethical usage of these technologies. Even though Internet has become an essential tool for education and entertainment in the life of students, it is widely accepted that the spread of the Internet has facilitated growth of a variety of crimes, such as digital piracy (Gan & Koh, 2006; Hinduja, 2001; Holt & Morris, 2009; Van der Byl & Van Belle, 2008). The advances in computer technology and the Internet have made it possible for people to access, store, change, and transmit the information much easier and faster than it used to be. However, these advantages have made also unethical behaviors much easier, particularly among students in academic settings (Abdul Karim, Zamzuri, & Nor, 2009). Software piracy has become an important problem for businesses and educational institutions (Hinduja, 2001), and continues as a variety of legal, economical and ethical issues. Studies show that software piracy in higher educational institutions is common and students perceive the use of unlicensed software as an acceptable behavior (Christensen & Eining, 1991; Cohen & Cornwell, 1989; Konstantakis, Palaigeorgiou, G., Siozos, P. & Tsoukalas, 2005; Law & Wong, 2005; Rawlinson & Lupton, 2007; Siegfried, 2004; Siegfried & Ashley, 2006). Literature Review There has been an increasing amount of literature about software piracy and other unethical uses of information technologies in the educational institutions. A considerable amount of these studies have investigated the relationship between software piracy and undergraduate students. The results from previous studies suggest that most university students do not view software piracy as an unethical practice. Konstantakis et al. (2005) surveyed 79 freshman students of a Computer Science Department and found that all students illegitimately use or copy software that is protected by intellectual property rights. Cohen and Cornwell (1989) found from the results of the survey study of 309 students that 58% of the students had personally pirated. Cohen and Cornwell (1989) reported that an overwhelming majority of students feel that software piracy is an acceptable behavior and also many students feel that it is okay for them to pirate software. Christensen and Eining (1991) investigated unethical copying of software among accounting students in the United States and found that of the 139 students who owned computers, seventy-three percent reported engaging in software piracy and students' knowledge of the laws appeared to have little impact on piracy behavior. They also found that individuals do not perceive software piracy as an inappropriate behavior and that they do not believe that their friends and superiors think it is inappropriate. …",7,,321,328,Internet privacy; The Internet; Empirical research; Information technology; Variety (cybernetics); Copying; Computer technology; Intellectual property; Entertainment,,,,,https://www.questia.com/library/journal/1G1-257352669/demographic-factors-affecting-freshman-students-attitudes https://www.informingscience.org/Publications/1209 http://iisit.org/Vol7/IISITv7p321-328Acilar817.pdf,http://dx.doi.org/10.28945/1209,,10.28945/1209,3123704776,,0,005-136-753-965-857; 024-178-065-161-008; 024-402-429-133-467; 028-040-551-224-127; 035-552-374-599-472; 038-703-907-935-470; 041-326-767-334-557; 042-143-102-272-982; 047-556-287-867-217; 049-548-077-721-300; 054-205-310-182-865; 057-182-959-994-032; 062-759-008-820-920; 070-050-965-186-476; 078-260-552-434-589; 097-713-253-577-641; 135-800-520-334-495; 164-595-677-804-741; 185-717-607-055-348; 190-243-813-656-856,10,true,,bronze 010-706-374-296-342,"The ""Define and Punish"" Clause and the Limit of Universal Jurisdiction",,2009,journal article,Northwestern University Law Review,00293571,,,Eugene Kontorovich,"INTRODUCTION 150 I. METHODOLOGICAL ISSUES 156 A. Interpretive Theories 156 B. Evolution in Common and International Law 157 II. ORIGINS OF THE CLAUSE 159 A. The Drafting 160 B. The Double Redundancy 163 C. Uniqueness of Piracy 165 D. Summary 167 III. POLICY OF THE CLAUSE 168 A. Purposes 168 B. Background Assumptions 171 C. Summary 174 IV. MURDER ON THE HIGH SEAS 174 A. Grand Jury Charges 176 B. John Marshall and Jonathan Robbins 179 C. The Crimes Act in the Supreme Court 185 D. Summary 192 V. THE SLAVE TRADE 194 A. The Constitution in Congress 194 B. The Antelope 197 CONCLUSION 198 INTRODUCTION Several federal statutes criminalize conduct by foreigners that has no relation to the United States. Some of these measures purportedly exercise Congress's power to ""define and punish Piracies and Felonies committed on the high Seas, and Offences against the Law of Nations.""1 This raises a serious and previously unexplored question about the meaning and jurisdictional breadth of the Define and Punish Clause: Does the clause authorize Congress to legislate for the rest of the world? This question intersects with several pressing controversies. As European nations have increasingly begun to exercise universal jurisdiction over various crimes, there is pressure on the United States to follow suit.2 Aliens have increasingly turned to U.S. courts to adjudicate purely foreign disputes.3 Also, the interplay between international law and constitutional law has become a much debated issue.4 A better understanding of the Define and Punish Clause will illuminate each of these controversies:5 in one breath the clause addresses universal jurisdiction (piracies), extraterritorial crimes (felonies on the high seas), and violations of international law. This Article demonstrates that the Define and Punish Clause limits Congress's power to criminalize conduct that lacks a U.S. nexus. Two possible interpretations emerge from examining the evidence. At most, Congress can legislate universally only when international law has made punishment of the regulated conduct universally cognizable. In the narrowest interpretation, Congress's universal jurisdiction powers under the clause are restricted solely to piracy. In either case, the restriction comes not from the independent force of international law but from the Constitution itself, which incorporates international law by reference in Clause Ten. This conclusion suggests that at least one important criminal law currently in force and several others pending in Congress exceed Congress's Article I competence. Moreover, it has cautionary implications for Alien Tort Statute (ATS) cases against foreign officials for abuses committed against their own nationals. Understanding the limits on universal jurisdiction under the Define and Punish Clause requires exploring its particularly obscure ""Piracies and Felonies"" provision.6 This inquiry also has important ramifications for the scope of the more often used ""Offenses"" power. Because maritime matters were so central to the life of the early Republic, almost all discussions of universal jurisdiction from the Founding Era until the twentieth century involved matters on the ""high seas,"" and thus primarily implicate those powers. The Piracies and Felonies provision has direct modern relevance: Congress has relied on it to enact America's most used criminal universal jurisdiction statute, the Maritime Drug Law Enforcement Act (MDLEA). …",103,1,149,204,Statute; Political science; Constitutional law; Law; Criminal law; Universal jurisdiction; Extraterritorial jurisdiction; Law enforcement; Alien Tort Statute; International law,,,,,https://www.scholars.northwestern.edu/en/publications/the-define-and-punish-clause-and-the-limits-of-universal-jurisdic https://scholarlycommons.law.northwestern.edu/facultyworkingpapers/181/ https://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article=1180&context=facultyworkingpapers https://www.questia.com/library/journal/1P3-1688809821/the-define-and-punish-clause-and-the-limits-of-universal,https://www.scholars.northwestern.edu/en/publications/the-define-and-punish-clause-and-the-limits-of-universal-jurisdic,,,3125698875,,0,,3,false,, 010-818-012-402-722,Choosing the Right Yardarm: Establishing an International Court for Piracy,,2010,journal article,Georgetown Journal of International Law,15505200,,,Craig Thedwall,,41,2,501,,Political science; Law; International court,,,,,,,,,313731009,,0,,3,false,, 010-829-307-119-717,An Analysis of Nation Brand Attractiveness: Evidence from Brand Zimbabwe,2018-12-22,2018,journal article,Journal of Economics and Behavioral Studies,22206140,AMH International Conferences and Seminars Organizing LLC,,Cleven Masango; Vannie Naidoo,"This paper examines the attractiveness of Brand Zimbabwe based on the factors perceived to impact on national competitiveness. Nation brand attractiveness is a necessary condition for a country to achieve influence and to effectively compete for global resources. Countries can enhance their attractiveness by building on their national brand equity and dealing with negatives around the national brands. The research sought to determine the perception towards Zimbabwe’s global risk and competitiveness; to ascertain the variables that promote competitiveness for Brand Zimbabwe and to contribute to the literature on risk perception and its impact on behaviour towards nation brands. The study followed a mixed approach; a combination of interpretivism and positivism. The research drew 372 respondents from politicians, scholars, the media, civic organisations, government officials, church and international organisations. The research established that Brand Zimbabwe faces glaring threats risks that impact on the country’s international image. The brand is affected by politics and governance together with socio-economic factors. Management and control of nation brand perception are critical for nations to distinguish themselves and to create vantage positions for sustainable performance. The way a country is viewed internationally is a function of how the country deals with factors that threaten its global competitiveness and perception towards the nation brand. Zimbabwe’s quest for foreign direct investment, international visitation and export revenue requires that the country deals with its nation brand image.",10,6,99,112,Business; Government; Marketing; Revenue; National brand; Nation branding; Attractiveness; Foreign direct investment; Corporate governance; Equity (economics),,,,,http://ojs.amhinternational.com/index.php/jebs/article/view/2598 https://core.ac.uk/download/288023229.pdf,http://dx.doi.org/10.22610/jebs.v10i6(j).2598,,10.22610/jebs.v10i6(j).2598,2906612984,,0,,0,true,cc-by,hybrid 010-937-914-547-48X,The Socio-Historical Case for the Existence of a Nexus Requirement in the Application of Universal Jurisdiction to Maritime Piracy,2017-10-21,2017,journal article,Journal of the History of International Law,1388199x; 15718050,Brill,Netherlands,Jeffrey T. Tirshfield,"This article provides a historical account of the application of universal jurisdiction to piracy jure gentium and details the nexus requirement. Prior work by Kontorovich and Art noted an increase in the application of universal jurisdiction concurrent with the rise of piracy off the coast of Somalia, yet did not address the historical case for the attribution of nexus to its application. This appears to be a non-sequitur, as the vast majority of scholars suggest that by definition the exercise of universal jurisdiction does not require a nexus. I argue that any presupposition of a lack of connection in the application of universality should be questioned, as not only is there a normative connection between the seizing and the adjudicating state, but that historically this has always been the case until just prior to the advent of third-party jurisdictional piracy courts in Kenya and the Seychelles that address Somali piracy, and only Somali piracy.",19,4,467,494,Nexus (standard); Public international law; Law; Geography; Presupposition; Universal jurisdiction; State (polity); Somali; Normative; International law,,,,,https://brill.com/view/journals/jhil/19/4/article-p467_467.xml?language=en,http://dx.doi.org/10.1163/15718050-19041043,,10.1163/15718050-19041043,2731131894,,0,,0,false,, 011-221-523-143-210,THE EFFECT OF JORDANIAN LAWS IN REDUCING SOFTWARE PIRACY,2013-08-12,2013,journal article,Journal of Global Research in Computer Sciences,,,,Essam Said Hanandeh; Hayel Khafajeh,"The large and rapid development in the fields of technology and computer and its frequent use in various fields in the last decade, make everyone, even the ordinary people and illiterates, computer users. But, unfortunately, some people abuse this technology and consequently, damage the computers and hurt the people. We all observed many cases such as breaking through and damaging the internet sites, breaking through the banks and stealing the credit cards and much more. Such violations are called software piracy, a term derived from sea pirates. As a preventive measure, some Arab countries, including Jordan, legislated regulations and laws in order to prevent those who attempt to tamper with the security of data and computers’ software. This research aims at studying the effect of legislations and laws in reducing piracy. We have provided in this study the implementations of laws and legislations in Jordan and some Arab countries. We have also consulted and asked the specialists in the public security to provide us with some statistics, which played a vital role in providing us with good results about the effect of enforcing the laws and legislations in Jordan.",4,7,28,32,The Internet; Order (exchange); Law; Implementation; Software; Public security; Computer users; Frequent use; Intellectual property; Computer security; Computer science,,,,,https://www.rroij.com/peer-reviewed/the-effect-of-jordanian-laws-in-reducing-software-piracy-38813.html https://www.rroij.com/open-access/the-effect-of-jordanian-laws-in-reducing-software-piracy-28-32.pdf https://www.researchgate.net/profile/Hayel_Khafajeh/publication/275970690_THE_EFFECT_OF_JORDANIAN_LAWS_IN_REDUCING_SOFTWARE_PIRACY/links/554cf90b0cf21ed2135f5afc.pdf https://www.omicsonline.org/peer-reviewed/the-effect-of-jordanian-laws-in-reducing-software-piracy-38813.html,https://www.rroij.com/peer-reviewed/the-effect-of-jordanian-laws-in-reducing-software-piracy-38813.html,,,1509630395,,0,005-136-753-965-857; 017-168-651-863-296; 017-729-887-366-12X; 024-178-065-161-008; 024-303-601-968-471; 024-891-998-305-097; 046-989-500-817-954; 058-919-953-064-002; 076-623-581-921-404; 106-231-840-927-40X; 110-972-209-498-247; 164-595-677-804-741,0,false,, 011-251-199-157-318,IT industry hit hard by software piracy,,1999,journal article,Computers & Security,01674048,Elsevier BV,United Kingdom,Sandy Nichol,,18,5,436,,Information technology; Software; Computer security; Computer science,,,,,https://www.sciencedirect.com/science/article/pii/S0167404899801059,http://dx.doi.org/10.1016/s0167-4048(99)80105-9,,10.1016/s0167-4048(99)80105-9,2090298128,,0,,0,false,, 011-314-753-458-747,The Internet and Copyright Protection: Are We Producing a Global Generation of Copyright Criminals?,,2010,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,F. D. O. Oduor,"The advent of the internet posed and continues to pose fundamental changes in social norms, politics and economics in society. The belief in cyber anarchy - ‘do not touch the internet’ mantra, has fundamentally altered the understanding of copyright laws amongst the present generation. Subsequently an aversion for property rights as understood by well established copyright laws has developed, manifesting itself mainly through piracy. The evolution of technology in tandem with the internet has further exacerbated the situation as a whole generation that enjoys entertainment finds it much easier to infringe on a litany of copyright laws. Taking into account the established norms of property-copyright protection, is it not clear, with growing copyright malcontents and malfeasance that we are simply producing a global generation of copyright criminals. This discourse explores the veracity of this statement taking into account the nature of the internet, the emergence of digital copying and sharing, alongside the fluid perceptions of copyright protection.",,,,,Technological evolution; The Internet; Business; Law and economics; Law; Mantra; Copying; Present generation; Entertainment; Property rights; Politics,,,,,https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID1640253_code1510125.pdf?abstractid=1640253&mirid=4 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1640253,http://dx.doi.org/10.2139/ssrn.1640253,,10.2139/ssrn.1640253,61213397,,0,,3,true,,green 011-331-090-604-858,Institutionalization of intellectual property rights in China,,2009,journal article,European Management Journal,02632373,Elsevier BV,United Kingdom,Nir Kshetri,"Institutional field Summary Following the 1978 political and economic reforms, China has undergone a sig-nificant transformation on the intellectual property rights (IPR) front. In this paper, we use neo-institutional theory to examine the institutionalization of IPR in China. Specifically, we examine the perceptions of national elites and the public regarding IPR as well as IPR related pressures facing these actors, their negotiation with other actors and their responses. Regulative, normative and cognitive institutions formed around the IPR field in China are analyzed.",27,3,155,164,Political economy; Economics; Institutionalisation; China; Negotiation; Field (Bourdieu); Economic reform; Market economy; Intellectual property; Normative; Politics,,,,,https://libres.uncg.edu/ir/uncg//listing.aspx?id=7307 https://www.sciencedirect.com/science/article/pii/S026323730800100X https://core.ac.uk/display/149237071 https://econpapers.repec.org/article/eeeeurman/v_3a27_3ay_3a2009_3ai_3a3_3ap_3a155-164.htm https://ideas.repec.org/a/eee/eurman/v27y2009i3p155-164.html https://core.ac.uk/download/149237071.pdf,http://dx.doi.org/10.1016/j.emj.2008.08.002,,10.1016/j.emj.2008.08.002,2152837658,,0,004-916-367-446-865; 006-554-511-932-348; 013-816-493-911-260; 016-196-875-065-957; 017-896-242-233-424; 017-993-173-427-042; 024-380-843-606-835; 037-398-354-366-110; 040-361-260-159-152; 048-322-307-535-215; 053-856-303-834-303; 062-923-292-534-009; 072-108-180-474-63X; 076-257-896-533-812; 078-141-172-518-826; 082-816-504-212-645; 083-099-894-950-017; 088-653-660-059-202; 093-203-828-285-442; 103-743-758-167-544; 123-652-944-056-858; 123-694-573-650-975; 127-102-873-739-043; 128-679-454-224-689; 130-634-263-660-413; 143-574-680-284-498; 161-342-060-108-696; 186-132-647-421-819,29,true,,green 011-610-268-189-076,INTERNATIONAL CRIMINAL JUSTICE (2008),,2008,journal article,The Italian Yearbook of International Law Online,22116133,Brill,,Carlo Focarelli,"This note scrutinizes the complex relationship between international law and national criminal law in the prosecution of piracy. UN Security Council Resolutions on Somalia have marked the beginning of a new era in counter-piracy, with much wider involvement of States and international organizations in patrols in the Horn of Africa and with an increasing number of piracy trials in courts in Europe, the US, and Africa. Increased State cooperation in enforcement and adjudication has evinced the weaknesses and ambiguities inherent in the provisions of the United Nations Convention on the Law of the Sea (UNCLOS) which deal with piracy. This article questions the suitability of the UNCLOS definition of piracy as a standalone legal basis for detention in light of the requirements of legal certainty that must be satisfied in order to permit the arrest and the “pre-transfer arrest” of piracy suspects. This question seems to have been recently overlooked by the Italian Court of Cassation whose reasoning, while correct in relation to the assertion of jurisdiction over the pirates arrested on board the M/V Montecristo, seems flawed with regard to the assumption of jurisdiction over the pirates captured aboard the “mothership” and then transferred to Italy by the British unit participating to the NATO counter-piracy mission.",18,1,219,254,Criminal justice; Political science; United Nations Convention on the Law of the Sea; Public international law; Law; Criminal law; Adjudication; Jurisdiction; Legal certainty; International law,,,,,https://brill.com/view/journals/iyio/18/1/article-p219_11.xml?lang=en https://iris.uniroma3.it/handle/11590/317844,http://dx.doi.org/10.1163/22116133-90000083,,10.1163/22116133-90000083,2118327204,,0,,0,false,, 011-705-940-864-634,An Analysis of Bio-piracy in the Third Time Amendment of Patent Law,,2009,journal article,Journal of Shenyang Agricultural University,10001700,,,Yang Hai-yao,"With the development of biotechnology,genetic resourses show its great economic and scientific value.Confronted to severe bio-piracy problems,many developing countries like China have joined a series of international conventions,such as ""Convention on Biological Diversity"",""International Convention for the Protection of New Varieties of Plants"",""Convention on International Trade in Endangered Species of Wild Fauna and Flora"",""Convention on Wetlands"",and are consummating related domestic legislations and regulations.In the third revision of The Patent Law,China made many regulations on the bio-piracy-related problems,in which it is required to set up an origin disclosure system of genetic resourses.All the efforts are surely to produce effects on containment of bio-piracy and protection of genetic resourses,but some vacancy still exists in the origin disclosure system of genetic resources.For example,nieither the principle of sovereignty nor the foundation of the origin disclosure system of genetic resources is mentioned;some basic problems,such as applicable object,approving authority,investigating content and bennifit-sharing system,are not given out.It's still unlikely to completely resolve the bio-piracy problems according to the revised Patent Law.",,,,,Political science; Sovereignty; Ecology; Law and economics; China; Convention on Biological Diversity; Convention; Foundation (evidence); Object (philosophy); Developing country; CITES,,,,,https://en.cnki.com.cn/Article_en/CJFDTOTAL-SYLD200905033.htm,https://en.cnki.com.cn/Article_en/CJFDTOTAL-SYLD200905033.htm,,,2380889497,,0,,0,false,, 011-795-613-153-888,Continued U.S. Efforts to Combat Somali Piracy,,2011,journal article,American Journal of International Law,00029300,,,John R. Crook,,105,1,131,135,Political science; Law; Somali,,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=3432807,https://dialnet.unirioja.es/servlet/articulo?codigo=3432807,,,165401764,,0,,1,false,, 011-854-259-515-280,"Global trajectories, dynamics, and tendencies of business software piracy: Benchmarking IPRs harmonization",2016-10-10,2016,journal article,Journal of Economic Studies,01443585,Emerald,United Kingdom,Simplice A. Asongu; Antonio Rodríguez Andrés,"In this paper, we examine global trajectories, dynamics, and tendencies of software piracy to ease the benchmarking of current efforts towards harmonizing the standards and enforcements of Intellectual Property Rights (henceforth IPRs) protection worldwide. Our empirical exercise is based on 15 different panel regressions, which together consists of 99 countries. The richness of the dataset allows us to disaggregate countries into fundamental characteristics of business software piracy based on income-levels (high-income, lower-middle-income, upper-middle-income and low-income), legal-origins (English common-law, French civil-law, German civil-law and, Scandinavian civil-law) and, regional proximity (South Asia, Europe & Central Asia, East Asia & the Pacific, Middle East & North Africa, Latin America & the Caribbean and, Sub-Saharan Africa). Our main finding suggest that, a genuine timeframe for standardizing IPRs laws in the fight against software piracy is most feasible within a horizon of 4.3 to 10.4 years. In other words, full (100%) convergence within the specified timeframe will mean the enforcements of IPRs regimes without distinction of nationality or locality within identified fundamental characteristics of software piracy. The absence of convergence (in absolute and conditional terms) for the World panel indicates that, blanket policies may not be effective unless they are contingent on the prevailing trajectories, dynamics and tendencies of software piracy. Policy implications and caveats are also discussed.",43,5,780,800,International trade; Latin Americans; Political science; Convergence (economics); Harmonization; Intellectual property; Business software; Panel data; East Asia; Benchmarking,,,,,https://www.emerald.com/insight/content/doi/10.1108/JES-06-2015-0093/full/html https://ideas.repec.org/a/eme/jespps/v43y2016i5p780-800.html https://www.emeraldinsight.com/doi/full/10.1108/JES-06-2015-0093 https://researchportal.vub.be/en/publications/global-trajectories-dynamics-and-tendencies-of-business-software- https://socionet.ru/publication.xml?h=repec:pra:mprapa:58755 https://mpra.ub.uni-muenchen.de/58755/1/MPRA_paper_58755.pdf https://mpra.ub.uni-muenchen.de/id/eprint/58755 https://www.econstor.eu/bitstream/10419/123621/1/agdi-wp14-011.pdf,http://dx.doi.org/10.1108/jes-06-2015-0093,,10.1108/jes-06-2015-0093,2913511864,,0,000-923-160-406-727; 003-120-061-431-142; 008-896-495-853-748; 008-986-463-467-067; 012-558-297-950-849; 013-327-431-504-996; 013-765-194-873-383; 015-808-798-057-897; 016-623-013-143-177; 017-619-716-693-348; 018-075-278-238-815; 019-922-761-145-695; 020-079-500-549-308; 021-274-666-916-139; 022-264-398-959-067; 022-518-779-347-993; 028-630-596-457-020; 029-476-172-710-41X; 030-968-232-499-772; 036-159-702-886-637; 039-883-767-744-759; 041-849-157-283-572; 041-893-696-570-720; 042-057-592-838-529; 042-335-426-642-552; 043-305-653-465-196; 044-884-973-451-274; 045-638-979-146-951; 046-127-203-871-082; 046-127-440-118-73X; 046-669-922-850-444; 047-010-436-077-442; 049-698-234-112-01X; 050-271-313-947-720; 053-956-378-667-86X; 054-549-558-630-210; 054-663-257-958-510; 058-682-219-560-287; 059-077-318-219-51X; 062-137-407-209-997; 062-169-487-131-224; 062-338-941-342-801; 063-085-822-993-592; 064-893-720-411-223; 066-237-973-648-031; 070-758-655-516-162; 072-498-861-728-275; 075-801-927-284-039; 079-974-973-741-086; 087-959-536-613-70X; 094-846-844-599-623; 097-165-496-887-789; 097-287-626-930-331; 098-929-261-686-185; 103-047-934-034-494; 105-231-453-450-342; 105-744-555-035-389; 107-007-285-779-662; 107-947-697-683-923; 110-231-183-577-925; 112-111-608-526-67X; 112-650-832-546-977; 118-348-885-347-77X; 121-394-722-855-679; 124-655-841-474-707; 125-271-356-328-638; 125-495-818-933-457; 127-396-485-243-755; 132-558-492-977-554; 133-793-936-162-353; 140-177-608-473-755; 145-811-348-738-768; 185-020-775-542-401; 185-197-322-646-367; 191-344-983-602-980; 191-906-538-570-417; 193-305-032-595-202,16,false,, 011-970-832-954-189,can low self-control help with the understanding of the software piracy problem?,2004-12-08,2004,journal article,Deviant Behavior,01639625; 15210456,Informa UK Limited,United Kingdom,George E. Higgins,"ABSTRACT Computer crime—specifically, software piracy—is growing, and no research in criminology examines whether low self-control can help us understand the behavior. This study examines the link that Gottfredson and Hirschi's (1990) idea of low self-control has with software piracy. Using a nonrandom sample of college students and measures of low self-control, software pirating peers, software pirating attitudes, and moral beliefs toward software piracy, the findings show that low self-control has a link with software piracy. This finding expands the scope of self-control theory and provides an understanding of why the behavior occurs.",26,1,1,24,Data science; Software; Scope (project management); Low self-control; Digital piracy; Computer security; Computer science; Sample (statistics),,,,,https://www.tandfonline.com/doi/full/10.1080/01639620490497947,http://dx.doi.org/10.1080/01639620490497947,,10.1080/01639620490497947,2136022733,,0,001-773-904-422-136; 003-621-909-349-361; 003-828-680-029-252; 005-136-753-965-857; 007-559-358-394-991; 008-669-373-663-807; 009-294-953-134-547; 009-819-013-936-725; 009-949-974-083-886; 010-292-330-210-925; 012-461-619-160-436; 012-558-297-950-849; 020-862-797-519-306; 020-973-534-331-792; 021-581-207-965-265; 022-634-145-782-991; 022-900-776-196-269; 023-906-216-969-247; 024-178-065-161-008; 025-882-454-923-868; 026-283-018-089-565; 027-430-189-451-868; 028-549-386-742-28X; 030-095-040-565-413; 032-888-443-351-535; 034-374-497-430-612; 035-198-733-235-488; 039-694-917-895-93X; 041-326-767-334-557; 041-756-193-271-330; 041-891-384-512-506; 042-143-102-272-982; 047-813-615-410-65X; 052-519-517-658-380; 055-408-413-936-398; 057-397-990-570-201; 057-717-174-338-850; 062-691-922-111-060; 062-850-626-837-137; 066-124-129-788-062; 067-339-005-241-596; 070-050-965-186-476; 070-660-090-646-684; 074-233-198-758-572; 074-282-607-331-862; 075-206-405-175-082; 075-256-058-597-621; 083-592-182-051-020; 090-877-862-061-882; 091-442-836-589-45X; 092-945-483-843-213; 094-565-529-045-486; 096-401-039-718-213; 104-904-305-990-328; 106-945-990-370-082; 111-389-959-550-33X; 116-760-844-878-63X; 120-438-038-072-657; 122-847-477-478-149; 127-945-112-133-405; 129-181-608-160-998; 131-176-129-891-465; 135-800-520-334-495; 164-283-046-147-287; 167-706-147-274-876; 175-940-530-591-247; 178-091-174-583-771; 197-896-318-310-228,194,false,, 012-002-932-281-506,"Piracy of Online News: A ""Moral Rights"" Approach to Protecting a Journalist's Right of Attribution and Right of Integrity",2016-09-27,2016,journal article,"DePaul Journal of Art, Technology & Intellectual Property Law",10610553,,,Matthew Novaria,,24,2,295,,Attribution; Political science; Law; Moral rights; Social psychology,,,,,https://via.library.depaul.edu/cgi/viewcontent.cgi?article=1031&context=jatip https://via.library.depaul.edu/jatip/vol24/iss2/3/,https://via.library.depaul.edu/jatip/vol24/iss2/3/,,,2562274217,,0,,0,false,, 012-198-477-422-289,The Status of the Individual: A Critical Appraisal,,2006,journal article,Proceedings of the ASIL Annual Meeting,02725037; 21691118,Cambridge University Press (CUP),,John Cerone,"I have been given the unenviable task of performing a critical appraisal of the status of the individual in international law one hundred years after the founding of the ASIL. As such, this presentation is not intended to be a neutral examination of the issue. Essentially, this critique will survey, from a conservative legal perspective, the international legal personality of the individual as evidenced by the ascription of duties and rights to individual human beings in the course of the past century. Particular attention will be paid to recent decisions of U.S. courts indicating divergent conceptions of the status of the individual. At times, U.S. courts have given the individual a far more robust status than is generally accepted in international law; in other cases, they have demonstrated an antiquated conception of the international legal system, with the individual relegated to the status of an object, protected only as the national of a sovereign. I. DUTIES Commentators often cite piracy as the classical example of a rule of international law imposing a duty on individuals. It is certainly true that piracy for centuries has been regarded as an offense against the law of nations and that all states have jurisdiction to prosecute pirates. This universality of jurisdiction is affirmed in Articles 100-107 of the United Nations Convention on the Law of the Sea. However, nowhere does the Convention create international criminal liability for piracy. Indeed, it is not clear that the act of piracy has historically given rise to individual criminal responsibility in international law. (1) Thus, while international law provides jurisdiction to all states to prosecute pirates and indeed imposes a duty on states to cooperate in the suppression of piracy, (2) it is not universally accepted that international law imposes a duty on individuals to refrain from piratical acts. Ultimately, it is difficult to establish the matter definitively because, prior to the twentieth century, there were no international tribunals applying international law to individuals. Other commentators may concede that piracy was not necessarily an international crime in the strict sense, but would then point to the International Military Tribunals convened after World War II as definitively establishing the existence of individual criminal responsibility for the breach of certain violations of international law. However, it must be recalled that the Nuremberg Tribunal was not an international criminal court in the strictest sense of the word--certainly not within the meaning of that term as used by International Court of Justice in Congo v. Belgium. (3) Indeed, the IMT at Nuremberg did not conceive of itself as having any kind of international jurisdiction. It grounded both its jurisdiction to prescribe and its jurisdiction to adjudicate on the fact that the Allies as occupying powers had stepped into the shoes of the German government. As the IMT underscored, the Allies had simply ""done together what any one of them might have done singly."" Nonetheless, the Nuremberg Tribunal famously announced the principle of individual criminal responsibility for serious violations of international law, neglecting, however, to provide a satisfying juridical basis for the assertion of the existence of duties of the individual in international law. The Tribunal ultimately grounded its reasoning in pragmatism, asserting that ""[c]rimes against international law are committed by men, not by abstract entities, and only by punishing individuals who commit such crimes can the provisions of international law be enforced."" (4) The approach of the IMT risks collapsing the question of individual criminal responsibility into the inquiry of whether the nullem crimen principle is satisfied. But, of course, this is a different issue. An international prosecution for murder would satisfy nullem crimen since murder is recognized in jurisdictions throughout the world. …",100,,257,260,Comparative law; Political science; Public international law; War crime; Law; International legal system; International court; Principle of legality; International law; Municipal law,,,,,https://www.questia.com/library/journal/1G1-158958282/the-status-of-the-individual-a-critical-appraisal,http://dx.doi.org/10.1017/s0272503700024435,,10.1017/s0272503700024435,258323943,,0,,1,false,, 012-418-704-175-727,Drawing a Distinction Between Bootleg and Counterfeit Recordings and Implementing a Market Solution Towards Combating Music Piracy in Europe,,1999,journal article,Penn State international law review,15463435,,,Clifford A. Congo,,17,2,383,404,Advertising; Business; Counterfeit; Music piracy,,,,,http://elibrary.law.psu.edu/cgi/viewcontent.cgi?article=1454&context=psilr https://elibrary.law.psu.edu/cgi/viewcontent.cgi?article=1454&context=psilr,http://elibrary.law.psu.edu/cgi/viewcontent.cgi?article=1454&context=psilr,,,2727220384,,0,,0,false,, 012-481-682-778-51X,Intellectual Property Rights: The Effects on Information Security and Research Innovations in Nigeria,,2019,journal article,Innovative Systems Design and Engineering,,"International Institute for Science, Technology and Education",,,"The rise of new digital technologies and file-sharing networks has definitely made it harder for organizations to protect their intellectual property (IP).  This is made even harder by the fact that there is no uniformity in the enforcement of laws that are designed to protect against IP theft, especially in Nigeria. Nigeria is ranked among countries in Africa where Intellectual Property (IP) theft or piracy is prevalent. Technology required for the operation of Intellectual Property Rights (IPRs) in Nigeria is still largely undeveloped,out-dated, and non-sustainable despite the huge human resources and technological innovations.This study highlights the gaps created by the ineffectiveness of anti-counterfeiting and anti-piracy tactics to curb the challenges of IP and strategies to close them.  In this study, the authors explored a narrative review of prior research that focused on the theoretical underpinnings of vast works of literature that revealed significant information on IP challenges facing research and innovation for national development and strategies to close these gaps. The authors also extracted peer-reviewed articles within the last five years from electronic databases, using some keywords such as “intellectual property”, “IPRs”, “IP penalty and offences”, etc. Results show that IP regulations and policies are crippled by out-dated, non-sustainable or virtually non-existent policies, counterfeiting and anti-piracy system. Findings from this study may encourage proper implementation of IP: copyrights, trademarks, patents, and trade secrets for technological innovations and development in Nigeria. Keyword:Intellectual property copyrights. Trademarks, Trade secrets, Intellectual property, ICT sustainability\ DOI: 10.7176/ISDE/10-7-06 Publication date: October 31st 201",,,,,,,,,,https://core.ac.uk/download/pdf/270185559.pdf,http://dx.doi.org/10.7176/isde/10-7-06,,10.7176/isde/10-7-06,,,0,,0,true,cc-by,hybrid 012-558-297-950-849,The Impact of National Culture on Software Piracy,,2000,journal article,Journal of Business Ethics,01674544; 15730697,Springer Science and Business Media LLC,Netherlands,Bryan W. Husted,"This paper examines the impact of the level of economic development, income inequality, and five cultural variables on the rate of software piracy at the country level. The study finds that software piracy is significantly correlated to GNP per capita, income inequality, and individualism. Implications for anti-piracy programs and suggestions for future research are developed.",26,3,197,211,Business ethics; Per capita; Income inequality metrics; Economics; Individualism; Software; National culture; Development economics; Economic growth; Economic inequality; Income distribution,,,,,https://rd.springer.com/article/10.1023/A%3A1006250203828 https://link.springer.com/content/pdf/10.1023%2FA%3A1006250203828.pdf https://philpapers.org/rec/HUSTIO,http://dx.doi.org/10.1023/a:1006250203828,,10.1023/a:1006250203828,1534899303,,0,000-603-664-604-951; 001-800-447-694-11X; 004-512-097-135-555; 007-559-358-394-991; 008-896-495-853-748; 009-292-371-162-047; 013-460-342-109-858; 014-828-464-072-845; 015-808-798-057-897; 017-821-290-122-01X; 020-973-534-331-792; 021-930-404-903-875; 023-604-880-685-054; 029-960-802-924-266; 030-225-208-891-574; 033-349-220-802-574; 037-552-295-726-800; 041-326-767-334-557; 041-467-573-179-244; 045-457-467-332-061; 062-654-797-336-152; 067-447-260-092-776; 070-051-909-647-949; 078-893-807-894-887; 089-835-928-224-875; 093-364-719-859-643; 100-018-440-203-612; 115-916-223-255-79X; 126-248-125-585-953; 131-639-209-368-138; 131-913-271-729-319; 133-701-924-540-926; 135-800-520-334-495; 142-721-738-523-334; 145-646-001-952-46X; 149-938-305-354-602; 151-429-160-186-105; 165-126-357-540-040; 167-703-557-923-468; 167-706-147-274-876; 172-754-651-308-964; 173-220-980-476-379; 175-602-270-496-697; 185-197-322-646-367; 196-212-184-416-716,371,false,, 012-640-174-321-068,Between the “Battlefield” Metaphor and Promises of Generativity: Contrasting Discourses on Cyberconflict,2015-08-20,2015,journal article,Canadian Journal of Communication,07053657; 14996642,University of Toronto Press Inc. (UTPress),,Artur de Matos Alves,"This article proposes a theoretical assessment of discourses on cyberconflict, and of their relation to the current perception of the state of cyberspace. By contrasting the “battlefield” approaches to cyberconflict with theoretical and factual materials on its social and political impacts, this article suggests that the “battlefield” terminology frames the discussion of online security within a drive for the “militarization” of cyberspace. It concludes by presenting generativity-based perspectives as a contribution towards addressing contemporary challenges to network politics in cyberconflict theoretical frameworks. Cet article propose une evaluation theorique des discours sur le cyberconflit, et de leur rapport a la perception actuelle de l’etat du cyberespace. En opposant des approches du type «champ de bataille» au cyberconflit avec des materiaux theoriques et factuelles sur ces impacts sociaux et politiques, ce document suggere que la terminologie «champ de bataille» encadre le debat sur la securite en ligne dans la militarisation de l’espace cybernetique. L’article conclu en presentant des perspectives fondees sur la « generativite » comme contributions pour relever les defis contemporains aux politiques des reseaux dans les cadres theoriques du cyberconflit.",40,3,389,406,Humanities; Generativity; Political science; Ethnology; Militarization; Metaphor; Battlefield; Cyberspace; Ligne; Online security; Politics,,,,,https://www.cjc-online.ca/index.php/journal/article/view/2742/2610 https://r-libre.teluq.ca/1452/ https://core.ac.uk/display/158622635 https://core.ac.uk/download/158622635.pdf,http://dx.doi.org/10.22230/cjc.2015v40n3a2742,,10.22230/cjc.2015v40n3a2742,1728821945,,0,001-300-775-328-505; 002-413-118-594-990; 009-081-551-270-766; 012-213-309-431-55X; 014-295-968-439-605; 030-107-376-857-132; 030-559-801-375-271; 032-595-275-247-501; 047-835-928-670-695; 056-481-162-855-75X; 058-716-628-182-646; 060-957-240-571-054; 067-293-569-921-262; 085-070-515-266-172; 100-322-397-884-753; 127-862-397-212-233; 145-947-466-555-658; 156-282-630-713-36X; 199-008-518-858-321,2,true,cc-by-nc-nd,hybrid 012-782-551-491-569,Drops in the bucket? A review of onshore responses to Somali piracy,2012-03-20,2012,journal article,WMU Journal of Maritime Affairs,1651436x; 16541642,Springer Science and Business Media LLC,Sweden,Christian Bueger,"That piracy needs to be addressed onshore is a widely shared assumption. While the majority of counter-piracy measures focus on the sea, a number of onshore counter-piracy initiatives have been launched. We can observe the seeds of an alternative land-based policy approach. One set of land-based programs aims at strengthening the legal and security state apparatus to better deter and punish pirates. The other set of programs aims at addressing local populations on regional, clan or village levels. Such projects aim at increasing surveillance, sensitizing populations for the consequences of piracy, and providing rehabilitation or alternative livelihood opportunities. In this article, I review the latter type of projects and discuss the promises and difficulties of addressing piracy by such measures. I discuss five major problems: knowledge problems, implementation problems, counterintuitive consequences, tensions towards other parts of counter-piracy strategy, and the securitization of aid.",11,1,15,31,Public economics; Counterintuitive; Economics; Set (psychology); Public international law; Somali; Law enforcement; Securitization; Computer security; Livelihood; Clan,,,,,https://trid.trb.org/view/1411813 https://link.springer.com/content/pdf/10.1007%2Fs13437-012-0022-5.pdf https://link.springer.com/article/10.1007/s13437-012-0022-5 https://orca.cardiff.ac.uk/29776/ https://link.springer.com/10.1007/s13437-012-0022-5 https://core.ac.uk/display/8818723 https://paperity.org/p/8784145/drops-in-the-bucket-a-review-of-onshore-responses-to-somali-piracy,http://dx.doi.org/10.1007/s13437-012-0022-5,,10.1007/s13437-012-0022-5,2008097414,,0,001-314-267-090-745; 009-805-853-067-123; 009-949-655-924-553; 014-501-620-509-937; 023-828-039-334-142; 025-784-266-343-445; 026-600-825-189-163; 043-164-385-854-497; 047-915-935-373-39X; 048-336-019-793-284; 060-079-250-632-475; 060-564-404-094-593; 060-728-611-779-067; 062-536-903-808-698; 063-203-515-670-958; 072-122-696-620-23X; 075-627-869-684-577; 098-294-695-182-551; 122-740-834-718-041; 132-448-358-300-756; 160-758-256-694-458; 180-490-305-918-94X; 196-350-296-966-072,33,true,cc-by,hybrid 012-787-492-243-313,The evolution of the Chinese online gaming industry,2009-05-29,2009,journal article,Journal of Technology Management in China,17468779,Emerald,,Nir Kshetri,"Purpose – This paper seeks to examine the growth of the Chinese online gaming industry and disentangle the mechanisms behind the emergence of unique online gaming culture in China. Design/methodology/approach – This is a review paper that provides a detailed and state-of-the-art overview of the development of the Chinese online gaming Industry. Findings – The findings indicate that online gaming is a remarkable example of an industry that is rapidly growing due to innovative business models of Chinese companies. Chinese companies are also working with the government to improve formal institutions to promote the growth of online gaming. Furthermore, we also found that Chinese online gaming industry resembles other technology industries in the country such as those related to handset and PC. Although Chinese companies were traditionally weak in creating new technologies, they have demonstrated success in some modern technologies in recent years. In the early stage of the growth, foreign players dominated the Chinese gaming industry. In recent years, this industry is characterized by the dominance of domestic players in the ecosystem catering to the full value chain of the industry. Research limitations/implications – A lack of primary data and empirical documentation and a lack of in-depth treatment of some of the key issues are major limitations here. Practical implications – The paper examines the implications of China's rapidly growing online gaming industry for high-technology businesses all over the world. The findings of this paper would help understand the opportunities for foreign multinational companies to enter the Chinese technology market or to intensify their operations in the country as well as the risks associated with China's unique institutions. Originality/value – This paper's greatest value stems from the fact that it analyzes demand conditions, industry structure and transfer and export conditions from the standpoint of the Chinese online gaming industry and market.",4,2,158,179,Dominance (economics); Business; Government; Multinational corporation; Marketing; China; Emerging technologies; Originality; Business model; Documentation,,,,,https://www.emeraldinsight.com/doi/abs/10.1108/17468770910965019 https://www.researchgate.net/profile/Nir_Kshetri/publication/228319290_The_Evolution_of_the_Chinese_Online_Gaming_Industry/links/09e41510a5f1069302000000.pdf?disableCoverPage=true https://www.emerald.com/insight/content/doi/10.1108/17468770910965019/full/pdf?title=the-evolution-of-the-chinese-online-gaming-industry https://libres.uncg.edu/ir/uncg//listing.aspx?id=7299 https://core.ac.uk/display/149237057 https://www.emerald.com/insight/content/doi/10.1108/17468770910965019/full/html?queryID=56%2F5408373 https://core.ac.uk/download/149237057.pdf,http://dx.doi.org/10.1108/17468770910965019,,10.1108/17468770910965019,2009182296,,0,002-356-333-202-576; 004-504-135-551-243; 008-205-284-330-028; 015-207-609-750-040; 023-889-644-036-214; 025-029-489-097-393; 026-862-338-215-74X; 027-431-843-260-535; 028-938-661-024-696; 030-745-376-525-003; 032-644-513-373-158; 033-970-716-058-633; 034-181-978-473-09X; 044-024-109-179-511; 044-136-929-129-209; 046-608-344-435-900; 050-575-770-228-505; 054-602-768-224-157; 059-356-499-268-469; 066-844-437-873-23X; 067-247-802-363-766; 076-880-688-437-863; 086-022-156-411-955; 089-311-584-970-702; 089-488-734-659-56X; 093-203-828-285-442; 094-904-341-451-013; 097-217-247-840-21X; 107-599-338-439-082; 108-912-153-994-797; 109-128-203-270-023; 116-903-794-606-884; 117-654-349-599-163; 142-185-568-958-207; 150-442-995-304-165; 164-092-612-448-307; 184-719-807-441-30X; 185-227-618-162-913; 193-143-616-761-105; 197-626-141-592-038,22,true,,green 012-847-134-427-800,Piracy and Privateers in the Golden Age: Lessons for Today,2018-06-20,2018,journal article,Ocean Development & International Law,00908320; 15210642,Informa UK Limited,United Kingdom,Paul Hallwood; Thomas J. Miceli,"ABSTRACTCustomary international law has governed high seas piracy for many centuries and is now codified in the United Nations Convention on the Law of the Sea (LOSC). In this article, we discuss the reasons why enforcement against piracy today is less effective than three hundred years ago. We contend that crime, including the crime of piracy, can be modeled as a rational choice that is responsive to expected rewards and punishments. Based on this view, we argue that three hundred years ago, the free rider problem resulting from enforcement on the high seas was less prevalent than it is today because seaborne trade was more concentrated in the vessels of a few countries, making enforcement more like internal than international policing. The persistence of piracy today also stems from a continuing low probability of capture coupled with lenient punishments. In addition to enforcement differences, we contrast the sources of piracy in the two eras—in the earlier period, the end of privateering led many priv...",49,3,236,246,International waters; Political science; United Nations Convention on the Law of the Sea; Law and economics; Free rider problem; Enforcement; Law enforcement; Indian ocean; International law,,,,,https://trid.trb.org/view/1516679 https://www.tandfonline.com/doi/full/10.1080/00908320.2018.1479369,http://dx.doi.org/10.1080/00908320.2018.1479369,,10.1080/00908320.2018.1479369,2808788422,,0,011-515-373-665-921; 017-259-580-053-539; 022-984-991-571-755; 024-303-139-421-053; 066-660-706-410-262; 104-561-187-234-625; 113-575-791-134-392; 120-489-511-046-762; 141-578-368-113-825; 147-454-181-506-681; 160-191-785-655-900; 160-394-265-689-744; 189-009-546-408-16X,0,false,, 013-050-302-381-169,"Council In re a Reference Under the Judicial Committee Act, 1833, in re Piracy Jure Gentium",,1935,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),United States,,,29,1,140,150,Political science; Law,,,,,,http://dx.doi.org/10.2307/2191065,,10.2307/2191065,,,0,,1,false,, 013-402-214-415-855,Video-film Production and Distribution in Tanzania: Copyright Infringement and Piracy,2017-02-22,2017,journal article,The African Review,08560056,,,Vicensia Shule,"Regardless of the enforcement of the Copyright and Neighbouring Rights Act, Cap.218 R.E 2002 (i.e. the Copyright Act), Tanzania remains one of the “notorious” countries known for copyright infringement and piracy. In video-films, piracy comes in various forms such as illegal sales and counterfeit production. Piracy affects both locally made video-films and imported ones mostly in Digital Video Discs (DVDs) and Video Compact Discs (VCDs). Poor production and distribution contracts as well as infringement of moral and commercial rights of most filmmakers are the key challenges. This article sets to examine the enforcement of the Copyright Act in Tanzania. It focuses mainly on infringement and piracy in both video-film production and distribution. I argue that regardless of the existing laws and regulations, copyright infringement and piracy are leading challenges to the video-film environment in the country. I suggest legal reforms to the Copyright Act in order to accommodate technological advancement and complexities in video-film production and distribution",41,2,185,199,Business; Law and economics; Order (business); Production (economics); Counterfeit; Tanzania; Copyright Act; Copyright infringement; Enforcement; Distribution (economics); Commerce,,,,,http://repository.udsm.ac.tz:8080/xmlui/handle/123456789/1415 http://journals.udsm.ac.tz/index.php/ar/article/view/149,http://repository.udsm.ac.tz:8080/xmlui/handle/123456789/1415,,,2182080608,,0,006-413-991-002-342; 008-278-824-812-050; 065-681-967-139-323; 070-289-817-258-735; 070-801-383-906-773; 086-541-371-603-516; 089-361-879-312-518; 105-343-851-401-665; 120-259-885-253-180; 130-275-690-611-77X; 132-743-604-911-707; 133-624-093-587-064; 150-227-857-903-758; 152-198-654-263-60X,0,false,, 013-642-980-467-577,Developing the Concept of Maritime Piracy: A Comparative Legal Analysis of International Law and Domestic Criminal Legislation,2016-06-03,2016,journal article,The International Journal of Marine and Coastal Law,09273522; 15718085,Brill,Netherlands,Ilja Van Hespen,"This article deals with the problem of combating international crime related to violence at sea. The question addressed is whether, according to public international law, all violent acts in the maritime domain, such as maritime piracy, drug trafficking, human trafficking and maritime terrorism, can be combined into one legal concept. In order to answer this question, this article takes the traditional notion of “piracy” in the sense used in the 1982 Law of the Sea Convention and explores the possibility of the notion being extended to encompass the other forms of crime to a concept of “universal maritime crime”. Jurisdictional issues, the difficulties of incorporating the resulting concept into domestic criminal legislation and challenges related to the prosecution of alleged criminals, such as due process and human rights issues, are also considered.",31,2,279,314,Human rights; Political science; United Nations Convention on the Law of the Sea; Public international law; Law; Universal jurisdiction; Maritime security; Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation; Law of the sea; International law,,,,,https://brill.com/view/journals/estu/31/2/article-p279_3.xml?language=en https://booksandjournals.brillonline.com/content/journals/10.1163/15718085-12341395 https://www.vliz.be/nl/imis?module=ref&refid=281524 https://core.ac.uk/display/55714429 https://biblio.ugent.be/publication/8030887,http://dx.doi.org/10.1163/15718085-12341395,,10.1163/15718085-12341395,2318756849,,0,083-011-007-517-876,4,true,, 013-645-790-521-433,Limitations of applying universal jurisdiction to piracy and some suggestions for reform,,2009,journal article,Annual of China Maritime Law,,,,Zheng Lei,"Piracy remains a serious threat to the international community in modern times,especially in Somalia.Because of the damage that maritime piracy inflicts on international trade and general safety,it has long been treated as a universal crime whose perpetrators were subject to punishment by any country that caught them.But there are some gaps in the definition of piracy,the mechanism of universal jurisdiction can not apply to all the piracy crime.It is high time to reform the international law to fight against piracy.The reform should include: filling the gaps of the definition of piracy,establishing the mechanism of patrol,promoting regional cooperation in anti-piracy and authorizing states to take anti-piracy actions by United Nations Security Council.",,,,,Political science; United Nations Convention on the Law of the Sea; Law; Universal jurisdiction; Punishment; International community; Security council; Maritime piracy; International law,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-ZGHS2009Z1014.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-ZGHS2009Z1014.htm,,,2374361498,,0,,0,false,, 013-708-772-729-260,What is maritime security,,2015,journal article,Marine Policy,0308597x,Elsevier BV,United Kingdom,Christian Bueger,"Maritme Security is one of the latest buzwords of international relations. Major actors have started to include maritme security in their mandate or reframed their work in such terms. Maritme security it is a term that draws atention to new chalenges and ralies suport for tackling these. Yet, no international consensus over the definiton of maritme security has emerged. Buzwords alow for the international cordination of actions, in the absence of consensus. These, however, also face the constant risk that disagrements and politcal conflict are camouflaged. Since there are litle prospects of defining maritme security once and for al, frameworks by which one can identify commonalites and disagrements are neded. This article proposes thre of such frameworks. Maritme security can firstly be understod in a matrix of its relation to other concepts, such as marine safety, seapower, blue economy and resilence. Secondly, the securitzation framework, alows to study how maritme threats are made and which divergent politcal claims these entail in order to uncover politcal interests and divergent ideologies. Thirdly, security practice theory enables the study of what actors actualy do when they claim to enhance maritme security. Together these frameworks alow for the maping of maritme security.",53,,159,164,Security through obscurity; Political science; Law and economics; Practice theory; Mandate; Maritime security; International relations; Public relations; Critical security studies; International security; Security studies,,,,Economic and Social Research Council,https://orca.cf.ac.uk/id/eprint/68143 https://www.researchgate.net/profile/Christian_Bueger/publication/270107474_What_is_maritime_security/links/54cf13bd0cf29ca810fd7252.pdf https://www.sciencedirect.com/science/article/abs/pii/S0308597X14003327 https://orca.cardiff.ac.uk/68143/ https://econpapers.repec.org/article/eeemarpol/v_3a53_3ay_3a2015_3ai_3ac_3ap_3a159-164.htm https://www.sciencedirect.com/science/article/pii/S0308597X14003327 https://www.mendeley.com/catalogue/7a99c623-b554-3596-bd7e-7dbc829a8a41/ https://core.ac.uk/display/42519187 https://ideas.repec.org/a/eee/marpol/v53y2015icp159-164.html https://core.ac.uk/download/42519187.pdf,http://dx.doi.org/10.1016/j.marpol.2014.12.005,,10.1016/j.marpol.2014.12.005,2022752333,,0,001-314-267-090-745; 006-362-817-917-179; 010-344-530-339-047; 011-599-438-244-943; 011-849-757-863-126; 012-972-682-590-716; 014-499-398-003-408; 015-670-014-160-986; 017-248-914-739-116; 020-405-707-257-178; 022-843-264-644-226; 026-207-422-305-800; 032-941-305-769-706; 036-407-805-713-456; 039-430-229-353-53X; 039-735-822-024-910; 044-816-360-051-409; 046-419-626-673-971; 047-324-109-904-14X; 055-670-954-031-579; 064-688-950-873-949; 067-502-476-871-620; 067-706-721-291-908; 073-747-318-311-102; 077-652-422-626-124; 080-538-046-127-944; 086-790-391-495-919; 086-880-441-361-433; 087-589-694-838-917; 089-326-096-722-744; 091-387-389-025-556; 093-480-178-620-637; 095-236-524-976-360; 097-090-439-248-872; 097-941-376-873-082; 110-823-744-420-864; 111-899-623-862-575; 121-138-225-232-451; 126-757-410-318-091; 156-287-781-795-748; 172-466-234-372-424; 178-788-274-722-433; 198-731-555-287-704,149,true,cc-by,hybrid 013-733-916-937-232,PIRACY,2017-12-31,2017,journal article,Spanish Yearbook of International Law,23864435,Asociacion Espanola de Profesores de Derecho Internacional y Relaciones Internacional,,José Manuel Sobrino,,21,,397,406,Political science,,,,,,http://dx.doi.org/10.17103/sybil.21.28,,10.17103/sybil.21.28,,,0,,0,true,,gold 013-765-194-873-383,Fighting Software Piracy in Africa: How Do Legal Origins and IPRs Protection Channels Matter?,2012-12-04,2012,journal article,Journal of the Knowledge Economy,18687865; 18687873,Springer Science and Business Media LLC,Germany,Simplice A. Asongu,"In the current efforts toward harmonizing intellectual property rights (IPRs) regimes in the African continent, this paper provides answers to four key questions relevant in the policy decision-making processes. After empirically examining the questions, the following findings are established. (1) In comparison to common law countries, civil law countries inherently have a significant autonomous rate of software piracy; consistent with the “law and property rights” theory. (2) But for IPRs laws, the other intellectual property (IP) protection channels (World Intellectual Property Organization treaties, main IP law, and multilateral treaties) reduce the incidence of software piracy. (3) In both short-run and long-term, IPRs protection channels in civil law countries appear to mitigate software piracy more than in common law countries. (4) Formal institutions are instrumental in the fight against software piracy through IPRs protection channels.",6,4,682,703,Economics; Common law; Law and economics; Law; Software; Intellectual property; Panel data; Entrepreneurship; Property rights,,,,,https://www.econstor.eu/handle/10419/123555 https://www.econstor.eu/bitstream/10419/123555/1/agdi-wp12-016.pdf https://econpapers.repec.org/article/sprjknowl/v_3a6_3ay_3a2015_3ai_3a4_3ap_3a682-703.htm https://link.springer.com/article/10.1007%2Fs13132-012-0137-0 https://link.springer.com/content/pdf/10.1007%2Fs13132-012-0137-0.pdf https://link.springer.com/article/10.1007/s13132-012-0137-0/fulltext.html https://researchportal.vub.be/en/publications/fighting-software-piracy-in-africa-how-do-legal-origins-and-iprs- https://mpra.ub.uni-muenchen.de/42766/ https://rd.springer.com/article/10.1007/s13132-012-0137-0 https://ideas.repec.org/a/spr/jknowl/v6y2015i4p682-703.html,http://dx.doi.org/10.1007/s13132-012-0137-0,,10.1007/s13132-012-0137-0,2099383322,,0,002-002-118-291-029; 003-120-061-431-142; 003-812-755-378-582; 008-658-577-449-235; 008-896-495-853-748; 011-582-120-011-399; 011-647-566-126-523; 015-808-798-057-897; 015-869-473-074-348; 016-637-372-475-47X; 017-153-449-730-092; 018-075-278-238-815; 025-336-013-036-43X; 027-989-705-549-237; 028-526-275-182-847; 028-630-596-457-020; 034-485-806-784-361; 039-883-767-744-759; 041-385-438-010-463; 041-849-157-283-572; 043-448-779-132-854; 047-010-436-077-442; 049-698-234-112-01X; 056-678-670-376-770; 062-169-487-131-224; 063-085-822-993-592; 066-237-973-648-031; 069-187-883-880-837; 072-166-078-734-816; 072-971-242-544-566; 076-033-619-539-914; 084-864-570-554-378; 086-665-683-815-168; 087-856-971-211-738; 087-959-536-613-70X; 090-703-583-387-097; 091-856-524-538-557; 097-165-496-887-789; 097-637-794-608-082; 105-803-797-619-085; 107-007-285-779-662; 107-947-697-683-923; 110-231-183-577-925; 114-175-428-597-564; 124-655-841-474-707; 125-271-356-328-638; 125-495-818-933-457; 129-798-330-692-606; 133-367-871-090-384; 133-792-324-438-318; 144-135-264-427-99X; 145-112-256-804-251; 145-489-062-191-725; 145-811-348-738-768; 149-620-415-273-520; 152-323-892-837-971; 159-771-177-761-457; 176-497-205-578-260; 181-883-148-914-382; 185-197-322-646-367; 193-305-032-595-202,44,true,cc0,green 013-834-095-430-225,Exploring the Provision of Online Booter Services,2016-05-09,2016,journal article,Deviant Behavior,01639625; 15210456,Informa UK Limited,United Kingdom,Alice Hutchings; Richard Clayton,"ABSTRACTThis research uses differential association, techniques of neutralization, and rational choice theory to study those who operate “booter services”: websites that illegally offer denial-of-service attacks for a fee. Booter services provide “easy money” for the young males that run them. The operators claim they provide legitimate services for network testing, despite acknowledging that their services are used to attack other targets. Booter services are advertised through the online communities where the skills are learned and definitions favorable toward offending are shared. Some financial services proactively frustrate the provision of booter services, by closing the accounts used for receiving payments.",37,10,1163,1178,Internet privacy; Financial services; Business; Payment; Techniques of neutralization; Rational choice theory (criminology); Differential association; Closing (real estate); Cybercrime; Computer security; Denial-of-service attack,,,,,https://www.repository.cam.ac.uk/bitstream/1810/252340/1/Hutchings%20%26%20Clayton%202015%20Deviant%20Behavior.pdf https://www.repository.cam.ac.uk/handle/1810/252340 https://www.tandfonline.com/doi/full/10.1080/01639625.2016.1169829 https://core.ac.uk/display/35279015 https://core.ac.uk/download/pdf/35279015.pdf,http://dx.doi.org/10.1080/01639625.2016.1169829,,10.1080/01639625.2016.1169829,2345976710,,0,000-859-906-610-609; 013-425-010-292-015; 017-735-927-499-308; 020-973-534-331-792; 024-876-069-992-106; 028-367-224-045-089; 035-301-164-312-166; 052-124-771-604-672; 053-513-753-813-564; 054-802-997-366-93X; 059-848-840-258-100; 067-261-634-303-641; 073-579-246-707-609; 082-791-768-979-198; 096-762-853-574-692; 108-489-753-486-838; 110-513-198-198-78X; 119-845-793-987-407; 128-686-226-626-059; 138-200-974-413-518; 138-217-653-847-957; 142-229-053-344-312; 143-049-289-750-593; 153-242-740-046-750; 161-026-451-451-876; 162-034-926-577-736; 171-803-389-787-120; 173-302-444-541-658; 176-877-270-345-361; 188-210-198-821-916; 198-119-701-516-106,76,true,,green 014-004-381-660-762,Online Piracy of Indian Movies: Is the Film Industry Firing at the Wrong Target,,2013,journal article,Michigan State international law review,23282991,,,Arul George Scaria,"India has recently introduced some digital rights management (DRM) provisions to the Indian copyright law with the objective of providing “adequate” protection for copyrighted material in the online digital environment. Film industry was one of the biggest lobbying groups behind the new DRM provisions in India, and the industry has been consistently trying to portray online piracy as a major threat. The Indian film industry also extensively uses John Doe orders from the high courts in India to prevent the access of Internet users to websites suspected to be hosting pirated material. This paper explores two questions in the context of the new DRM provisions in India: (1) Is online piracy a threat to the Indian film industry? and (2) Are the present measures taken by the film industry the optimal measures for addressing the issue of online piracy? Based on data from an extensive empirical survey conducted in India, this paper questions the claims of the industry that online piracy is at a substantial level in India. The Internet usage related data in India also support the findings from the empirical survey. However, the paper observes that pirated Indian movie content is abundant in the Internet and this shows the existence of strong demand for those content. Based on a careful analysis of different websites hosting pirated Indian movies, the paper illustrates that the most probable consumers of those pirated movies are the millions of (potential) consumers residing abroad. The * Post-doctoral Researcher, Center for Philosophy of Law Biodiversity Governance Research Unit, Catholic University of Louvain (UCL), Belgium. Email: arul.scaria@uclouvain.be. The empirical data used in this study was collected as part of the doctoral research of the author at the International Max Planck Research School for Competition and Innovation, Munich, and the author thankfully acknowledges the financial support received from the Max Planck Society for the empirical survey. The author is also thankful to participants of the IP for Creative Upstarts conference (November 9-10, 2012) organised by the Michigan State University, particularly Professor Sean Pager, for insightful suggestions on the first draft of this paper. 648 Michigan State International Law Review [Vol. 21:3 paper argues that the enactment of DRM provisions under Indian copyright law or wide sweeping John Doe orders may never be a solution for such piracy. Piracy of Indian movie content abroad is primarily attributable to the failure of the Indian film industry to explore innovative business models to reach (potential) consumers abroad. The paper argues that the Indian film industry may achieve sustainable solutions for online piracy only by making the legitimate products reach those consumers.",21,3,647,,The Internet; Advertising; Philosophy of law; Political science; Context (language use); Corporate governance; Business model; Digital rights management; Film industry; International law,,,,,https://osf.io/96cc6/ https://hcommons.org/deposits/item/hc:35555/,https://osf.io/96cc6/,,,3121160940,,0,,5,false,, 014-050-242-979-957,Digital Piracy and Stealing: A Comparison on Criminal Propensity,2010-07-01,2010,journal article,International Journal of Criminal Justice Sciences,09735089,,,Szde Yu,"IntroductionIs digital piracy the same as stealing? On the one hand, some people assert digital piracy is no different from stealing property from the owner (RIAA, n.d.). On the other hand, some people would argue digital piracy might not be regarded as theft (Seale, Polakowski, & Schnieder, 1998; Hill, 2007). A concept of virtual criminality has been put forth to suggest that considering the unique features of cyberspace, cyber crime may represent a unique criminality that is different from street crime (Graboski, 2001; Capelleer, 2001). It seems to imply some criminals are only prone to commit crime in cyberspace because of its special virtual settings, while in the physical world these people tend to be law-abiding due to the self-restraints that are somehow attenuated in the cyber world (Jaishankar, 2008). The study of psychology in cyberspace has confirmed this notion to some extent. A disinhibition effect has been suggested to explain why and how people might behave differently online (Suler, 2004).To date, there have been quite a few research studies done to explain digital piracy behavior. They mostly paid attention to the root causes or criminogenic factors. However, there seems to be a lack of more straightforward examinations that directly address the difference or similarity between digital piracy and stealing. This is to say, instead of trying to explain why digital piracy and stealing are the same or different, perhaps a simpler but crucial direct comparison is warranted before any assumption is taken for granted.In this paper, the focus was on a direct comparison between the propensity for committing digital piracy and that for stealing. The subject is criminal propensity rather than criminal behavior, for there could be too many mediating factors that can prevent a propensity from transforming into an act. In contrast, criminal propensity may more directly reflect a person's true intent, even without an actual act. This does not follow this must be a better approach. It merely offers a different look at this subject matter. The question seeking answers was whether when people have a propensity for digital piracy they will always have a propensity for stealing as well. As simple as this question may sound, it is important, because if criminal-minded people are not always prone to stealing and digital piracy at the same time, there must be something that distinguishes these two offenses. Morality was chosen in the current project to shed light on this possible distinction between digital piracy and stealing.Literature ReviewWhile the perpetrators of digital piracy have a different view on its definition, in the literature related to digital piracy, digital piracy was automatically defined as stealing. For example, Tan in his study of consumers' moral intensity and intention to use pirated software described software piracy as stealing copyright software (Tan, 2002). In a computer science study, software piracy was seen as a form of intellectual stealing (Rahim, Seyal, & Rahman, 1999). Glass and Wood (1996) in their study also pronounced software piracy stealing. The same view can be found in studies on music piracy as well (d'Astous, Colbert, & Montpetit, 2005; Fox & Wrenn, 2001). In light of this point of view, music piracy is equivalent to stealing music.Contrary to the aforementioned studies in which digital piracy is readily regarded as stealing, there is another view in the literature that asserts digital piracy is not theft or stealing, or at least it is not being considered the same as stealing. McGreal (2004) argued that copyright infringement is not stealing and copyright controllers intentionally use 'steal' or 'theft' to draw a parallel between digital piracy and the acts considered evil by most people. He further posited that infringement does not involve taking control over copyright or depriving its owner of it, which by definition is not consistent with stealing in which property is taken away (McGreal, 2004). …",5,2,239,,Internet privacy; Commit; Psychology; Property (philosophy); Morality; Control (management); Subject (philosophy); Copyright infringement; Music piracy; Cyberspace; Criminology,,,,,,,,,2585276361,,0,000-312-517-819-151; 002-488-252-834-55X; 005-685-964-848-564; 007-559-358-394-991; 008-157-723-118-763; 009-819-013-936-725; 013-425-010-292-015; 020-973-534-331-792; 028-999-447-590-450; 031-270-806-305-562; 038-623-323-979-226; 056-157-179-063-156; 057-182-959-994-032; 058-806-863-894-52X; 070-387-433-147-234; 074-777-270-980-043; 078-221-917-889-593; 084-502-083-697-859; 089-181-535-078-862; 094-565-529-045-486; 120-103-422-077-431; 130-214-393-255-423; 139-041-303-026-120; 152-066-088-660-031; 160-358-377-281-104; 174-537-622-402-996; 186-761-056-019-846,5,true,cc-by-nc-sa,gold 014-157-505-772-350,"Software piracy declines in Asia, elsewhere",,1995,journal article,Computers & Security,01674048,Elsevier BV,United Kingdom,Helen Collinson,,14,2,118,,Business; Software; Computer security,,,,,https://www.sciencedirect.com/science/article/pii/0167404895970359,http://dx.doi.org/10.1016/0167-4048(95)97035-9,,10.1016/0167-4048(95)97035-9,2041381029,,0,,0,false,, 014-202-423-842-861,Contemporary And Historical Comparison Of American And Brazilian Legal Efforts To Corral Digital Music Piracy And P2P Software,,2010,journal article,ILSA Journal of International and Comparative Law,1082944x,,,Nolan Garrido,,16,3,675,696,Software; Media studies; Timeline; Digital audio; History,,,,,https://nsuworks.nova.edu/cgi/viewcontent.cgi?article=1770&context=ilsajournal https://nsuworks.nova.edu/ilsajournal/vol16/iss3/3/,https://nsuworks.nova.edu/ilsajournal/vol16/iss3/3/,,,2618247165,,0,,0,false,, 014-229-754-790-787,Benefits of buccaneering,,2011,journal article,African Security Review,10246029; 21540128,Informa UK Limited,United Kingdom,Lisa Otto,"The modern-day face of what is one of the world's oldest crimes – maritime piracy – is quite different to that of two centuries ago. Over the last decade the hub of global pirate activities has shifted from the East to Africa, with the growing scourge of Somali pirates – armed with automatic weapons and rocket-propelled grenades – having arisen as a global concern as a result of the consequences piracy holds for a litany of security, strategic and economic imperatives. The evolution of Somali piracy off the east coast of Africa has increasingly hinted toward the phenomenon constituting a lucrative industry in the region. Indeed, it is evident that there is a political economy attached to maritime piracy in Somalia and Kenya in particular, which elucidates that piracy is a crime that is based not only at sea, but also on land. By considering the financial system related to piracy, as well as the costs and impacts it holds for locals, there are a number of lessons for counter-piracy efforts, specifically th...",20,4,45,52,Economy; Economics; Somali; Litany; Maritime security; Face (sociological concept); Maritime piracy; East coast; Phenomenon,,,,,https://www.tandfonline.com/doi/abs/10.1080/10246029.2011.630809,http://dx.doi.org/10.1080/10246029.2011.630809,,10.1080/10246029.2011.630809,1531547276,,0,016-018-095-806-249; 028-467-937-942-167; 038-687-506-474-047; 065-317-923-661-274; 083-813-344-695-264; 125-511-004-952-971; 198-731-555-287-704,3,false,, 014-250-791-280-715,‘Putting down a common enemy’: Piracy and occasional interstate power in South China during the mid-nineteenth century:,2020-09-30,2020,journal article,International Journal of Maritime History,08438714; 20527756,SAGE Publications,United States,C. Nathan Kwan,"Piracy was considered a crime in international law, and British authorities felt its suppression justified the extension of state power into Asian waters. Only after the Opium War and the colonisation of Hong Kong, however, did Britain gain an interest and the wherewithal to act against pirates off the coast of South China. Ships of the Royal Navy, enforcing British ideas of international and maritime law in Chinese waters, together with the criminal justice system in Hong Kong, proved limited in their capacity to deal with piracy in South China in the mid-nineteenth century. Agents of British state power on the coast of China thus sought the assistance of their international counterparts, culminating in an international punitive expedition to Coulan. This article examines interstate cooperation in the effort to suppress piracy and the light this sheds on the relationship between piracy and state power. It argues that such collaboration required compromises between different understandings of piracy and the jurisdiction that different states had over it, and that interstate power was ultimately limited in its impact on the activities of pirates in South China.",32,3,697,712,Criminal justice; Political economy; Political science; China; Power (social and political); State (polity); Navy; Jurisdiction; Punitive expedition; International law,,,,,https://journals.sagepub.com/doi/full/10.1177/0843871420944629 https://dialnet.unirioja.es/servlet/articulo?codigo=7664845,http://dx.doi.org/10.1177/0843871420944629,,10.1177/0843871420944629,3090346310,,0,,4,false,, 014-499-398-003-408,The Moral Economy of Somali Piracy – Organised Criminal Business or Subsistence Activity?,2013-03-27,2013,journal article,Global Policy,17585880; 17585899,Wiley,United Kingdom,Axel Klein,"Somali piracy is increasingly explained in terms of organised criminal business. This article argues that piracy does not constitute a business and the analogy with organised crime is misleading and can obstruct the search for a long term settlement. Dismissing the underlying grievance, the destruction of Somali fisheries by foreign trawlers, with literalist explanations such as ‘pirates are rarely fishermen’ and ‘most targets are cargo ships’, ignores its function as a ‘legitimating notion’. The concept of ‘moral economy’ is used to explain how along the coast but also within the diaspora the identity of Somalis as victims is used to legitimize pirate activities. International responses should therefore focus actively and symbolically on reconstructing livelihoods along the coast, instead of seeking security sector and criminal justice solution. This is possible and cost effective because Somali piracy is a subsistence activity driven by lack of employment and investment opportunities, and provides a limited economic stimulus for coastal micro economies.",4,1,94,100,Criminal justice; Economy; Sociology; Subsistence agriculture; Organised crime; Somali; Grievance; Diaspora; Moral economy; Analogy,,,,,https://core.ac.uk/display/10637761 https://econpapers.repec.org/RePEc:bla:glopol:v:4:y:2013:i:1:p:94-100 https://ideas.repec.org/a/bla/glopol/v4y2013i1p94-100.html https://kar.kent.ac.uk/33574/ https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1758-5899.2012.00192.x,http://dx.doi.org/10.1111/j.1758-5899.2012.00192.x,,10.1111/j.1758-5899.2012.00192.x,1508565795,,0,003-530-161-964-554; 013-425-010-292-015; 019-338-811-028-452; 024-013-108-178-470; 040-959-632-131-561; 043-164-385-854-497; 060-728-611-779-067; 101-965-654-950-607; 113-181-117-052-537; 113-589-375-707-427; 120-081-889-235-910; 132-710-338-500-68X; 161-295-418-702-261,7,false,, 014-543-842-827-100,"“Nobody cares, lah!” the phenomenon of flaming on YouTube in Malaysia",2016-06-30,2016,journal article,Journal of Business and Social Review in Emerging Economies,25190326; 2519089x,"CSRC Publishing, Center for Sustainability Research and Consultancy",,Revathy Amadera Lingam; Norizah Aripin,Objective: The purpose of this paper is to investigate what motivates people to provide; malicious comments on YouTube in Malaysia. This study will also question the differences; between how flaming is constructed in each video classification and how are flaming comments; categorized. Methodology: This study uses qualitative methods.Literature review has been summarized to contextualize the research problem.; Findings: The paper offers rich theoretical insights to understand the practical issue of ridiculous comments by internet users on YouTube.; Implications: Flaming or making ridiculous comments on social media has been a serious issue; in Malaysia and other countries with high internet usage.Findings of the study will help understand the views of YouTube community in Malaysia on flaming. The study may further help understand the issue of flaming on other social media sites.,2,1,71,78,Internet privacy; The Internet; Advertising; Geography; Ridiculous; Internet users; nobody; Phenomenon; Social media,,,,,https://core.ac.uk/display/78487464 http://repo.uum.edu.my/20706/ https://ideas.repec.org/a/src/jbsree/v2y2016i1p71-78.html https://doaj.org/article/28ec35bc15fa4a8c952ff7776b05399e https://core.ac.uk/download/230584617.pdf,http://dx.doi.org/10.26710/jbsee.v2i1.20,,10.26710/jbsee.v2i1.20,2596804949,,0,001-550-345-304-45X; 006-254-468-364-597; 011-406-787-391-833; 012-255-145-853-70X; 034-005-361-853-196; 034-401-870-179-27X; 035-499-237-773-948; 036-331-541-907-602; 070-546-472-000-708; 091-360-457-380-286; 092-205-458-175-408; 115-101-987-100-846; 163-827-631-928-195,1,true,cc-by-nc,gold 014-547-591-352-072,China—Intellectual Property Rights and the criminalization of trade mark counterfeiting and copyright piracy under the TRIPS Agreement,2009-07-20,2009,journal article,Journal of Intellectual Property Law & Practice,17471532; 17471540,Oxford University Press (OUP),,Bradly J. Condon,,4,9,618,619,Business; Law and economics; China; Law; TRIPS Agreement; Criminalization; Intellectual property,,,,,https://academic.oup.com/jiplp/article-pdf/4/9/618/2482554/jpp116.pdf https://academic.oup.com/jiplp/article-abstract/4/9/618/833463 http://academic.oup.com/jiplp/article-abstract/4/9/618/833463,http://dx.doi.org/10.1093/jiplp/jpp116,,10.1093/jiplp/jpp116,2093729636,,0,,0,false,, 014-746-077-248-215,INTELLECTUAL PIRACY: GENERAL-THEORETICAL ASPECTS OF VIOLATION OF THE INTELLECTUAL PROPERTY RIGHTS IN THE INTERNET,,2019,journal article,Scientific Journal of Public and Private Law,26181258,Private Institution Scientific Institute of Public Law,,О.М. Korotun,,2,4,82,86,The Internet; Political science; Law and economics; Intellectual property,,,,,http://dx.doi.org/10.32844/2618-1258.2019.4-2.16,http://dx.doi.org/10.32844/2618-1258.2019.4-2.16,,10.32844/2618-1258.2019.4-2.16,3014478365,,0,,0,true,,gold 014-799-929-675-057,Copyrightability of Software: Piracy on the Waters of Protection,,1986,journal article,South Carolina Law Review,00383104,,,Sylvia Ann Matthews,,37,4,6,,Business; Software; Intellectual property; Computer security,,,,,https://scholarcommons.sc.edu/cgi/viewcontent.cgi?article=2855&context=sclr https://scholarcommons.sc.edu/sclr/vol37/iss4/6/,https://scholarcommons.sc.edu/sclr/vol37/iss4/6/,,,3068827215,,0,,0,false,, 014-898-645-443-063,"United States v. Dire : The Somali Pirates and the Fourth Circuit's Choice to Apply an Evolving ""Law of Nations"" to the Problem",2014-02-19,2014,journal article,Boston College international and comparative law review,02775778,,,Samuel B. Richard,"Maritime piracy poses a grave threat to global shipping. In the United States, federal law criminalizes piracy as defined by international law, or the law of nations. Recently, in United States v. Dire, the Fourth Circuit Court of Appeals interpreted the law of nations surrounding piracy. Dire concerned the conviction of five Somali nationals under the piracy statute. The defendants argued that piracy requires a robbery, and since no robbery occurred, their convictions should be overturned. Examining two differing approaches by lower District Courts, the Fourth Circuit concluded that piracy does not require robbery because the law of nations evolves with changing international consensus, rather than maintaining a static definition. This consensus stems from international agreements, such as the United Nations Convention on the Law of the Sea, whose definition of piracy lacks a robbery element. Therefore, the court upheld the convictions. Dire may potentially change the way U.S. courts apply inter-",36,3,,,Statute; Political science; United Nations Convention on the Law of the Sea; Law; Element (criminal law); Somali; Federal law; Conviction; Maritime piracy; International law,,,,,https://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=1716&context=iclr https://lawdigitalcommons.bc.edu/iclr/vol36/iss3/6/,https://lawdigitalcommons.bc.edu/iclr/vol36/iss3/6/,,,237752912,,0,,0,false,, 014-913-869-202-499,Maritime Piracy in the Substantive Criminal Law,2013-06-28,2013,journal article,Internal Security,20805268,Index Copernicus,,Kamil Frąckowiak,,5,1,159,172,Political science; Law; Criminal law; Maritime piracy,,,,,http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ceon.element-9cabab3b-152b-3f0b-ab2b-55ee5d3eaf90 http://internalsecurity.pl/abstracted.php?level=5&ICID=1059481 http://cejsh.icm.edu.pl/cejsh/element/bwmeta1.element.ceon.element-9cabab3b-152b-3f0b-ab2b-55ee5d3eaf90,http://dx.doi.org/10.5604/20805268.1059481,,10.5604/20805268.1059481,874855042,,0,,0,false,, 015-019-918-695-171,Questionnaire No. 6.—Piracy,,1926,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),United States,,,20,S5,222,229,Business,,,,,,http://dx.doi.org/10.1017/s0002930000221891,,10.1017/s0002930000221891,,,0,,0,false,, 015-337-836-014-639,Copyright Law and the Menace of Piracy in Nigeria,,2015,journal article,"Journal of Law, Policy and Globalization",22243240,,,Mary Imelda Obianuju Nwogu,"The greatest resource and bedrock of every civilization is its creativity, innovation and invention. All these boost the economy of a nation. Creativity of a nation, Nigeria inclusive, is protected by the copyright Law. The goal of copyright protection is to encourage dissemination of information, provide employment and economic benefit to the owner, and reserve the ownership of the right in it to the creator of the work. But this right has been constantly bastardised and infringed upon by unauthorized acts of reproduction and distribution on a commercial scale, called piracy. Piracy is a menace that has negatively impacted on Nigerian economic, social and political wellbeing. Hence this paper examines the Nigerian copyright law in relation to the protection of literary, artistic and musical works, cinematograph film, sound recording and broadcast; the exclusive rights granted to copyright owners and its infringement; types and causes of piracy; the effects of piracy; and then made some recommendations for the eradication of piracy. Keywords: copyright law, menace, piracy, infingement, Nigeria.",34,,113,129,Creativity; Civilization; Economics; Resource (biology); Work (electrical); Law and economics; Law; Reproduction (economics); Distribution (economics); Exclusive right; Politics,,,,,https://www.iiste.org/Journals/index.php/JLPG/article/view/20335/0 https://www.iiste.org/Journals/index.php/JLPG/article/download/20335/20759,https://www.iiste.org/Journals/index.php/JLPG/article/view/20335/0,,,1514198210,,0,014-525-364-939-730,5,false,, 015-420-516-757-65X,Piracy at sea and the limits of international law,2010-04-23,2010,journal article,Aegean Review of the Law of the Sea and Maritime Law,18649610; 18649629,Springer Science and Business Media LLC,,Rytis Satkauskas,"The world community is focused on piracy. In today’s interdependent world, this crime has once again unleashed itself on the maritime industry, putting people lives and economies at risk. The waters around Somalia and Nigeria are of extreme risk, and the Asian waters still remain an area of concern. The United Nations Security Council even declared piracy a threat to international peace and security. States, in the repression of piracy, do not operate in a legal vacuum. International law, as well as the national legislation of states, regulates the use of force at sea, defining the limits and conditions exercising criminal jurisdiction over pirates. In an attempt to fight impunity on the high seas, many states have started to revise their practices and adapt their laws. Calls are also rising to fill the “loopholes left by the United Nations Convention on the Law of the Sea”: to address in due manner piracy issues and guarantee adequate balance between the freedom of navigation and the need to ensure the security of their ships and seafarers. This article is an attempt to identify the shortcomings of the existing provisions on piracy provided in international documents, discuss their applicability in fighting the piracy (namely by their ability to ensure the necessary jurisdiction over the crimes at sea) and offer an opinion on possible ways of addressing impunity at sea, both by national and international legal instruments.",1,2,217,235,International waters; Political science; United Nations Convention on the Law of the Sea; Public international law; Law; Jurisdiction; Impunity; Freedom of navigation; Law of the sea; International law,,,,,https://rd.springer.com/article/10.1007/s12180-010-0013-3 https://link.springer.com/article/10.1007/s12180-010-0013-3/fulltext.html https://link.springer.com/article/10.1007/s12180-010-0013-3,http://dx.doi.org/10.1007/s12180-010-0013-3,,10.1007/s12180-010-0013-3,1989686334,,0,003-886-498-076-349; 016-771-397-329-433; 018-027-432-841-107; 034-206-558-284-768; 041-102-193-199-049; 059-920-857-793-437; 089-267-037-482-499; 098-740-580-900-821; 103-547-038-508-648; 106-619-699-607-570; 107-963-340-858-903; 110-624-715-622-828; 124-041-827-528-522; 126-627-706-283-267; 128-370-702-985-597; 130-643-828-588-063; 132-213-404-560-983; 179-245-562-746-996; 185-104-823-389-543,7,false,, 015-554-842-248-934,Trading Higher Software Piracy for Higher Profits: The Case of Phantom Piracy,,2010,journal article,Management Science,00251909; 15265501,Institute for Operations Research and the Management Sciences (INFORMS),United States,Ram Gopal; Alok Gupta,"Faced with the sustained problem of piracy that costs nearly $40 billion in annual revenue losses, the software industry has adopted a number of technical, legal, and economic strategies to curb piracy and stem the resulting losses. Our work complements and contributes to the existing literature by exploring the possible effect of another economic lever—product bundling—on the relationship governing piracy and seller profits. The traditional economic rationale of demand pooling from bundling that enables sellers to extract higher surplus and its particular attractiveness for information goods with negligible marginal and bundling costs carry over to our analysis. However, the presence of piracy injects several new facets to our analysis. Bundling creates a shared level of piracy of disparate products, and under certain conditions to the detriment of one of the products. We argue that by construction of the copyright laws, the act of bundling itself can have a deterrence effect. This deterrence effect, alo...",56,11,1946,1962,Economics; Microeconomics; Revenue; Information good; Software; Pooling,,,,,http://dblp.uni-trier.de/db/journals/mansci/mansci56.html#GopalG10 https://pubsonline.informs.org/doi/10.1287/mnsc.1100.1221 https://econpapers.repec.org/RePEc:inm:ormnsc:v:56:y:2010:i:11:p:1946-1962 https://ideas.repec.org/a/inm/ormnsc/v56y2010i11p1946-1962.html https://doi.org/10.1287/mnsc.1100.1221 https://dblp.uni-trier.de/db/journals/mansci/mansci56.html#GopalG10 https://experts.umn.edu/en/publications/trading-higher-software-piracy-for-higher-profits-the-case-of-pha,http://dx.doi.org/10.1287/mnsc.1100.1221,,10.1287/mnsc.1100.1221,2165560415,,0,002-442-900-777-730; 005-527-414-966-466; 014-082-506-216-299; 017-619-716-693-348; 019-297-304-577-424; 020-307-640-558-689; 022-248-718-157-566; 025-882-454-923-868; 026-696-477-861-097; 033-349-220-802-574; 036-442-985-587-509; 041-470-778-328-140; 042-057-592-838-529; 042-110-965-689-651; 047-415-077-240-96X; 049-698-234-112-01X; 056-134-823-809-165; 070-422-731-431-875; 072-239-995-087-93X; 087-010-768-796-663; 108-743-157-279-059; 118-675-220-855-858; 143-557-663-439-334; 153-552-384-031-475,32,false,, 015-669-089-282-402,SEAPOWER AND ASYMMETRIC WARFARE IN INDONESIA,2020-04-04,2020,journal article,"Jurnal Pertahanan: Media Informasi ttg Kajian & Strategi Pertahanan yang Mengedepankan Identity, Nasionalism & Integrity",25499459; 20879415,Indonesia Defense University,,Luh Putu Ika Primayanti; Saudi Firmansyah Putra,"This study analyzes the Asymmetric Warfare that occurs at sea and the seapower that should be possessed by a state to overcome maritime asymmetrical threats. This study uses descriptive qualitative which explains in detail the asymmetrical warfare at sea and seapower using case examples. This research uses case examples of asymmetrical threats that occur in the domestic territory of Indonesia, namely the Malacca Strait case. The theories used in this study are defense theory, the concept of seapower, the concept of asymmetric warfare and the concept of international cooperation to analyze the case that occurs. The results of this study are Indonesia’s seapower to combat asymmetric warfare was built in three ways namely, strengthen the military defense equipment, carry out defense cooperation with the state that borders with Indonesia and strengthen the collaboration between related ministries and institutions. These ways are implemented through Malacca Strait Patrol which is defense cooperative include Malacca Sea Strait Patrol, Eyes in the Sky and Information Sharing.",6,1,94,104,International trade; Political science; Asymmetric warfare; State (polity); Information sharing,,,,,http://jurnal.idu.ac.id/index.php/DefenseJournal/article/view/620/primayantipdf http://jurnal.idu.ac.id/index.php/DefenseJournal/article/download/620/primayantipdf https://core.ac.uk/download/pdf/322560554.pdf,http://dx.doi.org/10.33172/jp.v6i1.620,,10.33172/jp.v6i1.620,3016197231,,0,005-863-712-890-773; 008-080-101-067-292; 015-982-564-000-402; 106-766-494-116-153; 146-480-641-351-549; 186-700-184-127-842,0,true,cc-by-nc,gold 015-708-379-874-376,Software piracy,,1985,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,7,3,1,6,Computer science; Software; Operating system; Computer security,,,,,,http://dx.doi.org/10.1016/0142-0496(85)90028-1,,10.1016/0142-0496(85)90028-1,,,0,,0,false,, 015-739-554-875-90X,Addressing Ethics And Technology In Business: Preparing Today's Students For The Ethical Challenges Presented By Technology In The Workplace,2011-01-11,2011,journal article,Contemporary Issues in Education Research (CIER),1941756x; 19405847,Clute Institute,,Rochelle Brooks,"The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody’s responsibility, the result can often be interpreted as nobody’s responsibility. Therefore, an effective while still practical moral framework needs to be recognized in order to put computer ethics on a sound foundation for further exploration.",1,2,23,32,Information technology; Computer ethics; Sociology; Social responsibility; Ethics of technology; Computer technology; Electronic mail; nobody; Public relations; Information ethics,,,,,https://files.eric.ed.gov/fulltext/EJ1056386.pdf https://eric.ed.gov/?id=EJ1056386 http://files.eric.ed.gov/fulltext/EJ1056386.pdf https://core.ac.uk/download/pdf/268108489.pdf,http://dx.doi.org/10.19030/cier.v1i2.1197,,10.19030/cier.v1i2.1197,2179905395,,0,129-286-748-541-531; 185-924-716-594-086,3,true,, 015-825-689-421-463,The Relationship between Piracy and Kidnapping for Ransom,2013-07-01,2013,journal article,Insight on Africa,09750878; 09763465,SAGE Publications,,Marelize Schoeman; Benjamin Häefele,"The world’s attention on maritime piracy is largely focussed on the root causes, modus operandi, extent and prevention. However, the complexity of the relationship between piracy and kidnapping for...",5,2,117,128,Economy; Political economy; Economics; Root (linguistics); Negotiation; Ransom; Maritime piracy,,,,,https://journals.sagepub.com/doi/abs/10.1177/0975087813512058 https://econpapers.repec.org/RePEc:sae:inafri:v:5:y:2013:i:2:p:117-128 https://ideas.repec.org/a/sae/inafri/v5y2013i2p117-128.html http://ioa.sagepub.com/content/5/2/117.abstract,http://dx.doi.org/10.1177/0975087813512058,,10.1177/0975087813512058,2056880947,,0,065-317-923-661-274; 071-346-623-291-646,2,false,, 016-825-469-452-256,The global ‘epidemic’ of movie ‘piracy’: crime-wave or social construction?:,,2005,journal article,"Media, Culture & Society",01634437; 14603675,SAGE Publications,United States,Majid Yar,"The growth of film ‘piracy’ has become an increasingly high-profile issue. Business groups, national governments, international organizations and law enforcement agencies have claimed that ‘piracy’...",27,5,677,696,Sociology; Social constructionism; Law and economics; Law; Globalization; Crime statistics; Law enforcement; Internet crime; Intellectual property,,,,,http://journals.sagepub.com/doi/pdf/10.1177/0163443705055723 http://mcs.sagepub.com/content/27/5/677.short https://journals.sagepub.com/doi/abs/10.1177/0163443705055723 http://journals.sagepub.com/doi/10.1177/0163443705055723 https://core.ac.uk/display/317936 https://kar.kent.ac.uk/272/,http://dx.doi.org/10.1177/0163443705055723,,10.1177/0163443705055723,1964736889,,0,015-430-380-101-473; 016-389-097-477-525; 018-799-380-925-965; 025-587-823-449-435; 034-493-031-775-696; 038-637-334-577-174; 049-055-862-633-327; 054-691-584-914-185; 074-814-777-733-99X; 086-718-334-050-175; 126-318-425-770-318; 127-484-621-527-526; 131-502-649-299-597; 156-249-677-674-21X; 188-684-351-374-847,90,false,, 016-891-857-050-203,A critical analysis of the implications of Covid-19 on piracy off the Nigerian coast,2021-11-12,2021,journal article,Revista de Direito Internacional,22371036; 2236997x,Centro de Ensino Unificado de Brasilia,,Kalu Kingsley Anele,"The objective of this paper is to analyse the implications of Covid-19 to the Nigerian piracy and to suggest measures to suppress the crime. While piracy is rife off the Nigerian coast due to heavy vessel traffic in the country’s oil and gas industry, the onshore causes of piracy, like unemployment, have worsened because of Covid-19 preventive measures introduced in Nigeria. This research critically analyses legal instruments, data and scholarly publications to determine the effect of Covid-19 to piracy in Nigeria. Though the emergence of Covid-19 significantly aggravated some of the onshore causes of piracy, like poverty, which could potentially increase the number of piratical acts off the Nigerian coast, data suggested that the number of piratical acts has not increased yet. This paper argued that this was due to the restriction of movement, the docking of vessels to curb the spread of Covid-19 and the restriction of vessels without thermal screening kit from operating in Nigerian waters. The paper concluded that notwithstanding that Covid-19 may not have affected the number of piracy incidences in Nigeria, there is a possibility of increase in the number of piratical attacks in Nigerian waters post Covid-19, especially after easing Covid-19 countermeasures. This was because the emergence of Covid-19 has escalated the onshore causes of piracy in the country and the movement restrictions have been partially lifted. This research suggested that finding a lasting solution to the onshore causes of piracy was key to curbing piracy off the Nigerian waters during and post Covid-19.",18,2,,,Business; Poverty; Unemployment; Coronavirus disease 2019 (COVID-19); Development economics; Petroleum industry,,,,,https://www.uhumanas.uniceub.br/rdi/article/view/7332 https://www.jus.uniceub.br/rdi/article/view/7332/pdf https://publicacoesacademicas.uniceub.br/rdi/article/download/7332/pdf https://www.gti.uniceub.br/rdi/article/view/7332 https://www.publicacoes.uniceub.br/rdi/article/view/7332 https://publicacoesacademicas.uniceub.br/rdi/article/view/7332 https://www.cienciasaude.uniceub.br/rdi/article/view/7332 https://uniceub.emnuvens.com.br/rdi/article/view/7332 https://www.publicacoes.uniceub.br/rdi/article/download/7332/pdf https://www.rel.uniceub.br/rdi/article/view/7332 https://www.arqcom.uniceub.br/rdi/article/view/7332,http://dx.doi.org/10.5102/rdi.v18i2.7332,,10.5102/rdi.v18i2.7332,3212597684,,0,,0,true,,gold 016-942-140-444-376,Preparing for piracy trials in Mauritius,,2013,journal article,Commonwealth Law Bulletin,03050718; 17505976,Informa UK Limited,United Kingdom,Aruna Narain,"This paper purports to present a brief overview of the measures taken by Mauritius in preparing for prosecution and trial of suspected pirates. It outlines the law of Mauritius on piracy in 2010 and the main heads of assistance under the European Union–UN Office on Drugs and Crime Joint Programme. It sets out salient features of the transfer agreement entered into with the EU and of the Piracy and Maritime Violence Act 2011. It refers to the conclusion of instruments this year with the UK, Puntland and the Transitional Federal Government (TFG). Lastly, it focuses on the preparation at the level of prosecutors in the Office of the Director of Public Prosecutions (ODPP).",39,1,53,58,Government; Political science; Law; Salient; Transfer Agreement,,,,,https://www.tandfonline.com/doi/abs/10.1080/03050718.2012.751201,http://dx.doi.org/10.1080/03050718.2012.751201,,10.1080/03050718.2012.751201,1997572640,,0,,0,false,, 016-997-043-031-594,Piracy and Law in the Ottoman Mediterranean by Joshua M. White (review),2018-05-11,2018,journal article,Middle East Journal,00263141,,,Mark D. Welton,,72,2,345,346,Ancient history; Mediterranean climate; White (horse); History,,,,,,,,,2801290320,,0,,0,false,, 017-137-297-082-064,China fights to prevent piracy,,1995,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1995,9,4,4,China; Business; Computer security; Computer science; Political science; Law,,,,,,http://dx.doi.org/10.1016/0142-0496(95)80244-4,,10.1016/0142-0496(95)80244-4,,,0,,1,false,, 017-145-450-830-496,The challenges of regulating warez trading,,2005,journal article,Social Science Computer Review,08944393; 15528286,SAGE Publications,United States,Eric Goldman,"This article analyzes the policy challenges of legally conforming the behavior of warez traders. The article discusses the motivations for warez trading, how criminalizing the behavior may counterproductively encourage it, and why legislators and prosecutors continue to target warez trading despite the counterproductive effects.",23,1,24,28,Criminal justice; Law and economics; Criminal law; Copyright infringement,,,,,https://ssc.sagepub.com/content/23/1/24.full.pdf http://journals.sagepub.com/doi/10.1177/0894439304271531 http://pdf.textfil.es/academics/warezchallenges.pdf http://journals.sagepub.com/doi/abs/10.1177/0894439304271531 https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?article=1635&context=facpubs https://ssc.sagepub.com/content/23/1/24.abstract https://journals.sagepub.com/doi/10.1177/0894439304271531 https://digitalcommons.law.scu.edu/facpubs/620/ http://pdf.textfiles.com/academics/warezchallenges.pdf https://core.ac.uk/download/149264850.pdf,http://dx.doi.org/10.1177/0894439304271531,,10.1177/0894439304271531,3125597601,,0,007-313-903-160-42X; 110-513-198-198-78X; 185-316-275-125-807,6,true,,green 017-204-421-471-444,The Legal Status of Piracy in Medieval Europe,2012-11-05,2012,journal article,History Compass,14780542,Wiley,,Emily Sohmer Tai,"This article discusses the history of maritime theft, or piracy, in medieval Europe, not so much as a crime but rather as a case study in legal pluralism: the operation of competing systems of law across a common region. Although scholarship has often interpreted sources for medieval European piracy through the filter of early modern conditions, the parameters of how disputes over piracy were settled within the conflicting legal systems of medieval Europe may have heuristic implications for understanding twenty-first century piracy. On the one hand, statutes of royal and civic polities across medieval Europe uniformly adhered to Roman legal precedents in condemning piracy as a capital crime. On the other hand, selective campaigns of maritime predation, referred to in the Latin sources as sailing ad piraticam or in cursum, (hence the term corsair), were sanctioned by medieval European polities when directed against political and economic rivals. Legal and narrative sources for maritime theft nevertheless indicate that piracy was often conflated with the operation of enemy corsairs in a manner that carried implications for the imposition of capital penalties on maritime marauders as well as for merchants who attempted to obtain compensation, or restitution, for cargo seized in a corsair raid from polities charged with authorizing their operations. Attempts to obtain restitution could also be complicated by commercial patterns subtly interwoven with maritime theft.",10,11,838,851,Legal pluralism; Engineering; Statute; Law; Scholarship; Restitution; Adversary; Filter (software); Capital (economics); Politics,,,,,https://www.onlinelibrary.wiley.com/doi/abs/10.1111/hic3.12009,http://dx.doi.org/10.1111/hic3.12009,,10.1111/hic3.12009,1838259102,,0,003-160-266-285-675; 006-281-446-723-150; 025-128-158-130-471; 034-727-329-103-699; 035-678-245-426-093; 046-203-204-496-538; 056-904-002-819-962; 058-321-368-064-89X; 058-719-596-890-210; 062-582-242-509-742; 063-276-821-583-438; 066-704-510-724-333; 070-068-126-253-215; 077-050-505-736-486; 083-783-525-257-592; 084-857-928-116-810; 090-793-800-000-373; 092-076-758-680-053; 101-524-052-142-641; 102-407-753-879-711; 116-067-412-131-887; 125-378-524-744-236; 136-704-056-856-439; 143-853-663-670-428; 150-047-447-112-306; 155-076-779-720-935,4,false,, 017-359-913-089-90X,Music Piracy: Bad for Record Sales but Good for the iPod?,,2015,journal article,Information Economics and Policy,01676245,Elsevier BV,Netherlands,Tin Cheuk Leung,"Abstract Music piracy is a double-edged sword for the music industry. On the one hand, it hurts record sales. On the other hand, it increases sales of its complements. To quantify the effect of music piracy, I construct a unique survey data set and use a Bayesian method to estimate the demand for music and iPods, and find three things. First, music piracy decreases music sales by 24% to 42%. Second, music piracy contributes 12% to iPod sales. Finally, counterfactual experiments show that, if music were free, the increase in Apple’s profits from iPod can more than compensate the loss of musicians. The last result implies that a Pareto improving iPod tax is possible.",31,,1,12,Counterfactual thinking; Advertising; Pareto principle; Business; Marketing; Set (psychology); Music industry; Survey data collection; Music piracy; SWORD; Demand estimation,,,,,https://www.sciencedirect.com/science/article/abs/pii/S0167624515000116 https://econpapers.repec.org/RePEc:eee:iepoli:v:31:y:2015:i:c:p:1-12 http://www.sciencedirect.com/science/article/pii/S0167624515000116 https://dblp.uni-trier.de/db/journals/iepol/iepol31.html#Leung15 https://mpra.ub.uni-muenchen.de/45772/ https://core.ac.uk/download/pdf/12036114.pdf https://core.ac.uk/display/12036114 https://ideas.repec.org/p/pra/mprapa/45772.html,http://dx.doi.org/10.1016/j.infoecopol.2015.04.001,,10.1016/j.infoecopol.2015.04.001,2113512301,,0,001-362-199-882-05X; 004-955-765-542-299; 006-836-720-340-184; 007-199-093-187-201; 011-605-128-488-465; 011-741-501-425-857; 014-135-373-786-445; 015-734-847-641-67X; 023-129-665-288-128; 026-663-230-471-125; 028-583-457-648-098; 030-437-185-681-738; 040-961-261-098-24X; 042-468-452-734-564; 052-774-446-911-198; 056-764-568-668-129; 057-077-569-385-114; 064-303-161-202-296; 077-884-090-484-950; 080-646-680-153-03X; 081-683-472-855-159; 083-131-099-542-994; 084-620-154-173-76X; 087-240-878-476-998; 088-828-651-541-39X; 095-937-634-366-901; 114-685-371-109-418; 116-800-506-398-098; 141-357-001-482-836; 175-510-713-674-379; 179-209-319-984-806,18,true,,green 017-382-482-204-093,IMPACT OF ICT ON LABOR MARKET DEVELOPMENT: MAIN TRENDS AND PROSPECTIVES,,2017,journal article,OPEN EDUCATIONAL E-ENVIRONMENT OF MODERN UNIVERSITY,24140325,Borys Grinchenko Kyiv University,,Liydmyla Ilich; Olena Akilina,"The level of intellectual activity in developed countries gives evidence concerning innovative economy formation and relevant employment model. The similar trends are being observed in Ukraine. Benefitting from the advantages existing and removal of key curbs regarding ICT introduction are of the actual importance in this country. The active participation of the state in gaining the true balance between technologies development and creation of proper conditions for market gears operation as well as favorable regulatory environment formation will favor ICT development in Ukraine. The specificity of innovative economy and their effect on local labor market and employment are considered in the article. Transformation of labor contents and character, gradual transition from functioning to project activity requires shaping a set of new skills peculiar to labor force as well as universal employee formation who is capable to fulfill both production and organizational duties, be engaged in projects and, correspondingly, who possesses creative abilities and thinking a new way while estimating production processes concerning their interdisciplinary and intercultural links. Based on monitoring examination of labor force skills matching to workplaces requirements the following future skills are shaped: design mindset, systems, project, computational, novel and adaptive thinking, transdisciplinarity, cognitive load management, virtual collaboration, inter-sector communication, project management, programming IT solutions, service orientation, multilingual and multicultural abilities, coordinating with others, artistic skills, ability to work under uncertainty. Prospective future jobs which need above-mentioned skills are analyzed. DOI:  https://doi.org/10.28925/2414-0325.2017.3.5568",,3,55,68,Business; Project management; Set (psychology); Service-orientation; Production (economics); Transdisciplinarity; Mindset; Virtual collaboration; Industrial organization; Information and Communications Technology,,,,,https://openedu.kubg.edu.ua/journal/index.php/openedu/article/download/69/99 https://openedu.kubg.edu.ua/journal/index.php/openedu/article/view/69 https://core.ac.uk/download/127440259.pdf,http://dx.doi.org/10.28925/2414-0325.2017.3.5568,,10.28925/2414-0325.2017.3.5568,2808146823,,0,063-561-117-692-73X; 075-432-694-722-411; 133-944-554-397-398; 171-018-886-513-012,2,true,,green 017-426-034-481-806,Software piracy in the U.K.—A review,,1986,journal article,Computer Law & Security Review,02673649,Elsevier BV,United Kingdom,Robert Hay,,2,3,10,12,Software engineering; Engineering; Software,,,,,https://www.sciencedirect.com/science/article/abs/pii/0267364986900452,http://dx.doi.org/10.1016/0267-3649(86)90045-2,,10.1016/0267-3649(86)90045-2,2067133366,,0,,0,false,, 017-477-988-870-001,The use of specialized cybercrime policing units: an organizational analysis,2016-04-02,2016,journal article,Criminal Justice Studies,1478601x; 14786028,Informa UK Limited,United Kingdom,Dale Willits; Jeffrey S. Nowacki,"AbstractGiven the increased focus and importance of cybercrime, some police agencies have turned to the use of specialized cybercrime policing units. Research has yet to examine how frequently these units are used in policing, nor has research examined the types of agencies most likely to use these units. The current research, drawing on contingency theory, institutional theory, and Maguire’s theory of police organizational structure, uses four waves of Law Enforcement Management and Administrative Survey data to provide a descriptive analysis of specialized cybercrime units with a focus on identifying organizational correlates, environmental pressures, and the role of time. Trend data show that cybercrime units have proliferated over time and are on the path to becoming a normative aspect of policing, with about one-half of all state-level agencies and around one-quarter of all county and municipal agencies making use of cybercrime units as of 2013. Regression results indicate that larger agencies, agenc...",29,2,105,124,Business; Institutional theory; Organizational structure; Organizational analysis; Survey data collection; Cybercrime; Law enforcement; Public relations; Descriptive statistics; Contingency theory,,,,,https://opensiuc.lib.siu.edu/cgi/viewcontent.cgi?article=1012&context=ccj_articles https://www.tandfonline.com/doi/full/10.1080/1478601X.2016.1170282 http://opensiuc.lib.siu.edu/cgi/viewcontent.cgi?article=1012&context=ccj_articles https://core.ac.uk/download/60582991.pdf,http://dx.doi.org/10.1080/1478601x.2016.1170282,,10.1080/1478601x.2016.1170282,2339543396,,0,002-933-904-061-277; 004-775-436-573-782; 007-617-364-254-496; 011-176-812-437-709; 012-669-244-843-515; 015-205-982-250-344; 015-271-876-692-523; 015-875-327-892-861; 018-247-342-051-093; 020-067-709-218-691; 023-260-748-842-271; 027-827-119-143-849; 033-850-532-669-695; 034-874-930-930-847; 035-676-125-114-205; 035-848-535-996-317; 036-246-969-220-303; 041-626-151-421-083; 041-953-859-701-484; 045-520-163-026-697; 047-606-440-110-230; 055-630-074-226-662; 060-703-192-035-838; 060-787-095-964-484; 076-793-102-046-131; 077-956-581-024-289; 079-382-458-677-041; 080-041-140-940-268; 080-608-943-134-256; 083-099-894-950-017; 085-479-136-862-592; 091-311-969-296-650; 094-144-997-753-349; 095-964-057-751-44X; 096-818-963-204-473; 096-867-891-629-069; 099-342-173-833-089; 107-426-590-836-244; 107-426-881-608-620; 108-917-118-941-879; 115-482-499-323-938; 119-531-502-608-218; 120-826-009-497-175; 124-573-175-707-169; 134-328-604-977-276; 138-453-249-951-589; 141-351-177-965-834; 147-797-855-285-251; 151-356-987-789-196; 158-981-772-225-48X; 186-924-451-684-428; 197-224-347-766-353,35,true,,green 017-636-967-389-062,Terror Australis - How Maritime,1999-10-30,1999,journal article,QUT Law Review,22017275; 22050507,Queensland University of Technology,,Todd Michler,This paper will examine maritime terrorism and discuss its effects on Australia by an examination of: the growing threat of maritime terrorism;  the characteristics of piracy and whether maritime terrorism fits within the current definition of piracy;the International Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation and its Protocol;  Australia's efforts in this legal arena including the adoption of the Convention and Protocol into domestic law; Australia's efforts to fight terrorism generally and at sea.,15,0,155,178,Political science; Law; Terrorism; Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation; Convention; Municipal law,,,,,https://paperity.org/p/78514744/terror-australis-how-maritime,http://dx.doi.org/10.5204/qutlr.v15i0.480,,10.5204/qutlr.v15i0.480,2192278167,,0,,0,true,cc-by,gold 017-948-600-567-304,Digital Piracy among Young Adults: The Role of Values and Time Perspectives,2021-08-16,2021,journal article,Sustainability,20711050,MDPI AG,Switzerland,Fatih Bayraktar; Łukasz Tomczyk,"The aim of the research is to measure the extent of piracy among young adults and to relate this phenomenon to variables, such as values and time orientation. The research fits into the risk paradigm of cyber research. The research was carried out in Northern Cyprus, a country with a persistently high rate of digital piracy. The research involved 318 young adults (Mean Age: 20.9, SD: 2.47). The research process was conducted through the triangulation of three questionnaires: Piracy Risk Scale, Time Perspective Inventory, and the Values Scale. Based on the data collected, it was noted that piracy is not a rare phenomenon among young people (similar to other e-risks), and it is most common for files related to entertainment to be systematically downloaded. Digital piracy is linked to the level of digital competence, as well as hedonistic and fatalistic attitudes to time and values such as materialism and sense of honour. Despite technological developments maximising the legal circulation of cultural and other digital content, piracy has still not been completely eliminated.",13,16,9140,,Materialism; Psychology; Digital content; Honour; Values scale; Phenomenon; Entertainment; Scale (social sciences); Fatalism; Social psychology,,,,,https://EconPapers.repec.org/RePEc:gam:jsusta:v:13:y:2021:i:16:p:9140-:d:614957 https://www.mdpi.com/2071-1050/13/16/9140/pdf https://www.mdpi.com/2071-1050/13/16/9140,http://dx.doi.org/10.3390/su13169140,,10.3390/su13169140,3194698358,,0,000-756-772-003-763; 002-563-869-942-777; 006-254-468-364-597; 008-464-076-941-912; 018-920-453-578-645; 019-710-569-364-789; 022-750-911-766-092; 023-513-327-867-764; 025-014-715-768-190; 028-999-447-590-450; 037-206-342-629-551; 037-291-535-609-134; 047-556-287-867-217; 050-713-890-821-824; 051-778-365-060-661; 057-222-020-595-999; 058-919-953-064-002; 073-821-834-702-030; 076-917-277-882-942; 077-067-579-569-271; 077-100-966-337-632; 078-571-165-817-30X; 078-813-846-119-688; 082-772-617-694-909; 086-646-048-607-18X; 103-829-233-162-836; 107-599-898-903-04X; 109-316-119-853-662; 110-081-547-413-235; 110-338-619-377-853; 110-613-302-464-936; 116-953-447-460-185; 124-205-497-088-584; 140-730-249-077-646; 144-809-792-813-411; 155-370-259-183-184; 158-515-777-127-012,1,true,cc-by,gold 018-155-192-928-911,The Emergence of Russian Private Military Companies: A New Tool of Clandestine Warfare,2020-01-02,2020,journal article,Special Operations Journal,23296151; 23722657,Informa UK Limited,,Tor Bukkvoll; Åse Gilje Østensen,"In recent years, the Russian private security and military company (PMSC) industry has evolved to serve the needs of both business clients as well as governments. Thus far, the ties between the Kre...",6,1,1,17,Business; Military capability; Hybrid warfare; Private security; Public administration,,,,,https://www.tandfonline.com/doi/full/10.1080/23296151.2020.1740528 https://fhs.brage.unit.no/fhs-xmlui/bitstream/11250/2655711/1/1811576.pdf https://fhs.brage.unit.no/fhs-xmlui/handle/11250/2655711 https://ffi-publikasjoner.archive.knowledgearc.net/handle/20.500.12242/2715 https://core.ac.uk/download/pdf/327082511.pdf,http://dx.doi.org/10.1080/23296151.2020.1740528,,10.1080/23296151.2020.1740528,3010822987,,0,004-938-302-875-447; 082-341-903-426-118; 118-413-834-491-737,6,true,,green 018-581-182-598-228,Options to Combat Maritime Piracy in Southeast Asia,,2002,journal article,Ocean Development & International Law,00908320; 15210642,Informa UK Limited,United Kingdom,John Mo,"Modern maritime piracy has become one of the major threats to safety at sea. How to combat maritime piracy in Southeast Asia effectively is the major concern of this contribution. It is argued that some form of government cooperation involving most of the governments of the Southeast Asian region is the best way to combat maritime piracy, although it is not an easy task due to various political, economical, and historical reasons. A unilateral and expedient arrangement by one or a few governments to combat maritime piracy may be convenient but may also encounter resistance or raise suspicion from other governments.",33,3-4,343,358,Economy; Government; International trade; Political science; Maritime piracy; Southeast asia; Southeast asian; Resistance (psychoanalysis); Politics,,,,,https://www.tandfonline.com/doi/abs/10.1080/00908320290054819,http://dx.doi.org/10.1080/00908320290054819,,10.1080/00908320290054819,2048798780,,0,016-214-460-601-531; 025-299-251-968-777; 129-991-433-699-952; 152-378-433-943-132,25,false,, 018-652-627-895-248,Piracy viewed as serious as tax fraud,,1999,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,1999,2,4,4,Business; Computer security; Internet privacy; Computer science,,,,,,http://dx.doi.org/10.1016/s1361-3723(99)80019-0,,10.1016/s1361-3723(99)80019-0,,,0,,0,false,, 018-656-999-902-160,Piracy,,1932,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),United States,,,26,S1,740,885,Political science,,,,,,http://dx.doi.org/10.2307/2213753,,10.2307/2213753,,,0,,4,false,, 018-775-043-869-249,Preliminary Study on the Legal Issues Associated with Bio-piracy,,2006,journal article,Hebei Law Science,,,,Dong Yue,"The legal issues associated with bio-piracy are one of the subsidiary questions of the problems about intellectual property rights(IPR) concerning biodiversity.The phenomenon of bio-piracy derives from the developmem of modern biotech-nology and the conflicts between the developed countries and the developing countries in the conservation of genetic re-sources,traditional knowledge and equitable benefits apportion.The action of bio-piracy has complicated subjects,objects and forms.It will infringe the sovereign righs of nations,decrease the economic health of indigenous communities,as well as deplete or destroy bio-diversity.",,,,,Developed country; Economics; Sovereignty; Law; Action (philosophy); Intellectual property; Phenomenon; Indigenous; Developing country,,,,,https://en.cnki.com.cn/Article_en/CJFDTOTAL-HBFX200606025.htm,https://en.cnki.com.cn/Article_en/CJFDTOTAL-HBFX200606025.htm,,,2377691802,,0,,0,false,, 018-810-550-090-986,The Impact and Effectiveness of UNCLOS on Counter Piracy Operations,,2015,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Tamsin Phillipa Paige,,,,,,Norm (social); Political science; United Nations Convention on the Law of the Sea; Law; Criminal law; Somali; Enforcement; Prison; International law; Politics,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2553662 https://ssrn.com/abstract=2553662,http://dx.doi.org/10.2139/ssrn.2553662,,10.2139/ssrn.2553662,2222778586,,0,,0,false,, 018-841-901-632-620,"Introduction to ""The Concept of Piracy""",,2011,journal article,"Humanity: An International Journal of Human Rights, Humanitarianism, and Development",21514372,Project Muse,,Daniel Heller-Roazen,,2,1,23,25,Political science,,,,,https://muse.jhu.edu/journals/humanity/v002/2.1.heller-roazen.pdf http://muse.jhu.edu/journals/humanity/summary/v002/2.1.heller-roazen.html,http://dx.doi.org/10.1353/hum.2011.0000,,10.1353/hum.2011.0000,2106919389,,0,027-281-496-884-149; 027-362-859-314-765; 035-939-886-805-088; 109-770-394-013-086; 115-872-600-448-035; 165-575-325-149-18X; 198-759-976-808-584,6,false,, 018-859-327-259-926,Signal Piracy: The Theft of United States Satellite SignalsSATELLITE SIGNALS,,1984,journal article,Fordham International Law Journal,07479395,,,Lori A. Yarvis,"This Note examines the problem of the unauthorized interceptionand transmission of United States programming, specifically concentrating on programming intercepted in the Caribbean Basin and Canada. SIGNAL PIRACY: THE THEFT OF UNITED STATES SATELLITE SIGNALS",8,1,62,,Advertising; Signal; Satellite; Caribbean Basin; Computer science; Transmission (telecommunications); Telecommunications,,,,,https://ir.lawnet.fordham.edu/ilj/vol8/iss1/3/ https://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=1106&context=ilj,https://ir.lawnet.fordham.edu/ilj/vol8/iss1/3/,,,1542133274,,0,,0,false,, 019-273-416-954-339,The Internet as a global public good and the role of governments and multilateral organizations in global internet governance,2018-04-25,2018,journal article,Meridiano 47 - Journal of Global Studies,15181219,Instituto Brasileiro de Relacoes Internacionais,,Mario Rodrigo Canazza,"The Internet presents social and economic attributes of a global public good, requiring governments and multilateral organizations to play central roles in Internet governance. This article examines the Internet as a global public good, identifies the roles of governments and multilateral organizations in global Internet governance, describes the current status of multi-stakeholder governance, and proposes guidelines to improve international cooperation.",19,,,,The Internet; Business; Global public good; Internet governance; Public administration; Corporate governance,,,,,https://periodicos.unb.br/index.php/MED/article/view/8151 http://ojs.bce.unb.br/index.php/MED/article/view/M47e19007/20723 http://ojs.bce.unb.br/index.php/MED/article/download/M47e19007/20723 https://periodicos.unb.br/index.php/MED/article/download/8151/6707 https://core.ac.uk/download/231193318.pdf,http://dx.doi.org/10.20889/m47e19007,,10.20889/m47e19007,2801181833,,0,,6,true,cc-by,gold 019-741-103-750-76X,A Network Effects Perspective on Software Piracy,,2005,journal article,University of Toronto Law Journal,17101174,Project Muse,,Ariel Katz,"The software industry frequently maintains that software piracy is no more than theft and a cause of huge losses. Courts and other policy makers easily adopt that straightforward argument. Surprisingly, however, many software publishers do not employ any technological measures to protect their software from piracy and many popular software products are distributed without any means of protection and are easily pirated. This lack of protection is puzzling; a solution for that puzzle is the focus of the article. The first part of the article challenges the conventional explanations that are usually given for the failure to protect software and offers an alternative explanation. The paper argues that not protecting software is a profitable strategy based on several elements: the first element is cross-sectional price discrimination in which the lower tiers of customers do not pay for their software. In the face of network effects that exist in many software markets, such a strategy achieves the most expeditious and widest dissemination of software, maximizes the value of the network, may accelerate the tipping of the market in favor of the more dominant publisher and later create higher barriers to entry. The article analyzes the advantages of such implicit price discrimination over explicit price discrimination and the advantages from complaining about piracy over preventing it. The second element is dynamic pricing in a multiple-period setting. At a second stage, due to a lock-in phenomenon, software publishers are able to hold-up potential ex-pirates who face a threat of litigation and charge them higher prices. According to the basic copyright paradigm each pirated copy is a net loss for the copyright holder. According to the proposed network theory some level of piracy generates higher revenues from other customers and over time. The second part of the article explores whether and to what extent legal doctrines, particularly in antitrust and copyright law should respond to these counter-paradigmatic circumstances.",55,2,155,216,Price discrimination; Network theory; Business; Revenue; Element (criminal law); Software; Dynamic pricing; Computer security; Argument; Barriers to entry,,,,,https://muse.jhu.edu/article/181520 https://tspace.library.utoronto.ca/handle/1807/89452 https://tspace.library.utoronto.ca/bitstream/1807/89452/1/Katz%20Network%20Effects.pdf,http://dx.doi.org/10.1353/tlj.2005.0007,,10.1353/tlj.2005.0007,3125541929,,0,004-873-323-580-619; 009-440-302-460-958; 009-670-445-036-779; 019-231-919-130-811; 024-303-601-968-471; 026-161-995-943-665; 028-170-832-298-638; 029-804-563-819-607; 033-242-516-311-918; 034-433-988-138-082; 037-851-147-655-705; 038-081-765-313-727; 039-883-767-744-759; 049-229-653-136-129; 049-509-688-494-248; 052-671-409-814-557; 054-061-292-669-660; 054-084-319-020-266; 057-261-182-157-889; 065-676-829-574-312; 066-758-227-434-545; 077-603-957-296-722; 078-663-464-379-133; 079-325-643-649-789; 093-383-318-773-412; 098-271-606-810-850; 112-529-341-785-354; 116-379-806-546-666; 118-675-220-855-858; 126-302-631-002-014; 126-996-752-002-343; 129-612-820-182-74X; 130-237-342-919-607; 133-833-720-216-213; 135-447-629-108-040; 142-027-748-756-377; 153-552-384-031-475; 161-961-079-024-233; 165-444-618-743-051; 188-208-063-267-062; 193-473-684-934-575,22,false,, 020-014-302-914-901,"Rationality, Pirates, and The Law: A Retrospective",,2010,journal article,The American University law review,00031453,,,Peter T. Leeson,"In the late 1720s Caribbean piracy was brought to a screeching halt. An enhanced British naval presence was partly responsible for this. But most important in bringing pirates to their end was a series of early 18thcentury legal changes that made it possible to effectively prosecute them. This short paper’s purpose is to recount those legal changes and document their effectiveness. Its other purpose is to analyze pirates’ response to the legal changes designed to exterminate them, which succeeded, at least partly, in frustrating the government’s goal. By providing a retrospective look at anti-piracy law and pirates’ reactions to that law, my hope is to supply some useful material for thinking about how to use the law to address the contemporary piracy problem.",59,5,2,,Government; Political science; Law; Rationality; Short paper,,,,,https://digitalcommons.wcl.american.edu/cgi/viewcontent.cgi?article=1250&context=aulr https://digitalcommons.wcl.american.edu/aulr/vol59/iss5/2/ https://paperity.org/p/81797399/rationality-pirates-and-the-law-a-retrospective,https://digitalcommons.wcl.american.edu/aulr/vol59/iss5/2/,,,3124577138,,0,,12,false,, 020-151-937-988-905,"Online video sharing: an alternative channel for film distribution? Copyright enforcement, censorship, and Chinese independent cinema",2016-11-13,2016,journal article,Chinese Journal of Communication,17544750; 17544769,Informa UK Limited,United Kingdom,Lin Feng,"Regarding piracy as the crime of stealing copyright holders’ rightful profits, many creative industries, such as the film, music, and gaming industries, are battling for stricter administrative and legal enforcement against copyright infringement. However, there is a counterargument that piracy could benefit copyright holders in the form of free promotion. Given China’s strict censorship of film content, this paper investigates how online piracy complicates the distribution of independent films in China. The advance of cyber technology and high-speed Internet access has not only fueled the spread of online film sharing, but has also encouraged public participation in the debate on the complex relationship between piracy, copyright, and censorship. Taking Jia Zhangke’s A Touch of Sin (2013) as a case study, this paper evaluates the alternative business models for Chinese independent cinema put forward by Chinese netizens.",10,3,279,294,Internet privacy; The Internet; Advertising; Business; Creative industries; Counterargument; Copyright infringement; Enforcement; Business model; Social media; Censorship,,,,,https://hull-repository.worktribe.com/output/444174/online-video-sharing-an-alternative-channel-for-film-distribution-copyright-enforcement-censorship-and-chinese-independent-cinema https://hydra.hull.ac.uk/resources/hull:13933 https://nca.tandfonline.com/doi/full/10.1080/17544750.2016.1247736 https://www.tandfonline.com/doi/full/10.1080/17544750.2016.1247736 https://hull-repository.worktribe.com/preview/842619/2018-05-13%2013933%20Feng.pdf,http://dx.doi.org/10.1080/17544750.2016.1247736,,10.1080/17544750.2016.1247736,2549891271,,0,015-936-531-123-230; 042-196-496-730-905; 094-987-228-041-828; 102-330-690-401-266; 113-943-718-350-714; 157-184-270-897-122; 164-825-396-403-301; 186-912-915-431-237,4,true,cc-by,green 020-174-924-773-106,The ambivalent relation between state and illegal actors: piracy retail in Mexico,2011-02-01,2011,journal article,Etnografica,08736561; 21822891,OpenEdition,Portugal,J.C.G. Aguiar,"In the rise of democratic governments across Latin America, the neoliberal law-and-order perspective has been the most influential model of security in the region. This approach is based on the opposition between state and illegal agents, as if they were two different sets of actors. Influenced by this model, Mexican president Vicente Fox launched an extensive anti-piracy programme to eradicate retail of counterfeit. Based on ethnographic material gathered in the San Juan de Dios market in Guadalajara, I discuss on the exchanges between piracy sellers and police officers. My argument is that law enforcement programmes have not affected the political economy of corruption, they overlook the net of ambiguous loyalties where state and illegal actors are entrenched. The anthropology of the state provides the rationale for a critique on neoliberal security policies.",15,1,109,128,Economy; Political economy; Sociology; Security policy; Latin Americans; Ambivalence; Ethnography; Counterfeit; Law enforcement; Opposition (politics); Democracy,,,,,http://etnografica.revues.org/840?lang=fr https://journals.openedition.org/etnografica/840 https://www.narcis.nl/publication/RecordID/oai%3Ascholarlypublications.universiteitleiden.nl%3Aitem_2864394 https://openaccess.leidenuniv.nl/bitstream/handle/1887/17997/JCGAguiar%20Etnogragica%2015%281%29.pdf?sequence=1 https://journals.openedition.org/etnografica/pdf/840 https://core.ac.uk/display/79341654,http://dx.doi.org/10.4000/etnografica.840,,10.4000/etnografica.840,1920769218,,0,000-517-724-727-822; 000-680-702-138-138; 002-061-314-322-216; 007-631-953-822-675; 012-562-267-270-940; 014-847-177-477-552; 026-107-676-065-837; 036-590-006-528-586; 040-648-259-635-797; 041-676-417-176-624; 048-260-136-923-430; 050-547-040-749-722; 067-063-355-384-410; 072-183-841-093-827; 083-579-655-284-312; 089-429-817-258-462; 093-782-462-388-146; 108-221-197-272-03X; 109-978-192-590-785; 113-997-934-276-591; 119-469-457-779-661; 125-268-617-755-543; 126-828-392-561-762; 127-193-040-997-941; 130-713-637-907-990; 146-656-670-896-712; 150-491-796-155-575; 158-339-163-200-289; 158-717-375-211-620; 181-528-251-613-979; 186-400-925-056-785,5,true,cc-by-nc,gold 020-376-012-302-091,Suppressing maritime piracy in the Gulf of Guinea: the prospects and challenges of the regional players,2016-04-02,2016,journal article,Australian Journal of Maritime & Ocean Affairs,18366503; 23336498,Informa UK Limited,,Samuel Oyewole,"ABSTRACTThe Gulf of Guinea (GoG) has emerged as the new hotspot of piracy and armed robbery against ships. This development is coming after a similar threat is declining off the East coast of Africa, thanks to all the naval powers that intervene in the region. The efforts to suppress piracy in the GoG have been led by regional players and supported by the international community. Nigeria, Ghana, Cameroon, Cote d'Ivoire, Equatorial Guinea, Benin among others have contributed notable efforts to suppress piracy in the GoG. The improvement in naval presence, maritime policing and target harden in the region have increased the number of intercepted, captured and killed pirates as well as foiled attacks, rescued victims and destroyed sanctuaries. Nevertheless, the available security presence remains insufficient to deter every attack, especially as the motivations for piracy persist in the region. This study examines the efforts committed against piracy in the GoG, some of the achievements so far and the challe...",8,2,132,146,Engineering; Economy; Law; International community; Maritime piracy; East coast,,,,,https://www.tandfonline.com/doi/full/10.1080/18366503.2016.1217377,http://dx.doi.org/10.1080/18366503.2016.1217377,,10.1080/18366503.2016.1217377,2509440727,,0,,5,false,, 020-482-566-227-31X,The Laws of War and the Fight against Somali Piracy: Combatants or Criminals?,2010-05-01,2010,journal article,Melbourne Journal of International Law,14448610,,,Douglas Guilfoyle,"Despite its codification in treaty law, the law applicable to the repression of high seas piracy remains a subject of unnecessary confusion and speculation. It is sometimes suggested that because pirates were described by classical authors as hostes humani generis ('enemies of humankind'), or because the United Nations Security Council has authorised the use of 'necessary means' in repressing Somali piracy, that we are at war with pirates. Alternatively, it might be thought that because the current counter-piracy operations in the Gulf of Aden are being conducted by naval forces, the appropriate law governing their actions should be the laws of armed conflict. On the contrary, this commentary confirms the view accepted by all governments involved in counter-piracy operations: that this is a law-enforcement operation to which the laws of armed conflict have no application. This follows from the fact that pirates are not in any relevant legal sense engaged in an armed conflict. Further, it is far from obvious that deeming the laws of armed conflict to be applicable would make the task of navies any easier on the one hand, or provide any greater human rights protection to suspect pirates on the other. There is already a clearly established framework for law-enforcement operations at sea; not only is this the correct law to apply as a matter of doctrine, it is hard to see what advantages would follow from applying the laws of war as a matter of policy.",11,1,141,154,Sociology; International waters; Project commissioning; Human rights; Law; Doctrine; Somali; Suspect; Treaty; Subject (philosophy),,,,,http://discovery.ucl.ac.uk/id/eprint/144268 https://research.monash.edu/en/publications/the-laws-of-war-and-the-fight-against-somali-piracy-combatants-or https://search.informit.com.au/documentSummary;dn=283855665761439;res=IELHSS,http://discovery.ucl.ac.uk/id/eprint/144268,,,1885733716,,0,,15,false,, 020-501-074-199-480,Toward a Framework for Identifying Attitudes and Intentions to Music Acquisition from Legal and Illegal Channels,2017-03-09,2017,journal article,Psychology & Marketing,07426046; 15206793,Wiley,United States,Athina Dilmperi; Tamira King; Charles Dennis,"Technological developments have had a profound effect on modern music acquisition, allowing people to share music over the Internet for free. The research identifies the antecedents of consumers’ attitudes and intentions to acquire music from various channels. The paper reports findings of a structured questionnaire survey of university students in the UK and Greece (n=511). Using structural equation modeling the authors conclude that consumers’ intention to acquire music via a legal channel is influenced by idolatry, the perceived quality of music, the perceived likelihood of punishment (digital legal channel only) and their subjective norm. On the other hand, intention to acquire music via an illegal channel is influenced by the perceived benefits of piracy. The price of legitimate music was only significant for the illegal street vendor channel, whereas idolatry had a positive effect on illegal downloading. Gender had moderating effects on perceived likelihood of punishment and attitude, and income moderated attitude and intention from P2P platforms. The findings carry important implications for academic researchers, practitioners and policy makers.",34,4,428,447,The Internet; Advertising; Communication channel; Psychology; Punishment; Idolatry; Street vendor; Subjective norm; Questionnaire; Structural equation modeling; Social psychology,,,,,https://core.ac.uk/display/81673090 https://eprints.mdx.ac.uk/id/eprint/21046 https://cyberleninka.org/article/n/736679 https://dspace.lib.cranfield.ac.uk/handle/1826/11671 https://onlinelibrary.wiley.com/doi/pdf/10.1002/mar.20998 https://onlinelibrary.wiley.com/doi/full/10.1002/mar.20998,http://dx.doi.org/10.1002/mar.20998,,10.1002/mar.20998,2590419486,,0,001-607-015-154-430; 002-683-149-062-671; 003-376-336-799-667; 004-063-984-775-638; 004-902-541-336-18X; 005-720-717-762-377; 005-724-969-495-744; 006-048-510-216-436; 006-733-359-463-041; 007-311-552-230-481; 007-642-134-708-872; 008-598-170-585-444; 009-299-623-546-736; 009-517-643-095-330; 010-854-534-444-434; 011-057-105-680-492; 012-825-985-377-760; 013-012-434-627-549; 013-589-273-901-40X; 015-924-366-219-440; 016-060-276-577-042; 016-294-061-168-446; 016-364-280-074-117; 018-436-463-315-481; 018-599-086-598-573; 022-255-645-917-135; 025-134-126-369-008; 028-615-356-511-184; 028-999-447-590-450; 029-582-603-166-532; 031-187-002-607-584; 032-653-897-764-354; 033-171-354-077-456; 033-349-220-802-574; 034-697-067-376-78X; 035-475-589-449-037; 035-731-254-786-269; 036-054-692-608-308; 037-732-315-459-227; 037-848-032-791-582; 037-892-893-163-690; 038-370-713-630-748; 038-456-962-870-272; 041-192-826-285-759; 041-326-767-334-557; 043-540-464-630-076; 045-374-340-641-605; 046-989-664-357-368; 047-322-627-659-501; 047-415-077-240-96X; 047-558-065-555-68X; 047-618-802-718-963; 048-888-462-850-445; 048-946-029-179-809; 049-342-202-690-627; 049-655-366-835-746; 051-851-761-421-930; 051-934-747-743-777; 052-597-866-635-72X; 054-205-310-182-865; 054-490-538-255-165; 056-145-168-499-546; 057-776-082-936-28X; 058-919-953-064-002; 060-846-649-342-896; 061-581-726-435-902; 064-017-034-126-916; 064-402-223-988-647; 067-248-156-625-729; 067-946-305-534-344; 069-015-520-696-239; 069-278-029-767-783; 069-989-898-800-777; 070-422-731-431-875; 070-940-436-310-050; 071-009-364-930-61X; 071-535-679-259-648; 071-611-549-496-620; 071-870-990-859-230; 073-578-755-227-676; 073-892-012-917-68X; 074-499-155-635-714; 074-777-270-980-043; 076-543-129-967-510; 078-119-116-381-596; 080-208-184-106-680; 080-646-680-153-03X; 083-896-704-859-063; 084-242-970-014-139; 084-502-083-697-859; 087-818-299-203-950; 089-287-916-336-824; 089-521-026-657-637; 092-824-540-063-205; 094-257-801-373-880; 095-272-616-658-421; 099-167-496-298-409; 102-195-409-691-515; 102-535-558-337-569; 102-766-860-755-890; 103-480-535-142-049; 104-110-461-997-527; 105-967-569-049-835; 109-212-740-749-437; 111-211-469-395-56X; 111-967-642-990-937; 118-354-305-653-457; 118-417-327-583-707; 119-124-789-716-583; 122-931-558-368-39X; 123-617-648-021-921; 124-170-590-601-410; 125-974-578-259-093; 127-629-056-629-021; 134-287-809-759-215; 134-972-901-914-703; 141-441-316-999-866; 146-452-610-115-174; 147-527-130-129-921; 151-176-329-196-198; 151-636-698-883-342; 154-648-408-496-043; 157-550-632-784-553; 158-467-769-571-419; 160-775-961-769-683; 162-270-854-965-370; 164-328-606-470-733; 166-427-606-781-933; 166-958-660-950-681; 178-014-357-940-55X; 189-056-695-069-474,13,true,cc-by,hybrid 020-619-424-111-244,The Law of Piracy: The United States of America and the Law of Piracy,,1988,journal article,International law studies,21546266,,,Alfred P. Rubin,,63,1,4,,Political science; Law,,,,,https://digital-commons.usnwc.edu/ils/vol63/iss1/4/ https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1768&context=ils,https://digital-commons.usnwc.edu/ils/vol63/iss1/4/,,,2949074594,,0,,0,false,, 021-032-982-936-295,Fighting Piracy: Experiences in Southeast Asia and off the Horn of Africa,,2009,journal article,Journal of Strategic Security,19440464; 19440472,University of South Florida Libraries,United States,Robert M. Farley; Yoav Gortzak,"The recent surge in acts of maritime piracy in the waters off the Horn of Africa stands in sharp contrast to a steep decline of such acts in Southeast Asia. In this study, we compare the development of the problem of piracy in both Southeast Asia and the Horn of Africa. We find that four main elements contributed to the recent decline in piracy in Southeast Asia: U.S. hegemonic interests, existing and emergent international institutions, bilateral relations among regional actors, and the density of naval forces in the region. Unfortunately, not all of these conditions are present in the Horn of Africa. Thus, the problem of piracy in that region will require new and innovative solutions. This article is available in Journal of Strategic Security: http://scholarcommons.usf.edu/jss/vol2/iss1/1 1 Fighting Piracy: Experiences in Southeast Asia and off the Horn of Africa Dr. Robert M. Farley, Ph.D. Dr. Yoav Gortzak, Ph.D.",2,1,1,24,Hegemony; Economy; French horn; Political science; Maritime piracy; Southeast asia; Far East,,,,,https://scholarcommons.usf.edu/jss/vol2/iss1/1/ https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=1033&context=jss https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1033&context=jss https://digitalcommons.usf.edu/jss/vol2/iss1/1/ https://doaj.org/article/e032a3be364f4b3480b9a641e3c5df65,http://dx.doi.org/10.5038/1944-0472.2.1.1,,10.5038/1944-0472.2.1.1,2089175701,,0,001-045-255-024-406; 092-071-930-903-245; 129-991-433-699-952,4,true,cc-by-nc,gold 021-216-971-685-378,Modern Piracy and International Law: Definitional Issues with the Law of the Sea,2011-11-02,2011,journal article,Geography Compass,17498198,Wiley,United Kingdom,Elizabeth Nyman,"In recent years, piracy, particularly off the coasts of Southeast Asia and the Horn of Africa, has become a major problem for global shipping and maritime safety. Piracy is an international problem, as it takes place outside state jurisdiction and affects the nationals of many states. Yet international law has proven unable to provide a framework for an effective solution to this problem. This is due in part to two main flaws in the treatment of piracy under the major document in international law, the United Nations Convention on the Law of the Sea. These two problems relate to the definition of the act, limiting piracy to events on the high seas caused for private ends between two ships, and the universal jurisdiction granted over it. The policy and scholarly communities have proposed many emendations of international law to better suit the reality of modern day piracy, but as yet none of these have gained any traction. Piracy continues to grow and alter in response to state actions, and it is too soon to tell whether any of the recent anti-piracy initiatives will have the appropriate effect.",5,11,863,874,International waters; United Nations Convention on the Law of the Sea; Law; Geography; Universal jurisdiction; State (polity); Jurisdiction; Effective solution; Law of the sea; International law,,,,,https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1749-8198.2011.00455.x http://onlinelibrary.wiley.com/doi/10.1111/j.1749-8198.2011.00455.x/abstract,http://dx.doi.org/10.1111/j.1749-8198.2011.00455.x,,10.1111/j.1749-8198.2011.00455.x,1507209214,,0,004-401-699-800-709; 006-904-432-894-985; 018-581-182-598-228; 020-949-098-758-457; 022-158-379-612-19X; 028-700-371-977-851; 030-578-320-467-259; 031-548-508-546-388; 033-148-044-826-540; 036-241-493-364-498; 038-328-019-267-302; 039-234-329-493-662; 039-386-510-787-529; 041-527-371-880-894; 041-960-201-469-952; 042-102-314-716-02X; 056-622-232-895-375; 056-692-423-416-596; 060-650-914-051-762; 065-510-226-479-535; 070-137-001-908-691; 085-561-239-066-938; 095-392-851-855-333; 101-965-654-950-607; 106-619-699-607-570; 114-736-451-862-845; 122-740-834-718-041; 128-929-022-328-889; 129-991-433-699-952; 134-649-453-286-239; 134-988-419-362-548; 136-466-410-293-552; 152-378-433-943-132; 152-812-962-511-182; 153-766-283-045-45X; 158-479-148-555-588; 179-027-036-816-67X; 189-484-813-376-223,4,false,, 021-272-640-153-71X,Use of Force in Self-Defense Against Cyber-Attacks and the Shockwaves in the Legal Community: One more Reason for Holistic Legal Approach to Cyberspace,2013-11-01,2013,journal article,Mediterranean Journal of Social Sciences,20399340; 20392117,Richtmann Publishing,Italy,Metodi Hadji-Janev; Stevan Aleksoski,"Technological advance is a double edge sword. Computer systems that monitor and control industrial infrastructure brings efficiency but at the same time security challenges too. Urged by this complexity some countries have considered to use military force in response to cyber-attacks. Such possibilities have created shockwaves inside the legal community. While some negate the applicability of Ius ad bellum others believe that its principles, standards and norms provide framework for use of force in self-defense. Giving the influence that legal community has in policy making the article offers legal analyses with these regards and use them to provide some incentives for legal alternatives. The overall argument of the article is that division inside the legal community is one more reason for international community to reconsider international legal reforms. These reforms must be based on holistic approach. DOI: 10.5901/mjss.2013.v4n14p115",4,14,115,115,Empirical legal studies; Sociology; Legal profession; Law and economics; Law; Business intelligence; Use of force; International community; Cyberspace; Argument; Legal research,,,,,https://www.richtmann.org/journal/index.php/mjss/article/download/1584/1593 https://www.mcser.org/journal/index.php/mjss/article/view/1584/1593 https://www.richtmann.org/journal/index.php/mjss/article/view/1584 https://connections-qj.org/article/use-force-self-defense-against-cyber-attacks-and-shockwaves-legal-community-one-more-reason https://procon.bg/article/use-force-self-defense-against-cyber-attacks-and-shockwaves-legal-community-one-more-reason https://core.ac.uk/display/35333389 https://www.mcser.org/journal/index.php/mjss/article/download/1584/1593 https://core.ac.uk/download/pdf/228543137.pdf,http://dx.doi.org/10.5901/mjss.2013.v4n14p115,,10.5901/mjss.2013.v4n14p115,2023521182,,0,028-350-042-307-040; 031-194-154-419-027; 118-020-267-105-547,2,true,cc-by-nc,hybrid 021-353-650-117-581,United States v. Yunis,,1989,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),United States,Lynda M. Clarizio,"Defendant Fawaz Yunis, a Lebanese resident and citizen, was charged for his alleged involvement in the 1985 hijacking of a Jordanian civil aircraft in the Middle East. Defendant moved to dismiss the indictment on the ground that, under general principles of international law, the court lacked subject matter and personal jurisdiction over a crime committed by a nonresident alien on foreign soil and that federal law provided no independent basis for such jurisdiction. The United States District Court for the District of Columbia (per Parker, J.) denied the motion to dismiss in part and granted it in part, and held: (1) that those counts of the indictment charging the defendant with violation of section 32(a) of the Destruction of Aircraft Act (18 U.S.C. §32(a) (1986)) (Aircraft Piracy Act) should be dismissed on the ground that this section provided no jurisdiction over aircraft piracy offenses having no connection to U.S. territory; (2) that traditional principles of international law provided sufficient grounds for asserting both subject matter and personal jurisdiction over the other crimes charged; and (3) that the Act for the Prevention and Punishment of the Crime of Hostage Taking (18 U.S.C. §1203 (1986)) (Hostage Taking Act) and section 32(b) of the Aircraft Piracy Act imposed liability for the offenses allegedly committed by the defendant.",83,1,94,99,Political science; Law; Punishment; Federal jurisdiction; Jurisdiction; Federal law; Liability; Personal jurisdiction; Indictment; International law,,,,,https://www.cambridge.org/core/journals/american-journal-of-international-law/article/united-states-v-yunis/1A62C24997990E2F43B5539A691D60E6,http://dx.doi.org/10.2307/2202796,,10.2307/2202796,2322904841,,0,,1,false,, 021-395-191-765-664,Police criminality and neutralization: an empirical study of court cases,,2012,journal article,Police Practice and Research,15614263; 1477271x,Informa UK Limited,United Kingdom,Petter Gottschalk,"The prevalence of police deviance is a much-debated statistic and one that is often rife with problems. Based on 61 convicted police officers in Norway, court cases are analyzed in this paper to identify relationships between imprisonment days for convicted police officers and motive and brutality as determinants of each sentence. While there is a positive correlation found between severity of sentence and the extent of personal motive, there is a negative correlation between severity of sentence and the extent of brutality applied in policing. This is explained by neutralization theory in the paper.",13,6,501,512,Empirical research; Peer review; Psychology; Sentence; Imprisonment; Positive correlation; Negative correlation; Criminology; Social psychology; Statistic; Deviance (sociology),,,,,https://brage.bibsys.no/xmlui/handle/11250/93806 https://core.ac.uk/display/52040295 https://www.tandfonline.com/doi/abs/10.1080/15614263.2012.656412 https://core.ac.uk/download/pdf/52040295.pdf,http://dx.doi.org/10.1080/15614263.2012.656412,,10.1080/15614263.2012.656412,2005331905,,0,009-560-687-465-077; 010-484-899-944-751; 017-675-718-365-07X; 018-562-467-695-263; 022-171-025-839-465; 029-253-343-590-961; 036-827-266-019-326; 046-454-809-105-700; 048-686-424-819-353; 054-523-675-834-313; 064-960-570-899-936; 081-789-425-815-563; 087-401-261-617-089; 089-281-296-531-022; 091-666-780-893-50X; 096-777-103-215-609; 100-475-120-564-949; 104-262-027-058-415; 124-719-673-693-782; 124-749-006-574-592; 130-214-393-255-423; 134-936-898-078-397; 136-616-530-960-808; 142-312-549-761-520; 168-687-228-512-667; 177-867-362-172-696,0,true,,green 022-027-708-413-061,Enforcing IPR through Informal Institutions: The possible role of religion in fighting software piracy,,2011,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Nora El-Bialy; Moamen Gouda,"The existence of formal IPR laws can be considered a prerequisite for having efficient law enforcement but does not imply efficient enforcement in itself. A simple model is constructed to explain the interplay between the IPR law and human behavior within counterfeiting countries. It shows how a politically monitored IPR enforcement strategy is able to alter formal IPR laws or institutions but might not affect informal institutions, or human morals and behavior, to the same extent, hence barely affecting piracy situation. The model shows the essential role of informal institutions and its sanction mechanisms in the enforcement process. The main obstacle of IPR enforcement is that people are still not convinced that IPR violations are unethical. Religion can be considered an informal institution that might support or hinder formal laws issued with regards to IPR and hence influence de facto enforcement of laws,especially in countries with high piracy rate if a high adherence to religion is found. As the Religion-Loyalty Index (RLI) developed by this study shows, Muslim countries have the highest religiosity level among different religions. Consequently, an investigation of how Islamic jurisprudence views IPR piracy is conducted. As Islam generally prohibits IPR piracy, a set of policy recommendations based on new institutional perspective is presented that can effectively help in minimizing IPR piracy in developing countries in general and Muslim ones in specific.",,,,,Political science; Law and economics; Obstacle; Enforcement; Religiosity; Law enforcement; Institution; Islam; Economic system; Developing country; Fiqh,,,,,https://ssrn.com/abstract=1950385 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1950385 http://www.uni-marburg.de/fb02/makro/forschung/magkspapers/20-2011_elbialy.pdf https://www.econstor.eu/bitstream/10419/56572/1/657908711.pdf https://www.econstor.eu/handle/10419/56572 https://www.uni-marburg.de/fb02/makro/forschung/magkspapers/20-2011_elbialy.pdf,http://dx.doi.org/10.2139/ssrn.1950385,,10.2139/ssrn.1950385,1539818634,,0,002-002-118-291-029; 002-355-604-344-572; 004-206-320-722-15X; 005-310-174-757-229; 007-495-994-754-943; 007-793-217-708-817; 008-438-866-157-955; 008-740-362-902-437; 008-753-407-998-974; 009-278-525-292-434; 009-294-953-134-547; 010-956-346-369-374; 012-558-297-950-849; 014-260-065-539-904; 015-214-697-003-912; 015-808-798-057-897; 016-451-815-723-415; 017-168-651-863-296; 018-065-171-223-366; 018-931-969-162-011; 019-382-258-896-833; 021-623-162-821-665; 021-762-370-157-615; 022-274-983-188-91X; 024-898-886-503-891; 026-988-129-934-16X; 027-699-211-993-973; 031-276-973-190-181; 031-753-139-471-861; 034-408-543-858-189; 036-159-702-886-637; 038-277-737-117-109; 039-883-767-744-759; 040-693-530-318-768; 041-849-157-283-572; 041-893-696-570-720; 046-864-792-391-836; 047-138-289-397-034; 047-502-066-511-459; 049-813-154-354-036; 052-141-799-346-788; 053-176-445-484-311; 053-956-378-667-86X; 054-409-767-688-588; 055-496-152-354-64X; 058-453-337-550-945; 059-077-318-219-51X; 061-807-982-886-306; 061-866-141-222-548; 063-239-958-234-906; 066-660-706-410-262; 068-316-203-002-857; 070-290-886-732-275; 072-166-078-734-816; 074-716-472-183-799; 075-313-990-590-351; 075-751-826-326-321; 077-957-815-298-026; 088-653-607-010-282; 095-039-970-732-611; 097-165-496-887-789; 097-637-794-608-082; 099-369-912-903-862; 107-605-926-265-849; 111-566-795-453-908; 111-622-105-510-826; 115-469-182-036-053; 124-032-418-964-871; 125-495-818-933-457; 130-508-245-567-277; 130-871-209-493-190; 132-955-046-473-902; 133-792-324-438-318; 138-520-139-466-352; 144-135-264-427-99X; 145-811-348-738-768; 147-049-277-521-692; 147-454-181-506-681; 150-594-241-601-430; 161-638-612-825-021; 164-822-825-795-451; 167-706-147-274-876; 168-279-307-752-682; 175-096-964-824-81X; 177-108-568-933-73X; 184-292-397-751-03X; 184-436-367-916-905; 191-344-983-602-980,9,true,,green 022-057-205-570-759,A study of the role of seafarers in combating piracy off the coast of Nigeria,2016-10-18,2016,journal article,WMU Journal of Maritime Affairs,1651436x; 16541642,Springer Science and Business Media LLC,Sweden,Kalu Kingsley Anele,"Piracy off the coast of Nigeria portends grave danger to the economic, security, and sociopolitical development of the country. It also threatens both international and regional trade as well as the stability of the West African sub-region. Despite Nigerian government’s attempts to curb piracy caused by poverty, unemployment, including corrupt and weak maritime regulatory and security institutions, attacks by pirates have continued to occur off the country’s coast. Consequent upon the adverse effects of piratical attacks on their day to day activities, seafarers can facilitate the suppression of piracy off the Nigerian coast. This paper uses statistics, provisions of international instruments and domestic legislations, the United Nations Security Council resolutions, soft laws, and opinions of researchers to examine the nature, causes, and effects of piracy on seafarers in Nigeria. The author argues that seafarers are necessary partners to curb piracy off the coast of Nigeria through enforcing maritime security conventions and other related instruments as well as testifying against pirates during trials. In conclusion, this paper contends that acts of piracy adversely affect crew members’ life, health, family, job, and finance thereby providing an overwhelming motivation for seafarers to play a role in suppressing piracy off the Nigerian coast.",16,3,313,349,Engineering; Economy; Government; United Nations Convention on the Law of the Sea; Public international law; Poverty; Unemployment; Maritime security; Law enforcement; Sociopolitical development; Economic growth,,,,Association of the Korea Seafarer’s Union,https://link.springer.com/article/10.1007/s13437-016-0111-y/fulltext.html https://link.springer.com/content/pdf/10.1007%2Fs13437-016-0111-y.pdf https://trid.trb.org/view/1485019 https://link.springer.com/article/10.1007/s13437-016-0111-y,http://dx.doi.org/10.1007/s13437-016-0111-y,,10.1007/s13437-016-0111-y,2536936128,,0,001-378-238-618-881; 009-825-722-818-941; 014-336-635-679-529; 022-225-431-207-544; 024-255-855-325-667; 034-145-462-126-945; 039-036-972-553-110; 039-234-329-493-662; 044-355-623-299-168; 050-092-638-200-71X; 054-583-104-584-239; 055-670-954-031-579; 060-210-031-928-402; 061-337-805-806-447; 062-085-981-231-046; 073-211-567-090-261; 078-184-157-881-926; 080-193-285-377-456; 096-913-088-847-010; 098-740-580-900-821; 100-063-472-876-531; 112-756-060-430-338; 118-972-653-872-494; 123-937-475-029-601; 124-775-716-784-26X; 145-275-781-468-133; 153-087-716-704-584; 154-881-161-335-280; 157-487-464-245-024; 184-935-963-102-55X; 192-424-225-694-253; 196-350-296-966-072,9,false,, 022-102-303-721-469,Continued U.S. Efforts to Combat Somali Piracy,,2011,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),,,,105,1,131,135,,,,,,,http://dx.doi.org/10.1017/s0002930000761471,,10.1017/s0002930000761471,,,0,,0,false,, 022-136-181-248-807,Piracy in Canada: bad faith and poor conduct can have a large impact on damages,2014-02-20,2014,journal article,Journal of Intellectual Property Law & Practice,17471532; 17471540,Oxford University Press (OUP),,Melanie Hayes,,9,4,271,272,Business; Law; Bad faith; Damages,,,,,https://academic.oup.com/jiplp/article-abstract/9/4/271/842457/,http://dx.doi.org/10.1093/jiplp/jpu017,,10.1093/jiplp/jpu017,2019286740,,0,,0,false,, 022-172-714-243-821,Privacy as Invisibility: Pervasive Surveillance and the Privatization of Peer-to-Peer Systems,2011-06-14,2011,journal article,"tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society",1726670x,Information Society Research,Austria,Francesca Musiani,"Normal 0 21 false false false DE X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:""Normale Tabelle""; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""""; mso-padding-alt:0cm 5.4pt 0cm 5.4pt; mso-para-margin:0cm; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:""Cambria"",""serif""; mso-ascii-font-family:Cambria; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:""Times New Roman""; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Cambria; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:""Times New Roman""; mso-bidi-theme-font:minor-bidi;} This article addresses the ongoing, increasing privatization of peer-to-peer (P2P) file sharing systems – the emergence of systems that users may only join by personal, friend-to-friend invitation. It argues that, within P2P systems, privacy is increasingly coinciding with “mere” invisibility vis-a-vis the rest of the Internet ecosystem because of a trend that has shaped the recent history of P2P technology: The alternation between forms of pervasive surveillance of such systems, and reactions by developers and users to such restrictive measures. Yet, it also suggests that the richness of today’s landscape of P2P technology development and use, mainly in the field of Internet-based services, opens up new dimensions to the conceptualization of privacy, and may give room to a more articulate definition of the concept as related to P2P technology; one that includes not only the need of protection from external attacks, and the temporary outcomes of the competition between surveillance and counter-surveillance measures, but also issues such as user empowerment through better control over personal information, reconfiguration of data management practices, and removal of intermediaries in sharing and communication activities.",9,2,126,140,Internet privacy; The Internet; Intermediary; Personally identifiable information; Political science; Empowerment; Serif; Public relations; Invisibility; File sharing; Conceptualization,,,,,http://www.csi.mines-paristech.fr/working-papers/DLWP.php?wp=WP_CSI_021.pdf https://www.triple-c.at/index.php/tripleC/article/viewFile/248/232 https://halshs.archives-ouvertes.fr/halshs-00563789/document http://www.csi.mines-paristech.fr/working-papers/WP/WP_CSI_021.pdf https://www.triple-c.at/index.php/tripleC/article/view/248 https://www.triple-c.at/index.php/tripleC/article/download/248/232 https://halshs.archives-ouvertes.fr/halshs-00563789,http://dx.doi.org/10.31269/triplec.v9i2.248,,10.31269/triplec.v9i2.248,2123005940,,0,007-107-505-342-036; 007-337-424-866-990; 014-109-694-163-952; 033-118-026-418-343; 034-012-610-082-173; 040-050-765-801-00X; 041-377-382-775-618; 047-216-839-137-503; 058-542-042-895-756; 061-331-823-736-254; 067-939-017-180-021; 071-683-456-010-233; 075-508-035-314-033; 078-373-232-712-683; 079-016-424-000-876; 082-852-876-905-707; 083-237-491-234-801; 085-328-752-716-187; 094-499-434-312-841; 103-116-999-145-36X; 115-367-072-601-632; 116-189-129-335-978; 117-468-887-313-338; 119-364-958-639-519; 122-532-516-654-883; 131-359-540-735-413; 139-001-328-483-671; 156-496-093-753-270; 163-531-041-290-678; 171-488-084-821-220; 171-716-781-313-004; 173-324-396-168-39X; 174-697-336-201-192; 177-988-917-986-054; 178-406-050-581-727,10,true,cc-by-nc-nd,gold 022-327-674-979-183,Is Piracy Illegal,,1976,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),United States,Alfred P. Rubin,,70,1,92,95,Political science,,,,,https://www.cambridge.org/core/journals/american-journal-of-international-law/article/is-piracy-illegal/800AD04A231E29ACBFA5EBECC665B631,http://dx.doi.org/10.1017/s0002930000142605,,10.1017/s0002930000142605,2947513958,,0,,4,false,, 022-432-981-174-89X,A Study on the Legal Liabilities and Countermeasures against Piracy,2005-02-01,2005,journal article,Journal of Korean navigation and port research,15985725,Korean Institute of Navigation and Port Research,,Sukyoon Choi; Yuncheol Lee; Sung-Hwa Hong; Jeong-Ki Park,"Piracy is the enemy of the human race. Pirates commit acts of murder, robbery, plunder or other villainous deeds at sea, cruelly against humanity. The Republic of Korea(ROK), as a big maritime country, is obliged to suppress piracy under international treaties it ratified, including the UN Convention on the Law of the Sea and the two 1988 Conventions against maritime terrorism The Korean government is recently taking a positive attitude towards the regional cooperation which is necessary for the suppression of piracy in the waters of Southeast Asia In spite of the effects of international cooperation to prevent piracy, it is recently on an increasing trend every year. Such circumstances may have a bad effect on the sound development of world economy by means of trade at sea as well as treat to the safety of crews and safe operation of ships. This paper aims to suggest the countermeasures against piracy in terms of criminal law, civil law and international law in order to secure safe operation of vessels at sea.",29,1,43,58,Advertising; Commit; International trade; Political science; United Nations Convention on the Law of the Sea; Civil law (legal system); Criminal law; Terrorism; World economy; Law of the sea; International law,,,,,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=GHMHD9_2005_v29n1s97_43,http://dx.doi.org/10.5394/kinpr.2005.29.1.043,,10.5394/kinpr.2005.29.1.043,812952027,,0,,5,true,,bronze 022-705-235-825-575,"Internet ""Piracy"" and Fair Personal Use",2022-07-02,2022,journal article,Cybersecurity and Law,26581493,War Studies University,,Monika Nowikowska,,7,1,248,260,Internet privacy; The Internet; Business; Computer security; Advertising; Computer science; World Wide Web,,,,,,http://dx.doi.org/10.35467/cal/151831,,10.35467/cal/151831,,,0,122-301-746-475-022,0,true,,bronze 022-721-632-624-822,Taiwan's piracy fight continues,,1996,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,1996,6,4,4,Computer security; Business; Internet privacy; International trade; Political science; Computer science,,,,,,http://dx.doi.org/10.1016/s1361-3723(96)90276-6,,10.1016/s1361-3723(96)90276-6,,,0,,0,false,, 023-186-843-059-733,Polish agency created to prevent piracy,,1995,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1995,5,5,5,Agency (philosophy); Business; Computer security; Internet privacy; Computer science; Sociology; Social science,,,,,,http://dx.doi.org/10.1016/0142-0496(95)80165-0,,10.1016/0142-0496(95)80165-0,,,0,,0,false,, 023-382-497-153-337,A Network Effects Perspective on Software Piracy,,2003,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Ariel Katz,,,,,,Price discrimination; Software asset management; Business; Revenue; Law; Element (criminal law); Software; Dynamic pricing; Monopoly; Computer security; Barriers to entry,,,,,https://www.ssrn.com/abstract=386141 https://autopapers.ssrn.com/sol3/papers.cfm?abstract_id=386141 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=386141 https://papers.ssrn.com/sol3/Delivery.cfm?abstractid=386141,http://dx.doi.org/10.2139/ssrn.386141,,10.2139/ssrn.386141,2070877849,,0,140-836-654-182-12X,4,false,, 023-436-453-273-40X,Worldwide loss of over $13 billion to piracy,,1997,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,1997,2,3,3,Business; Computer security; Internet privacy; Computer science,,,,,,http://dx.doi.org/10.1016/s1361-3723(97)85237-2,,10.1016/s1361-3723(97)85237-2,,,0,,0,false,, 023-827-874-348-084,EU Criminal Law and the Regulation of Information and Communication Technology,2015-07-07,2015,journal article,Bergen Journal of Criminal Law & Criminal Justice,18944183,Universtity of Bergen Library,,Sarah Summers,"The opportunities afforded by the global information space give rise to the potential for the commission of new crimes –crimes such as hacking or denial of service attacks– and for existing crimes, such as speech offences or fraud, to be committed in new ways and with potentially larger consequences. One of the biggest challenges for the regulation of information and communications technology is that the global information space does not respect national boundaries. In order to be successful, any regulatory approach will call for some degree of cooperation between countries. This poses an obvious problem for those seeking to develop a regulatory structure. This challenge is particularly relevant in the criminal law context, as the criminal law has traditionally been considered to be the product and responsibility of national law. This article considers the EU’s regulatory approach in this area. The aim here is not to offer a critique of the EU’s regulatory structure in the context of cybercrime, but rather to use the situation in the EU to illustrate various issues arising in the context of the criminal law regulation of information and communications technology. This article examines some of the issues which have arisen in the context of the regulation of cyber activity at the EU level as a result of this tension between national sovereignty and broader overarching EU regulation and assesses the relevance of these issues in the context of criminal law regulation more broadly. Consideration of the processes of criminalisation and harmonisation provides the basis for an analysis of the manner in which the EU seeks to justify its involvement in criminal law in this field.",3,1,48,60,Relevance (law); Political science; Public law; Sovereignty; Law and economics; Law; Criminal law; Commission; Cybercrime; Context (language use); Information and Communications Technology,,,,,https://www.zora.uzh.ch/id/eprint/118569/ https://boap.uib.no/index.php/BJCLCJ/article/view/827 https://www.zora.uzh.ch/id/eprint/118569/1/document.pdf https://boap.uib.no/index.php/BJCLCJ/article/download/827/775 https://core.ac.uk/display/33635492 https://core.ac.uk/download/230570811.pdf,http://dx.doi.org/10.15845/bjclcj.v3i1.827,,10.15845/bjclcj.v3i1.827,1915338952,,0,,1,true,cc-by,gold 023-925-299-862-843,Where do beliefs about music piracy come from and how are they shared,,,journal article,International Journal of Cyber Criminology,09742891,K. Jaishankar,India,Steven Caldwell Brown,"Research suggests that those individuals engaging in music piracy have little concern for the potentially negative consequences of engaging in this illegal activity. This study aims to build on previous research which finds that sub-cultural piracy knowledge is effectively transmitted online. Explicitly, this study aims to observe the various justifications people forward to rationalise engagement in music piracy, in accordance with Sykes and Matza’s (1957) widely researched neutralization theory, and if techniques used to rationalize behaviours are shared amongst those individuals found to be discussing and engaging in music piracy online. The research examines naturally occurring discourse across three online settings, finding a widespread perception that there is ‘no harm done’ and that tips to work around web-blocking are exchanged online, including in public spaces such as Twitter. However, differences were found in the beliefs and attitudes of the sample. The study raises key conceptual issues about the theory used.",10,1,21,39,Internet privacy; Sociology; Ethnography; Qualitative research; Law; Morality; Key (music); Perception; Harm; Music piracy; Social media,,,,,https://pure.strath.ac.uk/portal/en/publications/where-do-beliefs-about-music-piracy-come-from-and-how-are-they-shared(001aa5f0-313e-4835-9760-77e36d23084b)/export.html https://www.research.ed.ac.uk/portal/en/publications/where-do-beliefs-about-music-piracy-come-from-and-how-are-they-shared(97b836d8-4e39-4077-9f51-6bfa5902e730).html https://pureportal.strath.ac.uk/en/publications/where-do-beliefs-about-music-piracy-come-from-and-how-are-they-sh https://zenodo.org/record/58518 https://strathprints.strath.ac.uk/60164/ https://core.ac.uk/download/80688186.pdf,http://dx.doi.org/10.5281/zenodo.58518,,10.5281/zenodo.58518,2606656449,,0,,3,true,cc-by-nc-sa,gold 024-068-702-245-97X,Analogical reasoning in uncovering the meaning of digital-technology terms: the case of backdoor,2020-05-26,2020,journal article,Journal of Computer-Assisted Linguistic Research,25309455,Universitat Politecnica de Valencia,,Inna V. Skrynnikova,"The paper substantiates the critical role of analogical reasoning and figurative languge in resolving the ambiguity of cybersecurity terms in various expert communities. Dwelling on the divergent interpretations of a backdoor, it uncovers the potential of metaphor to serve both as an interpretative mechanism and as a framing tool in the ongoing digital technologies discourse. By combining methods of corpus research and frame semantics analysis the study examines the challenges of unpacking the meaning of the contested concept of the backdoor. The paper proposes a qualitatively new metaphor-facilitated mode of interpreting cybersecurity vulnerabilities based on MetaNet deep semantic metaphor analysis and outlines the merits of this hierarchically organized metaphor and frames ontology. The utility of the method is demonstrated through analyzing corpus data and top-down extracting of metaphors (linguistic metaphor – conceptual metaphor – entailed metaphor – inferences) with subsequent identifying of metaphor families dominating the cybersecurity discourse. The paper further claims that the predominant metaphors prompt certain decisions and solutions affecting information security policies.",4,1,23,46,Frame semantics; Framing (social sciences); Cognitive science; Conceptual metaphor; Unpacking; Metaphor; Ambiguity; Backdoor; Computer science; Literal and figurative language,,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=7419257 https://www.scilit.net/article/1bee233298e09ccba9cce1209bf823c7 https://riunet.upv.es/handle/10251/144775 https://polipapers.upv.es/index.php/jclr/article/download/12921/12572 https://polipapers.upv.es/index.php/jclr/article/view/12921 https://riunet.upv.es/bitstream/10251/144775/1/Skrynnikova%20-%20Analogical%20reasoning%20in%20uncovering%20the%20meaning%20of%20digital-technology%20terms%3a%20the%20cas....pdf,http://dx.doi.org/10.4995/jclr.2020.12921,,10.4995/jclr.2020.12921,3029244836,,0,000-174-526-206-899; 001-352-499-988-850; 002-871-907-999-446; 002-986-334-579-291; 004-011-537-584-616; 005-351-810-724-884; 011-881-218-053-044; 014-840-970-366-856; 025-827-757-085-337; 027-184-231-935-145; 031-180-418-956-874; 032-635-021-569-58X; 036-018-967-090-600; 038-556-814-762-809; 039-082-426-957-844; 042-361-181-199-984; 051-097-981-433-448; 055-081-881-513-909; 061-162-207-009-18X; 062-469-104-177-124; 067-678-680-194-267; 067-860-828-920-087; 072-553-666-883-885; 079-836-024-075-880; 090-424-094-108-622; 095-716-537-377-327; 095-823-584-678-425; 102-011-958-028-856; 115-507-352-178-375; 134-757-781-242-25X; 140-826-053-059-872; 147-741-796-372-503; 164-928-428-441-073; 167-013-008-456-15X; 175-781-797-737-377; 188-048-713-722-101; 191-187-512-380-182,0,true,cc-by-nc-nd,gold 024-163-945-465-358,You’ve got mail! : Explaining individual differences in becoming a phishing target,,2018,journal article,Telematics and Informatics,07365853,Elsevier BV,Netherlands,Lies De Kimpe; Michel Walrave; Wim Hardyns; Lieven Pauwels; Koen Ponnet,"Abstract Although phishing is a form of cybercrime that internet users get confronted with rather frequently, many people still get deceived by these practices. Since receiving phishing e-mails is an important prerequisite of victimization, this study focusses on becoming a phishing target. More precisely, we use an integrative lifestyle exposure model to study the effects of risky online routine activities that make a target more likely to come across a motivated offender. Insights of the lifestyle exposure model are combined with propensity theories in order to determine which role impulsivity plays in phishing targeting. To achieve these objectives, data collected in 2016 from a representative sample (n = 723) were used. Support was found for a relationship between both online purchasing behavior and digital copying behavior, and phishing targeting. Moreover, a relationship was found between all online activities (except for online purchasing behavior) and impulsivity. The present study thus suggests that especially online shoppers and users who often share and use copied files online should be trained to deal with phishing attacks appropriately.",35,5,1277,1287,Internet privacy; Psychology; Order (business); Purchasing; Copying; Cybercrime; Impulsivity; General theory; Internet users; Phishing,,,,,https://core.ac.uk/display/153397267 https://www.sciencedirect.com/science/article/abs/pii/S0736585317304677 https://biblio.ugent.be/publication/8554543 https://lib.ugent.be/en/catalog/pug01:8554543 https://dblp.uni-trier.de/db/journals/tele/tele35.html#KimpeWHPP18 https://core.ac.uk/download/153397267.pdf,http://dx.doi.org/10.1016/j.tele.2018.02.009,,10.1016/j.tele.2018.02.009,2790461029,,0,002-121-925-610-614; 003-909-772-546-841; 004-776-253-992-305; 005-225-407-305-64X; 007-976-383-596-023; 008-402-830-311-813; 008-550-441-677-808; 009-412-044-967-909; 010-407-303-592-62X; 014-916-135-954-265; 017-468-237-237-26X; 020-774-959-748-807; 022-652-309-016-222; 023-567-826-632-226; 026-571-082-081-492; 026-885-227-345-447; 027-300-158-772-006; 037-710-506-349-517; 038-015-941-472-829; 038-831-629-110-167; 039-185-840-137-966; 042-184-037-017-707; 044-852-049-886-065; 045-498-678-340-046; 047-160-523-950-995; 047-560-815-684-361; 049-283-568-695-986; 055-447-895-146-728; 056-141-152-107-650; 058-809-468-935-356; 060-178-329-301-103; 060-742-202-586-652; 067-339-005-241-596; 068-888-002-303-26X; 070-260-541-874-588; 073-000-628-100-735; 074-233-198-758-572; 075-922-978-286-190; 085-606-440-229-889; 091-086-164-432-59X; 094-977-562-673-004; 095-847-724-219-471; 096-401-039-718-213; 097-184-334-194-457; 100-843-284-057-448; 101-573-495-546-750; 103-176-415-263-747; 103-500-317-581-268; 104-925-931-575-132; 105-299-108-113-370; 107-071-780-136-281; 109-343-665-740-546; 110-753-234-350-412; 113-383-990-551-643; 116-760-844-878-63X; 116-953-447-460-185; 124-258-123-656-574; 124-294-731-704-857; 124-593-190-550-807; 125-221-796-065-258; 138-778-000-753-830; 151-136-123-941-803; 154-247-701-466-495; 163-652-640-754-463; 166-146-478-475-841; 172-548-937-366-759; 176-761-560-307-799; 191-335-059-787-356,13,true,,green 024-485-269-559-560,Digital piracy debunked: a short note on digital threats and intermediary liability,2016-03-23,2016,journal article,Internet Policy Review,21976775,"Internet Policy Review, Alexander von Humboldt Institute for Internet and Society",,Giancarlo Frosio,"In the last two decades, the industry has deployed endlessly the rhetoric of the ""digital threat"" in order to demand harsher measures against digital piracy. Recently, the ""digital threat"" discourse called for enhanced liability of online intermediaries, especially those whose platforms may be used to infringe copyright. This short paper shows that the ""digital threat"" discourse is based on shaky grounds. Two related arguments might run against this approach. First, market conditions might incentivise piracy. Additionally, there are raising doubts over the argument that piracy is a threat to creativity, especially in the digital environment. Overall, it may be hard to find a factual justification for policy decisions based on the ""digital threat"" discourse. In fact, digital technology seems not to have negatively affected the creation of new works. In contrast, an observation of the literature and quantitative analysis on point may suggest that digital piracy can be an opportunity for the cultural market. Finally, piracy may function as an innovation policy by forcing market players to innovate in response to a consumer demand that widespread piracy highlights.",5,1,1,22,Creativity; The Internet; Rhetoric; Intermediary; Business; Order (exchange); Law and economics; Liability; Argument; Function (engineering),,,,,https://paperity.org/p/243337561/digital-piracy-debunked-a-short-note-on-digital-threats-and-intermediary-liability https://doaj.org/article/8a884c5ced964445969cb5f35438f0d3 https://ideas.repec.org/a/zbw/iprjir/214005.html https://policyreview.info/articles/analysis/digital-piracy-debunked-short-note-digital-threats-and-intermediary-liability https://cyberlaw.stanford.edu/files/publication/files/Internet%20Policy%20Review%20-%20Digital%20piracy%20debunked-%20a%20short%20note%20on%20digital%20threats%20and%20intermediary%20liability%20-%202016-03-23.pdf https://policyreview.info/node/400/pdf,http://dx.doi.org/10.14763/2016.1.400,,10.14763/2016.1.400,3123785033,,0,007-199-093-187-201; 015-640-768-071-536; 020-573-882-057-133; 021-573-062-057-783; 024-717-364-439-719; 031-043-470-440-292; 035-663-245-434-171; 041-728-035-798-366; 059-760-772-118-248; 076-438-835-821-389; 084-168-892-003-465; 088-828-651-541-39X; 089-635-107-046-091; 093-754-034-260-092; 094-123-199-550-587; 095-937-634-366-901; 098-630-988-605-917; 101-473-724-013-58X; 107-546-283-366-445; 108-127-445-284-355; 114-451-206-749-321; 118-023-387-631-772; 129-725-943-284-966; 140-309-345-925-749; 149-460-350-979-812; 162-776-914-976-054; 191-962-862-454-799,8,true,cc-by,gold 024-488-908-349-492,From Aiding Pirates to Aiding Human Rights Abusers: Translating the Eighteenth-Century Paradigm of the Law of Nations for the Alien Tort Statute,,2009,journal article,Yale Human Rights and Development Journal,,,,Martha Lovejoy,"The Alien Tort Statute [ATS], alternately hailed as a potent weapon for human rights and a threat to developing nations and American corporate interests alike, was secured a second act by the Supreme Court's 2004 decision in Sosa v. Alvarez-Machain. The Sosa decision confirmed the ATS as actionable, but restricted its application to offenses comparable to the features of the eighteenth-century paradigms, offenses against ambassadors, violations of safe conduct and piracy, that Congress had in mind when it enacted the ATS. Whether aiding and abetting liability is available under the ATS remains a live issue. This Note analyzes Sosa's historical paradigm, examining whether aiding and abetting liability was available for the archetypical violation of the law of nations: piracy. It concludes that aiding and abetting liability for piracy was available and common in English and American law from the sixteenth century to the eighteenth century. The Note outlines the theories of aiding and abetting piracy and applies those theories to contemporary human rights problems. This Note is in draft form and is forthcoming in the Yale Human Rights and Development Law Journal, 2009. Please consult with the Yale Human Rights & Development Law Journal for the final version.",12,1,6,,Human rights; Political science; Law; Liability; Supreme court; Aiding and abetting; Alien Tort Statute; Final version; Developing country,,,,,https://paperity.org/p/83197301/from-aiding-pirates-to-aiding-human-rights-abusers-translating-the-eighteenth-century https://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=1083&context=yhrdlj https://digitalcommons.law.yale.edu/yhrdlj/vol12/iss1/6/,https://paperity.org/p/83197301/from-aiding-pirates-to-aiding-human-rights-abusers-translating-the-eighteenth-century,,,3121724475,,0,,0,false,, 024-515-815-913-577,"Got a band-aid? Political discourse, militarized responses, and the Somalia pirate",,2011,journal article,Contemporary Justice Review,10282580; 14772248,Informa UK Limited,United Kingdom,Dawn L. Rothe; Victoria E. Collins,"Piracy is far from a new phenomenon (with records of piracy dating back to the 1600s), yet over the course of the past decade, it has become a focus of the international political community. Drawing from Foucault and Gramsci, we suggest that the ‘problem’ of piracy today, in particular off the coast of Somalia, is framed in a discourse to reify and support a broader ‘regime of truth’ embedded in global state-corporate economic interests. We further suggest that equating the Somalia piracy to terrorism and as a global threat to peace and maritime security serves as the political discourse designed to legitimate militarized policy responses rather than addressing the underlying conditions in Somalia that are facilitating the instances of piracy. While piracy was once a state-organized crime committed for the purposes of capital accumulation, the current framing and overly militarized responses are based on protecting states’ capital interests rather than addressing the root of the problem at hand, inadverte...",14,3,329,343,Political economy; Sociology; Framing (social sciences); Terrorism; Maritime security; Political community; Phenomenon; Criminology; Capital accumulation; Politics,,,,,https://www.tandfonline.com/doi/citedby/10.1080/10282580.2011.589669 https://www.tandfonline.com/doi/full/10.1080/10282580.2011.589669,http://dx.doi.org/10.1080/10282580.2011.589669,,10.1080/10282580.2011.589669,2033902381,,0,000-082-705-145-448; 001-047-067-837-687; 001-758-759-169-705; 021-205-207-256-208; 031-692-489-219-088; 032-154-017-464-382; 056-212-693-100-641; 057-302-022-749-752; 086-858-245-697-596; 093-173-205-682-607; 111-336-697-220-541; 117-454-642-577-32X; 122-740-834-718-041; 122-810-508-693-513; 138-454-032-573-18X; 143-020-235-423-90X; 163-516-395-136-162; 192-055-249-317-849; 198-119-701-516-106,16,false,, 024-539-327-776-880,Digital Forensics to Intelligent Forensics,2014-09-12,2014,journal article,Future Internet,19995903,MDPI AG,Switzerland,Alastair Irons; Harjinder Singh Lallie,"In this paper we posit that current investigative techniques—particularly as deployed by law enforcement, are becoming unsuitable for most types of crime investigation. The growth in cybercrime and the complexities of the types of the cybercrime coupled with the limitations in time and resources, both computational and human, in addressing cybercrime put an increasing strain on the ability of digital investigators to apply the processes of digital forensics and digital investigations to obtain timely results. In order to combat the problems, there is a need to enhance the use of the resources available and move beyond the capabilities and constraints of the forensic tools that are in current use. We argue that more intelligent techniques are necessary and should be used proactively. The paper makes the case for the need for such tools and techniques, and investigates and discusses the opportunities afforded by applying principles and procedures of artificial intelligence to digital forensics intelligence and to intelligent forensics and suggests that by applying new techniques to digital investigations there is the opportunity to address the challenges of the larger and more complex domains in which cybercrimes are taking place.",6,3,584,596,Social network analysis; Cybercrime; Law enforcement; Crime investigation; Computer security; Computer science; Network forensics; Computer forensics; Digital forensics,,,,,https://www.mdpi.com/1999-5903/6/3/584/pdf https://doaj.org/article/77741ce91be44f9b94623b123f0d552f https://dblp.uni-trier.de/db/journals/fi/fi6.html#IronsL14 https://www.mdpi.com/1999-5903/6/3/584 http://sure.sunderland.ac.uk/9495/ https://doi.org/10.3390/fi6030584 https://core.ac.uk/display/25688666 https://core.ac.uk/download/157851532.pdf,http://dx.doi.org/10.3390/fi6030584,,10.3390/fi6030584,2102414025,,0,005-471-570-182-209; 009-168-289-731-644; 010-951-806-548-929; 013-853-253-052-99X; 018-245-873-246-94X; 021-850-998-857-676; 026-582-043-902-677; 034-773-286-616-44X; 035-380-397-316-182; 048-209-571-753-372; 049-122-467-585-49X; 050-513-243-638-138; 059-002-926-336-692; 066-042-782-732-898; 072-297-921-376-769; 073-847-291-567-156; 077-532-025-251-756; 078-144-022-647-386; 091-619-263-117-914; 114-621-082-012-238; 185-786-528-318-049,36,true,cc-by,gold 024-706-259-486-667,Piracy is rising,,2002,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,2002,7,2,2,Computer science; Business; Computer security,,,,,,http://dx.doi.org/10.1016/s1361-3723(02)00703-0,,10.1016/s1361-3723(02)00703-0,,,0,,1,false,, 024-791-058-241-507,"Vom Out-Law zum In-Law: Piraterie, Recht und Familie in Pirates of the Caribbean",2011-11-01,2011,journal article,Behemoth : a Journal on Civilisation,18662447,,,Irmtraud Hnilica,"In order to analyse the relationship between piracy, law and family, the article takes a look at the popular Pirates of the Caribbean films. Hollywood turns out to link piracy with family; instead of forming the usually assumed contrast, both are closely intertwined entities. The film series can therefore be seen as an unorthodox revision of the pirate’s common juridical classification as the anti-social hostis humani generis. It becomes apparent that, surprisingly, family sometimes may develop from piracy.",4,3,79,94,Political science; Law; Hostis humani generis; Hollywood,,,,,https://ojs.ub.uni-freiburg.de/behemoth/article/download/661/596 https://ojs.ub.uni-freiburg.de/behemoth/article/view/661,https://ojs.ub.uni-freiburg.de/behemoth/article/view/661,,,1951851483,,0,,1,true,cc-by-nc-nd,gold 025-240-727-934-251,"The digital copyright time bomb in the BRIC economies, some ideas from the UK for the Indian market",2012-07-06,2012,journal article,International Journal of Law and Management,1754243x; 17542448,Emerald,United Kingdom,Mark Wing,"Purpose – The purpose of this work is to provide an overview of the current debate over copyright piracy and its control in Western countries, especially the use of graduated response laws in countries like the UK, and provide some thoughts and lessons on better responses that may be adopted in countries like India where evidence suggests the market in broadband access is rapidly developing, with associated piracy implications.Design/methodology/approach – The work provides an overview of the current legal issues surrounding copyright piracy, and the most recent response of graduated response laws, together with the flaws in such responses. The author suggests through a coordinated strategy comprising four elements which will increase the success of on‐line businesses involving copyright works (particularly film and music) in attracting people who may traditionally turn to piracy.Findings – Substantial losses as high as 40 per cent of revenues are reported by some copyright industries due to on‐line pirac...",54,4,302,310,The Internet; Economy; Economics; Work (electrical); Revenue; Control (management); Graduated response; BRIC,,,,,https://www.emeraldinsight.com/doi/abs/10.1108/17542431211245332,http://dx.doi.org/10.1108/17542431211245332,,10.1108/17542431211245332,1987190729,,0,102-875-390-614-489; 127-254-760-129-567,1,false,, 025-299-251-968-777,Foreign Naval Intervention in Cases of Piracy: Problems and Strategies,,1999,journal article,The International Journal of Marine and Coastal Law,09273522; 15718085,Brill,Netherlands,Samuel Pyeatt Menefee,"This article considers the problem of contemporary piracy in the 1990s and the use of foreign naval forces against pirates on the high seas and in coastal waters. An analysis of legal considerations suggest that the LOS Convention on the Law of the Sea makes such intervention less likely; this study also highlights potential factors militating for and against such interference. The possibilities of modifying or amending the LOS Convention are discussed, as well as the employment of declarations or statements, or the use of other international strategies to allow foreign naval activity. The article emphasises the key role of coastal and flag states in any such scenario.",14,3,353,370,International waters; Political science; United Nations Convention on the Law of the Sea; Law; Convention; Law of the sea; International law; Intervention (law),,,,,https://booksandjournals.brillonline.com/content/journals/10.1163/157180899x00183 https://brill.com/view/journals/estu/14/3/article-p353_3.xml?language=en,http://dx.doi.org/10.1163/157180899x00183,,10.1163/157180899x00183,2023935835,,0,,5,false,, 025-394-856-531-856,Ripped from the Headlines: What can the Popular Press Teach us about Software Piracy?,2007-12-21,2007,journal article,Journal of Business Ethics,01674544; 15730697,Springer Science and Business Media LLC,Netherlands,Shariffah Zamoon; Shawn P. Curley,"Software piracy is an instance of unauthorized duplication of information goods where laws and norms are not agreed-upon. This article presents a content analysis of articles from the five highest circulating U.S. newspapers 1989–2004 as evidence of the prevailing social environment surrounding software piracy. The rationales in the news articles are analyzed as evidence of the social and psychological underpinnings of attitudes toward software piracy. An expanded version of Sykes and Matza’s (American Sociological Review22, 664–670, 1957); Zamoon and Curley (Working paper, Kuwait University, Kuwait, 2007) neutralization framework is applied to analyze the content of the articles. We found that rationales condoning piracy showed a more balanced use of neutralization approaches, and less moral intensity toward the behavior. In contrast, rationales condemning piracy mostly promoted the injury aspect of software piracy, and suggested higher moral intensity. The discrepancies have practical implications as a barrier to the ability to connect the two sides of the debate concerning software piracy.",83,3,515,533,Social environment; Business ethics; Sociology; Content analysis; Newspaper; Information good; Software; Media studies; Moral intensity; Popular press; Public relations,,,,,https://link.springer.com/article/10.1007%2Fs10551-007-9636-5 https://experts.umn.edu/en/publications/ripped-from-the-headlines-what-can-the-popular-press-teach-us-abo https://philpapers.org/rec/ZAMRFT-2 http://misrc.umn.edu/workshops/2006/spring/shariffah.pdf https://ideas.repec.org/a/kap/jbuset/v83y2008i3p515-533.html https://dialnet.unirioja.es/servlet/articulo?codigo=2748841 https://EconPapers.repec.org/RePEc:kap:jbuset:v:83:y:2008:i:3:p:515-533,http://dx.doi.org/10.1007/s10551-007-9636-5,,10.1007/s10551-007-9636-5,2002333953,,0,000-086-869-583-274; 001-463-209-899-123; 001-495-539-651-928; 002-329-721-696-826; 002-597-976-832-798; 002-809-035-499-34X; 006-432-773-652-834; 007-559-358-394-991; 008-568-541-949-263; 011-161-175-482-328; 011-987-790-794-412; 013-425-010-292-015; 013-826-032-785-715; 014-587-444-151-170; 014-828-464-072-845; 014-858-295-886-350; 015-621-895-728-322; 016-318-893-723-215; 016-812-903-092-650; 016-839-219-279-419; 017-254-526-960-565; 018-508-328-479-969; 019-614-341-984-308; 019-973-338-111-13X; 020-862-797-519-306; 021-999-628-789-480; 024-448-875-876-096; 024-695-674-404-63X; 024-793-321-841-286; 025-336-013-036-43X; 025-534-617-067-832; 026-283-018-089-565; 026-636-974-288-24X; 026-665-442-057-961; 028-040-408-539-249; 029-343-886-763-151; 030-760-093-157-912; 032-058-836-918-077; 032-860-549-370-238; 033-668-220-430-203; 034-534-118-283-633; 034-947-793-516-352; 036-029-061-137-250; 036-192-164-921-240; 036-576-410-271-494; 041-781-348-238-610; 042-264-752-950-264; 043-200-840-148-259; 043-797-936-108-643; 045-201-107-411-584; 046-722-019-324-421; 046-763-865-840-178; 046-943-878-443-719; 048-675-243-529-978; 055-936-852-905-250; 056-542-592-790-016; 058-166-050-525-484; 058-618-698-071-109; 059-540-385-694-769; 063-045-781-923-11X; 069-443-181-995-744; 071-151-471-991-159; 077-302-665-212-196; 077-465-793-447-383; 078-663-464-379-133; 079-313-819-074-467; 079-817-902-796-806; 080-172-407-502-313; 080-387-358-161-732; 080-654-385-333-396; 082-326-707-434-270; 086-285-005-719-092; 087-010-768-796-663; 089-007-011-740-196; 090-401-163-961-722; 092-683-136-856-805; 094-213-099-107-472; 094-305-260-057-968; 095-476-486-007-843; 095-571-625-944-323; 096-762-470-199-768; 097-128-074-825-77X; 102-250-566-799-932; 104-847-381-824-753; 108-610-025-099-436; 109-356-504-408-270; 110-388-175-111-24X; 115-983-160-091-256; 116-659-855-264-274; 116-806-922-958-725; 117-333-886-036-588; 117-938-779-498-471; 118-675-220-855-858; 120-417-554-411-771; 123-782-800-233-013; 123-927-198-758-70X; 124-076-116-602-319; 125-354-929-077-447; 129-612-820-182-74X; 131-204-417-399-008; 131-270-797-529-622; 135-800-520-334-495; 140-780-777-028-94X; 149-938-305-354-602; 153-552-384-031-475; 165-651-170-191-915; 166-237-195-230-071; 167-706-147-274-876; 174-913-905-788-223; 184-631-218-797-950; 185-491-266-466-86X; 186-132-647-421-819; 196-212-184-416-716,26,false,, 025-577-975-811-342,"Global Trajectories, Dynamics, and Tendencies of Business Software Piracy: Benchmarking IPRs Harmonization",,2014,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Simplice A. Asongu; Antonio Rodríguez Andrés,"In this paper, we examine global trajectories, dynamics, and tendencies of software piracy to ease the benchmarking of current efforts towards harmonizing the standards and enforcements of Intellectual Property Rights (henceforth IPRs) protection worldwide. Our empirical exercise is based on 15 different panel regressions, which together consists of 99 countries. The richness of the dataset allows us to disaggregate countries into fundamental characteristics of business software piracy based on income-levels (high-income, lower-middle-income, upper-middle-income and low-income), legal-origins (English common-law, French civil-law, German civil-law and, Scandinavian civil-law) and, regional proximity (South Asia, Europe & Central Asia, East Asia & the Pacific, Middle East & North Africa, Latin America & the Caribbean and, Sub-Saharan Africa). Our main finding suggest that, a genuine timeframe for standardizing IPRs laws in the fight against software piracy is most feasible within a horizon of 4.3 to 10.4 years. In other words, full (100%) convergence within the specified timeframe will mean the enforcements of IPRs regimes without distinction of nationality or locality within identified fundamental characteristics of software piracy. The absence of convergence (in absolute and conditional terms) for the World panel indicates that, blanket policies may not be effective unless they are contingent on the prevailing trajectories, dynamics and tendencies of software piracy. Policy implications and caveats are also discussed.",,,,,Economy; International trade; Latin Americans; Economics; Convergence (economics); Harmonization; Intellectual property; Business software; Panel data; East Asia; Benchmarking,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2493467 https://www.ssrn.com/abstract=2493467,http://dx.doi.org/10.2139/ssrn.2493467,,10.2139/ssrn.2493467,2106472825,,0,000-923-160-406-727; 003-120-061-431-142; 008-896-495-853-748; 012-558-297-950-849; 013-327-431-504-996; 013-765-194-873-383; 015-808-798-057-897; 016-202-448-837-906; 017-153-449-730-092; 017-619-716-693-348; 018-075-278-238-815; 020-079-500-549-308; 022-264-398-959-067; 022-518-779-347-993; 028-630-596-457-020; 029-476-172-710-41X; 030-968-232-499-772; 031-232-902-254-593; 032-661-919-515-800; 036-159-702-886-637; 039-883-767-744-759; 041-849-157-283-572; 041-893-696-570-720; 042-057-592-838-529; 042-335-426-642-552; 043-305-653-465-196; 045-638-979-146-951; 046-127-440-118-73X; 046-669-922-850-444; 047-010-436-077-442; 047-736-711-284-984; 049-698-234-112-01X; 052-479-998-409-604; 053-956-378-667-86X; 054-549-558-630-210; 054-663-257-958-510; 058-682-219-560-287; 059-077-318-219-51X; 060-029-094-849-473; 062-137-407-209-997; 062-169-487-131-224; 062-338-941-342-801; 063-085-822-993-592; 064-893-720-411-223; 066-237-973-648-031; 068-809-693-165-274; 071-046-582-807-006; 072-498-861-728-275; 075-401-188-052-732; 075-801-927-284-039; 079-974-973-741-086; 081-952-279-823-465; 083-798-097-606-101; 085-796-193-840-794; 097-165-496-887-789; 097-287-626-930-331; 103-047-934-034-494; 105-231-453-450-342; 105-744-555-035-389; 107-007-285-779-662; 107-605-926-265-849; 107-947-697-683-923; 108-534-046-972-503; 110-231-183-577-925; 110-949-871-136-35X; 121-394-722-855-679; 123-847-715-999-019; 125-271-356-328-638; 125-495-818-933-457; 127-396-485-243-755; 130-028-842-016-809; 132-558-492-977-554; 133-793-936-162-353; 140-177-608-473-755; 144-135-264-427-99X; 145-811-348-738-768; 155-807-491-187-736; 158-780-316-147-632; 161-784-952-964-349; 163-395-334-414-976; 185-020-775-542-401; 185-197-322-646-367; 191-344-983-602-980; 193-892-719-391-272,2,true,,green 025-742-155-772-903,Cyber Crimes and New Challenges Before Mordern Society,2016-05-24,2016,journal article,Indian journal of applied research,2249555x,,,Adv.Syed Rahmat Quadri,"The stakes involved in cybercrimes are more serious due to the inherent characteristics of the network functioning. With the help of technology, the criminals are able to conduct their activities in much more sophisticated manner and within the relative safety of their homes or other private places, continents away from the actual ‘scene of crime’. Other characteristics of computer network that increase their vulnerability to crimes include; a)      Density of information and processes in the network b)      Relatively easy accessibility to the system c)      Vulnerability due to dependence on telecommunication systems d)     Uncertainties of the complex logical processes Traditional responses to crime become irrelevant in fighting this technological menace. We need innovative strategies and technologies to catch up with the criminals and keep abreast of them, who are coming out with newer and newer versions of cybercrimes. Otherwise, the potential of this great revolution of Internet and computer will never reach their maximum. Cyber crimes are very serious threat for the time to come and pose one of the most difficult challenges before law enforcement machinery.To combat crime in cyber space we have to implement strict and advance statutes which cover the area of cyber crime. As the nature of Internet is changing and this new medium is being seen as the ultimate medium ever evolved in human history, every activity of yours in Cyberspace can and will have a Cyber legal perspective. From the time you register your Domain Name, to the time you set up your web site, to the time you promote your website, to the time when you send and receive emails, to the time you conduct electronic commerce transactions on the said site, at every point of time, there are various Cyber law issues involved. You may not be bothered about these issues today because you may feel that they are very distant from you and that they do not have an impact on your Cyber activities. But sooner or later, you will have to tighten your belts and take note of Cyber law for your own benefit. Internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of, be it entertainment, business, sports or education. Internet has also its own disadvantages one of the major disadvantage is cyber crime. The internet along with its disadvantages has also exposed citizens to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like email espionage, credit card fraud, spasm, software piracy and so on criminal activities in the cyberspace are on the rise.",5,10,,,The Internet; Sociology; Statute; Disadvantage; Law enforcement; Credit card fraud; Cyberspace; Computer security; Entertainment; Vulnerability (computing),,,,,,,,,2403452094,,0,,0,false,, 025-784-266-343-445,Piracy and armed robbery at sea : the legal framework for counter-piracy operations in Somalia and the Gulf of Aden,,2011,journal article,Social Science Research Network,,,,Robin Geiss; Anna Petrig,"Since 2008 increasing pirate activities in Somalia, the Gulf of Aden, and the Indian Ocean have once again drawn the international community's attention to piracy and armed robbery at sea. States are resolved to repress these impediments to the free flow of trade and navigation. To this end a number of multinational counter-piracy missions have been deployed to the region.; ; This book describes the enforcement powers that States may rely upon in their quest to repress piracy in the larger Gulf of Aden region. The piracy rules of the United Nations Convention on the Law of the Sea; (UNCLOS) and the legal safeguards applicable to maritime interception operations are scrutinized before the analysis turns to the criminal prosecution of pirates and armed robbers at sea. The discussion includes so-called shiprider agreements, the transfers of alleged offenders to regional states, the jurisdictional bases for prosecuting pirates, and the feasibility of an international(ized) venue for their trial. In addressing a range of relevant issues, this book presents a detailed and comprehensive up-to-date analysis of the legal issues pertaining to the repression of piracy and armed robbery at sea and assesses whether the currently existing legal regime is still adequate to effectively counter piracy in the 21st century.",,,,,Multinational corporation; United Nations Convention on the Law of the Sea; Law; Geography; Enforcement; International community; Indian ocean; Free flow,,,,,https://edoc.unibas.ch/47932/ https://pure.mpg.de/pubman/faces/ViewItemOverviewPage.jsp?itemId=item_2500214 http://eprints.gla.ac.uk/80470/ https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3360488,https://edoc.unibas.ch/47932/,,,87971314,,0,,51,false,, 025-800-395-824-349,ENHANCING MARITIME SECURITY IN THE MALACCA STRAIT: COOPERATION AGAINST PIRACY AND MARITIME TERRORISM,2021-08-12,2021,journal article,Indonesian Journal of International Law,23565527,Indonesian Journal of International Law,,Rheny Wahyuni Pulungan,"The Malacca Strait, together with the Singapore Strait, are two of the most important straits in the world and consequently there is significant traffic through them, reported to be approximately 60,000 vessels a year. The rising number of violent and well-coordinated attacks on transiting ships in these straits has become a very serious problem, such as threats of unauthorized boarding; theft of personal property, cargo and the ships themselves; and violence against, and the kidnapping or murder of, seafarers. One effort which is likely to enhance security in the Malacca Straits is the establishment of 'joint patrol areas', where more than one of the three littoral states will have the right to patrol and arrest persons and vessels where there is an incident of piracy. Extra regional assistance is also necessary to suppres and prevent piracy and maritime terrorism in the Malacca Strait, however the proposal by the United States to deploy its troops to help with patrolling these straits may violate the national soverignty of the three littoral states. Therefore, the foreign assistance given by the major user states should be given in other forms such as providing more advanced technology for combating piracy and terrorism, training for personnel who patrol the Malacca and Singapore straits and sharing intelligence information to prevent piracy and maritime terrorist attacks.",7,2,39209,,Patrolling; Business; International trade; Sovereignty; Terrorism; Training (civil); Maritime security; Personal property,,,,,https://scholarhub.ui.ac.id/ijil/vol7/iss2/4/ http://ijil.ui.ac.id/index.php/home/article/view/220 https://scholarhub.ui.ac.id/cgi/viewcontent.cgi?article=1397&context=ijil https://www.neliti.com/publications/39209/enhancing-maritime-security-in-the-malacca-strait-cooperation-against-piracy-and http://ijil.ui.ac.id/index.php/home/article/download/220/pdf_167,http://dx.doi.org/10.17304/ijil.vol7.2.220,,10.17304/ijil.vol7.2.220,2252679508,,0,,1,true,cc-by,gold 026-101-773-425-403,Competition and Piracy,,,journal article,Berkeley Technology Law Journal,10863818,,,Gregory Day,"Intellectual property (IP) infringement has been characterized by over two hundred years of judicial opinions and scholarly writings as an antisocial behavior akin to theft and trespassing. Modern IP laws are faithful to this approach, punishing those who willfully infringe upon patent rights with treble damages and remedying acts of copyright infringement with statutory damages and, in some instances, prison time. This Article argues, however, that deterring infringement with such hyper-compensatory remedies squanders the benefits of piracy. Using an economic framework, certain acts of infringement are shown to increase society’s level of innovation and efficiency in ways that the law should—but does not currently—encourage. From a conceptual standpoint, infringement should be reframed as a rational response to IP’s anticompetitive structure, as opposed to a normatively bad behavior.",32,2,775,,Judicial opinion; Business; Law and economics; Statutory damages; Treble damages; Copyright infringement; Prison; Competition (economics); Economic framework; Intellectual property,,,,,https://scholarship.law.berkeley.edu/btlj/vol32/iss2/3/ https://lawcat.berkeley.edu/record/1128505/files/fulltext.pdf,http://dx.doi.org/10.15779/z382r3nx0v,,10.15779/z382r3nx0v,3122088909,,0,,0,false,, 026-245-617-611-944,Building blocks of e-commerce,,2005,journal article,Sadhana,02562499; 09737677,Springer Science and Business Media LLC,India,V. Rajaraman,"This article examines the architecture of e-commerce as a set of layers, each supporting the one above it. The layers have clean interfaces, that is, they can be designed independently. We present an architecture with six layers. The lowest layer consists of a physical communication network such as local area network or public switched telephone networks. The next higher layer is the logical layer which describes the protocol used to interconnect communication systems to create internet, intranet and extranet. The services provided over the internet infrastructure, namely, e-mail, world wide web etc., are described in what is called network services layer. It is essential to ensure security of messages, documents etc., which are transmitted using network services. The messaging layer is thus concerned with encryption methods, both private and public key encryption and their applications. We call the layer above this the middleman service, which is concerned with value-added services offered by intermediaries to enable payment for services received, certify digital signatures, safely transmit documents and provide information on behalf of companies. The topmost layer is the application layer which users see. The major applications are customer-to-business (C2B) e-commerce, business-to-business (B2B) e-commerce, customer-to-consumer (C2C) e-commerce etc. We briefly explain these modes.",30,2,89,117,Service layer; The Internet; Network layer; Link layer; Local area network; Application layer; Network architecture; Intranet; Computer network; Computer science,,,,,http://repository.ias.ac.in/38346/ http://eprints.iisc.ac.in/3537/ http://repository.ias.ac.in/38346/1/19-PUB.pdf https://link.springer.com/article/10.1007/BF02706240 https://core.ac.uk/download/pdf/291533745.pdf,http://dx.doi.org/10.1007/bf02706240,,10.1007/bf02706240,2069873370,,3,000-661-074-543-621; 003-273-318-840-783; 005-562-210-668-153; 008-810-331-329-640; 027-385-508-834-525; 032-455-020-356-314; 033-612-351-384-654; 046-287-926-242-370; 048-791-891-072-847; 049-781-955-525-970; 056-580-888-214-429; 062-111-927-362-041; 064-379-668-791-529; 073-789-708-643-589; 076-952-534-064-89X; 078-484-002-114-356; 079-895-136-679-769; 082-146-533-887-887; 085-004-393-422-396; 087-156-662-585-747; 092-436-208-442-241; 113-236-553-027-384; 119-729-117-510-736; 119-908-065-025-272; 147-549-060-075-012; 153-090-463-809-931,6,true,,green 026-373-009-701-475,"“Piracy is a Land-Based Crime”: Analysis of Definition, Drivers, and Governmental Policy",2018-11-12,2018,journal article,Journal of Maritime Studies and National Integration,25799215,Institute of Research and Community Services Diponegoro University (LPPM UNDIP),,Volodymyr Kyrychenko,"In this paper, the author theoretically analyses piracy drivers rooted on land which may form main obstacles for the resolution of problems at sea. Discussing the claim of Murphy that piracy is a land-based crime, this article expands the focus and examines the main drivers to understand causes of piracy exististence. Furthermore, it questions the credibiity of statistical data for the researchers to make reliable conclusions in this area. And, finally, the author examines weaknesses in understanding piracy which might help to reduce piracy as a maritime crime.",2,1,45,57,Resolution (logic); Regional science; Political science; Crime analysis; Land based; Corporate governance; Focus (computing),,,,,https://ejournal2.undip.ac.id/index.php/jmsni/article/viewFile/3060/1998 https://core.ac.uk/download/pdf/234033813.pdf,http://dx.doi.org/10.14710/jmsni.v2i1.3060,,10.14710/jmsni.v2i1.3060,2901831181,,0,072-224-764-986-979; 077-487-287-544-452; 166-939-264-583-513,1,true,cc-by-sa,gold 026-487-439-649-799,Justify State 'Piracy' after Allen: Introducing 'Apology' to the U.S. Copyright Regime,,2020,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Runhua Wang,,,,,,Sovereign immunity; Legal psychology; Economics; Law and economics; State (polity); Public interest; Harm; Supreme court; Copyright infringement; Bargaining power,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3681078 https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID3681078_code2569554.pdf?abstractid=3681078&mirid=1,http://dx.doi.org/10.2139/ssrn.3681078,,10.2139/ssrn.3681078,3132432950,,0,012-160-179-235-22X; 012-581-272-560-495; 019-262-809-980-892; 019-266-769-919-496; 024-551-954-064-729; 027-858-315-544-852; 029-935-715-205-381; 036-108-579-886-489; 040-836-852-160-567; 044-720-870-699-209; 044-937-422-002-137; 049-552-944-068-293; 064-389-164-185-09X; 068-952-902-423-703; 072-000-251-327-852; 074-293-651-217-18X; 077-854-198-395-16X; 077-901-029-620-003; 085-275-458-107-990; 086-454-281-254-230; 088-122-318-907-963; 089-869-401-473-192; 091-985-397-803-506; 101-981-053-025-336; 108-166-685-307-984; 108-228-541-496-035; 109-214-371-682-802; 112-258-997-416-939; 119-094-502-469-446; 121-136-862-892-023; 128-005-619-186-860; 129-556-668-268-456; 129-784-285-501-34X; 130-429-656-341-779; 135-628-992-616-843; 137-875-332-463-627; 143-179-566-689-352; 143-677-210-973-530; 144-426-488-013-286; 150-748-022-346-141; 157-142-981-438-277; 170-264-673-729-124; 170-838-132-370-614; 182-108-890-504-82X; 199-403-071-983-23X,0,false,, 026-504-029-928-594,"Piracy, Prejudice and Profit: A Perspective from US¿China Intellectual Property Rights Disputes",,2006,journal article,The Journal of World Intellectual Property,14222213; 17471796,Wiley,United Kingdom,Hanson Hu Li,"Intellectual property scholars and US–China trade observers alike have spilled much ink on describing and explaining piracy and China's apparently “voracious appetite” for it. Unfortunately, such extensive discussions tend to oversimplify the complicated picture by exaggerating only particular aspects of the piracy problem. As a consequence, those discussions have created widespread misconceptions that confuse the public as to the truth of the piracy phenomenon in general, and Chinese piracy in particular. This article examines the US–China piracy debate in a wider context and challenges the three most common misconceptions about piracy: (1) stronger intellectual property rights protection is necessarily beneficial to economic development; (2) piracy is primarily a problem of lack of law; and (3) intellectual property businesses cannot profit from piracy. The analysis of this article dictates a more rational use of government regulation, as well as business strategies for the benefit of individual business and, ultimately, for society.",9,6,727,746,Economics; Profit (economics); Law and economics; China; Law; Voracious appetite; Government regulation; Intellectual property rights protection; Rational use; Intellectual property; Phenomenon,,,,,https://onlinelibrary.wiley.com/doi/full/10.1111/j.1422-2213.2006.00309.x https://dialnet.unirioja.es/servlet/articulo?codigo=6597550,http://dx.doi.org/10.1111/j.1422-2213.2006.00309.x,,10.1111/j.1422-2213.2006.00309.x,2126032472,,0,004-472-932-396-537; 012-489-692-058-811; 015-354-268-224-922; 015-808-798-057-897; 018-931-969-162-011; 020-339-118-332-552; 028-549-731-056-388; 032-954-615-765-922; 033-146-578-934-133; 046-507-000-905-62X; 052-208-622-733-41X; 054-084-319-020-266; 075-931-022-659-444; 078-663-464-379-133; 093-386-756-231-721; 109-975-908-159-592; 119-043-693-846-59X; 126-318-425-770-318; 128-679-454-224-689; 133-942-998-093-978; 150-097-222-086-19X; 153-552-384-031-475; 179-245-562-746-996; 182-259-685-978-397,6,false,, 026-541-587-976-243,The Enemy of All: Piracy and the Law of Nations – By Daniel Heller-Roazen,2012-01-20,2012,journal article,Political Studies Review,14789299; 14789302,SAGE Publications,United States,Amanda Harmon Cooley,,10,1,110,110,Political science; Law; Adversary,,,,,https://onlinelibrary.wiley.com/doi/10.1111/j.1478-9302.2011.00251_11.x http://journals.sagepub.com/doi/10.1111/j.1478-9302.2011.00251_11.x https://journals.sagepub.com/doi/10.1111/j.1478-9302.2011.00251_11.x https://EconPapers.repec.org/RePEc:bla:pstrev:v:10:y:2012:i:1:p:110-110 https://econpapers.repec.org/article/blapstrev/v_3a10_3ay_3a2012_3ai_3a1_3ap_3a110-110.htm https://ideas.repec.org/a/bla/pstrev/v10y2012i1p110-110.html,http://dx.doi.org/10.1111/j.1478-9302.2011.00251_11.x,,10.1111/j.1478-9302.2011.00251_11.x,1497061626,,0,,0,false,, 026-655-479-672-336,Towards an International Piracy Tribunal: Curing the Legal Limbo of Captured Pirates,,2014,journal article,African Journal of International and Comparative Law,09548890; 17551609,Edinburgh University Press,,James D. Fry,"The number of pirates from Somalia acting in and around the Arabian Sea and Arab Gulf seems to have grown exponentially in recent years, catching numerous headlines and the world’s attention in the process. Although naval powers have devoted substantial energy and resources to conducting various enforcement missions, little has been done to prosecute their captured pirates. At present, the capturing powers usually either release the pirates shortly after they are captured or ‘dump’ them for trial at a developing African country. This practice hardly can be said to provide an effective deterrence to piracy. To aid in deterring these pirates through proper prosecution, the establishment of an international judicial organisation in the region – perhaps in Qatar – that focuses specifically on these types of crimes and criminals might be helpful in terms of convenience and legitimacy. This article is the first to explore this possibility from a legal perspective. Critics will be quick to question whether use of an already existing forum might be more viable. Expanding the International Criminal Court’s jurisdiction to cover piracy is one option, although at least two factors frustrate this option. First, adding piracy to genocide, crimes against humanity, war crimes and the crime of aggression might dilute the International Criminal Court’s focus on the ‘most serious crimes’. Second, without the cooperation of the United States and the People’s Republic of China, which are not members of the Rome Statute, it will be difficult for captured pirates by these naval powerhouses to be tried by the International Criminal Court (ICC). Another option is to establish a specialised piracy chamber within the International Tribunal for the Law of the Sea (ITLOS). At least three factors frustrate this option. First, the United Nations Convention on the Law of the Sea (UNCLOS) requires the consent of private",22,3,341,368,Statute; Political science; United Nations Convention on the Law of the Sea; War crime; Law; Genocide; Crimes against humanity; Jurisdiction; Tribunal; Crime of aggression,,,,,https://www.euppublishing.com/doi/pdfplus/10.3366/ajicl.2014.0098 https://core.ac.uk/display/38055430,http://dx.doi.org/10.3366/ajicl.2014.0098,,10.3366/ajicl.2014.0098,1965110476,,0,,1,false,, 026-660-419-175-975,PEMBAJAKAN MUSIK DAN LAGU : SEBUAH KAJIAN YURIDIS BERDASARKAN PERJANJIAN INTERNASIONAL TENTANG PERLINDUNGAN KARYA SENI DAN SASTRA SECARA DIGITAL DI INDONESIA,2013-07-23,2013,journal article,Jurnal Pelangi,24603740,STKIP PGRI Sumatera Barat,,Surya Prahara,"Abstract In recent years, the level of copyright piracy of music and song in several countries, especially Indonesia, Indonesian people are generally more likely to choose pirated CDs than the original, with the reasons expensive original works and the price difference very much. Legally, the core problem of music piracy and the song is contrary to Article 2 point (1) Berne Convention for the Protection of Literary and Artistic Works containing that music is a creation and a nationally-protected against the Law No. 19 Year 2002 on Copyright Article 12 paragraph (1). Therefore, the required action from the government in dealing with these problems,. The author would like to discuss the concept of an ideal law enforcement in cases of copyright piracy of digital music and the songs and the dominant factor affecting copyright piracy of music and song in Indonesia, Factors Affecting Copyright Piracy Music And Songs In Indonesia, among others, the factors based economy because they want to seek financial benefits quickly and ignoring the interests of creators and copyright holders, cost factors, cultural factors of society itself so that public awareness of the illegal pirated goods is still very low. The government should issue a form idealdalam concepts governing Perunang-Invitation Copyright in greater detail, giving firmness law, legal protection and certainty against copyrigt Indonesia.",5,1,,,Engineering; Government; Law; Ideal (ethics); Paragraph; Berne Convention; Indonesian; Music piracy; Law enforcement; Certainty,,,,,https://www.mendeley.com/catalogue/10a49fab-6723-349a-a4f7-841db7eefa4d/,http://dx.doi.org/10.22202/jp.2012.v5i1.5,,10.22202/jp.2012.v5i1.5,1501040162,,0,,2,true,cc-by-sa,gold 026-882-193-774-142,The law and practice of piracy at sea: European and international perspectives,2014-11-24,2014,journal article,Australian Journal of Maritime & Ocean Affairs,18366503; 23336498,Informa UK Limited,,I Hodgson-Johnston,The Law and Practice of Piracy at Sea: European and International Perspectives is a collection of essays that comprehensively cover the legal and policy aspects of piracy in the EU and some other j...,7,2,163,165,Political science; Law; Cover (telecommunications); International relations; Law of the sea,,,,,http://ecite.utas.edu.au/96965 https://www.tandfonline.com/doi/full/10.1080/18366503.2014.976164,http://dx.doi.org/10.1080/18366503.2014.976164,,10.1080/18366503.2014.976164,1554009162,,0,,1,false,, 026-983-693-861-157,Risk‐reducing regulatory strategies for protecting minors in social networks,2011-09-27,2011,journal article,info,14636697; 14659840,Emerald,United Kingdom,Eva Lievens,"Purpose – The purpose of this article is to present the preliminary results of a research project which aspires to identify requirements for risk‐reducing regulatory strategies aspiring to protect children and young people in social networks. It aims to provide an insight into the changing role of law in today's networked society and the innovative regulatory solutions that will be able to deal with the paradigm shift from mass media and passive, vulnerable consumers to media for mass self‐communication and active “prosumers”.Design/methodology/approach – First, the legal impact of social networking sites (SNS) risks for children and young people that have been identified in social science research is assessed, as well as the applicability of existing legal instruments. Second, legal trends in this field and a number of recent (alternative) regulatory initiatives and their implementation are discussed. In a final part, the use of such alternative regulatory instruments and their compliance with the broade...",13,6,43,54,Sociology; Co-regulation; Field (Bourdieu); Compliance (psychology); Social science research; Public relations; Paradigm shift; Mass media,,,,,https://www.emerald.com/insight/content/doi/10.1108/14636691111174252/full/html https://core.ac.uk/display/34504128 https://biblio.ugent.be/publication/8049018/file/8049019.pdf https://biblio.ugent.be/publication/8049018 https://core.ac.uk/download/55896875.pdf,http://dx.doi.org/10.1108/14636691111174252,,10.1108/14636691111174252,1970464223,,0,028-705-648-104-504; 033-110-856-403-021; 037-368-153-448-534; 079-138-465-449-915; 085-374-974-994-198; 134-958-883-301-274; 136-184-625-841-047; 143-824-447-080-578; 151-982-870-021-966; 156-159-302-641-367; 163-101-249-467-858; 169-147-990-752-194; 176-761-560-307-799; 195-473-133-192-918,10,true,,green 026-991-651-523-643,A Short Policy Analysis of Copyright Law and DRM in the United States,2006-08-01,2006,journal article,TATuP - Zeitschrift für Technikfolgenabschätzung in Theorie und Praxis,21999201; 16197623,Oekom Publishers GmbH,,Bill Rosenblatt,,15,2,19,26,Policy analysis; Economics; Law and economics; Copyright law,,,,,https://tatup.de/index.php/tatup/article/download/1199/2263 https://core.ac.uk/download/328140546.pdf,http://dx.doi.org/10.14512/tatup.15.2.19,,10.14512/tatup.15.2.19,2988708119,,0,,0,true,cc-by,gold 027-022-585-226-053,Crime and Justice in Digital Society: Towards a ‘Digital Criminology’?,2017-05-22,2017,journal article,"International Journal for Crime, Justice and Social Democracy",22028005; 22027998,Queensland University of Technology,Australia,Gregory Stratton; Anastasia Powell; Robin Cameron,"The opportunities afforded through digital and communications technologies, in particular social media, have inspired a diverse range of interdisciplinary perspectives exploring how such advancements influence the way we live. Rather than positioning technology as existing in a separate space to society more broadly, the ‘digital society’ is a concept that recognises such technologies as an embedded part of the larger social entity and acknowledges the incorporation of digital technologies, media, and networks in our everyday lives (Lupton 2014), including in crime perpetration, victimisation and justice. In this article, we explore potential for an interdisciplinary concept of digital society to expand and inspire innovative crime and justice scholarship within an emerging field of ‘digital criminology’.",6,2,17,33,Economic Justice; Sociology; Victimisation; Scholarship; Space (commercial competition); Cybercrime; Field (Bourdieu); Digital society; Social media; Criminology,,,,,https://apo.org.au/sites/default/files/resource-files/2017-05/apo-nid95406.pdf https://www.crimejusticejournal.com/article/download/355/311 https://doi.org/10.5204/ijcjsd.v6i2.355 https://doaj.org/article/9a2d3dc7d26744e3aaebffabbcd35753 https://apo.org.au/node/95406 https://core.ac.uk/display/88917433 https://researchrepository.rmit.edu.au/esploro/outputs/journalArticle/Crime-and-justice-in-digital-society-towards-a-digital-criminology/9921860641801341 https://core.ac.uk/download/230570259.pdf,http://dx.doi.org/10.5204/ijcjsd.v6i2.355,,10.5204/ijcjsd.v6i2.355,2619009128,,0,,51,true,cc-by,gold 027-186-598-006-157,"Maritime Raiding, International Law and the Suppression of Piracy on the South China Coast, 1842–1869",2017-06-07,2017,journal article,International History Review,07075332,Taylor and Francis Ltd.,United Kingdom,Jonathan Chappell,"ABSTRACTThis paper explores how piracy was defined and eventually reduced in the South China seas between 1842 and 1869. In the early 1840s, a large increase in maritime raiding led British agents ...",,,1,20,Economy; Political science; China; Empire; South china; International law,,,,,https://www.tandfonline.com/doi/full/10.1080/07075332.2017.1334689,https://www.tandfonline.com/doi/full/10.1080/07075332.2017.1334689,,,2623833061,,0,,6,false,, 027-535-206-141-847,Piracy of Broadcast Programs,,1930,journal article,Columbia Law Review,00101958,JSTOR,United States,Louis G. Caldwell,,30,8,1087,,Computer security; Computer science,,,,,http://dx.doi.org/10.2307/1114999,http://dx.doi.org/10.2307/1114999,,10.2307/1114999,2797293119,,0,,0,false,, 027-906-553-111-28X,Versioning and Piracy Control for Digital Information Goods,,2008,journal article,Operations Research,0030364x; 15265463,Institute for Operations Research and the Management Sciences (INFORMS),United States,Shin-yi Wu; Pei-Yu Chen,"Technological advances in digitalization and communications technologies have aggravated the information goods piracy problem. In contrast to previous literature which mainly considers solutions, such as law enforcement or technology protection that work on increasing individual piracy costs to alleviate the piracy problem, we consider using versioning as a potential instrument to fight piracy. We show that while a single version is the optimal strategy for an information goods provider absent piracy, the presence of piracy may lead firms to offer more than one quality, and versioning can be an effective and profitable instrument to fight piracy for digital information goods under some conditions. Our results indicate that the incentive to version is greater when the piracy cost is in a certain range. This strategic interaction between piracy cost and product line design has an interesting implication on optimal investment in piracy control. We also find that versioning can act as both a strategic substitute and a strategic complement to other instruments that increase consumer piracy costs. We further provide a general model, as a nonlinear mixed-integer program, that would assist an information goods provider in determining how many versions to offer, at what quality levels and prices.",56,1,157,172,Business; Strategic complements; Software versioning; Information good; Control (management); Investment (macroeconomics); Quality (business); Law enforcement; Incentive; Industrial organization; Operations research,,,,,http://dx.doi.org/10.1287/opre.1070.0414 https://ideas.repec.org/a/inm/oropre/v56y2008i1p157-172.html https://dblp.uni-trier.de/db/journals/ior/ior56.html#WuC08 https://dl.acm.org/doi/10.1287/opre.1070.0414 https://doi.org/10.1287/opre.1070.0414 https://econpapers.repec.org/RePEc:inm:oropre:v:56:y:2008:i:1:p:157-172 https://www.jstor.org/stable/info/25147174 http://dblp.uni-trier.de/db/journals/ior/ior56.html#WuC08 https://pubsonline.informs.org/doi/10.1287/opre.1070.0414 https://asu.pure.elsevier.com/en/publications/versioning-and-piracy-control-for-digital-information-goods https://dialnet.unirioja.es/servlet/articulo?codigo=2558812 https://dx.doi.org/10.1287/opre.1070.0414 https://www.jstor.org/stable/25147174,http://dx.doi.org/10.1287/opre.1070.0414,,10.1287/opre.1070.0414,2117114641,,0,002-744-548-301-621; 011-132-816-459-775; 017-619-716-693-348; 017-940-475-104-274; 022-630-084-177-369; 025-882-454-923-868; 033-349-220-802-574; 038-375-524-238-459; 039-898-832-968-073; 041-521-985-770-596; 042-189-039-564-15X; 043-747-066-400-820; 045-523-803-520-989; 054-084-319-020-266; 059-633-281-170-47X; 065-565-723-557-192; 066-174-220-915-486; 071-611-549-496-620; 087-010-768-796-663; 103-830-029-725-88X; 118-675-220-855-858; 123-152-515-915-975; 126-996-752-002-343; 129-154-209-747-00X; 130-431-013-813-43X; 132-670-257-092-545; 138-504-189-703-600; 139-570-122-688-129; 153-061-770-401-925; 153-552-384-031-475; 158-837-997-854-205; 189-782-768-638-364; 197-078-884-561-684,80,false,, 027-994-791-633-289,State Laws Against Piracy of Sound Recordings: A Handbook for Enforcement and Prosecution,,1974,journal article,Performing Arts Review,00315249; 23776544,Informa UK Limited,United Kingdom,,,5,1-2,63,74,Enforcement; State (computer science); Law; Sound (geography); Law enforcement; Political science; Computer security; Computer science; Acoustics; Physics; Algorithm,,,,,,http://dx.doi.org/10.1080/00315249.1974.9943378,,10.1080/00315249.1974.9943378,,,0,,0,false,, 028-013-255-081-797,"How Piracy is Affecting Economic Development in Puntland, Somalia",,2013,journal article,Journal of Strategic Security,19440464; 19440472,University of South Florida Libraries,United States,Jonathan R. Beloff,"The international community has united in its mission to halt the hijacking of merchant ships in the Gulf of Aden and the Red Sea with a massive naval presence that monitors the vast, strategic seas in which Somali pirates operate. This naval presence consequently has had some success in reducing pirate attacks in 2012, but why are the Somalis turning to piracy in the first place? The economic history of piracy has been well documented with other former “pirate hotspots” worldwide; however, there is little data available on the microeconomic affects of piracy. This article explores the underlying reasons of why Somalis have turned to piracy as a “profession,” and offers recommendations for the international community to eliminate piracy effectively through non-military means. This article is available in Journal of Strategic Security: http://scholarcommons.usf.edu/jss/vol6/iss1/7",6,1,7,54,Economy; Political science; Somali; International community; Development economics,,,,,https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1222&context=jss https://scholarcommons.usf.edu/jss/vol6/iss1/7/ https://digitalcommons.usf.edu/jss/vol6/iss1/7/ https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=1222&context=jss https://doaj.org/article/8acde1bb57d14d14828eee2555b73b96,http://dx.doi.org/10.5038/1944-0472.6.1.4,,10.5038/1944-0472.6.1.4,2085065439,,0,,12,true,cc-by-nc,gold 028-064-877-914-271,Joshua M. White. Piracy and Law in the Ottoman Mediterranean,2018-12-11,2018,journal article,Divan: Disiplinlerarası Çalışmalar Dergisi,13096834,Divan: Disiplinlerarasi Calismalar Dergisi,,Bahar Bayraktaroğlu,,23,45,,,Ancient history; Mediterranean climate; White (horse); History,,,,,https://dergipark.org.tr/tr/pub/divan/issue/49444/495382 https://dergipark.org.tr/tr/download/article-file/593737,http://dx.doi.org/10.20519/divan.495382,,10.20519/divan.495382,2903662038,,0,063-199-289-581-13X,0,true,,gold 028-309-596-121-93X,Competing Interests: Anti-Piracy Efforts Triumph Under TRIPS But New Copying Technology Undermines the Success,,1999,journal article,Brooklyn journal of international law,07404824,,,JeanMarie LoVoi,,25,2,28,,Business; TRIPS architecture; Law and economics; Copying; Competing interests,,,,,https://brooklynworks.brooklaw.edu/bjil/vol25/iss2/28/ https://brooklynworks.brooklaw.edu/cgi/viewcontent.cgi?article=1626&context=bjil,https://brooklynworks.brooklaw.edu/bjil/vol25/iss2/28/,,,2771470400,,0,,2,false,, 028-342-628-908-695,"""The Complicated Plot of Piracy"": Aspects of English Criminal Law and the Image of the Pirate in Defoe",,1985,journal article,Studies in Eighteenth-Century Culture,19386133,Project Muse,,Joel H. Baer,,14,1,3,28,Image (mathematics); Plot (narrative); Literature; Criminal law; History,,,,,http://dx.doi.org/10.1353/sec.1985.0001,http://dx.doi.org/10.1353/sec.1985.0001,,10.1353/sec.1985.0001,3165809133,,0,,4,false,, 028-417-689-414-844,Evolving a combative framework and strategy for effective maritime counter piracy measures in Nigeria,2020-04-25,2020,journal article,The Journal of Social Sciences Research,24136670; 24119458,Academic Research Publishing Group (Publications),,Gabriel E. B. Inyang; Odey Stephen Agi,"Maritime piracy is a global problem affecting the entire world, particularly, world maritime, which contributes a huge percentage of the logistics in world economy. Being a worldwide problem, it is necessary to develop a counter piracy law for Nigeria, gearing towards both domestic and regional jurisdictions for effective application and enforcement. Sea navigation through ships is the major means of movement of finished goods and raw materials globally. The sea being the heritage of mankind, any activity that negatively affects sea transportation affects the world economy, nay, Nigerian economy. Maritime pirates over the ages have been considered as enemies of humanity. Piracy has been a major problem in all major sea routes worldwide, including the gulf of Guinea. Notwithstanding all the criminal activities of maritime pirates in and around the gulf of Guinea including Nigerian coastal waters, there is no legal framework formulated to accost and punish pirates to curtail their activities. It is quite unfortunate that the international Convention developed by the UNCLOS, 1982, to fight piracy and armed robbery at sea is yet to be domesticated as part of Nigerian municipal law. The various agreements and guidelines churned out by the International Maritime Organization (IMO), on this subject are yet to become part of Nigerian policy as recommended to member states of IMO. This article recommends that Section 12 of the Nigerian 1999 Constitution should domesticate these conventions and guidelines as counter piracy law for the country to make the fight against maritime piracy and armed robbery successful.",6,64,459,467,Business; Human factors and ergonomics; Occupational safety and health; Injury prevention; Accident prevention; Poison control; Injury control; Suicide prevention; Medical emergency,,,,,http://dx.doi.org/10.32861/jssr.64.459.467 https://www.safetylit.org/citations/index.php?fuseaction=citations.viewdetails&citationIds[]=citjournalarticle_651168_14,http://dx.doi.org/10.32861/jssr.64.459.467,,10.32861/jssr.64.459.467,3023148871,,0,,0,true,cc-by,gold 028-925-926-452-934,An Exploratory Study of Determinants and Corrective Measures for Software Piracy and Counterfeiting in the Digital Age,2010-07-09,2010,journal article,Computer and Information Science,19138997; 19138989,Canadian Center of Science and Education,,Yin-Leng Theng; Wee Teck Tan; May O. Lwin; Schubert Foo Shou-Boon,"Software piracy and counterfeiting is a global problem that has resulted in huge economic losses worldwide. This paper proposes a theory-based approach to study the key factors contributing to piracy and counterfeiting issues. We first developed a theoretical model linking the antecedents into the key factors using information acquired from an extended literature review. We then undertook a survey of thirty business professionals representing different industries, functional roles and different levels of work exposure to software usages in Singapore to investigate the issues. Specifically, the objectives of the survey were to: (1) investigate the key issues associated to software piracy and counterfeiting; (2) identify the factors that have contributed to the software piracy and counterfeiting; and (3) draw up a refined list of appropriate measures to counter software piracy and counterfeiting. Through the structural use of Non-Parametric Correlation Test, Chi-Square Test for Independence, Fisher Exact Probability Test and Phi value, our findings showed that the lack of awareness to software usage laws and regulations, the perceived lack of enforcement measures and penalties, and the lack of educational programs catering to the proper usage of software were the key factors contributing to the software piracy and counterfeiting issues. The findings are useful to managers of software companies and policy-makers in reviewing existing software protection policies, laws and regulations, such that any flaws or loopholes can be",3,3,30,49,Risk analysis (engineering); Software; Test (assessment); Enforcement; Software protection; Correlation test; Fisher exact probability test; Work exposure; Computer security; Computer science; Exploratory research,,,,,https://dr.ntu.edu.sg/bitstream/10356/80778/1/6892-21688-1-PB.pdf https://www.researchgate.net/profile/May_Lwin/publication/45363392_An_Exploratory_Study_of_Determinants_and_Corrective_Measures_for_Software_Piracy_and_Counterfeiting_in_the_Digital_Age/links/0912f5112046111667000000.pdf https://www.ccsenet.org/journal/index.php/cis/article/view/6892 https://doi.org/10.5539/cis.v3n3p30 https://dr.ntu.edu.sg/handle/10356/80778?mode=full https://dblp.uni-trier.de/db/journals/ccsecis/ccsecis3.html#ThengTLF10 http://ccsenet.org/journal/index.php/cis/article/download/6892/5427,http://dx.doi.org/10.5539/cis.v3n3p30,,10.5539/cis.v3n3p30,2052630245,,0,006-383-919-912-064; 009-951-353-757-924; 010-854-534-444-434; 014-152-883-938-562; 025-336-013-036-43X; 025-882-454-923-868; 042-057-592-838-529; 044-173-349-817-964; 054-549-558-630-210; 059-267-897-916-930; 070-050-965-186-476; 070-387-433-147-234; 079-004-174-053-220; 094-050-399-108-73X; 104-433-476-117-816; 123-180-951-340-790; 123-313-540-896-141; 192-635-646-545-205,5,true,cc-by,hybrid 028-928-638-686-844,Assessing Multinational Global Cyber Business Risk Of Cyberattacks – Minimizing The Risk Of Loss Due To Wrongful Jurisdiction,2017-05-17,2017,journal article,Journal of Cybersecurity Research (JCR),24712485,Clute Institute,,Paul J. Morrow,"In Cyberspace, more and more, corporations with global holdings are seeking excellence in business around the world mostly by Internet. In order to do business, several legal and economic developments must be explored to assess the risks and practicalities involving the new legal issues created by cyberspace.  Compliance officers, because of their responsibilities to develop cybersecurity plans, need to understand the personal jurisdictional effects test and the subject matter test to assess risk of loss.  Jurisdiction as to what court or what administrative agency has authority to decide a particular case is critical to the success of a recovering party filing a lawsuit seeking damages for a cyberattack. The jurisdictional nuances analyzed in this paper offer a gradual development of the leading court and administrative cases for guidance on the issues.  This paper is worth your time because: 1) it examines the inconsistent and obscure legal standards for jurisdiction in cyber space including cyberattacks, 2) it shows the places and methods used by both the Federal Trade Commission and the Courts having jurisdiction over cyberattack litigation, 3) it gives the recommendations for U.S. and international corporations on the subject of cyber jurisdiction. All of this is supported by current case law and journal articles involving cybersecurity to help minimize the mistakes that I have observed in the practice saving time and money. This is a new technology area of inquiry facing many corporate legal departments, and IT managers today. So, this paper involves the legal/business research necessary to give guidance regarding the jurisdictional boundaries of cyberattack litigation and ways to substantially reduce the risk of loss.",2,1,5,12,Agency (sociology); Business; Common law; Law and economics; Jurisdiction; Lawsuit; Damages; Risk of loss; Cyberspace; Public relations; Business risks,,,,,https://www.cluteinstitute.com/ojs/index.php/JCR/article/download/9961/10062 https://core.ac.uk/download/pdf/268113313.pdf,http://dx.doi.org/10.19030/jcr.v2i1.9961,,10.19030/jcr.v2i1.9961,2615672066,,0,,0,true,,gold 028-999-447-590-450,Factors that Influence the Intention to Pirate Software and Media,2007-03-28,2007,journal article,Journal of Business Ethics,01674544; 15730697,Springer Science and Business Media LLC,Netherlands,Timothy Paul Cronan; Sulaiman Al-Rafee,"This study focuses on one of the newer forms of software piracy, known as digital piracy, and uses the Theory of Planned Behavior (TPB) as a framework to attempt to determine factors that influence digital piracy (the illegal copying/downloading of copyrighted software and media files). This study examines factors, which could determine an individual's intention to pirate digital material (software, media, etc.). Past piracy behavior and moral obligation, in addition to the prevailing theories of behavior (Theory of Planned Behavior), were studied to determine the influence on digital piracy intention. Based on the results of this study, planned behavioral factors in addition to past piracy behavior and moral obligation were found to influence an individual's intention to pirate digital material. Attitude, past piracy behavior, perceived behavior control, and moral obligation explained 71 percent of the intention to pirate variance. Using these results, a better understanding of why individuals pirate is presented and can be used to help combat digital piracy.",78,4,527,545,Advertising; Business ethics; Psychology; Variance (accounting); Moral obligation; Software; Copying; Behavior control; Digital material; Theory of planned behavior,,,,,https://econpapers.repec.org/article/kapjbuset/v_3a78_3ay_3a2008_3ai_3a4_3ap_3a527-545.htm https://philpapers.org/rec/CROFTI-2 https://EconPapers.repec.org/RePEc:kap:jbuset:v:78:y:2008:i:4:p:527-545 https://ideas.repec.org/a/kap/jbuset/v78y2008i4p527-545.html https://dialnet.unirioja.es/servlet/articulo?codigo=2673582 https://link.springer.com/article/10.1007/s10551-007-9366-8?error=cookies_not_supported&error=cookies_not_supported&error=cookies_not_supported&code=9ebe4351-0d1b-4185-9960-d92a842125b3&code=f064660c-a492-4f91-98d0-25061bf7de04&code=8d0a10b4-75c9-4b0b-a505-b55fd9514a0d https://link.springer.com/article/10.1007/s10551-007-9366-8,http://dx.doi.org/10.1007/s10551-007-9366-8,,10.1007/s10551-007-9366-8,2111051912,,0,001-263-962-588-804; 001-495-539-651-928; 004-703-894-331-147; 005-014-989-182-407; 007-397-558-000-193; 007-559-358-394-991; 009-299-623-546-736; 010-292-330-210-925; 011-913-430-300-771; 012-310-657-322-389; 012-385-759-934-550; 015-262-552-587-247; 019-623-803-893-73X; 020-862-797-519-306; 021-985-765-184-51X; 024-178-065-161-008; 024-695-674-404-63X; 025-882-454-923-868; 026-283-018-089-565; 026-646-274-108-972; 027-319-766-288-744; 028-615-356-511-184; 029-343-886-763-151; 031-187-002-607-584; 031-995-304-744-790; 033-349-220-802-574; 035-783-038-125-989; 036-043-845-832-56X; 036-054-692-608-308; 036-339-914-478-393; 038-776-077-985-336; 041-326-767-334-557; 042-970-223-978-163; 044-777-542-862-916; 044-954-083-301-320; 045-689-949-615-518; 046-242-964-958-565; 046-865-213-703-191; 047-415-077-240-96X; 056-955-100-555-374; 057-182-959-994-032; 061-887-275-818-235; 061-892-764-570-281; 062-759-008-820-920; 067-844-766-523-907; 073-725-072-478-764; 073-943-655-438-997; 074-236-235-932-992; 074-249-987-836-98X; 074-777-270-980-043; 079-378-687-597-545; 087-010-768-796-663; 087-496-406-795-842; 089-181-535-078-862; 089-263-185-202-518; 089-802-824-324-07X; 097-015-746-977-880; 099-167-496-298-409; 104-322-499-205-075; 105-459-949-589-170; 108-743-157-279-059; 111-967-642-990-937; 112-320-970-849-886; 113-405-571-747-814; 116-448-006-181-378; 122-570-270-294-976; 124-076-116-602-319; 125-602-253-212-118; 130-485-538-446-859; 139-709-125-151-267; 153-755-120-267-572; 155-076-943-830-539; 156-358-614-160-396; 171-240-587-575-210; 174-355-717-097-683; 174-913-905-788-223,279,false,, 029-300-525-955-270,Pelaksanaan Yurisdiksi Universal Terhadap Modern Piracy Jure Gentium,2020-05-19,2020,journal article,JURNAL BELO,26865920; 24606820,Universitas Pattimura,,Nadiyah Asfarosya,"This study aims to analyze the relevance of the approach of universal jurisdiction in law enforcement against the crime of modern pirates. This study looks at piracy itself which changes over time and the effectiveness of universal jurisdiction in minimizing back piracy that can affect the international community. This research is normative. Universal jurisdiction has long been in law enforcement against piracy. However, turning the numbers of countries implementing universal jurisdiction raises the question of what constitutes an obstacle to implementing universal jurisdiction over the crime of piracy. In addition, several solutions have emerged that are considered more effective in enforcing the law against modern piracy in order to prevent the culture of impunity. ;  ",5,2,86,96,Universal jurisdiction; Impunity; Jurisdiction; Law; Relevance (law); Enforcement; Political science; Normative; Obstacle; Order (exchange); Business,,,,,,http://dx.doi.org/10.30598/belobelovol5issue2page86-96,,10.30598/belobelovol5issue2page86-96,,,0,,0,true,cc-by-nc,gold 029-407-755-374-084,The Prosecution in Seychelles of Piracy Committed on the High Seas and the Right to a Fair Trial,2020-02-04,2020,journal article,Criminal Law Forum,10468374; 15729850,Springer Science and Business Media LLC,United States,Jamil Ddamulira Mujuzi,"In Seychelles, the general rule is that domestic courts do not have jurisdiction over offences committed abroad. However, there are exceptions to that rule and one of them relates to the offence of piracy committed on the high seas. Section 65(1) of the Seychelles Penal Code creates the offence of piracy which is committed “within Seychelles or elsewhere” and section 65(2) provides that “the courts of Seychelles shall have jurisdiction to try an offence of piracy…whether the offence is committed within the territory of Seychelles or outside the territory of Seychelles.” On the basis of section 65, many suspected pirates have been prosecuted in Seychelles. Closely related to the issue of prosecuting suspected pirates is the question of whether their trial was fair. The right to a fair trial and public hearing is provided for under Article 19 of the Constitution. There are many piracy cases in which Seychellois courts have dealt with the issue of the right to a fair trial. The rights which have featured prominently are: the right to be tried by a competent court and the jurisdiction of Seychellois courts to try piracy committed on the high seas; the right against double jeopardy; the right to examine witnesses and challenge evidence; right to remain silent; the right to be presumed innocent until proved guilty; and the right to be informed in detail of the nature of the offence. The purpose of this article is to assess the jurisprudence in question and, where appropriate, suggest ways in which Seychellois courts could better protect the right to fair trial of those accused of committing piracy.",31,1,1,48,International waters; Political science; Public international law; Law; Constitution; Jurisdiction; Right to a fair trial; Double jeopardy; Fair trial; Jurisprudence,,,,,https://link.springer.com/article/10.1007/s10609-020-09383-0,http://dx.doi.org/10.1007/s10609-020-09383-0,,10.1007/s10609-020-09383-0,3004644296,,0,,0,false,, 029-628-120-484-318,Four Common Misconceptions About Copyright Piracy,,2003,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Peter K. Yu,"Copyright piracy is one of the most difficult, yet important, transnational problems in the twenty-first century. Although legal literature has discussed copyright piracy extensively, commentators rarely offer a ""grand unified theory"" on this global problem. Rather, they give nuanced analyses, discussing the many aspects of the problem-political, social, economic, cultural, and historical. This nuanced discussion, however, is missing in the current public debate. To capture the readers' emotion and to generate support for proposed legislative and executive actions, the debate often oversimplifies the complicated picture by overexagerrating a particular aspect of the piracy problem or by offering an abbreviated, easy-to-understand, yet somewhat misleading version of the story. Such oversimplification is dangerous, for it creates misconceptions that not only confuse the public as to the cause and extent of the problem, but also mislead policymakers into finding solutions that fail to attack the crux of the piracy problem. In light of this shortcoming, this Article discusses four common misconceptions about copyright piracy: (1) Copyright piracy is merely a cultural problem; (2) copyright piracy is primarily a development issue; (3) copyright piracy is a past phenomenon for technologically-advanced countries; and (4) copyright piracy is a necessary byproduct of authoritarian rule. It then attempts to reconfigure the misguided public debate on copyright piracy by underscoring the need to focus on the copyright divide - the gap between those who have stakes in the copyright regime and those who do not. This Article concludes by warning that the United States might not be able to eradicate the piracy problem unless its legislators and policymakers are willing to change the lawmaking process by taking into account the interests of both the stakeholders and nonstakeholders.",,,,,Economics; Law and economics; Law; Lawmaking; Public debate; Global problem; Phenomenon; Authoritarianism; Legislature,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=443160,http://dx.doi.org/10.2139/ssrn.443160,,10.2139/ssrn.443160,1539556517,,0,018-196-635-656-638; 034-285-913-095-303; 037-944-359-908-05X; 084-549-379-449-297; 131-105-900-405-953,1,true,cc0,green 029-641-431-668-735,The problem of piracy and the proliferation of counterfeit products in Ukraine: current state and prospects of avoiding it,2017-04-13,2017,journal article,"Scientific works of National Aviation University. Series: Law Journal ""Air and Space Law""",26633949; 23079061,National Aviation University,,Наталія Борисівна Шуст; Тетяна Володимирівна Корженівська,,1,42,,,Business; Current (fluid); Counterfeit; State (computer science); Commerce,,,,,http://dx.doi.org/10.18372/2307-9061.42.11520,http://dx.doi.org/10.18372/2307-9061.42.11520,,10.18372/2307-9061.42.11520,2929038890,,0,,0,true,cc-by,gold 029-792-896-997-086,The farcical side to the war on media piracy: a popular case of Divine Comedy?:,2014-03-11,2014,journal article,"Media, Culture & Society",01634437; 14603675,SAGE Publications,United States,Trajce Cvetkovski,"This article examines illegal consumption in popular media. Corporate citizens have portrayed media piracy as an activity comprising several layers of illegal and morally derelict behaviour. They have waged a most aggressive war against consumers and technology pioneers. The need for deterrence, it appears, is obvious. However the internet paints a different picture. It reminds us just how little people care about breaking copyright laws. Online parodies concerning anti-piracy campaigns also affirm this development. This article revisits the war on piracy and the strategies adopted. It assesses the success of campaigns aimed at consumers. An argument that deterrence has a paradoxical and somewhat comical effect is advanced. The final part explores the nexus between parody and piracy. Social networking has created a potentially subversive force by encouraging farcical representations of centralized copyright governance models. The dramas are indeed sublime. It appears Dante was right about the human condition.",36,2,246,257,Sociology; Nexus (standard); Law; Morality; Human condition; Sublime; Media studies; Corporate governance; Argument; Comedy; Deterrence theory,,,,,https://espace.library.uq.edu.au/view/UQ:326744 http://mcs.sagepub.com/lookup/doi/10.1177/0163443714526552 http://journals.sagepub.com/doi/10.1177/0163443714526552 http://journals.sagepub.com/doi/abs/10.1177/0163443714526552 https://core.ac.uk/display/43343867 https://journals.sagepub.com/doi/abs/10.1177/0163443714526552,http://dx.doi.org/10.1177/0163443714526552,,10.1177/0163443714526552,2074444544,,0,011-363-147-941-166; 056-975-066-982-345; 061-158-107-066-29X; 066-360-935-478-442; 072-359-727-454-699; 073-907-841-809-773; 132-508-501-761-822; 138-816-149-171-788; 139-174-618-886-706; 185-316-275-125-807; 198-082-036-745-69X,3,false,, 029-806-165-768-049,Digital Piracy Justification: Asian Students Versus American Students,2013-04-17,2013,journal article,International Criminal Justice Review,10575677; 15563855,SAGE Publications,United States,Szde Yu,"The literature has shown that digital piracy is more rampant in Asia and Asians are often found to have a more favorable attitude toward digital piracy in research. This study examines the attitude toward justifying digital piracy in light of the techniques of neutralization. A comparison is made between Asian international students and American students. The result shows Asian international students are significantly more likely to justify digital piracy, but their general morality is not significantly different from American students. This finding supports neutralization theory in that people do not need to change their moral belief to favor criminal behavior as long as they can apply the techniques of neutralization to justify it. Moreover, Asian Americans, among all racial groups in the American sample, are the only group that does not show significant difference in their digital piracy justification, compared to the Asian international students. Considering that Asian Americans and Asian internationa...",23,2,185,196,Psychology; Law; Morality; Techniques of neutralization; Digital piracy; Criminal behavior; Racial group; Significant difference; Asian americans; Sample (statistics); Social psychology,,,,,http://journals.sagepub.com/doi/10.1177/1057567713485416 https://journals.sagepub.com/doi/full/10.1177/1057567713485416,http://dx.doi.org/10.1177/1057567713485416,,10.1177/1057567713485416,2330919679,,0,000-312-517-819-151; 002-597-976-832-798; 005-136-753-965-857; 010-146-711-506-660; 011-970-832-954-189; 013-425-010-292-015; 014-050-242-979-957; 016-812-713-548-418; 017-316-092-636-864; 019-018-863-918-921; 032-563-160-588-721; 032-653-897-764-354; 032-708-467-543-653; 039-883-767-744-759; 046-989-664-357-368; 048-060-330-802-96X; 049-813-154-354-036; 051-621-974-013-494; 051-873-992-963-021; 055-450-998-184-302; 057-182-959-994-032; 058-806-863-894-52X; 059-344-106-506-801; 061-453-121-924-088; 062-180-644-489-615; 070-387-433-147-234; 071-293-161-244-776; 071-535-679-259-648; 072-084-774-976-983; 074-777-270-980-043; 077-583-896-139-647; 084-502-083-697-859; 089-181-535-078-862; 102-535-558-337-569; 110-388-175-111-24X; 120-103-422-077-431; 123-538-500-409-553; 130-214-393-255-423; 130-316-635-715-70X; 134-518-930-828-169; 136-088-646-231-491; 139-041-303-026-120; 150-527-549-363-854; 160-213-996-404-452; 165-651-170-191-915; 167-706-147-274-876; 170-359-671-564-794; 174-537-622-402-996,22,false,, 029-845-740-382-057,In re Piracy Jure Gentium.,,1940,journal article,Annual Digest and Reports of Public International Law Cases,26337088; 26337096,Cambridge University Press (CUP),,,Piracy jure gentium — Frustrated Attempt to Rob — Whether Actual Robbery Essential — Piracy in Civil Law — Piracy in Common Law — International Law Crimes and Jurisdiction — Sources of International Law.,7,,213,224,Political science; Jurisdiction; Law; International law; Civil law (Civil law); Commercial law,,,,,,http://dx.doi.org/10.1017/cbo9781316151341.124,,10.1017/cbo9781316151341.124,,,0,,3,false,, 030-042-583-488-259,Piracy in Contemporary National and International Law,,1990,journal article,California Western international law journal,08863210,,,Barry Dubner,"The author believes that there are two types of piracy. The first type I would call ""classical piracy."" Classical piracy is really a catch-all way of including domestic crimes of murder, plunder, robbery and kidnapping, that have been elevated to the international level and have questionably become a crime against mankind. Classical piracy has been reduced to treaty form both in 1958 and 1982. The second type of piracy may be called ""modern-day piracy."" Modern-day piracy is really a crime that falls under the catch-all word ""piracy"" that can include air piracy, hijacking (both air and sea), and possibly the destruction of oil rigs and nuclear facilities. Most of these types of modern-day piracy are reduced to crimes by domestic legislation.Developed countries are naturally desirous of being able to ""try"" persons who have killed their nationals. Indeed, domestic legislation may supplement these wishes. Is it necessary to expand the classical definition of piracy to a modern-day international treaty? Should we permit countries to avoid ""extradition"" (assuming their laws permit them to do so) if available to them in order to accomplish this result? We know that the classical form of piracy (ship-to-ship) does occur today. There have been many reported incidents off the coasts of various African nations, in the Far East and in the Caribbean. Outlaws of the Ocean gives many examples. But can a country go into another country's water in ""hot pursuit"" without permission, capture these pirates and either (1) turn them over to the country, or (2) try them under the international crime of piracy as a crime against mankind or, under their own domestic laws? Are we not really asking whether the doctrine of ""hot pursuit"" should be expanded to allow capture of persons alleged to have committed domestic crimes?The question is whether or not nations will accept this expansive definition and will agree to be bound by their reduced jurisdiction in these particular arenas. Obviously, if the crime itself is expanded to incorporate new crimes (or occurrences that we consider crimes), then individual states will have to accept limitations on their jurisdictional powers and give way to permitting other states to exercise enforcement procedures against the expanded crime. The author does not believe that the world community is ready for this broader expansion of jurisdictional power, because individual states may not be willing to limit their respective jurisdictional powers to achieve a more comprehensive international deterrent.",21,1,8,,Political science; Law and economics; Power (social and political); Doctrine; Jurisdiction; Legislation; Hot pursuit; Treaty; Enforcement; International law,,,,,https://scholarlycommons.law.cwsl.edu/cwilj/vol21/iss1/8/ https://scholarlycommons.law.cwsl.edu/cgi/viewcontent.cgi?article=1417&context=cwilj,https://scholarlycommons.law.cwsl.edu/cwilj/vol21/iss1/8/,,,3125147934,,0,,1,false,, 030-173-134-579-008,Fighting Maritime Piracy under the European Convention on Human Rights,2011-08-01,2011,journal article,European Journal of International Law,09385428; 14643596,Oxford University Press (OUP),United Kingdom,Stefano Piedimonte Bodini,"On the basis of real examples of anti-piracy operations conducted in the Indian Ocean by European navies, the article examines the legal implications of such military actions and their judicial medium- and long-term consequences in the framework of the European Convention on Human Rights. The only existing authority directly addressing maritime piracy, although from the sole perspective of state jurisdiction, is the recent Grand Chamber judgment in Medvedyev and Others v. France. The Court�s approach and conclusions in Medvedyev will be analysed in section 2. Section 3 will explore other important issues likely to be raised under the Convention by anti-piracy operations. Section 4 will consider the question of state responsibility, i.e., jurisdiction and attribution, in the context of anti-piracy operations carried out on the high seas or on the territory of third states.",22,3,829,848,Sociology; International waters; Human rights; Law; State (polity); Jurisdiction; State responsibility; Context (language use); Section (archaeology); Convention,,,,,https://academic.oup.com/ejil/article/22/3/829/388183 https://dialnet.unirioja.es/servlet/articulo?codigo=3749522 http://ejil.oxfordjournals.org/content/22/3/829.full.pdf+html,http://dx.doi.org/10.1093/ejil/chr052,,10.1093/ejil/chr052,2044389830,,0,,10,true,,bronze 030-278-768-153-202,United States Participation in International Efforts to Combat Piracy,,2009,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),,,,103,4,750,755,,,,,,,http://dx.doi.org/10.1017/s0002930000159937,,10.1017/s0002930000159937,,,0,,0,false,, 030-341-270-470-20X,Diverse patterns of world and regional piracy: implications of the recurrent characteristics,2018-02-28,2018,journal article,Australian Journal of Maritime & Ocean Affairs,18366503; 23336498,Informa UK Limited,,Keunsoo Jeong,"This study discusses diverse patterns of piracy across time and regions. By comparing various features of piracy, this study highlights recurrent characteristics behind the scenes of piracy inciden...",10,2,118,133,Geography; Economic geography; Maritime security,,,,,https://www.tandfonline.com/doi/full/10.1080/18366503.2018.1444935,http://dx.doi.org/10.1080/18366503.2018.1444935,,10.1080/18366503.2018.1444935,2791194086,,0,003-149-709-352-674; 005-789-621-654-06X; 012-713-859-298-600; 042-102-314-716-02X; 045-440-821-059-264; 059-829-053-784-714; 064-954-713-529-545; 067-268-728-762-162; 067-507-654-717-531; 068-132-495-560-992; 098-360-959-017-174; 113-589-375-707-427; 123-516-880-194-453; 132-448-358-300-756; 189-484-813-376-223; 192-548-100-346-575,0,false,, 030-414-175-870-373,The Dilemma and Outlet of Musical Industry in China,,2012,journal article,Journal of Guizhou University,,,,Liu Tie-guang,"The quick shrink of music-record industry in China has pushed its chain-structured musical industry into a dilemma.Because of the difficulty and long time for anti-piracy,especially ""anti-digital piracy"",the musical industry in China cannot wait long for the day to prevent ""digital piracy"" effectively.The direct proportion of function between the increasing rate of global musical industry and the proportion of income from performance and the successful examples in India indicates that conferring right to secondary use of phonogram in The Copyright Law of China will be a new way-out for musical industry in China.",,,,,Engineering; China; Dilemma; Digital piracy; Copyright law; Market economy; Commerce; Musical; Function (engineering); Phonogram,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-GZBS201202008.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-GZBS201202008.htm,,,2348053742,,0,,0,false,, 030-643-177-106-212,SECURITIZATION OF MARITIME SECURITY ISSUES IN SUPPORTING INDONESIA’S DEFENSE DIPLOMACY AT ADMM-PLUS ON MARITIME SECURITY,2018-05-22,2018,journal article,Jurnal Pertahanan & Bela Negara,26207400; 26205262,Indonesia Defense University,,Rizky Reza Lubis,"Abstract –Indonesia is one of the countries which has many maritime security issues that needs to be managed appropriately through defense diplomacy approach, including the ASEAN framework. ADMM Plus on Maritime Security as the highest defense forum and dialog in ASEAN on maritime security issues is expected to be able to build confidence building measures and mutual trust between ASEAN member states and non-member states in solving maritime security issues. However, some goals have not been achieved due to many complex problems on maritime security in domestic sphere. This paper will use securitization theory, defense diplomacy concept, and maritime security concept for analyzing the maritime security issues in Indonesia which need securitization for supporting its defense diplomacy at ADMM Plus on Maritime Security. However, the securitization progress faced several challenges coming from various aspects, especially the habit of political leaders that only use maritime security as political instrument without concerning to the real security issues. Keywords : Maritime Security, Securitization, ADMM-Plus, Defense Diplomacy",8,1,1,18,International trade; Dialog box; Political science; Maritime security; Securitization; Complex problems; Member states; Confidence building; Diplomacy; Politics,,,,,http://jurnal.idu.ac.id/index.php/JPBH/article/view/275/163 http://jurnal.idu.ac.id/index.php/JPBH/article/download/275/163 https://core.ac.uk/download/pdf/230516980.pdf,http://dx.doi.org/10.33172/jpbh.v8i1.275,,10.33172/jpbh.v8i1.275,2808866951,,0,,0,true,,gold 030-694-662-960-842,"Piracy, navies and the law of the Sea: the case of Somalia",,2009,journal article,WMU Journal of Maritime Affairs,1651436x; 16541642,Springer Science and Business Media LLC,Sweden,Uwe Jenisch,"This contribution concentrates on the legal aspects of piracy and tries to explain some of the practical problems which modern navies experience in their fight against piracy and maritime violence off Somalia. The UN Law of the Sea Convention of 1982 provides a traditional though largely deficient set of rules for control and counter measures. Modern legal instruments such as the SUA Convention of 1988 as amended, recent resolutions of the UN Security Council and regional treaties try to fill the loopholes. Against this background the paper discusses e. g. the law of boarding and investigation of suspicious vessels, the arrest and penal prosecution of criminals and the right of self-defence in case of an imminent attack. The international mandates and the national rules of engagement in which the navies operate reflect these ambiguities that result in a loss of momentum. After all piracy is not an act of war, but a crime. In conclusion apolitical solution on land is indispensable as the navies and coast guards can only fight the symptoms and not the causes of crime and unrest in a failed State.",8,2,123,143,Economics; United Nations Convention on the Law of the Sea; Public international law; Law; Failed state; Unrest; Rules of engagement; Convention; Security council; Counter measures,,,,,https://link.springer.com/article/10.1007/BF03195157 https://trid.trb.org/view/1411771 https://rd.springer.com/article/10.1007/BF03195157,http://dx.doi.org/10.1007/bf03195157,,10.1007/bf03195157,2066224808,,0,026-572-044-294-053; 071-463-106-544-572; 129-646-462-244-124; 132-418-939-955-323,5,false,, 030-944-615-798-431,Why buy an album? The motivations behind recorded music purchases,,2016,journal article,"Psychomusicology: Music, Mind, and Brain",21621535; 02753987,American Psychological Association (APA),,Steven Caldwell Brown; Don Knox,"There has been little research into the motivations behind recorded music purchases, despite recorded music sales dropping steadily in the past decade. It is thought that widespread music piracy has played a critical role in this shift. Though 39% of revenues in the recorded music industry now come from digital services, physical formats still account for over half of all global revenues (IFPI, 2014). Furthermore, research shows that while so-called second generation (on-demand services) are taking over, most people still possess a physical music collection and actively listen to digital collections (Liikanen & Aman, 2015). Of interest in the present study, is why individuals continue to buy music, given they no longer need to in order to listen to their favorite songs.The Recorded Music Industry and the Digital Revolution: A Brief OverviewThe music industry has undergone huge changes over the past decade, as a direct result of the digital revolution. In particular, practices in the distribution and promotion of recorded music have changed from conventional purchases of albums and singles in different physical formats to digital formats via the Internet.Pioneering peer-to-peer file-sharing service, Napster is largely responsible for setting digital downloads into motion, which facilitated widespread music piracy on a global scale. Released in 1999, Napster demonstrated how quickly and easily music could be uploaded and downloaded on the Internet as well as the potential for digital music distribution to be profitable. Though music piracy has existed for decades, it is the digitization of recorded music that has inspired widespread copyright infringement of protected works on an unprecedented scale. The true prevalence of music piracy remains unknown (as with all crime), but conservative estimates of Internet users actively downloading copyrighted media illegally tend to cluster around one third of the global population (see Bustinza, Vendrell-Herrero, Parry, & Myrthianos, 2013). Antipiracy measures to date have largely failed, with pirates adapting well to technical and legislative changes-Higgins and Marcum (2011) explain that knowledgeable Internet users always seem to outsmart new technologies faster than they can be produced. In recent years, the most effective antipiracy measure appears to be the rise of increasingly more attractive legal alternatives to digital piracy. As the late former Apple CEO Steve Jobs stated: ""You'll never stop [piracy], what you can do is compete with it"" (quoted in Goodell, 2003). Indeed, the iPod was released soon after Napster boomed, quickly followed by the i-Tunes store. Apple remains the market leader on digital music.The emerging preference for digital music has altered how music fans consume and enjoy recorded music, where over 80 legal modes of accessing digital music now exist in the United Kingdom, in addition to illegal means. Music can now be bought on a track-by-track basis, streamed via subscription services such as Spotify or Deezer, or listened to on-demand from personal collections stored in cloud services (networked online storage of data), to name but a few options. As much as the digitization of music, increased access to the Internet along with the increased capabilities of smartphones have shaped new listening behaviors. Music listening can now meet particular needs such as aiding a workout at the gym or managing the hectic lifestyle of living in busy urban cities. The popularity of music streaming via music subscription services calls into question what it now means to own music.While there has been a renewed interest in vinyl, largely thanks to the likes of Record Store Day (where artists release exclusive content), The International Federation of the Phonographic Industry (IFPI) in 2013 reported a steady increase in global digital revenue from music annually since 2008. IFPI notes that subscription services are now a central part of the recorded music market, with 20 million paying subscribers worldwide in 2012-an increase of 44% on 2011. …",26,1,79,86,The Internet; Advertising; Popular music; Visual arts; Psychology; Music industry; Digital Revolution; Digitization; Copyright infringement; Music piracy; Digital audio,,,,,https://www.research.ed.ac.uk/en/publications/why-buy-an-album-the-motivations-behind-recorded-music-purchases https://psycnet.apa.org/record/2016-07231-001 https://researchonline.gcu.ac.uk/en/publications/why-buy-an-album-the-motivations-behind-recorded-music-purchases https://www.pure.ed.ac.uk/ws/files/23261379/Brown_PMMB_2016_Why_buy_an_album.pdf https://www.research.ed.ac.uk/portal/en/publications/why-buy-an-album-the-motivations-behind-recorded-music-purchases(901cd702-ba01-4a96-98c4-bb2db3672172).html https://pureportal.strath.ac.uk/en/publications/why-buy-an-album-the-motivations-behind-recorded-music-purchases https://www.questia.com/library/journal/1P3-4033753841/why-buy-an-album-the-motivations-behind-recorded https://core.ac.uk/display/43717600 https://core.ac.uk/download/43717600.pdf,http://dx.doi.org/10.1037/pmu0000134,,10.1037/pmu0000134,2346093986,,0,002-329-721-696-826; 002-338-659-689-303; 003-197-673-727-986; 004-679-522-471-467; 005-726-118-137-649; 007-011-066-832-810; 007-199-093-187-201; 013-012-434-627-549; 013-425-010-292-015; 018-602-054-510-017; 033-770-913-063-523; 034-540-804-153-40X; 037-550-015-414-716; 039-165-194-872-916; 048-060-330-802-96X; 067-146-220-710-171; 068-974-781-159-551; 069-127-159-795-709; 083-542-757-489-328; 084-702-693-406-592; 085-061-598-547-249; 088-828-651-541-39X; 098-748-588-292-783; 100-715-463-123-678; 101-429-365-503-553; 102-404-675-251-57X; 103-256-424-369-463; 117-904-730-188-290; 131-546-101-620-132; 134-936-898-078-397; 145-606-006-558-22X; 152-764-080-566-68X; 186-814-528-713-77X,3,true,,green 031-066-014-940-404,The Law and Practice of Piracy at Sea: European and International Perspectives,2014-12-09,2014,journal article,Australian and New Zealand Maritime Law Journal,18340881,,,Christopher Rahman,"Book Review: Panos Koutrakos and Achilles Skordas (eds). The Law and Practice of Piracy at Sea: European and International Perspectives. Hart Publishing, Oxford (2014). xl, 374 pp.; ISBN 9781849464123",28,2,137,139,Publishing; Political science; Law; Law of the sea,,,,,https://ssl.law.uq.edu.au/journals/index.php/maritimejournal/article/download/238/262 https://ssl.law.uq.edu.au/journals/index.php/maritimejournal/article/view/238/262,https://ssl.law.uq.edu.au/journals/index.php/maritimejournal/article/view/238/262,,,1573915386,,0,,0,false,, 031-199-564-347-305,Piracy in Somalia: A Legal Analysis Concerning the Prosecution of Pirate Negotiators and Pirate Facilitators under the Current US and International Framework,2014-01-03,2014,journal article,Indiana International & Comparative Law Review,21693226,IUPUI University Library,,Graham T. Youngs,"Piracy off the coast of Somalia remains an issue with implications for the international community generally and for the Somali government specifically. Regardless of its genesis, piracy off the coast of Somalia “has in essence become an organized, lucrative and attractive criminal activity undertaken for heinous ends.” Although the number of people being held hostage by pirates is in constant flux, the piracy problem implicates several enduring issues: the protection of human lives, the maintenance of channels for international commerce, and continuing respect for Somali territorial waters.",24,3,809,857,Government; Political science; Law; Somali; International community; Legal analysis; Territorial waters,,,,,https://mckinneylaw.iu.edu/iiclr/pdf/vol24p809.pdf https://journals.iupui.edu/index.php/iiclr/article/view/18284/0 https://journals.iupui.edu/index.php/iiclr/article/download/18284/18379,http://dx.doi.org/10.18060/18284,,10.18060/18284,2201793304,,0,,0,true,,bronze 031-229-639-985-673,The short- and long-term effectiveness of anti-piracy laws and enforcement actions,2014-08-13,2014,journal article,Journal of Cultural Economics,08852545; 15736997,Springer Science and Business Media LLC,United States,Tylor Orme,"Film studios have spent the past two decades lobbying extensively to establish new legislation restricting access to copyrighted materials online. While there is growing evidence of the effect film piracy has on studio profits, the evidence on the impact of anti-piracy legislation is limited. If anti-piracy legislation is having the film industry’s desired impact, we would expect film revenues to be consistently higher following the passage of major laws that restrict access to pirated content, or major enforcement actions, such as the shutdown of Web sites that provide illegal content for download. This paper applies an intervention analysis approach to weekly data on movie box-office revenues in the USA to determine whether the passage of new anti-piracy policy has generated significant changes in box-office revenues during the period from 1997 to the present. These effects are evaluated in both the short and long term, which allows an assessment of the duration of effectiveness of government actions. The results show that four of the six included policies are ineffective in the long term and those policies that do impact revenues in the short term often harm film studios, rather than help them.",38,4,351,368,Government; Economics; Revenue; Law; Legislation; restrict; Enforcement; Download; Film industry; Term (time),,,,,https://link.springer.com/article/10.1007/s10824-014-9225-2 https://link.springer.com/article/10.1007/s10824-014-9225-2/fulltext.html https://econpapers.repec.org/RePEc:kap:jculte:v:38:y:2014:i:4:p:351-368 https://ideas.repec.org/a/kap/jculte/v38y2014i4p351-368.html https://link.springer.com/content/pdf/10.1007%2Fs10824-014-9225-2.pdf https://link.springer.com/10.1007/s10824-014-9225-2,http://dx.doi.org/10.1007/s10824-014-9225-2,,10.1007/s10824-014-9225-2,2011737033,,0,013-224-006-188-687; 016-885-062-975-148; 025-531-545-593-927; 029-148-253-189-424; 075-439-907-756-802; 090-170-438-651-454; 094-301-311-282-316; 119-233-603-143-75X; 133-157-904-802-750; 175-513-814-457-932; 177-016-186-817-428; 184-169-063-089-804,16,false,, 031-232-902-254-593,Fighting Software Piracy: Which Governance Tools Matter in Africa?,,2012,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Simplice A. Asongu; Antonio Rodríguez Andrés,"This article integrates previously missing components of government quality into the governance-piracy nexus in exploring governance mechanisms by which global obligations for the treatment of IPRs are effectively transmitted from international to the national level in the battle against piracy. It assesses the best governance tools in the fight against piracy and upholding of Intellectual Property Rights (IPRs). The instrumentality of IPR laws (treaties) in tackling piracy through good governance mechanisms is also examined. Findings demonstrate that: (1) while all governance tools under consideration significantly decrease the incidence of piracy, corruption-control is the most effective weapon; (2) but for voice and accountability, political stability and democracy, IPR laws (treaties) are instrumental in tackling piracy through government quality dynamics of rule of law, regulation quality, government effectiveness, corruption-control, and press freedom. Hence, the need for a policy approach most conducive to expanding development is to implement an integrated system of both IPRs and corollary good governance policies. Moreover, our findings support the relevance of good governance measures in developing countries wishing to complement their emerging IPR regimes.",,,,,Business; Nexus (standard); Government; Law and economics; Accountability; Rule of law; Good governance; Intellectual property; Corporate governance; Democracy,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2493253 https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2493253_code2294135.pdf?abstractid=2493253 https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2493253_code2294135.pdf?abstractid=2493253&mirid=1,http://dx.doi.org/10.2139/ssrn.2493253,,10.2139/ssrn.2493253,3123452229,,0,000-634-971-571-194; 001-255-581-643-427; 003-120-061-431-142; 003-812-755-378-582; 008-896-495-853-748; 012-558-297-950-849; 017-619-716-693-348; 018-075-278-238-815; 019-311-622-107-557; 020-319-612-123-969; 021-404-432-486-431; 023-380-666-791-542; 027-989-705-549-237; 028-526-275-182-847; 028-630-596-457-020; 036-868-938-840-100; 039-883-767-744-759; 040-494-214-092-320; 041-849-157-283-572; 042-057-592-838-529; 042-675-010-023-548; 043-305-653-465-196; 045-523-803-520-989; 047-010-436-077-442; 048-226-101-207-689; 049-698-234-112-01X; 052-479-998-409-604; 056-134-823-809-165; 060-029-094-849-473; 063-085-822-993-592; 066-237-973-648-031; 069-187-883-880-837; 071-049-038-387-881; 071-737-539-334-023; 072-166-078-734-816; 075-401-188-052-732; 078-410-292-183-154; 079-004-174-053-220; 084-379-790-789-735; 084-864-570-554-378; 085-796-193-840-794; 089-541-480-057-170; 096-977-975-759-335; 097-637-794-608-082; 099-872-608-734-257; 101-874-873-388-77X; 103-047-934-034-494; 105-803-797-619-085; 107-007-285-779-662; 107-947-697-683-923; 108-534-046-972-503; 110-231-183-577-925; 111-538-496-609-353; 118-675-220-855-858; 129-154-209-747-00X; 135-800-520-334-495; 141-997-096-450-524; 142-614-722-389-800; 144-135-264-427-99X; 145-489-062-191-725; 151-648-047-765-500; 168-778-518-719-694; 171-221-578-087-895,15,true,cc0,green 031-270-303-738-307,PENERAPAN PRINSIP UNCITRAL MODEL LAW DALAM PEMBUKTIAN KASUS TRANSAKSI ELEKTRONIK DI INDONESIA,2017-04-22,2017,journal article,University Of Bengkulu Law Journal,25287656; 25411926,UNIB Press,,Asep Ahmad Fauji,"Pemanfaatan teknologi  informasi  tidak  lagi  dapat  dilakukan melalui sistem hukum konvensional, mengingat kegiatannya tidak lagi bisa dibatasi oleh teritorial suatu Negara. Persoalan yang lebih luas juga terjadi untuk masalah-masalah keperdataan, karena saat ini transaksi e-commerce telah menjadi bagian dari perniagaan nasional dan internasional. Pelanggaran hukum dengan instrumen teknologi informasi seringkali sulit dipecahkan. Tulisan ini akan membahas terkait dengan perapan prinsip UNCITRAL Model Law dalam pembuktian kasus transaksi elektronik di Indonesia dan persyaratan hukum terhadap data elektronik sebagai bentuk pembuktian kasus transaksi elektronik di Indonesia. Kesimpulan yang didapatkan yakni Indonesia telah menerapkan prinsip UNCITRAL Model Law dalam Pembuktian Kasus Transaksi Elektronik dengan pendekatan yang secara fugsinya sama dan pendekatan kenetralan suatu teknologi. Penyelesaian kasus e-commerce di Indonesia harus memenuhi persyaratan hukum terhadap data elektronik sebagai bentuk pembuktian kasus transaksi elektronik dengan mengandung unsur tertulis, syarat adanya tanda tangan, dan juga keaslian.",2,1,90,102,,,,,,https://ejournal.unib.ac.id/index.php/ubelaj/article/download/8013/4121 https://ejournal.unib.ac.id/index.php/ubelaj/article/view/8013 https://core.ac.uk/download/pdf/228580402.pdf,http://dx.doi.org/10.33369/ubelaj.2.1.90-102,,10.33369/ubelaj.2.1.90-102,2961642930,,0,,0,true,cc-by-sa,hybrid 031-338-334-314-820,RECENT DEVELOPMENTS IN MARITIME LAW,2012-07-01,2012,journal article,"Geopolitics, History, and International Relations",19489145,,,Ilie Marian,"ABSTRACT.This study is grounded in the considerable body of scholarship examining the enforcement powers granted to coastal states to protect their specific interests in fishing and the marine environment, pirate attacks off the coast of Somalia, aspects of the framework of the law of the sea that have particular relevance for assessing maritime security, and the changing dynamics of exclusive and inclusive claims to ocean use. The overall results provide strong evidence for the problem of attacks on shipping off the Horn of Africa, key underlying causes of the Somali piracy phenomenon, the vulnerability of ships to piratical attack and sea robbery, the increasing threat posed by piracy over the last several years, and the world public order of the oceans.Keywords: Somali piracy problem, security, ocean, sea1. IntroductionThis paper seeks to fill a gap in the current literature by examining the ship hijackings by Somali pirates, the effect of piracy on maritime trade, the interpretation and application of the law of the sea, and security interests in the oceans. Although researchers have discovered some important findings regarding the relationship between the suppression of piracy off Somalia, glaring vulnerabilities in the maritime domain and worldwide cargo chain, the laws of war in counter-piracy actions, the use of force in maritime police actions, and the increasing frequency of maritime piracy attacks, there is still a great deal that is unknown and that requires further empirical inquiry.2. The Threat to International Peace and Security Posed by PiracyGuilfoyle claims that pirate attacks have now escalated to hostage-taking for ransom: public international law grants all the authority needed for warships to engage in counter-piracy operations on the high seas. Piracy is an organized criminal activity, principally targeting foreign ships, and affecting regional trade and shipping. The laws of piracy carry with them a sufficient regime governing the use of force against pirates. The fight against piracy is a law enforcement operation (the applicable rules are those of police powers), as pirates are ordinary criminals.It follows from this that applying the laws of armed conflict to pirates would be counter-productive. Guilfoyle stresses that the laws of armed conflict have no application to the case of Somali piracy. Somali pirates operate against randomly targeted vessels of disparate nationalities to compel private parties to pay large ransoms, and are not engaged in an international armed conflict, and are not direct participants in an internal armed conflict.1Guilfoyle holds that conflict in Somalia has extended its reach into the waters off its coasts: the situation in Somalia constitutes the threat to international peace and security. The eventual disposition of criminals captured in Somalian territorial waters is either a matter for Somalia or for the interdicting State. As Guilfoyle puts it, rules governing the conduct of high seas interdictions remain embryonic. Customary international law permits any State finding a pirate within its territory to prosecute him or her as an exercise of universal jurisdiction, but that does not mean they will be eager to or will have appropriate national laws. Pirates are criminals because their acts impinge upon States' monopoly on legitimate violence and their interests in freedom of navigation.2Dutton observes that the number of maritime piracy attacks is spiraling ever upward (piracy attacks are increasing at an alarming rate), and maritime pirates are getting paid huge sums for their violent activities. Pirates cannot be deterred from their violent and criminal activities unless the world community shares the burden, expense, and difficulty of trying them. The international community is engaged in naval operations designed to repress acts of maritime piracy, expending time, energy, and resources in an effort to prevent and combat maritime piracy. …",4,2,131,136,Sociology; International waters; United Nations Convention on the Law of the Sea; Public international law; Law; Use of force; Somali; Maritime security; Customary international law; Territorial waters,,,,,https://www.ceeol.com/search/article-detail?id=61563 https://www.questia.com/library/journal/1P3-2875256091/recent-developments-in-maritime-law,https://www.ceeol.com/search/article-detail?id=61563,,,649272047,,0,,0,false,, 031-476-837-067-361,Economic and Cultural Impact on Intellectual Property Violations: A Study of Software Piracy,2007-08-01,2007,journal article,Journal of World Trade,10116702,Kluwer Law International BV,,Mahmut Sonmez; Deli Yang,,41,Issue 4,731,750,,,,,,,http://dx.doi.org/10.54648/trad2007029,,10.54648/trad2007029,,,0,,3,false,, 031-583-710-315-552,"The Liues, Apprehensions, Arraignments, and Executions of the 19 Late Pyrates: Jacobean Piracy in Law and Literature",2022-06-29,2022,journal article,Humanities,20760787,MDPI AG,,Graham Moore,"The 1609 pamphlet The liues, apprehensions, arraignments, and executions of the 19 late pyrates tells the stories of nineteen pirates trialled in 1609. Historians of Jacobean piracy have used this pamphlet as evidence, finding value in its detailed, dramatic accounts of maritime depredation—yet it has often escaped close textual analysis. This article analyses the pamphlet’s content and context, in doing so illuminating the tensioned relationship between legal, state, and popular cultural narratives of what constituted a “pirate”. The pamphlet provides an opportunity to further discuss the ambiguous, developing cultural role of piracy (and its perpetrators) at this time. It allows us to approach such questions as: which elements of a pirate’s story were interesting to the seventeenth-century audience, and which elements marked out acts of depredation as truly being “piracy”? How does the source approach legal proceedings, and digest them for popular consumption? What place does this pamphlet have in the wider canon of piracy’s print culture? This article suggests that the figure of the pirate could be redeemed, where it was reconcilable with the sensibilities of the terrestrial community—however, tensions arose when different groups imposed their own ideologies and intentions upon the criminal. These tensions appear in the differences between representations of maritime depredation emanating from the state and from the public—differences visible in the transmission of information from law to literature.",11,4,82,82,Context (archaeology); Narrative; State (computer science); Ideology; Value (mathematics); Law; Sociology; History; Consumption (sociology); Media studies,,,,,,http://dx.doi.org/10.3390/h11040082,,10.3390/h11040082,,,0,024-578-230-798-946; 039-241-798-727-869; 040-923-083-205-411; 043-468-634-479-177; 051-537-666-600-601; 051-959-980-569-323; 099-676-814-089-73X; 103-181-067-294-040; 109-691-180-966-257; 147-100-868-248-000,0,true,cc-by,gold 031-615-663-868-333,The power of one! The failure of criminal copyright laws (piracy) to blend into the greater cultural consciousness!,,2014,journal article,European Intellectual Property Review,01420461,,,Paul Thomas Sugden,,36,6,363,375,Economics; Consciousness; Law; Power (social and political),,,,,https://research.monash.edu/en/publications/the-power-of-one-the-failure-of-criminal-copyright-laws-piracy-to,https://research.monash.edu/en/publications/the-power-of-one-the-failure-of-criminal-copyright-laws-piracy-to,,,2885569514,,0,,0,false,, 031-697-266-338-621,United States v. Dire,,2013,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),United States,Eugene Kontorovich,"In the first criminal piracy decision by a United States court in nearly a century, the U.S. Court of Appeals for the Fourth Circuit ruled that the federal piracy statute’s reference to the “law of nations” explicitly ties the scope of the offense to evolving customary international law definitions of the crime. The court went on to find that under current customary and treaty law, attempted piracy falls within the scope of the international crime. In doing so, it joined several courts in nations around the world that have confronted the issue as a result of the outbreak of Somali piracy that began in 2008.",107,3,644,649,Statute; Political science; United Nations Convention on the Law of the Sea; Law; Somali; Treaty; Customary international law; Scope (project management); Gerontology,,,,,https://www.cambridge.org/core/journals/american-journal-of-international-law/article/united-states-v-dire/5E4D03C58DC2CF687BD3B876EC918B75 https://www.scholars.northwestern.edu/en/publications/united-states-v-dire https://dialnet.unirioja.es/servlet/articulo?codigo=5235563,http://dx.doi.org/10.5305/amerjintelaw.107.3.0644,,10.5305/amerjintelaw.107.3.0644,2259670148,,0,010-706-374-296-342; 017-562-627-730-931; 021-934-863-161-944; 045-115-781-935-223,3,false,, 031-751-246-908-871,Maritime Piracy and Limitations of the International Law of the Sea,2019-09-18,2019,journal article,Historia i Polityka,23917652; 18995160,Uniwersytet Mikolaja Kopernika/Nicolaus Copernicus University,,Michał Wallner; Artur Kokoszkiewicz,"The primary aim of this paper is to analyse the legal definition of piracy stipulated in Article 101 of the United Nations Convention on the Law of the Sea. As the title of the paper itself suggests, the phenomenon of maritime piracy is examined only from the perspective of international law of the sea, which means that state municipal laws remain beyond the scope of the analysis. The authors attempt to interpret and critically assess relevant legal provisions, rather than recount in detail facts related to cases of maritime piracy or present statistics describing the scale of this phenomenon. The article is divided into six relatively short sections. Key considerations are contained within sections 3–5, which cover the relevant provisions of the Montego Bay Convention. These sections deal, respectively, with the definition of piracy, the “private ends” requirement, and the “two-vessel” requirement. The remainder of the article is divided into introduction, historical background and conclusions.",,28 (35),25,35,Political science; United Nations Convention on the Law of the Sea; Law and economics; State (polity); Convention; Scope (project management); Phenomenon; International law; Scale (social sciences); Municipal law,,,,,https://apcz.umk.pl/czasopisma/index.php/HiP/article/download/HiP.2019.012/18207 http://cejsh.icm.edu.pl/cejsh/element/bwmeta1.element.desklight-ecd50fc8-71ea-4c8d-9bfc-30fd87f4da98 https://apcz.umk.pl/HiP/article/view/HiP.2019.012 https://doaj.org/article/8e61805e18334c31b3dc0b8d70db93f2 http://cejsh.icm.edu.pl/cejsh/element/bwmeta1.element.desklight-ecd50fc8-71ea-4c8d-9bfc-30fd87f4da98/c/wallner.pdf,http://dx.doi.org/10.12775/hip.2019.012,,10.12775/hip.2019.012,2976020235,,0,021-216-971-685-378; 024-173-301-649-142; 026-160-938-314-243; 039-036-972-553-110; 047-547-799-392-951; 050-034-327-238-66X; 073-424-329-473-821; 084-995-589-177-55X; 106-060-765-669-696; 106-226-855-819-165; 112-522-868-512-641; 124-894-971-183-009,1,true,cc-by-nd,gold 031-813-883-208-860,"Corruption, Income and Piracy. An empirical analysis",2017-01-01,2017,journal article,Review of Law & Economics,15555879,Walter de Gruyter GmbH,Germany,Bekir Insaf,"This paper subjects the piracy-corruption relationship to a detailed empirical examination. A distinction is drawn between the direct impact of corruption on piracy and the indirect impact which operates through corruption’s impact on per capita income and the resultant impact of income on piracy. Using data for 100 countries covering the period 1996–2010, both direct and indirect impacts of corruption on software piracy are estimated. Corruption is estimated to have a positive direct effect on the piracy rate. The indirect effect is found to be negative and smaller in absolute value than the direct effect for the majority of the sample income range. As a result, the total effect of corruption on software piracy is positive except for the lower income countries in the sample.",13,2,1,25,Per capita income; Economics; International economics; Corruption; Indirect effect; Indirect impact; Empirical examination; Lower income; Demographic economics; Sample (statistics); Panel data,,,,,https://ideas.repec.org/a/bpj/rlecon/v13y2017i2p25n1.html,http://dx.doi.org/10.1515/rle-2013-0005,,10.1515/rle-2013-0005,2586038786,,0,003-907-954-695-152; 006-405-597-929-940; 012-558-297-950-849; 018-500-543-636-764; 028-630-596-457-020; 030-552-311-543-904; 031-527-479-447-256; 032-328-178-729-836; 033-349-220-802-574; 033-507-476-338-841; 039-883-767-744-759; 040-418-373-603-47X; 041-849-157-283-572; 049-698-234-112-01X; 049-813-154-354-036; 054-549-558-630-210; 058-121-885-295-622; 059-077-318-219-51X; 063-495-030-789-245; 065-147-989-141-993; 069-802-630-028-576; 075-801-927-284-039; 097-383-353-676-568; 098-250-466-700-090; 099-847-996-923-097; 107-007-285-779-662; 107-947-697-683-923; 109-567-947-801-944; 124-655-841-474-707; 127-194-549-407-099; 127-396-485-243-755; 144-088-100-816-770; 148-372-377-194-744; 150-594-241-601-430; 191-344-983-602-980,0,false,, 031-880-400-442-75X,THE UNIVERSALITY OF HADD PUNISHMENT WITH SPECIAL REFERENCE TO PIRACY AND HIRABAH,2017-07-10,2017,journal article,Malaysian Journal of Syariah and Law,25904396; 19857454,Universiti Sains Islam Malaysia,,Hendun Abd Rahman Shah; Suraiya Osman,"Since time immemorial, piracy has become a major threat to the safety and security at sea. It has been conferred universal jurisdiction because it is considered as an enemy of humankind.  Nevertheless, the punishment of this offence in international law varies from one county to another. For example in Malaysia the criminal would be punished under the Penal Code of Malaysia. On the other hand, in Islamic law the similar act of piracy or hirabah is punishable under the hadd punishment. This paper attempts to analyse the universality of the hadd punishment by making a comparison between the concept and punishments of piracy and hirabah. It is suggested that the hadd punishment for the offence of hirabah has universal character and is not changeable regardless of the place and time as compared to piracy in international law.",3,,,,Universality (philosophy); Sharia; Political science; Law; Universal jurisdiction; Punishment; Time immemorial; Character (mathematics); Adversary; International law,,,,,https://mjsl.usim.edu.my/index.php/jurnalmjsl/article/view/3 https://core.ac.uk/download/pdf/229472415.pdf,http://dx.doi.org/10.33102/mjsl.v3i1.3,,10.33102/mjsl.v3i1.3,2887295532,,0,,0,true,cc-by-sa,gold 031-993-371-422-899,Software piracy still significant in Europe,,1995,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1995,6,5,6,Software; Computer science; Computer security; Business; Operating system,,,,,,http://dx.doi.org/10.1016/0142-0496(95)80186-3,,10.1016/0142-0496(95)80186-3,,,0,,0,false,, 032-072-603-252-500,Defining Piracy Under International Law: The Process and the Problems,2018-01-01,2018,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Akshat Bhargava,,,,,,Law; Process (computing); Law and economics; Political science; Business; Economics; Computer science; Operating system,,,,,,http://dx.doi.org/10.2139/ssrn.3362181,,10.2139/ssrn.3362181,,,0,,0,false,, 032-121-068-837-010,Between Collaboration and Competition:Global Public-Private Partnerships Against Intellectual Property Crimes,,2011,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Christopher J. Paun,"This paper explores the issue area of global public-private partnerships (PPPs) against intellectual property (IP) crimes. It is based on preliminary findings from a PhD re-search project that included interviews with more than 30 participants of such PPPs from different countries around the world. Key factors that influence the formation, maintenance, termination, and reform of such partnerships are identified by comparing more and less successful PPPs over a period of time. First, the paper introduces the topic of IP crime, also known as counterfeiting and piracy. The paper then proposes a typology of different PPPs, as the term is used in very different ways in the literature. In the subsequent sections of the paper, empirical examples of global PPPs against IP crimes are analyzed, whose secretariats are hosted by three public international organizations: Interpol, the World Customs Organization (WCO), and the World Health Organization (WHO). By comparing the different paths of these three international organizations and their PPPs, five key factors are identified that influence the formation, maintenance, termination, and reform of such PPPs: (1) common ground, (2) absolute and/or relative gains of resources, (3) the management of the PPP and its discretion, (4) the representation of stakeholders, and (5) the policy pursued by the PPP.",,,,,Business; Representation (politics); Discretion; Common ground; Competition (economics); World health; Key factors; Public administration; Intellectual property; Public relations; Typology,,,,,https://ssrn.com/abstract=1884888 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1884888 https://core.ac.uk/display/71739102 https://core.ac.uk/download/71739102.pdf,http://dx.doi.org/10.2139/ssrn.1884888,,10.2139/ssrn.1884888,1590935882,,0,004-859-531-071-471; 009-778-508-227-340; 012-394-248-625-099; 013-067-596-248-849; 023-614-805-605-391; 029-616-686-642-057; 035-573-359-999-171; 058-426-813-455-428; 083-475-624-755-939; 083-499-019-157-267; 084-112-625-617-566; 084-412-001-864-264; 097-746-746-451-634; 105-133-236-551-148; 106-704-057-147-724; 188-040-089-709-598; 199-602-663-574-028,4,true,,green 032-136-287-915-578,A New Maritime Security Architecture for the 21st Century Maritime Silk Road: The South China Sea and the Persian Gulf,2020-06-29,2020,journal article,"Revista de Estudos Constitucionais, Hermenêutica e Teoria do Direito",21752168,UNISINOS - Universidade do Vale do Rio Dos Sinos,,Mohammad Ali Zohourian,"China and Iran have the ancient gate of Maritime Silk Road, as well as two new superhighways within this road, namely Strait of Hormuz and Malacca Strait. Unlike the Strait of Hormuz, maritime security in the Malacca Strait needs to be redesigned and re-established by littoral states for the safe corridor. The aim of this study is to find out the new concept and classification of maritime security, namely direct and indirect insecurity elements. This study illustrates that the most remarkable direct and indirect elements are respectively piracy, armed robbery, and external state presence. It is acknowledged that the continuous and dangerous presence of an external state is the indirect insecurity element. In the light of the USA's violation and destabilizing activities in the Persian Gulf and the South China Sea, its presence and passage are considered as noninnocent activities, as these are prejudicial to the good order, peace and security of states located along the coast. Therefore, a new doctrine called the ""Doctrine of No Sheriff"" is offered in this article to possibly prevent the uprising of hegemonies in every region in the future.",12,2,239,262,Architecture; Economy; Political science; China; Doctrine; State (polity); Persian; Maritime security; South china,,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=7863491 https://dialnet.unirioja.es/descarga/articulo/7863491.pdf https://core.ac.uk/download/pdf/327167506.pdf,http://dx.doi.org/10.4013/rechtd.2020.122.05,,10.4013/rechtd.2020.122.05,3042334122,,0,007-043-231-786-464; 013-708-772-729-260; 015-885-283-741-859; 018-581-182-598-228; 026-663-289-958-499; 029-374-126-042-732; 039-355-632-986-831; 042-693-308-197-46X; 046-837-183-031-84X; 052-190-310-557-215; 056-976-801-520-96X; 062-085-981-231-046; 066-205-359-017-081; 069-332-509-983-586; 075-036-605-504-742; 079-183-677-457-063; 080-340-987-561-511; 084-995-589-177-55X; 096-058-470-807-795; 101-165-357-325-244; 125-811-373-861-551; 128-274-704-126-075; 135-229-348-223-215; 136-996-589-559-936; 148-367-366-868-487; 156-535-411-124-963; 161-498-903-530-977; 196-350-296-966-072,0,true,cc-by,gold 032-247-672-813-887,The Resurgence Of Piracy: A Phenomenon Of Modern Times,,2009,journal article,University of Miami International and Comparative Law Review,,,,Helmut Tuerk,,17,1,1,,Political economy; Political science; Law; Phenomenon,,,,,https://repository.law.miami.edu/cgi/viewcontent.cgi?article=1028&context=umiclr https://repository.law.miami.edu/umiclr/vol17/iss1/3/,https://repository.law.miami.edu/umiclr/vol17/iss1/3/,,,851131144,,0,,3,false,, 032-253-313-025-492,"Positive externality, increasing returns, and the rise in cybercrimes",,2009,journal article,Communications of the ACM,00010782; 15577317,Association for Computing Machinery (ACM),United States,Nir Kshetri,"IntroductionThe meteoric rise in cybercrime has been an issue of pressing concern to our society. According to Federal Bureau of Investigation (FBI), nine out of 10 U.S. companies experienced computer security incidents in 2005 which led to a loss of $67.2 billion. A survey conducted by IBM found that U.S. businesses worry more about cybercrimes than about physical crimes. Internet-related frauds accounted for 46% of consumer complaints made to the Federal Trade Commission (FTC) in 2005. Total losses of Internet fraud victims reporting to FTC increased from $205 million in 2003 to $336 million in 2005. In a July 2007 interview with USA Today, McAfee CEO reported that his company received 3,000--5,000 threat submissions per day from customers and 10% of them were new.This paper offers an economic analysis to explain cybercrimes' escalation. We define cybercrimes as criminal activities in which computers or computer networks are the principal means of committing an offense. Examples include cyber-theft, cyber-trespass, cyber-obscenity, critical infrastructure attacks and cyber-extortions.6 The most notable features of the cybercrime environment include newness, technology and skill-intensiveness, and a high degree of globalization. Factors such as a wide online availability of hacking tools, information sharing in the cyber-criminal community, availability of experienced hackers' help to less skillful criminals and congestion in law enforcement systems produce externality effects within the cyber-criminal community as well as across society and businesses.We focus on three positive or self-reinforcing feedback systems to examine increasing returns in cybercrime related activities. In this article, we first provide an overview of the positive feedback loops that reinforce cyber-criminals' behavior. Then, we describe mechanisms associated with externality in cybercrime related activities.",52,12,141,144,Internet privacy; Business; Externality; Returns to scale; Globalization; Cybercrime; Law enforcement; Critical infrastructure; Computer security; Internet fraud; Hacker,,,,,https://core.ac.uk/display/149237073 https://doi.acm.org/10.1145/1610252.1610288 https://dl.acm.org/doi/abs/10.1145/1610252.1610288 https://dblp.uni-trier.de/db/journals/cacm/cacm52.html#Kshetri09 https://doi.org/10.1145/1610252.1610288 https://dl.acm.org/citation.cfm?id=1610288 https://core.ac.uk/download/149237073.pdf,http://dx.doi.org/10.1145/1610252.1610288,,10.1145/1610252.1610288,1966656101,,0,004-916-367-446-865; 009-630-896-337-048; 036-159-702-886-637; 050-448-430-534-360; 052-203-105-291-198; 078-133-440-158-67X; 088-410-144-264-051; 089-302-030-658-982; 107-605-926-265-849; 159-081-163-866-938; 163-637-734-144-951; 193-107-258-263-342; 193-151-758-365-829,42,true,,green 032-422-247-395-595,Intellectual Property Counterfeiting and Piracy-Response of Small Commonwealth Jurisdictions,,2008,journal article,Commonwealth Law Bulletin,03050718; 17505976,Informa UK Limited,United Kingdom,Michael Blakeney,,34,1,55,106,Business; Law; Commonwealth; Intellectual property,,,,,https://www.tandfonline.com/doi/full/10.1080/03050710801942621 https://research-repository.uwa.edu.au/en/publications/intellectual-property-counterfeiting-and-piracy-response-of-small,http://dx.doi.org/10.1080/03050710801942621,,10.1080/03050710801942621,2054790622,,0,,0,false,, 032-588-242-862-414,"Pirates and the Orient: China, Film Piracy, and Hollywood",,2007,journal article,Jeffrey S. Moorad Sports Law Journal,10749187,,,Oliver Ting,,14,2,399,,Advertising; Political science; Orient; China; Hollywood,,,,,https://digitalcommons.law.villanova.edu/cgi/viewcontent.cgi?article=1086&context=mslj https://digitalcommons.law.villanova.edu/mslj/vol14/iss2/6/,https://digitalcommons.law.villanova.edu/mslj/vol14/iss2/6/,,,52436635,,0,,0,false,, 032-660-778-850-116,Combating Maritime Piracy: Inter-Disciplinary Cooperation and Information Sharing,2014-12-31,2014,journal article,Case Western Reserve Journal of International Law,00087254,,,Yaron Gottlieb,"In recent years, maritime piracy has reemerged as a serious threat to peace and security, notably following the significant increase in incidents of maritime piracy and armed robbery at sea that occurred off the coast of Somalia and in the Gulf of Guinea. As presented in this paper, international cooperation is indispensable for combating piracy. To that end, the paper argues that a duty to cooperate in the repression of piracy exists under international law. This duty, as articulated in article 100 of the United Nations Convention on the Law of the Sea (UNCLOS), should serve as a guiding principle in identifying the specific obligations imposed on States. Among those specific obligations is the duty to share relevant information that can assist in preventing piracy attacks and in facilitating prosecution of suspected pirates. It is further submitted that successful undertakings to fight maritime piracy necessitate inter-disciplinary cooperation, namely cooperation among entities whose expertise generally lies in different fields. The paper further discusses the main challenges for information sharing and proposes solutions to meet them.",46,1,303,,International trade; Political science; United Nations Convention on the Law of the Sea; Information sharing; Duty; Maritime piracy; Relevant information; International law; Discipline,,,,,https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1039&context=jil https://scholarlycommons.law.case.edu/jil/vol46/iss1/14/ https://paperity.org/p/82557082/combating-maritime-piracy-inter-disciplinary-cooperation-and-information-sharing,https://scholarlycommons.law.case.edu/jil/vol46/iss1/14/,,,3123044877,,0,,4,false,, 032-669-479-781-027,The EC directive on rental and lending rights and on piracy,,1994,journal article,Computer Law & Security Review,02673649; 2212473x; 22124748; 18736734,Elsevier BV,United Kingdom,,,10,4,194,194,Directive; Business; Renting; Law and economics; International trade; Law; Economics; Political science; Computer science; Programming language,,,,,,http://dx.doi.org/10.1016/0267-3649(94)90040-x,,10.1016/0267-3649(94)90040-x,,,0,,0,false,, 032-707-139-947-881,"Review of Prosecuting maritime piracy: domestic solutions to international crimes edited by Michael P. Scharf, Michael A. Newton and Milena Sterio",2016-04-11,2016,journal article,International and Comparative Law Quarterly,00205893,,,Sofia Galani,,,,,,Political science; Law; Maritime piracy; Criminology,,,,,http://research-information.bristol.ac.uk/en/publications/review-of-prosecuting-maritime-piracy-domestic-solutions-to-international-crimes-edited-by-michael-p-scharf-michael-a-newton-and-milena-sterio(fc441271-4b27-414d-8f7f-63bf2d4e42f6).html,http://research-information.bristol.ac.uk/en/publications/review-of-prosecuting-maritime-piracy-domestic-solutions-to-international-crimes-edited-by-michael-p-scharf-michael-a-newton-and-milena-sterio(fc441271-4b27-414d-8f7f-63bf2d4e42f6).html,,,2612309054,,0,,0,false,, 032-708-467-543-653,Digital Piracy,2008-04-07,2008,journal article,Social Science Computer Review,08944393; 15528286,SAGE Publications,United States,George E. Higgins; Scott E. Wolfe; Melissa L. Ricketts,"The rates of digital piracy appear to be increasing, suggesting that additional research that uses new approaches is necessary to evaluate the problem. Using data from undergraduate students (n = 353), the present study explores actual digital piracy and the intention to perform piracy using latent class analysis, develops profiles of these individuals, and provides an analysis of the differences between intentions and actual digital piracy for the groups. The results indicate three separate classes for each form of digital piracy and different profiles for each form of piracy. Actual piracy shows more demographic and social learning theory differences among individuals, whereas scenario-based digital piracy shows more self-control and social learning theory differences among individuals. A cross-tab analysis shows that there are differences between individuals who actually perform digital piracy and those who have the intention to pirate. Research and policy implications are discussed from these findings.",27,1,24,40,The Internet; Advertising; Social learning theory; Psychology; Digital piracy; Additional research; Latent class model,,,,,http://ssc.sagepub.com/content/27/1/24 https://journals.sagepub.com/doi/abs/10.1177/0894439308321350 http://journals.sagepub.com/doi/abs/10.1177/0894439308321350 https://dl.acm.org/citation.cfm?id=1481495.1481503,http://dx.doi.org/10.1177/0894439308321350,,10.1177/0894439308321350,2052715087,,0,005-136-753-965-857; 006-317-517-652-647; 010-124-089-161-975; 011-970-832-954-189; 012-379-692-154-152; 012-558-297-950-849; 014-082-506-216-299; 020-973-534-331-792; 026-283-018-089-565; 026-621-534-864-651; 027-430-189-451-868; 031-251-033-679-947; 037-721-905-792-43X; 041-756-193-271-330; 046-989-664-357-368; 051-367-533-097-396; 067-339-005-241-596; 071-188-859-738-263; 071-489-815-917-496; 072-084-774-976-983; 092-122-423-208-798; 096-401-039-718-213; 098-570-250-639-553; 099-342-173-833-089; 116-760-844-878-63X; 128-354-106-684-501; 129-652-166-610-207; 139-041-303-026-120; 168-253-262-507-724; 175-905-268-229-256; 175-940-530-591-247; 187-469-347-090-640; 193-423-519-073-147,31,false,, 032-770-972-952-957,"Cybercrime, criminal libel and the media: From 'e-martial law' to the Magna Carta in the Philippines",2015-05-01,2015,journal article,Pacific Journalism Review,23242035; 10239499,Auckland University of Technology (AUT) Library,New Zealand,David Robie; null Del M Abcede,"President Ferdinand E. Marcos declared martial law in the Philippines on 21 September 1972. Issuing the declaration under Proclamation 1081 which suspended civil rights, gagged the news media and imposed military authority in the country, Marcos defended this draconian move under the Philippines Constitution in response to a series of bombings allegedly caused by communist rebels. The emergency rule at the height of the Cold War was also planned to quell rebellion and drive national development. Four decades later, on 12 September 2012, President Benigno Aquino III signed Republic Act No. (RA) 10175 , or the Cybercrime Prevention Act , into law. This legislation was immediately widely condemned as a threat to freedom of expression on the internet, the media and online privacy and has been likened by human rights groups, media freedom advocates, ‘netizens’ and opposition Congress members as comparable to the Marcos Martial Law era. Kabataan Representative Raymond Palatino branded the legislation ‘e-Martial Law’, comparing it to repressive Marcos-era decrees censoring and harassing the media. Fifteen Supreme Court appeal petitions were lodged against the Cybercrime Law but the subsequent ruling found the law constitutional in February 2014. This article examines the law, challenges since the constitutional ruling, and demands for repealing the law and replacing it with a so-called ‘Magna Carta’ of internet media freedom. Pictured: Figure 1: Protests against the Cybercrime Law have been widespread in the Philippines. Image: Interaksyon",21,1,211,229,Sociology; Comparative law; Human rights; Public law; Law; Freedom of information; Constitution; Martial law; Supreme court; Freedom of the press,,,,,https://search.informit.com.au/documentSummary;dn=245717122397614;res=IELHSS https://ojs.aut.ac.nz/pacific-journalism-review/article/view/158 https://ojs.aut.ac.nz/pacific-journalism-review/article/download/158/121 http://search.informit.com.au/documentSummary;dn=245717122397614;res=IELHSS https://doi.org/10.24135%2Fpjr.v21i1.158 https://search.informit.org/doi/10.3316/INFORMIT.245717122397614 https://core.ac.uk/download/pdf/233599453.pdf,http://dx.doi.org/10.24135/pjr.v21i1.158,,10.24135/pjr.v21i1.158,2297180482,,0,,4,true,cc-by-nc,gold 032-840-316-028-169,Westward Ho! The evolution of maritime piracy in Nigeria,2014-09-01,2014,journal article,Portuguese Journal of Social Science,1476413x; 17589509,Intellect,United Kingdom,Lisa Otto,"Since 2008 the international community has come together amid mounting pressure to take action towards tackling the pirate menace off the Somali coast that has posed a multi-pronged threat to global economic, strategic and security interests. However, piracy has also been occurring in the Gulf of Guinea, specifically in Nigeria, and has officially overtaken the Gulf of Aden as the primary piracy hotspot. This article seeks to investigate piracy in Nigeria by tracing its evolution and cross checking this against the legal definition thereof under international law. It seeks to contextualize the phenomenon with discussion on the nature of the Nigerian state and the legacy of oil in Nigeria. Further, the article establishes piracy in the Gulf of Guineaas unique, by illustrating the differences between piracy in the Gulf of Guinea and the Gulf of Aden. By summarizing the range of efforts designed to counter piracy in West Africa, the article is able to provide relevant prescriptions.",13,3,313,329,Economy; Political science; Law; Somali; International community; Security interest; Legal definition; Maritime piracy; West africa; International law,,,,,http://pjss.iscte-iul.pt/index.php/pjss/article/view/172,http://dx.doi.org/10.1386/pjss.13.3.313_1,,10.1386/pjss.13.3.313_1,2033533705,,0,,4,false,, 032-932-650-714-672,A Human Rights View of Maritime Piracy Law: Exploring the Gulf of Guinea,2021-09-28,2021,journal article,Groningen Journal of International Law,23522674,University of Groningen Press,,Ramat Tobi Abudu,"As a result of pirates’ unique modus operandi in the Gulf of Guinea (GoG), the current approach to counter-piracy is mainly securitised and repressive. This approach follows the international provisions on piracy framed based on the customary international law categorising pirates as “enemy of mankind”; which, considering the vicious nature of the crime, is quite justified. Moreover, the increase in piracy activities at sea within the GoG is foreseeable considering the economic recession faced by countries within the region due to the Covid-19 pandemic. This prediction calls for the strengthening of law enforcement operations at sea, which must be justifiable in international human rights law in order to ensure the protection of all persons. Thus, reviewing the current piracy laws and their coherence with international human rights law is a requisite. This paper recognises the repressive counter-piracy approach’s success, but takes a glance from a human rights lens, which raises questions relating to “lawfulness”. Consequently, this paper builds on the existing literature criticising the repressive policy towards countering piracy in the GoG. It also advances the research probing the alignment of counter-piracy operations with human rights obligations. This paper additionally takes it a step further by evaluating the piracy laws in the GoG and their alignment with human rights provisions. These findings set a new course towards a more sustainable approach to countering piracy in the GoG, balancing rights and security approaches towards ensuring the protection of lives at sea.",9,1,1,22,Human rights; Political science; Order (exchange); United Nations Convention on the Law of the Sea; Recession; Law; Customary international law; Law enforcement; Adversary; International human rights law,,,,,https://ugp.rug.nl/GROJIL/article/view/37948,http://dx.doi.org/10.21827/grojil.9.1.1-22,,10.21827/grojil.9.1.1-22,3201916405,,0,,0,true,cc-by-nc-nd,gold 033-027-141-484-73X,China’s Three Warfares Strategy Mitigates Fallout From Cyber Espionage Activities,,2016,journal article,Journal of Strategic Security,19440464; 19440472,University of South Florida Libraries,United States,Emilio Iasiello,"China is engaged in longstanding cyber espionage against the U.S., as well as other nations, to collect sensitive public and private information in support of national objectives laid out in its 12th Five Year Plan. Foreign governments citing China’s malfeasance have rebuked these activities, a claim vehemently denied by Beijing. In response, China is leveraging the “Three Warfares” an integrated three-prong information warfare strategy to combat these accusations by leveraging Media, Legal, and Psychological components designed to influence the international community. While the United States has threatened the imposition of economic sanctions, Beijing has successfully parried consequential actions by arresting U.S.-identified hackers, thereby demonstrating its commitment toward preserving a stable and peaceful cyberspace. These interrelated “Three Warfares” disciplines have targeted the cognitive processes of the U.S. leadership, as well as the international public’s perception of China as a global threat, thereby having successfully forestalled the implementation of any effective punitive or economic deterrence strategy to include the imposition of cyber sanctions. This article is available in Journal of Strategic Security: http://scholarcommons.usf.edu/jss/vol9/iss2/4",9,2,4,71,Advertising; Political science; China; Sanctions; Beijing; Economic sanctions; International community; Information warfare; Public administration; Espionage; Deterrence theory,,,,,https://core.ac.uk/display/154477946 https://digitalcommons.usf.edu/jss/vol9/iss2/4/ https://scholarcommons.usf.edu/jss/vol9/iss2/4/ https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=1489&context=jss https://doaj.org/article/32224f34bbc147a79c4eb512af0476b2 https://paperity.org/p/82121189/chinas-three-warfares-strategy-mitigates-fallout-from-cyber-espionage-activities https://core.ac.uk/download/154477946.pdf,http://dx.doi.org/10.5038/1944-0472.9.2.1489,,10.5038/1944-0472.9.2.1489,2408961218,,0,,7,true,cc-by-nc,gold 033-075-030-373-072,Moving beyond the law: foreign pressure and the politics of piracy in China,2006-03-27,2006,journal article,Journal of Intellectual Property Law & Practice,17471532; 17471540,Oxford University Press (OUP),,Simon Teng,,1,6,423,424,Political science; China; Law; Politics,,,,,https://academic.oup.com/jiplp/article/1/6/423/917613 https://academic.oup.com/jiplp/article-lookup/doi/10.1093/jiplp/jpl037,http://dx.doi.org/10.1093/jiplp/jpl037,,10.1093/jiplp/jpl037,2051879725,,0,,0,false,, 033-100-146-111-527,Why Book Piracy Matters?,2011-01-01,2011,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Sidharth Chauhan,,,,,,Political science; Law; Law and economics; Sociology,,,,,,http://dx.doi.org/10.2139/ssrn.4033634,,10.2139/ssrn.4033634,,,0,,0,false,, 033-129-231-754-550,Strengthening Universal Jurisdiction for Maritime Piracy Trials to Enhance a Sustainable Anti-Piracy Legal System for Community Interests,2021-06-29,2021,journal article,Sustainability,20711050,MDPI AG,Switzerland,Jing Jin; Erika Techera,"Although universal jurisdiction over piracy has long existed in customary international law and international conventions, such as the Convention on the High Seas (HSC) and the United Nations Convention on the Law of the Sea (UNCLOS), the piracy situation has been changing. The subsidence of Somali piracy provides an opportunity for rethinking how to strengthen universal jurisdiction for maritime piracy trials to enhance a sustainable anti-piracy legal system. The incidents of Somali piracy have resulted in some new developments in exercising universal jurisdiction: the separation of seizing, prosecuting, and imprisoning States; the consideration of creative piracy prosecution mechanisms; the increased focus on land-based facilitation of piracy; enhanced international cooperation; and expanded universal jurisdiction. This leads to several main challenges in existing legal frameworks, including weaknesses in UNCLOS, the disharmony among international instruments, and defects in domestic piracy legislation. In order to sustain and improve the anti-piracy legal system, universal jurisdiction over piracy should be incrementally strengthened to support the prosecution of pirates by States. To address the trends and challenges, this article explores how the legal system can be enhanced in two respects: adjusting the basic provisions of universal jurisdiction over piracy and refining the relevant measures in exercising that jurisdiction to prosecute pirates.",13,13,7268,,Political science; United Nations Convention on the Law of the Sea; Law and economics; Universal jurisdiction; Jurisdiction; Legislation; Maritime security; Customary international law; Convention on the High Seas; International law,,,,China’s National Social Sciences Foundation,https://www.mdpi.com/2071-1050/13/13/7268 https://research-repository.uwa.edu.au/en/publications/strengthening-universal-jurisdiction-for-maritime-piracy-trials-t https://www.mdpi.com/2071-1050/13/13/7268/pdf,http://dx.doi.org/10.3390/su13137268,,10.3390/su13137268,3174960510,,0,001-378-238-618-881; 002-932-514-076-356; 008-312-973-544-316; 008-505-496-740-031; 011-587-457-342-68X; 016-104-931-283-035; 016-899-977-323-751; 024-312-035-013-359; 025-784-266-343-445; 026-194-471-675-701; 028-868-278-426-94X; 031-697-266-338-621; 037-695-262-470-472; 039-036-972-553-110; 040-903-151-221-301; 042-178-213-754-204; 048-434-751-128-102; 050-034-327-238-66X; 050-693-948-260-666; 053-290-021-853-266; 054-035-533-666-366; 064-220-015-273-80X; 067-883-387-891-568; 072-426-912-797-164; 073-269-142-796-092; 073-857-823-031-600; 085-541-728-913-650; 089-572-702-832-761; 090-185-561-718-660; 098-101-253-124-545; 098-740-580-900-821; 112-883-561-816-230; 120-666-542-440-695; 123-516-880-194-453; 124-352-108-007-294; 137-701-371-644-340; 145-266-638-789-546; 152-620-195-558-337; 154-627-759-273-041; 183-581-780-379-028; 198-160-988-578-332,0,true,cc-by,gold 033-245-591-938-386,The hybrid victim: Re-conceptualizing high-tech cyber victimization through actor-network theory:,2018-11-20,2018,journal article,European Journal of Criminology,14773708; 17412609,SAGE Publications,United States,Wytske van der Wagen; Wolter Pieters,"Victims are often conceptualized as single, human and static entities with certain risk factors that make them more vulnerable and attractive for offenders. This framework is challenged by emerging forms of high-tech cybercrime, such as ransomware, botnets and virtual theft, in which the offender targets a composite of human, technical and virtual entities. This study critically assesses the current theorization of the cyber victim and offers an alternative approach. Drawing on actor-network theory and three empirical case studies, it analyses the cyber victim as a hybrid actor-network consisting of different entities that, together with the offender, make the victimization possible. The proposed concepts of victim composition, delegation and translation enable a more profound understanding of the hybrid and complex process of becoming a high-tech cyber victim. Keywords: cybercrime, cyber victimization, actor-network theory, botnet, ransomware, virtual theft.",17,4,480,497,Actor–network theory; High tech; Botnet; Ransomware; Cybercrime; Computer security; Composition (language); Computer science; Process (engineering); Delegation,,,,Horizon 2020 Framework Programme,http://journals.sagepub.com/doi/10.1177/1477370818812016 https://repub.eur.nl/pub/113368/Repub_113368_O-a.pdf https://journals.sagepub.com/doi/full/10.1177/1477370818812016 https://journals.sagepub.com/doi/pdf/10.1177/1477370818812016 https://www.narcis.nl/publication/RecordID/oai%3Arepub.eur.nl%3A113368 https://repub.eur.nl/pub/113368 https://core.ac.uk/download/163111470.pdf,http://dx.doi.org/10.1177/1477370818812016,,10.1177/1477370818812016,2900702693,,0,002-837-349-742-005; 002-889-393-877-50X; 004-133-248-301-486; 005-458-034-819-062; 006-716-004-619-110; 008-771-999-645-767; 016-477-518-286-461; 021-845-940-660-663; 022-358-546-399-506; 030-401-587-715-801; 032-611-951-407-134; 034-219-221-859-207; 038-015-941-472-829; 042-289-392-240-47X; 050-119-609-226-360; 050-262-684-733-84X; 050-834-614-427-207; 052-123-341-755-804; 054-119-929-537-753; 054-802-997-366-93X; 058-119-501-839-895; 058-375-411-049-614; 064-009-139-829-255; 064-948-898-743-327; 065-480-050-190-206; 065-569-227-484-965; 067-406-388-589-502; 075-842-194-176-276; 080-886-874-379-507; 084-253-754-649-918; 087-312-017-064-457; 088-801-066-400-473; 094-146-268-434-697; 095-847-724-219-471; 103-773-526-378-489; 106-301-741-530-109; 115-822-219-738-126; 124-883-552-751-215; 127-621-756-948-799; 145-459-779-740-317; 151-136-123-941-803; 163-652-640-754-463; 165-774-156-145-795,12,true,cc-by-nc,hybrid 033-250-424-600-819,Protecting the wages of seafarers held hostage by pirates: the need to reform the law,,2013,journal article,International Journal of Public Law and Policy,20447663; 20447671,Inderscience Publishers,Switzerland,Hilton Staniland,"In this paper, it is argued that seafarers held hostage by pirates do not have a right to the continued payment of their wages under international conventions. Under English law it is contended that the entitlement to wages exists in some limited circumstances, but in many other circumstances is uncertain, inadequate or non-existent. The need to protect the wages of seafarers and to reform the law is therefore argued. Taking into account the spread of piracy and the fast evolving ‘business models’ of piracy, draft legislation that is already being considered in one state is proposed as a possible legislative guide for other states.",3,4,345,,Entitlement; English law; Payment; Economics; Law; State (polity); Legislation; Maritime Labour Convention; Business model; Legislature,,,,,http://www.inderscience.com/link.php?id=56824 https://www.inderscienceonline.com/doi/full/10.1504/IJPLAP.2013.056824 https://eprints.soton.ac.uk/348703/,http://dx.doi.org/10.1504/ijplap.2013.056824,,10.1504/ijplap.2013.056824,2157217459,,0,,1,true,,green 033-283-778-073-084,Digital Rights Management Systems and Digital Piracy – Archrivals or Unintended Allies?,2012-07-28,2012,journal article,Masaryk University journal of law and technology,18025943,,,Robert Kutiš,"Although Digital Rights Management systems were often triumphantly presented as a panacea for digital piracy they actually did not meet their objective. Moreover, number of products failed on the market because of the use of the DRM systems and various studies indicate that usage of such systems may indirectly act as a positive driver of digital piracy. With their further development DRM systems considerably evolved and became more sophisticated. Combating the piracy is no more their main aim and they became an important part of the competition strategies and business models of many companies. At the heart of this paper lies the question whether DRM technologies inherently include special characteristics which may cause that they act as a driver of digital piracy and whether were those characteristics identified by DRM system implementers and subsequently mirrored in further development of current DRM systems.",6,1,101,119,Internet privacy; Business; Panacea (medicine); Competition (economics); Digital rights management system; Digital piracy; Computer security; Business model,,,,,https://journals.muni.cz/mujlt/article/download/2599/2163 https://journals.muni.cz/mujlt/article/view/2599/2163,https://journals.muni.cz/mujlt/article/view/2599/2163,,,2622635013,,0,014-099-560-936-044; 034-928-769-255-160; 041-998-137-257-229; 042-233-771-516-111; 044-496-093-017-192; 107-828-687-748-728; 158-785-363-450-282,0,false,, 033-315-006-239-252,"Counterpiracy in Historical Context: Paradox, Policy, and Rhetoric",,2012,journal article,Studies in Conflict & Terrorism,1057610x; 15210731,Informa UK Limited,United Kingdom,Martin N. Murphy,"This article identifies the salient lessons from three specific periods—the Graeco-Roman, Atlantic piracy and its extension into the Indian Ocean during the early Seventeenth Century, and piracy off China during the Ch’ing dynasty—that can most usefully inform the counter-piracy effort off Somalia. It makes the point that piracy's sinuous character has always given rise to conceptual and definitional difficulties; but that while law has had an important voice in piracy matters since Roman times it has never been the only voice. It suggests that modern pirate hunters, by treating piracy as akin to a domestic criminal activity, have shackled the effectiveness of violent suppression which their historical predecessors found so useful, while at the same time undervaluing the fundamental roles of politics and economics in piracy formation and the continuous struggle to make the seas safe for legitimate commerce.",35,7-8,507,522,Rhetoric; Psychology; Law and economics; China; Law; Extension (metaphysics); Context (language use); Salient; Indian ocean; Politics,,,,,https://www.tandfonline.com/doi/full/10.1080/1057610X.2012.684648,http://dx.doi.org/10.1080/1057610x.2012.684648,,10.1080/1057610x.2012.684648,2019316700,,0,,4,false,, 033-404-338-752-460,Piracy of Aircraft and the Law,1969-12-31,1969,journal article,Alberta Law Review,19258356; 00024821,University of Alberta Libraries,Canada,L. C. Green,"Aerial hijacking or aerial piracy presents serious threat to the personal safety of air travellers as well as to orderly international air transport. As the problem is relatively new the rights of the state or states involved against the hijacker, as well as the hijacker's personal rights within the new state, are confused due to attempts to make old international and municipal concepts fit contemporary hybrid problem. In order to discover basis for state jurisdiction and hijacker liability, Professor Green analyses the extraditable offence of piracy as well as international con ventions and jurisprudence. The author concludes that customary inter national law rules regarding extradition are inadequate to deal with the problem of aerial piracy. Therefore, in view of its widespread international effect, the only effective method of dealing with the problem is by way of multilateral treaty regulation such as the 1970 Hague Convention for the Suppression of Unlawful Seizure of Aircraft.",10,1,72,72,Political science; Order (exchange); Law; State (polity); Jurisdiction; Liability; Treaty; Convention; Personal rights; Jurisprudence,,,,,http://www.albertalawreview.com/index.php/ALR/article/view/2437 http://www.albertalawreview.com/index.php/ALR/article/download/2437/2426,http://dx.doi.org/10.29173/alr2437,,10.29173/alr2437,2803451412,,0,,1,true,,bronze 033-700-087-466-027,Software piracy suits settled out of court,,1992,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1992,3,4,4,Computer security; Software; Computer science; Law; Business; Internet privacy; Political science; Operating system,,,,,,http://dx.doi.org/10.1016/0142-0496(92)90213-3,,10.1016/0142-0496(92)90213-3,,,0,,0,false,, 034-486-829-428-727,Explaining Software Piracy using a New Set of Indicators,2014-10-28,2014,journal article,Journal of the Knowledge Economy,18687865; 18687873,Springer Science and Business Media LLC,Germany,Nora El-Bialy; Antonio Rodríguez Andrés; Ronia Hawash,"Previous literature has used common aggregated indices as a proxy for intellectual property rights (IPR) institutional quality to assess their importance in determining piracy rates. The main contribution of this study is to empirically assess the relative importance of IPR institutional developments by differentiating between provision of laws protecting IPRs and their enforcement. These are observed through a factor analysis comprising different variables reflecting the copyright related laws, regulations, and agreements executed by 85 member countries of the WTO in addition to other economic and institutional characteristics of these countries. Using cross-country software piracy rates as a proxy for IPR violations from 1994 to 2010, our results indicate that per capita income, individualism, literacy, internet spread, the number of IPR laws and agreements in a country, and judicial independence significantly determine the level of a nation’s software piracy rates. On the other hand, international threats by the United States Trade Representative (USTR) do not have a significant impact on the prevailing piracy situation.",7,2,526,544,The Internet; International trade; Per capita income; Economics; Enforcement; Proxy (statistics); Intellectual property; Literacy; Judicial independence; Entrepreneurship,,,,,https://link.springer.com/article/10.1007/s13132-014-0226-3 https://www.infona.pl/resource/bwmeta1.element.springer-doi-10_1007-S13132-014-0226-3 https://link.springer.com/content/pdf/10.1007%2Fs13132-014-0226-3.pdf,http://dx.doi.org/10.1007/s13132-014-0226-3,,10.1007/s13132-014-0226-3,2093987866,,0,001-340-229-214-62X; 003-907-954-695-152; 008-896-495-853-748; 012-558-297-950-849; 014-438-048-968-489; 017-619-716-693-348; 018-830-496-789-160; 021-160-963-136-280; 026-283-018-089-565; 027-709-443-260-089; 028-630-596-457-020; 030-968-232-499-772; 031-476-837-067-361; 036-159-702-886-637; 039-883-767-744-759; 041-849-157-283-572; 042-675-010-023-548; 043-305-653-465-196; 044-369-537-374-894; 047-010-436-077-442; 049-698-234-112-01X; 050-895-629-733-978; 051-785-228-029-954; 054-549-558-630-210; 059-077-318-219-51X; 070-051-909-647-949; 072-978-121-958-617; 074-816-997-110-160; 076-742-312-832-368; 079-004-174-053-220; 079-178-353-168-322; 084-276-283-502-216; 097-192-909-512-402; 097-637-794-608-082; 103-047-934-034-494; 105-305-899-504-332; 105-803-797-619-085; 107-007-285-779-662; 107-605-926-265-849; 108-555-723-608-710; 111-622-105-510-826; 115-716-554-714-093; 124-655-841-474-707; 127-522-596-374-322; 127-874-306-733-083; 135-800-520-334-495; 138-520-139-466-352; 146-286-722-880-267; 146-379-268-595-433; 150-594-241-601-430; 158-611-965-571-903; 162-331-341-062-164; 191-344-983-602-980,4,false,, 034-489-122-074-842,Film Piracy: Surfing the Internet for Free Content Provides Little Bounty for the Collective Economy,2017-07-05,2017,journal article,Journal of Business Entrepreneurship and the Law,,,,Jordan Matthews,,10,2,273,294,The Internet; Advertising; Business; Content (Freudian dream analysis); Copyright infringement,,,,,https://digitalcommons.pepperdine.edu/cgi/viewcontent.cgi?article=1164&context=jbel https://digitalcommons.pepperdine.edu/jbel/vol10/iss2/6/,https://digitalcommons.pepperdine.edu/jbel/vol10/iss2/6/,,,2746382577,,0,,0,false,, 034-622-231-760-42X,Crime scripting: A systematic review,2019-06-04,2019,journal article,European Journal of Criminology,14773708; 17412609,SAGE Publications,United States,Hashem Dehghanniri; Hervé Borrion,"More than two decades after the publication of Cornish’s seminal work about the script-theoretic approach to crime analysis, this article examines how the concept has been applied in our community....",,,147737081985094,,Sociology; Work (electrical); Cornish; Crime analysis; Scripting language; Criminology,,,,Engineering and Physical Sciences Research Council; Engineering and Physical Sciences Research Council,https://dora.dmu.ac.uk/bitstream/2086/17755/1/Crime%20scripting-submitted.pdf https://journals.sagepub.com/doi/10.1177/1477370819850943 http://journals.sagepub.com/doi/10.1177/1477370819850943 https://discovery.ucl.ac.uk/id/eprint/10072755/ https://dora.dmu.ac.uk/handle/2086/17755 https://core.ac.uk/download/228197061.pdf,http://dx.doi.org/10.1177/1477370819850943,,10.1177/1477370819850943,2943130008,,0,000-299-250-548-87X; 000-587-273-572-094; 002-840-480-378-832; 003-003-523-044-292; 003-211-560-318-017; 004-338-742-382-743; 004-526-169-649-959; 004-703-221-902-777; 004-829-060-508-472; 004-959-044-025-150; 007-662-376-003-494; 008-260-284-385-813; 008-877-622-706-895; 008-909-426-812-598; 009-399-059-030-808; 009-470-624-505-896; 010-048-762-030-94X; 011-500-882-071-089; 013-548-472-674-915; 013-698-443-001-619; 014-467-802-315-344; 014-506-218-948-416; 015-234-085-371-560; 016-651-039-186-528; 017-332-992-289-765; 017-735-927-499-308; 018-383-358-001-353; 019-655-057-709-596; 020-017-022-088-143; 022-679-308-814-097; 023-787-141-710-986; 023-827-261-942-46X; 024-011-023-635-709; 024-134-896-489-982; 025-446-792-444-121; 025-586-099-819-858; 026-169-659-060-94X; 026-957-197-558-440; 027-569-865-316-925; 027-575-119-346-664; 028-125-396-295-170; 028-883-583-894-390; 029-352-812-222-090; 030-341-916-412-296; 031-862-849-734-817; 031-864-645-375-436; 032-863-197-636-71X; 032-937-488-384-89X; 034-457-577-616-357; 035-257-917-480-231; 037-167-594-781-497; 037-181-518-304-69X; 037-806-428-529-235; 039-299-798-787-871; 041-328-162-055-394; 042-196-101-116-40X; 042-501-824-654-410; 043-197-284-686-202; 044-595-687-036-108; 045-592-130-432-253; 045-805-592-837-331; 047-586-121-909-509; 047-606-594-887-069; 048-322-307-535-215; 048-387-975-567-156; 048-683-104-814-533; 048-928-987-195-344; 049-354-698-389-982; 049-708-529-947-74X; 050-705-271-852-322; 051-598-025-492-339; 051-895-921-204-13X; 054-054-220-209-002; 055-262-243-516-964; 055-545-495-904-285; 057-325-495-750-384; 059-216-059-042-111; 061-062-618-502-333; 063-276-037-326-075; 066-991-208-466-745; 067-780-766-873-552; 070-967-850-929-422; 072-671-792-984-422; 075-875-988-818-294; 076-128-981-724-399; 076-634-879-459-519; 077-841-254-398-793; 077-896-578-754-529; 087-426-458-617-454; 089-093-935-238-482; 090-432-692-337-687; 090-588-199-904-984; 091-383-749-155-162; 094-550-565-102-845; 095-303-895-471-756; 097-652-536-320-380; 097-712-753-723-241; 100-301-656-686-848; 102-656-156-408-628; 106-537-825-707-531; 107-399-661-302-741; 112-990-131-206-727; 115-083-041-132-234; 116-320-445-927-175; 117-049-762-016-587; 118-763-826-406-23X; 119-664-211-190-156; 119-920-307-433-183; 122-717-449-218-512; 129-173-315-010-005; 130-540-698-002-439; 134-202-586-807-99X; 137-673-131-410-830; 137-992-921-878-778; 143-720-566-990-105; 145-579-727-885-174; 147-204-504-250-405; 151-038-299-941-787; 156-392-705-970-908; 157-000-237-564-01X; 159-703-077-783-152; 161-321-406-959-488; 161-938-905-740-624; 164-928-483-519-275; 173-167-518-236-770; 179-426-088-155-605; 179-931-741-422-84X; 184-365-604-040-498; 187-032-314-490-144; 192-828-361-530-908,25,true,,green 034-664-875-903-583,Computer laws thwart piracy watchdog,,1994,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1994,8,3,3,Computer security; Computer science; Law; Internet privacy; Business; Political science,,,,,,http://dx.doi.org/10.1016/s0142-0496(08)80004-5,,10.1016/s0142-0496(08)80004-5,,,0,,0,false,, 034-774-147-245-786,Ghost jailed for piracy,,2001,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,2001,3,3,3,Computer security; Business; Computer science,,,,,,http://dx.doi.org/10.1016/s1361-3723(01)03005-6,,10.1016/s1361-3723(01)03005-6,,,0,,0,false,, 035-212-355-846-06X,"Aerial Piracy and International Law. Edited by Edward McWhinney. (Leiden: A. W. Sijthoff; Dobbs Ferry. N. Y.:Oceana Publications, 1971. pp. 213.)",,1972,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),United States,Howard J. Taubenfeld,,66,4,907,907,Law; Political science; Sociology,,,,,,http://dx.doi.org/10.2307/2198547,,10.2307/2198547,,,0,,0,false,, 035-512-740-898-821,Forms of Redress for Design Piracy: How Victims Can Use Existing Copyright Law,,1997,journal article,Seattle University Law Review,10781927,,,Peter K. Schalestock,,21,1,113,,Business; Law; Redress; Copyright Act; Copyright law; Intellectual property; Clothing,,,,,http://lawpublications.seattleu.edu/sulr/vol21/iss1/4 https://digitalcommons.law.seattleu.edu/sulr/vol21/iss1/4/,http://lawpublications.seattleu.edu/sulr/vol21/iss1/4,,,1593303782,,0,,0,false,, 035-572-863-019-641,Maritime Piracy: Changes in U.S. Law Needed to Combat This Critical National Security Concern,2012-10-04,2012,journal article,Seattle University Law Review,10781927,,,Daniel L. Pines,"Many articles have recently been written on maritime piracy. Most of these articles focus on the problem through the prism of the international community and international law. The few articles that view the matter through U.S. eyes tend to examine it as a distant economic or geo-political concern. Yet, for the United States, the true threat posed by piracy is not to our economy or geo-politics; it is to our national security. Just as terrorists exploited aviation hijacking in the 9/11 attacks, a similar terrorist threat looms via piracy. This article therefore seeks to explore the parameters offered by U.S. law to permit the United States to combat this national security problem. It concludes that international and U.S. law offer numerous, wide-ranging authorities for the U.S. government to attack pirates, seize their vessels, and prosecute the offenders under a plethora of charges both in the United States and abroad. Yet much more should to be done if we are to seriously stave off this threat. Changes to U.S. statutes and regulations are desperately needed to allow U.S. vessels to defend themselves from maritime pirates, the U.S. military to capture such marauders, and the U.S. justice system to prosecute such criminals.",36,1,69,,Economic Justice; Government; Statute; Political science; Law; Terrorism; International community; National security; Law of the sea; International law,,,,,https://digitalcommons.law.seattleu.edu/cgi/viewcontent.cgi?article=2112&context=sulr https://digitalcommons.law.seattleu.edu/sulr/vol36/iss1/3/,https://digitalcommons.law.seattleu.edu/sulr/vol36/iss1/3/,,,3124995725,,0,,0,false,, 035-848-535-996-317,Developments in the global law enforcement of cyber‐crime,2006-07-01,2006,journal article,Policing: An International Journal of Police Strategies & Management,1363951x,Emerald,United Kingdom,Roderic Broadhurst,"Purpose – Addresses the rapid expansion of computer connectivity and the opportunities provided for criminals to exploit security vulnerabilities in the online environment.Design/methodology/approach – International efforts to combat cyber‐crime are reviewed by evaluating the forms of mutual legal assistance (MLA) now in place.Findings – Cyber‐crime is often traditional crime (e.g. fraud, identify theft, child pornography) albeit executed swiftly and to vast numbers of potential victims, as well as unauthorised access, damage and interference to computer systems. Most detrimental are malicious and exploit codes that interrupt computer operations on a global scale and along with other cyber‐crimes threaten e‐commerce. The cross‐national nature of most computer‐related crimes have rendered many time‐honoured methods of policing both domestically and in cross‐border situations ineffective even in advanced nations, while the “digital divide” provides “safe havens” for cyber‐criminals. In response to the threa...",29,3,408,433,The Internet; Business; Exploit; Digital divide; Crime prevention; Child pornography; Law enforcement; Computer security; Interrupt; Scale (social sciences),,,,,https://eprints.qut.edu.au/3769/ https://www.emerald.com/insight/content/doi/10.1108/13639510610684674/full/html http://www.emeraldinsight.com/doi/full/10.1108/13639510610684674 https://www.emerald.com/insight/content/doi/10.1108/13639510610684674/full/pdf?title=developments-in-the-global-law-enforcement-of-cybercrime https://www.emeraldinsight.com/doi/full/10.1108/13639510610684674 https://core.ac.uk/download/10875282.pdf,http://dx.doi.org/10.1108/13639510610684674,,10.1108/13639510610684674,3021831872,,0,016-694-359-631-256; 024-958-231-756-283; 038-538-897-240-045; 039-355-076-122-804; 041-103-929-041-645; 075-810-114-252-915; 079-004-575-830-983; 105-500-200-431-859; 135-794-833-998-112; 160-908-310-734-934; 179-087-507-658-781; 190-010-156-853-552,115,true,,green 035-895-289-408-728,Torts. Unfair Competition. Piracy of News,,1919,journal article,Harvard Law Review,0017811x; 2161976x,JSTOR,United States,,,32,5,582,582,Unfair competition; Business; Competition (biology); Advertising; Law and economics; Law; Political science; Economics; Biology; Ecology,,,,,,http://dx.doi.org/10.2307/1327948,,10.2307/1327948,,,0,,0,false,, 036-206-197-513-432,Swashbuckling Students: An Exploratory Study of Internet Piracy,2006-07-11,2006,journal article,Security Journal,09551662; 17434645,Springer Science and Business Media LLC,United States,Dave A Hohn; Lisa R. Muftić; Kelly Wolf,"Advancements in computer technology have led to the development of a new form of criminal offence: internet piracy. Internet piracy, or the illegal duplication and reproduction of copyrighted music, movies, and computer software costs entertainment and software companies billions of dollars annually. Despite the escalating costs due to internet piracy, to date few studies have examined the incidence of internet piracy. The present study attempts to rectify this lack of research attention by examining the occurrence of internet piracy among college students, as well as identifying variables related to pirating behaviours. Surveys were distributed to 114 college students at a medium-sized land grant University in the upper Mid-West. Multiple regression is used to examine the ability of variables traditionally associated with deviance (e.g., social bonding and strain variables) to predict internet piracy. Findings from this study, as well as limitations and recommendations for future research, are presented.",19,2,110,127,Internet privacy; The Internet; Advertising; Business; Airport security; Organised crime; Computer technology; Entertainment; Access control; Exploratory research; Deviance (sociology),,,,,https://link.springer.com/article/10.1057%2Fpalgrave.sj.8350005 https://link.springer.com/content/pdf/10.1057%2Fpalgrave.sj.8350005.pdf,http://dx.doi.org/10.1057/palgrave.sj.8350005,,10.1057/palgrave.sj.8350005,2077952181,,0,004-094-496-674-32X; 023-906-216-969-247; 039-694-917-895-93X; 041-679-153-033-294; 061-591-654-895-377; 066-696-466-314-267; 081-683-472-855-159; 096-401-039-718-213; 171-127-329-866-328,20,false,, 036-382-357-996-385,Maritime commercial malpractices and piracy under international law,,1981,journal article,Maritime Policy & Management,03088839; 14645254,Informa UK Limited,United Kingdom,E. D. Brown,"The term ‘Piracy’ tends to be used in a loose, popular sense to refer to various acts of violence or lawlessness at sea which are not, strictly speaking, acts of piracy in law. In this article, the author examines the concept of piracy under international law and related notions such as hijacking and mutiny. In this context, he shows that the ‘malpractices’ of robber bands in such places as the inshore waters of Nigeria and The Philippines are not acts of piracy jure gentium.",8,2,99,107,Political science; Law; Mutiny; Context (language use); Lawlessness; International law; Term (time),,,,,https://www.tandfonline.com/doi/abs/10.1080/03088838100000031,http://dx.doi.org/10.1080/03088838100000031,,10.1080/03088838100000031,2003871864,,0,,2,false,, 036-396-404-721-18X,Intellectual Property Theft and Organized Crime: The Case of Film Piracy,,2005,journal article,Trends in Organized Crime,10844791; 19364830,Springer Science and Business Media LLC,United States,Jeffrey Scott Mclllwain,"This article seeks to understand the processes by which the crime of intellectual property theft is organized, with specific attention given to film piracy. It seeks to identify the structure and function of the criminal enterprises engaged in this crime and assess the degree to which organized crime is involved with film piracy. An analysis of available sources reveals that general conclusions about the relationship of organized crime to film piracy results from a lack of useable and verifiable information in media, government, and industry sources. In the absence of independent, substantive analysis, anecdote and industry interests currently drive public policies and legal developments created to address the role of organized crime in film piracy. In the United States and across the globe, seizures, criminal indictments, civil actions, and public awareness are up considerably. Whether or not these advances can be maintained in the face of technological advances, the evolution of industry economic structures, and consumer indifference to the stigma of intellectual property theft and concern at industry response to such theft remains to be seen. Specific recommendations for future research are offered.",8,4,15,39,Public policy; Government; Economics; Stigma (botany); Organised crime; Globe; Face (sociological concept); Public awareness; Intellectual property; Public relations; Criminology,,,,,https://link.springer.com/content/pdf/10.1007%2Fs12117-005-1012-1.pdf https://link.springer.com/article/10.1007%2Fs12117-005-1012-1 https://www.taylorfrancis.com/chapters/edit/10.4324/9781315080970-2/intellectual-property-theft-organized-crime-case-film-piracy-1-jeffrey-scott-mcillwain,http://dx.doi.org/10.1007/s12117-005-1012-1,,10.1007/s12117-005-1012-1,2006531090,,0,013-545-106-760-422; 015-430-380-101-473; 144-135-979-153-179,10,false,, 036-648-610-435-852,"Defeating terrorism, piracy and armed robbery against ships in a collective maritime security system",2014-06-27,2014,journal article,International Journal of Human Sciences./ Uluslararası İnsan Bilimleri Dergisi,13035134,Uluslararasi Insan Bilimleri Dergisi,,Hakan Selim Canca,"With increasing global economic development, maritime security constitutes more important role throughout the world. The efforts of the international community including shipmasters, shipowners, international specialized agencies, intergovernmental organizations and States concentrate on ensuring the safety and security of ships, repressing acts of maritime violence, imposing obligations upon States, and developing regional agreements between States. As the oceans are used by all and controlled by no one [1] , these efforts are very important for global trade and security. Taking into account the security concerns of littoral states, the shipping industry and passengers in general, these efforts continue to try to repress the serious crimes of terrorism, piracy and armed robbery at sea while staying in the lines of the freedoms of the seas that are being protected by state practice and customary international law. In this study, the consequent codification related to the acts of terrorism, piracy and armed robbery against ships and the problems related to the measures aiming to defeat these crimes were examined and recommendations to prevent these crimes were given. [1] Gabel, Jr., George D. (2007), ""Smoother Seas Ahead: The Draft Guidelines as an International Solution to Modern-Day Piracy"", 21st Biennial Admiralty Law Institute Symposium, 81 Tul.L.Rev.1433, p.1.",11,1,1282,1300,Political science; United Nations Convention on the Law of the Sea; Law; Terrorism; State (polity); Maritime security; International community; Customary international law; Law of the sea; Collective security,,,,,http://core.ac.uk/display/25833983,http://dx.doi.org/10.14687/ijhs.v11i1.2951,,10.14687/ijhs.v11i1.2951,1963953246,,0,051-525-120-152-757; 059-303-273-240-827; 067-502-476-871-620; 071-634-454-583-897; 077-777-582-591-767; 110-250-513-619-926; 113-672-688-042-654; 142-147-299-192-030; 152-378-433-943-132; 179-565-068-275-28X,0,true,cc-by-nc-sa,hybrid 036-740-766-100-049,Penalties for piracy on the problems and improvements,,2010,journal article,SungKyunKwan Law Review,1229943x,"Institute of Legal Studies, Sungkyunkwan University",,hwang in su; zaehee Kim,,22,2,183,218,Advertising; Business,,,,,https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001476046,http://dx.doi.org/10.17008/skklr.2010.22.2.007,,10.17008/skklr.2010.22.2.007,2318886445,,0,,0,true,cc-by-nc,hybrid 036-927-739-753-001,Applying Protection Motivation Theory To Understand Generation Z Students Intention To Comply With Educational Software Anti Piracy Law,2019-09-30,2019,journal article,International Journal of Emerging Technologies in Learning (iJET),18630383; 18688799,International Association of Online Engineering (IAOE),Germany,Bobby Ardiansyah Miraja; Satria Fadil Persada; Yogi Tri Prasetyo; Prawira Fajarindra Belgiawan; A. A. N. Perwira Redi,"The negative effects of the usage of illegal software, especially in educational settings, concerns not only software developers but also educational institutions. This research papers investigated the factors contributing to the behavioral intention of Generation Z students' to comply with educational software anti-piracy laws. Using a framework that analyzes fear appeals, this research found that self-efficacy and response efficacy has a significant relationship with the behavioral intention of Generation Z's intention to comply with educational software anti-piracy laws. Several insights from practical and managerial perspectives are dis-cussed. Supporting the anti-piracy behavior will help the education field to be better in the future.",14,18,39,52,Psychology; Law; Protection motivation theory; Software; Field (Bourdieu); Response efficacy; Educational software; Fear appeal,,,,,https://onlinejour.journals.publicknowledgeproject.org/index.php/i-jet/article/download/10973/5946 https://online-journals.org/index.php/i-jet/article/viewFile/10973/5946 https://onlinejour.journals.publicknowledgeproject.org/index.php/i-jet/article/view/10973 https://www.online-journals.org/index.php/i-jet/article/view/10973 https://learntechlib.org/p/217186/ https://dblp.uni-trier.de/db/journals/ijet/ijet14.html#MirajaPPBR19,http://dx.doi.org/10.3991/ijet.v14i18.10973,,10.3991/ijet.v14i18.10973,2978464646,,0,,19,true,cc-by,gold 037-033-666-368-375,Perlindungan Hukum Terhadap Karya Cipta Lagu “Hilang” Atas Tindakan Perbanyakan Atas Karya Cipta Tanpa Perjanjian Lisensi (Studi Putusan Mahkamah Agung Republik Indonesia Nomor 192 PK/Pdt.Sus/2010),2019-09-30,2019,journal article,Jurnal Hukum Kaidah: Media Komunikasi dan Informasi Hukum dan Masyarakat,26139340; 14121255,Universitas Islam Sumatera Utara,,Khairil Fahmi,"The development of human creativity in creating a work that can have economic value requires legal protection. This protection is very important to encourage the creative enthusiasm of people. There are some basic principles of the copyright law protection of the sound recordings results in its protection that need to be considered, such as what is protected by copyright is an idea that has been tangible and original. As a result of law enforcement efforts against piracy song or music copyright is regulated in the Article 72 where the law enforcement efforts by the government by providing criminal sanctions and civil sanctions with claims for compensation, the Supreme Court considers the reasons of the Petitioner for Review that these reasons cannot be justified, because the judex juris did not commit an error or a real mistake in deciding the a quo case . In general, the forms of Song or Music copyright piracy are divided into several categories, namely Pirate, Couterfeit and Bootleging . The motive for the piracy is for commercial interests in the form of financial gain. The role of the government in law enforcement dealing with piracy is to provide strict sanctions in the form of confiscation and destruction of goods resulting from Copyright piracy carried out by the government. Keywords: Legal Protection, Copyright, Songs, Propagation Actions, License.",19,1,94,113,Commit; Political science; Petitioner; Law; Confiscation; Mistake; Sanctions; Supreme court; Law enforcement; License,,,,,https://jurnal.uisu.ac.id/index.php/jhk/article/download/1910/1400 https://jurnal.uisu.ac.id/index.php/jhk/article/view/1910,http://dx.doi.org/10.30743/jhk.v19i1.1910,,10.30743/jhk.v19i1.1910,3005964914,,0,,0,true,,bronze 037-207-693-416-229,Digital Piracy Under a Graduated Response Policy,,2019,journal article,Journal of Institutional and Theoretical Economics,09324569,Mohr Siebeck,Germany,Michael Vincent Arnold; Eric Darmon; Sylvain Dejean; Thierry Pénard,"Graduated response policies (e.g., three-strikes laws) are often adopted to deter repeated criminal activity. In 2009 France passed the Hadopi three-strikes law targeting digital piracy. We model the individual intertemporal decision to engage in illegal activity before and after receiving each strike and, contingent on this decision, the level of illegal content acquisition (piracy) within each stage. We find that monitoring efforts typically believed to deter criminal activity can have unintended results. For example, an increase in the probability of detection can increase piracy. An increase in the punishment is the only policy that unambiguously deters illegal activity.",175,2,372,393,Business; Law and economics; Punishment; Graduated response; Deterrence (legal); Digital piracy; Criminal behavior,,,,,https://ideas.repec.org/a/mhr/jinste/urndoi10.1628-jite-2018-0016.html https://halshs.archives-ouvertes.fr/halshs-01866946,http://dx.doi.org/10.1628/jite-2018-0016,,10.1628/jite-2018-0016,2955962345,,0,,2,false,, 037-396-819-192-853,Private or Public Law Enforcement? The Case of Digital Anti-Piracy Policies with Illegal Non-Monitored Behaviors,2016-12-20,2016,journal article,Review of Network Economics,14469022; 21945993,Walter de Gruyter GmbH,Germany,Eric Darmon; Thomas Le Texier,"Should rights be publicly or privately enforced in the case of digital piracy? The emergence of large-scale anti-piracy laws and the existence of illegal non-monitored channels raise important issues for the design of anti-piracy policies. We study the impact of these demand-side policies in two enforcement settings (namely, public and private enforcement settings) with an outside adoption option for users of an illegal non-monitored channel. Our results show that public enforcement generates higher monitoring and lower price levels, and also higher legal welfare than private enforcement. However, we identify potential conflicts of interest between the legal seller and the social planner when the efficiency of the illegal non-monitored channel is low. Introducing supply-side policies, i.e. policies targeted to suppliers of illegal content, we find that they may have unexpected impacts and can damage legal welfare. We also identify situations in which the two policies are substitutes or complements.",15,4,169,210,Public economics; Welfare; Business; Public law; Social planner; Copyright infringement; Enforcement; Law enforcement; Price level; Private law,,,,,https://econpapers.repec.org/RePEc:bpj:rneart:v:15:y:2016:i:4:p:169-210:n:1 https://ideas.repec.org/a/bpj/rneart/v15y2016i4p169-210n1.html,http://dx.doi.org/10.1515/rne-2016-0027,,10.1515/rne-2016-0027,2769098053,,0,002-338-659-689-303; 003-149-709-352-674; 003-847-542-728-999; 003-982-789-982-915; 005-444-494-708-307; 006-405-597-929-940; 006-640-792-460-818; 007-483-988-718-032; 007-676-489-021-039; 012-707-978-791-667; 019-297-304-577-424; 021-614-280-806-517; 030-823-075-021-486; 031-780-301-052-432; 032-391-864-105-363; 039-350-981-279-016; 041-470-778-328-140; 042-189-039-564-15X; 046-232-044-563-596; 049-698-234-112-01X; 064-961-315-125-460; 065-340-458-055-900; 066-660-706-410-262; 071-114-479-382-099; 073-301-396-282-814; 079-974-973-741-086; 083-314-077-463-736; 118-675-220-855-858; 122-774-617-866-545; 126-996-752-002-343; 128-666-566-100-995; 129-154-209-747-00X; 136-039-565-798-356; 139-864-918-380-203; 140-131-325-230-370; 144-286-904-436-703; 147-454-181-506-681; 153-552-384-031-475; 153-965-680-783-191; 197-472-572-359-095,4,false,, 037-540-208-250-499,Pattern of global cyber war and crime: A conceptual framework,,2005,journal article,Journal of International Management,10754253,Elsevier BV,Netherlands,Nir Kshetri,"The flourishing synergy arising between organized crimes and the Internet has increased the insecurity of the digital world. How hackers frame their actions? What factors encourage and energize their behavior? These are very important but highly underresearched questions. We draw upon literatures on psychology, economics, international relation and warfare to propose a framework that addresses these questions. We found that countries across the world differ in terms of regulative, normative and cognitive legitimacy to different types of web attacks. Cyber wars and crimes are also functions of the stocks of hacking skills relative to the availability of economic opportunities. An attacking unit’s selection criteria for the target network include symbolic significance and criticalness, degree of digitization of values and weakness in defense mechanisms. Managerial and policy implications are discussed and directions for future research are suggested.",11,4,541,562,The Internet; Conceptual framework; Cyberwarfare; Digitization; Flourishing; Public relations; Normative; Legitimacy; Hacker,,,,,https://econpapers.repec.org/RePEc:eee:intman:v:11:y:2005:i:4:p:541-562 https://www.sciencedirect.com/science/article/abs/pii/S1075425305000700 https://ideas.repec.org/a/eee/intman/v11y2005i4p541-562.html https://libres.uncg.edu/ir/uncg//listing.aspx?id=7309 http://www.sciencedirect.com/science/article/pii/S1075425305000700 https://core.ac.uk/download/149237075.pdf,http://dx.doi.org/10.1016/j.intman.2005.09.009,,10.1016/j.intman.2005.09.009,3123661920,,0,004-916-367-446-865; 008-880-076-470-236; 009-630-896-337-048; 019-664-267-521-174; 020-900-493-741-113; 030-745-376-525-003; 034-093-799-294-766; 034-264-085-889-657; 035-325-670-176-458; 036-159-702-886-637; 036-768-990-231-89X; 036-806-161-013-435; 044-024-109-179-511; 044-136-929-129-209; 044-654-386-574-073; 046-460-274-989-300; 047-047-198-847-737; 049-219-615-824-319; 050-575-770-228-505; 054-602-768-224-157; 057-372-064-186-277; 065-209-559-677-668; 067-362-365-721-070; 071-907-688-587-285; 073-180-282-307-675; 086-285-005-719-092; 092-773-699-562-009; 093-203-828-285-442; 093-340-962-908-250; 097-217-247-840-21X; 098-251-797-040-466; 100-848-102-428-483; 105-416-790-215-416; 118-795-157-818-195; 123-987-051-617-106; 136-062-310-165-579; 139-896-380-587-304; 142-078-410-347-437; 144-878-227-535-526; 153-479-715-634-126; 154-089-119-838-088; 162-171-017-818-505; 180-078-032-350-943; 184-719-807-441-30X; 193-107-258-263-342,69,true,,green 037-675-067-047-558,Copyright Protection of Digital Movies Using the Coalition of Technology and Law in China,,2018,journal article,Chinese Studies,21685428; 2168541x,"Scientific Research Publishing, Inc.",,Xia Liu; Yunfei Zha,"Copyright protection of digital movie is becoming increasingly important with increasing developing of the information technology. In China, unlimited replication and rapid propagation of the network makes it increasingly difficult to monitor the copyright piracy and illegal dissemination. Currently, encryption and tracking technology is predominantly used for copyright protection of digital film. The law is also committed to combating piracy and protecting copyright. But neither technical protection nor legal protection can achieve the protective effect that is necessary. Every year, the industry loses billions of dollars in revenue and faces the potential loss of hundreds of thousands of jobs. And Chinese laws do not define the consumer’s responsibilities. So the legal protection is a little weak in reality. This paper argues that there is a need for an alliance of technology and law. Copyright owners actively carry out technical protection to minimize the impact of piracy. Simultaneously, when the technical protection fails or has loopholes, the law shall punish the infringer severely according to the technical data and proof, and deter the offender. This is the better way to protect the copyright of digital film.",07,4,259,276,Information technology; Business; Encryption; China; Revenue; Law; Carry (investment); Alliance; Legal protection; Replication (computing),,,,,https://www.scirp.org/Journal/PaperInformation.aspx?PaperID=87271 https://file.scirp.org/Html/1-2550303_87271.htm http://file.scirp.org/Html/1-2550303_87271.htm,http://dx.doi.org/10.4236/chnstd.2018.74023,,10.4236/chnstd.2018.74023,2891268902,,0,009-111-425-282-330; 019-942-883-069-342; 037-712-830-063-915; 040-294-130-451-422; 083-148-486-695-350; 102-478-462-148-538; 181-246-356-645-816,3,true,cc-by,gold 037-896-979-140-498,Auction sites are piracy havens,,2001,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,2001,4,3,3,Business; Computer security; International trade; Computer science,,,,,,http://dx.doi.org/10.1016/s1361-3723(01)00406-7,,10.1016/s1361-3723(01)00406-7,,,0,,0,false,, 037-912-175-469-738,Desain dan Kasus Pembajakan Karya Intelektual di Indonesia,2005-12-19,2005,journal article,Mediator: Jurnal Komunikasi,25810758; 14115883,Universitas Islam Bandung (Unisba),,Ferry Darmawan; Saefuddin Saefuddin,"Design piracy, though considered as serious problems, is often overlooked. This phenomenoncommonly found in Third World countries. The government have been have been employing many ways to reduce piracy, such as adopting Intellectual Property Rights. But the effort to combat piracy was challenged by some parties which benefited from such activities. Piracy, in micro perspective, eliminates fair competition and creates unfair competition. The culture of piracy also harassed and submerged the role of law. Law enforcement toward Intellectual Property Rights is a must. The challenge is how to awaken members of society toward the importance of Intellectual Property Rights.",6,2,237,246,Government; Political science; Law and economics; Law; Perspective (graphical); Unfair competition; Law enforcement; Competition (economics); Third world; Intellectual property,,,,,https://ejournal.unisba.ac.id/index.php/mediator/article/view/1192 https://ejournal.unisba.ac.id/index.php/mediator/article/download/1192/746 https://www.neliti.com/id/publications/153975/desain-dan-kasus-pembajakan-karya-intelektual-di-indonesia,http://dx.doi.org/10.29313/mediator.v6i2.1192,,10.29313/mediator.v6i2.1192,2328389503,,0,,0,true,cc-by,gold 037-960-760-459-713,Digital piracy: utilising efficient digital distribution models as an alternative to strengthening enforcement,,2011,journal article,International Journal of Private Law,17536235; 17536243,Inderscience Publishers,United Kingdom,Michael Filby,"The recently published Media Piracy in Emerging Economies report includes a detailed consideration of the conflict between the regulatory approach of strengthening IP regulations and enforcement, and the establishing of new business models in order to take advantage of efficient digital distribution. This paper defines the currently existing digital distribution model that describes how consumers presently access digital content, both legitimately and illegitimately. This foundation is then used to identify a number of alternative new business models and existing models that have been adapted from the analogue age such as indirectly supported distribution and advertising supported distribution, and the operation of the network effect, that together rely on a model of efficient distribution. It is concluded that due to the ineffectiveness of stronger enforcement at impeding piracy, the adoption of new models to adapt to efficient distribution remains the most efficacious approach.",4,4,488,,The Internet; Risk analysis (engineering); Emerging markets; Digital content; Enforcement; Intellectual property; Computer science; Business model; File sharing; Network effect,,,,,https://www.inderscienceonline.com/doi/abs/10.1504/IJPL.2011.042687,http://dx.doi.org/10.1504/ijpl.2011.042687,,10.1504/ijpl.2011.042687,3125160704,,0,,1,false,, 038-092-153-352-067,The Question of Pirate Trials in States Without a Crime of Piracy,2020-12-01,2020,journal article,Chinese Journal of International Law,15401650; 17469937,Oxford University Press (OUP),United States,Zou Keyuan; Jin Jing,"Many States in the world such as China have no specific domestic laws providing for the crime of piracy, leading to the question whether these States have the competence to punish piracy as required by international law. This paper argues that the lack of a crime of piracy within a domestic legal system should not become an insurmountable obstacle for States to prosecute pirates. Prosecution of pirates without a crime of piracy is feasible in a State that has domestic criminal laws that deal with illicit activities similar to piracy by indicting perpetrators with other criminal offences. While it would be an ideal solution for that State to establish a specific crime of piracy in its domestic legal system, it is important to consider the difficulties in setting the definition of piracy and the degree of punishment appropriately, and realize that the major deficiencies in punishing pirates under other existing domestic crimes can be basically addressed within an existing domestic legal system. The main purpose of universal jurisdiction over piracy to punish criminals to the maximum extent and the changing situation of piracy also require States to always be ready to deal with piracy. Therefore, prosecuting pirates as another crime is a realistic compromise. Furthermore, for a State without a crime of piracy, it is more urgent for it to build up legal grounds for exercising universal jurisdiction over piracy and relevant procedural provisions on the exercise of extraterritorial jurisdiction over international crimes at sea.",19,4,591,623,Political science; Law and economics; Competence (law); China; Universal jurisdiction; State (polity); Punishment; Extraterritorial jurisdiction; Compromise; International law,,,,China’s National Social Sciences Foundation,http://clok.uclan.ac.uk/36673/ https://academic.oup.com/chinesejil/article-abstract/19/4/591/6128713,http://dx.doi.org/10.1093/chinesejil/jmaa040,,10.1093/chinesejil/jmaa040,3128372185,,0,,0,false,, 038-638-044-536-723,Intellectual Property Crimes with Special Reference to Software Piracy,,2014,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Mudit Nema,,,,,,Advertising; Political science; Law and economics; Punishment; Software; Global issue; Intellectual property; Victimless crime,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2398008 https://www.ssrn.com/abstract=2398008 https://papers.ssrn.com/sol3/Delivery.cfm?abstractid=2412426,http://dx.doi.org/10.2139/ssrn.2398008,,10.2139/ssrn.2398008,2262759066,,0,,0,false,, 038-724-347-017-50X,Sovereign Piracy,2001-01-01,2001,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,G. Mitu Mitu Gulati; Kenneth N. Klee,,,,,,Sovereignty; Business; Law and economics; Political science; International trade; Law; Economics; Politics,,,,,,http://dx.doi.org/10.2139/ssrn.272194,,10.2139/ssrn.272194,,,0,033-997-310-466-100; 060-735-271-999-463; 108-466-681-926-328,7,false,, 038-969-491-059-785,The Piracy Gap: Protecting Intellectual Property in an Era of Artistic Creativity and Technological Change,,1997,journal article,Willamette Law Review,01919822,,,Sherri L. Burr,,33,1,245,260,Creativity; Technological change; Political science; Law and economics; Intellectual property,,,,,https://digitalrepository.unm.edu/law_facultyscholarship/639/ https://digitalrepository.unm.edu/cgi/viewcontent.cgi?article=1643&context=law_facultyscholarship,https://digitalrepository.unm.edu/law_facultyscholarship/639/,,,2803552696,,0,,2,false,, 038-974-541-771-022,Criminal law aspects of piracy at sea according to the UNCLOS with reference to the Croatian legal system1,2020-12-21,2020,journal article,Pomorstvo,18468438; 13320718,"University of Rijeka, Faculty of Maritime Studies",Croatia,Maja Buhovac; Marko Pilić; Stipe Jukić,"Piracy is traditionally one of the oldest forms of violation of international law and a global threat to maritime traffic. It is a serious international offense against which criminal protection is ensured in the domestic legal system, relying on the postulates of international maritime law, and in particular the Convention on the Law of the Sea. In this paper, the authors deal with the legal analysis of the incrimination of piracy at the international and national levels. In relation to the Republic of Croatia, the authors present recent regulations regarding this international criminal offense in the domestic legal system. This paper aims to point out the fundamental problems caused by the existing regulations regarding this international crime, especially when it comes to jurisdiction over piracy, universal jurisdiction, taking over criminal prosecution, etc.",34,2,282,290,Political science; United Nations Convention on the Law of the Sea; Law; Criminal law; Universal jurisdiction; Territorial jurisdiction; Croatian,,,,,https://www.bib.irb.hr/1099427 https://hrcak.srce.hr/file/360691 https://hrcak.srce.hr/index.php?show=clanak&id_clanak_jezik=360691,http://dx.doi.org/10.31217/p.34.2.9,,10.31217/p.34.2.9,3117178330,,0,025-784-266-343-445; 106-619-699-607-570; 137-701-371-644-340; 166-991-318-248-349; 172-040-164-920-06X; 179-245-562-746-996,0,true,cc-by,gold 039-036-972-553-110,Toward an International Law of Piracy Sui Generis: How the Dual Nature of Maritime Piracy Law Enables Piracy to Flourish,,,journal article,Berkeley Journal of International Law,10855718,,,Lucas Bento,"This article explores the divergence between international and national legal responses to maritime piracy, and it addresses the benefits of a unified international legal framework. Current domestic, regional and international legal frameworks fail to adequately combat the nature and scale of maritime piracy, which increasingly impacts the shipping, global manufacturing and tourism industries and which governments now consider to be a serious problem. As of yet, no unified legal approach exists to address the problem of modern piracy. The crux of the argument advanced in this article is that an inadvertent – yet dangerous – bifurcation of legal developments has unfolded within the field of maritime piracy, consequently creating a body of law that lacks harmony.",29,2,399,,Dual (category theory); Political science; Tourism; Law; Divergence (linguistics); Harmony (color); Maritime piracy; Argument; International law; Scale (social sciences),,,,,https://paperity.org/p/81361024/toward-an-international-law-of-piracy-sui-generis-how-the-dual-nature-of-maritime-piracy http://scholarship.law.berkeley.edu/cgi/viewcontent.cgi?article=1406&context=bjil https://scholarship.law.berkeley.edu/bjil/vol29/iss2/1/,http://dx.doi.org/10.15779/z38pd44,,10.15779/z38pd44,3122380532,,0,,14,false,, 039-065-867-682-351,The Elements of Maritime Piracy,,2012,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Callum Musto,,,,,,Statute; Political science; United Nations Convention on the Law of the Sea; Law; State (polity); Obstacle; Jurisdiction; Legislation; Maritime piracy; Law of the sea,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3109828,http://dx.doi.org/10.2139/ssrn.3109828,,10.2139/ssrn.3109828,3178458024,,0,004-284-104-668-332; 004-775-618-519-816; 009-514-148-005-613; 012-476-902-544-808; 013-063-289-139-580; 013-649-512-125-869; 017-210-477-168-242; 018-198-086-554-776; 019-062-452-273-899; 019-509-776-656-376; 024-463-978-022-777; 025-792-626-934-178; 026-633-140-110-222; 026-936-818-112-562; 027-646-963-496-399; 028-243-439-974-729; 029-845-740-382-057; 030-694-662-960-842; 030-807-991-157-346; 033-874-591-213-82X; 035-451-086-821-849; 036-600-204-756-930; 037-566-338-304-358; 038-795-733-780-982; 040-981-953-293-992; 041-960-201-469-952; 042-522-108-066-725; 044-092-642-617-828; 048-189-815-242-195; 049-659-644-922-179; 050-013-757-145-858; 050-092-638-200-71X; 050-569-131-604-18X; 051-615-096-129-715; 052-982-895-978-984; 053-780-458-242-099; 060-925-104-157-717; 061-453-006-799-349; 064-953-361-262-810; 068-392-169-079-969; 069-755-166-766-989; 071-402-742-463-985; 072-191-838-583-729; 072-580-620-081-274; 072-924-916-153-106; 075-194-748-142-607; 076-381-322-394-874; 077-331-231-343-247; 084-995-589-177-55X; 087-088-697-328-546; 088-466-238-643-135; 089-435-752-439-668; 090-010-606-985-689; 090-890-021-582-778; 094-970-581-184-423; 097-802-687-984-214; 099-819-037-879-440; 103-535-183-073-283; 106-619-699-607-570; 107-607-958-735-963; 111-420-009-137-990; 112-593-526-248-228; 117-312-710-168-234; 125-511-004-952-971; 126-627-706-283-267; 130-811-369-705-557; 133-678-064-930-242; 139-976-138-233-225; 140-141-261-651-529; 143-891-228-787-557; 149-400-507-335-78X; 150-093-164-260-736; 152-378-433-943-132; 153-671-502-273-865; 154-201-685-261-110; 160-923-642-874-971; 179-251-363-129-080; 183-169-029-370-321; 184-934-365-982-695; 187-461-291-393-637,0,false,, 039-141-623-498-314,Piracy law update shows promise,2012-03-01,2012,journal article,IHS Fairplay,,,,Stephen Spark,"While major state fail to bring a single pirate to trial, updating piracy laws offers a practical solution, writes Stephen Spark.",374,,,,Engineering; Law; State (polity); Spark (mathematics),,,,,https://trid.trb.org/view/1135587,https://trid.trb.org/view/1135587,,,636124246,,0,,0,false,, 039-234-329-493-662,COUNTER-PIRACY LAW ENFORCEMENT AND HUMAN RIGHTS,2010-01-27,2010,journal article,International and Comparative Law Quarterly,00205893; 14716895,Cambridge University Press (CUP),United Kingdom,Douglas Guilfoyle,"In the remarkably short period from April 2007 to mid-2009 a flurry of hard and soft-law-making activity has constructed an increasingly comprehensive and decentralized legal framework addressing piracy off Somalia. Warships operate under a variety of national and international mandates, and there is no single unified command covering all counter-piracy missions. Bilateral transfer agreements sit alongside a regional code of conduct, and both sit within the framework of the law of the sea and Security Council Resolutions. One-size-fits-all solutions have been eschewed for a pragmatic range of national and international mechanisms. Nonetheless, captured piracy suspects raise significant questions about their arrest, detention and transfer to a State willing to try them, especially for State parties to the European Convention on Human Rights. This article first outlines the general legal framework surrounding Somali piracy before addressing to specific human rights issues and potential ways forward.",59,1,141,169,Sociology; Human rights; United Nations Convention on the Law of the Sea; Law; State (polity); Somali; Code of conduct; Law enforcement; Convention; International human rights law,,,,,http://discovery.ucl.ac.uk/144267/ https://www.cambridge.org/core/services/aop-cambridge-core/content/view/S002058930999011X https://research.monash.edu/en/publications/counter-piracy-law-enforcement-and-human-rights https://www.cambridge.org/core/journals/international-and-comparative-law-quarterly/article/counterpiracy-law-enforcement-and-human-rights/4DDFE463721681901FEEE1CE6A6FD750,http://dx.doi.org/10.1017/s002058930999011x,,10.1017/s002058930999011x,2146485098,,0,002-085-787-133-155; 030-452-208-915-046; 033-037-074-962-795; 040-026-877-083-372; 051-393-025-360-687; 077-546-002-877-69X; 106-619-699-607-570; 144-692-248-255-931; 152-378-433-943-132; 168-758-120-821-201; 179-565-068-275-28X; 188-516-240-120-921,53,false,, 039-908-980-071-336,Formulating specialised Legislation to address the Growing Spectre of Cybercrime: A Comparative Study,2017-06-26,2017,journal article,Potchefstroom Electronic Law Journal,17273781,Academy of Science of South Africa,,Fawzia Cassim,"There appears to be no precise definition for cybercrime or 'computer crime'. Computer crime has been described as ""any violation of criminal law that involves knowledge of computer technology by the perpetrator, investigator or prosecution"". Cybercrime (online misdemeanour) has been defined as including any crime carried out primarily by means of a computer on the Internet; for example, hacking into or damaging a computer network, accessing and stealing electronic data without authorisation, and cyberstalking (via e-mail threats of violence or extortion). Thus, on the one hand, a computer may be the 'object' of the crime when there is theft of computer hardware or software, or a computer may be the 'subject' of a crime when it is used as an 'instrument' to commit traditional crimes such as fraud, theft, extortion, or 'new' types of criminal activity such as denial of service attacks and malware, identity theft, child pornography, copyright infringement, mail or wire-fraud.",12,4,35,79,Business; Law; Cyberstalking; Extortion; Cybercrime; Copyright infringement; International cybercrime; Computer technology; Identity theft; Hacker,,,,,https://umkn-dsp01.unisa.ac.za/handle/10500/21741?show=full https://perjournal.co.za/article/download/2740/2544 https://doaj.org/article/f0ba7c3b3ea44458942d5984c3b66fd3 http://www.scielo.org.za/scielo.php?script=sci_arttext&pid=S1727-37812009000400004 https://uir.unisa.ac.za/handle/10500/21741?show=full https://www.ajol.info/index.php/pelj/article/view/50049 http://www.puk.ac.za/opencms/export/PUK/html/fakulteite/regte/per/issuepages/2009Volume12no4/2009x12x4_Cassim_art.pdf https://journals.assaf.org.za/per/article/view/2740 https://perjournal.co.za/article/view/2740 https://dspace.nwu.ac.za/bitstream/handle/10394/3647/2009x12x4_Cassim_art.pdf?sequence=1 https://journals.assaf.org.za/per/article/download/2740/2544 https://journals.co.za/content/perblad/12/4/EJC86756 https://dspace.nwu.ac.za/handle/10394/3647 https://repository.nwu.ac.za/handle/10394/3647 https://www.ajol.info/index.php/pelj/article/download/50049/36367 http://www.scielo.org.za/pdf/pelj/v12n4/a04v12n4.pdf https://core.ac.uk/download/pdf/231093562.pdf,http://dx.doi.org/10.17159/1727-3781/2009/v12i4a2740,,10.17159/1727-3781/2009/v12i4a2740,2064289195,,0,003-458-222-023-181; 003-754-130-337-761; 007-851-897-427-13X; 045-545-834-607-021; 056-802-252-549-662; 057-160-402-759-652; 062-910-696-319-177; 075-527-406-230-095; 100-767-382-538-470; 105-846-709-264-473; 108-364-206-991-297; 156-356-730-195-650; 159-636-480-564-315; 175-927-276-243-151; 191-286-356-138-987,4,true,cc-by,gold 040-002-898-138-68X,Toward a Revision of the International Law of Piracy,2015-03-11,2015,journal article,Depaul Law Review,00117188,,,Clyde H. Crockett,,26,1,78,,Political science; Law; International law,,,,,https://via.library.depaul.edu/law-review/vol26/iss1/5/ https://via.library.depaul.edu/cgi/viewcontent.cgi?article=2619&context=law-review,https://via.library.depaul.edu/law-review/vol26/iss1/5/,,,233145970,,0,,0,false,, 040-219-306-828-925,ESSAYS ON PIRACY: An Introduction to the International Law on Piracy,,1990,journal article,California Western international law journal,08863210,,,John E. Noyes,,21,1,5,,Political science; Law; International law,,,,,https://scholarlycommons.law.cwsl.edu/cwilj/vol21/iss1/5/ https://scholarlycommons.law.cwsl.edu/cgi/viewcontent.cgi?article=1414&context=cwilj,https://scholarlycommons.law.cwsl.edu/cwilj/vol21/iss1/5/,,,2992370954,,0,,1,false,, 040-485-738-775-339,A strong stance against software piracy,,1993,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1993,9,4,4,Software; Computer science; Computer security; Business; Operating system,,,,,,http://dx.doi.org/10.1016/0142-0496(93)90230-t,,10.1016/0142-0496(93)90230-t,,,0,,0,false,, 040-527-520-267-73X,Piracy crackdown in New Zealand,,1995,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1995,1,3,4,Business; Computer security; Computer science,,,,,,http://dx.doi.org/10.1016/0142-0496(95)80009-3,,10.1016/0142-0496(95)80009-3,,,0,,0,false,, 040-573-773-028-697,FAST bogged down by software piracy,,1995,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1995,2,3,4,Software; Computer science; Computer security; Operating system,,,,,,http://dx.doi.org/10.1016/0142-0496(95)80106-5,,10.1016/0142-0496(95)80106-5,,,0,,0,false,, 040-646-496-214-639,Human Aspects in Digital Rights Management: the Perspective of Content Developers.,2016-12-16,2016,journal article,SCRIPTed,17442567,Wiley,,Marcella Favale; Neil McDonald; Shamal Faily; Christos Gatzidis,"Legal norms and social behaviours are some of the human aspects surrounding the effectiveness and future of DRM security. Further exploration of these aspects would help unravel the complexities of the interaction between rights protection security and law. Most importantly, understanding the perspectives behind the circumvention of content security may have a significant impact on DRM effectiveness and acceptance at the same time. While there has been valuable research on consumer acceptability, (The INDICARE project, Bohle 2008, Akester 2009) there is hardly any work on the; human perspective of content creators. Taking video games as a case study, this paper employs qualitative socio-legal analysis and an interdisciplinary approach to explore this particular aspect of content protection.",13,3,289,304,Internet privacy; Sociology; Work (electrical); Perspective (graphical); Content (Freudian dream analysis); Content security; Legal norm; Digital rights management,,,,,https://script-ed.org/article/human-aspects-of-digital-rights-management-the-perspective-of-content-developers/ http://eprints.bournemouth.ac.uk/23010/1/Human%20Aspects%20in%20DRM.pdf http://eprints.bournemouth.ac.uk/25478/ https://script-ed.org/?p=3193 https://core.ac.uk/download/74204544.pdf,http://dx.doi.org/10.2966/scrip.130316.289,,10.2966/scrip.130316.289,3125632580,,0,008-750-557-965-576; 022-350-574-902-598; 027-361-210-226-483; 039-587-992-216-489; 042-303-139-110-864; 057-512-593-590-218; 088-621-279-167-179; 143-610-563-677-917; 183-609-427-733-219,1,true,cc-by-nc-nd,gold 040-795-519-766-962,Contemporary maritime piracy: five obstacles to ending Somali piracy,2013-03-27,2013,journal article,Global Policy,17585880; 17585899,Wiley,United Kingdom,Sarah Percy; Anja Shortland,,4,1,65,72,Political science; Law; Somali; Maritime piracy,,,,,https://core.ac.uk/display/43388562 https://onlinelibrary.wiley.com/doi/abs/10.1111/1758-5899.12043 https://ideas.repec.org/a/bla/glopol/v4y2013i1p65-72.html https://econpapers.repec.org/article/blaglopol/v_3a4_3ay_3a2013_3ai_3a1_3ap_3a65-72.htm https://espace.library.uq.edu.au/view/UQ:380623,http://dx.doi.org/10.1111/1758-5899.12043,,10.1111/1758-5899.12043,2129463841,,0,012-703-976-561-544; 029-541-891-801-797; 045-440-821-059-264; 047-108-257-036-43X; 061-201-853-587-290; 063-595-703-476-39X; 064-954-713-529-545; 071-872-706-989-134; 084-378-059-689-810; 113-589-375-707-427; 118-027-735-704-770; 122-740-834-718-041; 154-324-634-025-476,11,false,, 040-812-619-024-749,Problems of Intellectual Piracy and Counterfeiting in the EAEU Countries,2021-03-25,2021,journal article,Intellectual property law,20724322,The Publishing Group Jurist,,T.K. Kanatov,"This article discusses the problematic issues of intellectual piracy and counterfeiting in the EEU countries. Analyzed international instruments, given the statistics in the context of the EEC according to the ECA, the FCS, the types of the main groups of counterfeit goods moved across the customs border, the issues of online trading of counterfeit products, given the statistics of the market size of counterfeit products. The legal characteristics of the concepts of «counterfeit», «intellectual piracy» from the point of view of legislation, doctrine and practice are given. In order to prevent offenses, special tables of «counterfeit indices» developed by the Russian Anti-Piracy Organization to help law enforcement agencies and copyright holders, which allows them to independently identify counterfeit copies without the involvement of experts, as well as the table of the Moscow Center for Independent Comprehensive Examination and Certification of Systems and Technologies, which proposed to use a system of criteria for protecting computer disks with computer programs from counterfeiting according to certain criteria, are considered. Purpose. To investigate current problematic issues of intellectual piracy and counterfeiting in the EAEU countries. Methodology: system-structural, concrete-sociological, historical-legal, social-legal, comparative-legal, statistical methods of work were used in writing the article. Results. Proposals and conclusions based on the analysis of international legislation, as well as regulatory legal acts of the EAEU countries that were in force at the moment. The relevance and practical significance of the article lies in the analysis of intellectual piracy and counterfeiting in the EAEU countries. The special significance of this study lies in the fact that the developed theoretical provisions of this work can be used in the future for further study and consideration of issues related to counterfeiting and intellectual piracy in the doctrine and legislation of the EAEU countries. With this research, the author invests a significant resource in the theoretical part of civil law. Novelty/originality/value: The article has a high scientific value, as it is one of the first attempts to consider topical issues of intellectual piracy and counterfeiting in the EAEU countries.",1,,29,33,Counterfeit; Legislation; Intellectual property; Enforcement; Relevance (law); Order (exchange); Certification; Law; Commission; Business; Context (archaeology); Political science; Law and economics,,,,,,http://dx.doi.org/10.18572/2072-4322-2021-1-29-33,,10.18572/2072-4322-2021-1-29-33,,,0,,0,true,,bronze 040-814-969-118-445,Software piracy & corporate compliance:,,1994,journal article,Computer Law & Security Review,02673649,Elsevier BV,United Kingdom,C. Ian Kyer,,10,5,245,246,Business; Software; Compliance (psychology); Computer security,,,,,http://dblp.uni-trier.de/db/journals/clsr/clsr10.html#Kyer94 http://linkinghub.elsevier.com/retrieve/pii/0267364994900086 http://www.sciencedirect.com/science/article/pii/0267364994900086 https://doi.org/10.1016/0267-3649(94)90008-6,http://dx.doi.org/10.1016/0267-3649(94)90008-6,,10.1016/0267-3649(94)90008-6,1998965530,,0,,0,false,, 040-823-496-634-101,Piracy in Roman Law and the Beginnings of International Criminal Law,2012-01-21,2012,journal article,Polish Review of International and European Law,25447432; 22992170,Uniwersytet Kardynala Stefana Wyszynskiego,,Anna Tarwacka,,1,1-2,57,73,Comparative law; Chinese law; Black letter law; Common law; Political science; Public law; Civil law (legal system); Law; Criminal law; Legal history,,,,,http://czasopisma.uksw.edu.pl/index.php/priel/article/view/1152,http://dx.doi.org/10.21697/priel.2012.1.1.02,,10.21697/priel.2012.1.1.02,2767215487,,0,,0,true,,bronze 040-852-754-604-216,Pirating in Lacuna,2019-07-05,2019,journal article,Beijing Law Review,21594635,,,D. S. Madhumitha,"With development of industries and a welcome to the era of globalization along with information technology, many software companies came into being. Tech and tech experts made it easier to pirate the software of the producers. Problems to the customer as well as to the content owner are present. One of major lacunas is the Judiciary being indecisive with the adamant growth of digital world as to the punishment and the reduction of crime, no separate laws by the legislators to protect the software piracy as a distinct crime. Lack of enforcement mechanism by the executive and administrative bodies leads to the increase of piracy in software.",10,4,829,838,Information technology; Business; Globalization; Punishment; Software; Enforcement; Public relations,,,,,https://www.scirp.org/journal/paperinformation.aspx?paperid=94449,https://www.scirp.org/journal/paperinformation.aspx?paperid=94449,,,2972140955,,0,013-522-589-546-428; 063-024-736-152-237,0,false,, 040-957-779-767-610,Piracy: Air and Sea,2015-04-08,2015,journal article,Depaul Law Review,00117188,,,Jacob W. F. Sundberg,,20,2,337,,,,,,,https://via.library.depaul.edu/cgi/viewcontent.cgi?article=2944&context=law-review https://via.library.depaul.edu/law-review/vol20/iss2/2/,https://via.library.depaul.edu/law-review/vol20/iss2/2/,,,422506883,,0,,0,false,, 041-006-185-936-678,Financial and Non-financial Implications of Cybercrimes in Emerging Countries☆,,2015,journal article,Procedia Economics and Finance,22125671,Elsevier BV,,Mihail Antonescu; Ramona Birau,"Abstract This article aims to investigate financial and non-financial implications of cybercrimes in emerging countries. In a globalized world, is very difficult to quantify in a precise manner the economic impact of cybercrimes. Nevertheless, there are significant differences among financial and non-financial implications of cybercrime attacks. Despite widespread awareness, the vulnerability of emerging countries regarding cybersecurity surveys is still very high.",32,,618,621,Finance; Emerging markets; Business; Vulnerability; Economic impact analysis; Cybercrime; Financial fraud; Intellectual property; Identity theft,,,,,https://www.sciencedirect.com/science/article/abs/pii/S2212567115014409 https://www.sciencedirect.com/science/article/pii/S2212567115014409 https://core.ac.uk/download/pdf/82376169.pdf,http://dx.doi.org/10.1016/s2212-5671(15)01440-9,,10.1016/s2212-5671(15)01440-9,2262486124,,0,064-009-139-829-255; 077-873-261-261-599; 094-517-669-663-060; 102-599-212-097-716,13,true,,gold 041-061-538-346-924,Factors influencing digital forensic investigations: Empirical evaluation of 12 years of Dubai police cases,,2015,journal article,"Journal of Digital Forensics, Security and Law",15587223,Embry-Riddle Aeronautical University/Hunt Library,,Ibtesam Al Awadhi; Janet C. Read; Andrew Marrington; Virginia N. L. Franqueira,"In Digital Forensics, the number of person-hours spent on investigation is a key factor which needs to be kept to a minimum whilst also paying close attention to the authenticity of the evidence. The literature describes challenges behind increasing person-hours and identifies several factors which contribute to this phenomenon. This paper reviews these factors and demonstrates that they do not wholly account for increases in investigation time. Using real case records from the Dubai Police, an extensive study explains the contribution of other factors to the increase in person-hours. We conclude this work by emphasizing on several factors affecting the person-hours in contrast to what most of the literature in this area proposes.",10,4,7,16,Work (electrical); Political science; Empirical data; Case records; Computer security; Public relations; Computer forensics; Digital forensics,,,,,https://zuscholars.zu.ac.ae/works/1642/ https://commons.erau.edu/jdfsl/vol10/iss4/1/ https://derby.openrepository.com/handle/10545/600540 https://commons.erau.edu/cgi/viewcontent.cgi?article=1207&context=jdfsl http://derby.openrepository.com/derby/bitstream/10545/600540/1/361-1320-1-PB.pdf https://zuscholars.zu.ac.ae/cgi/viewcontent.cgi?article=2641&context=works https://core.ac.uk/display/46171175 https://derby.aws.openrepository.com/handle/10545/600540 https://doi.org/10.15394/jdfsl.2015.1207 http://clok.uclan.ac.uk/18386/ https://core.ac.uk/download/46171175.pdf,http://dx.doi.org/10.15394/jdfsl.2015.1207,,10.15394/jdfsl.2015.1207,2288156152,,0,005-465-138-684-882; 024-539-327-776-880; 072-399-102-731-218; 073-847-291-567-156; 077-590-082-657-678; 079-070-981-899-105; 090-752-043-508-733; 192-955-966-543-738,1,true,cc-by-nc,gold 041-213-454-213-833,Leaving the Corsair's Name to Other Times: How to Enforce the Law of Sea Piracy in the 21st Century through Regional International Agreements,,1999,journal article,Case Western Reserve Journal of International Law,00087254,,,Timothy H. Goodman,,31,1,139,,Political science; Law; Maritime piracy; Law of the sea,,,,,https://scholarlycommons.law.case.edu/jil/vol31/iss1/5/ https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1506&context=jil,https://scholarlycommons.law.case.edu/jil/vol31/iss1/5/,,,2549049093,,0,,0,false,, 041-319-802-649-98X,Can an Act of Piracy be Committed Against an Offshore Petroleum Installation,2012-10-31,2012,journal article,Australian and New Zealand Maritime Law Journal,18340881,,,Mikhail Kashubsky,This paper assesses piracy as a security threat to offshore petroleum installations and analyses how the international legal framework addresses piracy in the context of offshore petroleum installations. The paper attempts to answer the key question of whether an act of piracy can be committed against an offshore petroleum installation in the legal sense.,26,2,163,171,Business; Submarine pipeline; Law and economics; Law; Key (cryptography); Context (language use); Petroleum,,,,,https://ssl.law.uq.edu.au/journals/index.php/maritimejournal/article/view/189 https://ssl.law.uq.edu.au/journals/index.php/maritimejournal/article/download/189/232 https://newcustomscentre.files.wordpress.com/2013/10/can-an-act-of-piracy-be-committed-against-an-offshore-petroleum-installation.pdf http://customscentre.com/wp-content/uploads/2013/10/can-an-act-of-piracy-be-committed-against-an-offshore-petroleum-installation.pdf,https://ssl.law.uq.edu.au/journals/index.php/maritimejournal/article/view/189,,,1546096826,,0,,0,false,, 041-413-357-728-700,Piracy war launched in Poland,,1994,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1994,5,2,2,Launched; Political science; Computer security; Aeronautics; Business; Computer science; Engineering; Electrical engineering,,,,,,http://dx.doi.org/10.1016/0142-0496(94)90037-x,,10.1016/0142-0496(94)90037-x,,,0,,0,false,, 041-419-602-788-748,Particularities of the Forensic Investigation of Software Piracy and Online Piracy,,2019,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Adrian Cristian Moise,"Starting from the analysis of the Law no 8/1996 on copyright and related rights in Romania, and continuing with the analysis of the main provisions of the European Union Directive 2001/29/EC on copyright and related rights in the information society and the European Union Directive 2009/24/EC on the legal protection of computer programs, the article presents and analyzes aspects of the criminal investigation of software piracy and online piracy. The article analyzes both some of the criminal investigation acts commonly used in software piracy such as technical-scientific findings and forensic expertise of copyrighted software or related rights, and some methodological issues related to forensic investigation of software piracy and online piracy.",,,,,Criminal investigation; Forensic science; Political science; Law; Software; Related rights; Information society; Directive; European union; Legal protection,,,,,https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID3459614_code2704251.pdf?abstractid=3459614&mirid=1 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3459614,http://dx.doi.org/10.2139/ssrn.3459614,,10.2139/ssrn.3459614,3175781369,,0,063-195-309-093-275; 146-414-742-439-536,0,true,cc-by,green 041-433-640-557-159,Piracy in Europe costs $4.4 billion a year,,1996,journal article,Computer Fraud & Security,13613723,Mark Allen Group,United Kingdom,Michael McCormack,,1996,11,4,,,,,,,https://www.sciencedirect.com/science/article/pii/1361372396889263,http://dx.doi.org/10.1016/1361-3723(96)88926-3,,10.1016/1361-3723(96)88926-3,2084559811,,0,,0,false,, 041-723-074-053-006,Is there an international obligation to prosecute pirates,2011-12-20,2011,journal article,Netherlands International Law Review,0165070x; 17416191,Springer Science and Business Media LLC,United Kingdom,Saiful Karim,"Combating piracy at sea and apprehending pirates have been a long-standing problem for the global community. Increasing acts of piracy off the coast of Somalia have prompted the UN Security Council to intervene in the matter. The Council, through several resolutions, has authorised states to take action against Somali pirates in the territorial waters and land territory of Somalia and recently adopted a resolution urging all states to fully implement relevant international conventions in their domestic legal systems. However, despite the Security Council’s intervention in the matter most states are still reluctant to prosecute Somali pirates in their domestic courts. Considering the most recent Security Council resolution and existing international law, this article examines whether there is an international obligation to criminalise piracy under domestic legal frameworks and to prosecute pirates in domestic courts. It submits that existing international law arguably imposes an obligation to prosecute pirates, at least in certain circumstances, and the recently adopted Security Council resolution reinforces this obligation.",58,3,387,407,Sociology; Public international law; Law; Somali; Obligation; Security council; International law; Intervention (law); Territorial waters,,,,,https://eprints.qut.edu.au/60312/ https://works.bepress.com/karim_saiful/5/ https://dialnet.unirioja.es/servlet/articulo?codigo=3799368 http://epubs.scu.edu.au/law_pubs/213/ https://link.springer.com/article/10.1017/S0165070X11300046,http://dx.doi.org/10.1017/s0165070x11300046,,10.1017/s0165070x11300046,2125460087,,0,037-394-472-600-790; 084-995-589-177-55X; 093-135-002-741-403; 106-619-699-607-570; 110-624-715-622-828; 112-756-060-430-338; 113-749-123-832-731; 132-321-976-263-106; 181-870-045-454-309; 185-104-823-389-543,3,false,, 041-809-066-417-196,"‘Even in the remotest corners of the world’: globalized piracy and international law, 1500–1900*",2010-10-27,2010,journal article,Journal of Global History,17400228; 17400236,Cambridge University Press (CUP),United Kingdom,Michael Kempe,"As a phenomenon accompanying European expansion, piracy and privateering spread globally, beginning in the sixteenth century. These activities, and their handling within transnational relations, shed light on several issues of modern international law, then under formation. They reflect different basic problems that both challenged and structured central aspects of legal relations on an international level: the transformation of ocean spaces into areas of colliding legal strategies, the use of privateers (‘legalized’ pirates) as a tool for extraterritorial expansion, the involvement of non-state players in international legal relations, the fragmentation of maritime sovereignty, and the application of international law to criminalize political resistance as piracy. That said, the international management of piracy shows that international law had the potential to resist its abuse as a mere instrument of politics and special interests. By focusing on piracy and privateering in early modern times, this article suggests a tension within modern international law, between its instrumentalization by particular interests and its status as an independent normative authority to correct or regulate such interests.",5,03,353,372,Sociology; Comparative law; Public international law; Sovereignty; Law; Resistance (psychoanalysis); Phenomenon; International law; Municipal law; Politics,,,,,https://www.cambridge.org/core/journals/journal-of-global-history/article/even-in-the-remotest-corners-of-the-world-globalized-piracy-and-international-law-15001900/B50A43C944DDB189D7FA2E5FC79B843D https://kops.uni-konstanz.de/bitstream/123456789/13728/2/kempe.pdf https://ideas.repec.org/a/cup/jglhis/v5y2010i03p353-372_00.html http://kops.uni-konstanz.de/bitstream/123456789/13728/2/kempe.pdf https://kops.uni-konstanz.de/handle/123456789/13728 https://econpapers.repec.org/RePEc:cup:jglhis:v:5:y:2010:i:03:p:353-372_00 https://www.cambridge.org/core/services/aop-cambridge-core/content/view/S1740022810000185 http://journals.cambridge.org/abstract_S1740022810000185 http://kops.uni-konstanz.de/bitstream/handle/123456789/13728/kempe.pdf?sequence=2&isAllowed=y,http://dx.doi.org/10.1017/s1740022810000185,,10.1017/s1740022810000185,2115123713,,0,002-516-259-561-510; 003-058-733-588-042; 010-744-922-210-51X; 021-915-731-166-344; 032-385-082-839-476; 035-939-886-805-088; 048-283-328-180-653; 051-265-676-733-639; 055-578-775-753-195; 058-441-831-045-882; 063-506-933-850-677; 073-560-751-997-854; 098-031-653-995-613; 104-043-662-116-901; 114-496-528-766-238; 116-067-205-392-38X; 160-186-006-041-525; 179-829-784-044-841; 199-668-829-638-151; 199-991-018-275-246,41,true,,green 041-971-841-374-701,Poly‐criminal Pirates and Ballooning Effects: Implications for International Counter‐piracy,2018-12-27,2018,journal article,Global Policy,17585880; 17585899,Wiley,United Kingdom,Katja Lindskov Jacobsen,"In view of continued international counter‐piracy efforts and these recent incidents, this article takes the five obstacles presented by Percy and Shortland (), as its point of departure for an analysis of key developments of importance for Somali piracy since 2013. Specifically, the article firsts offer an analysis and updated version of Percy and Shortland's five obstacles. Second, I argue, that a sixth obstacle should be added. This obstacle is the phenomenon that practitioners as well as academics working with organised crime refer to as ‘poly‐criminals’. Having elaborated on this additional obstacle – with reference to interviews conducted with key actors in Somalia – the third section explicates the policy impact of poly‐criminal pirates; it offers a discussion of what this alternative conception means for external actors’ counter‐piracy engagements, with particular attention to the risk of creating ‘balloon effects’ when addressing a challenge of this kind (poly‐criminals) through too narrowly defined counter‐piracy lenses, mandates and programmes.",10,1,52,59,Political science; Law and economics; Key (cryptography); Organised crime; Obstacle; Somali; Section (archaeology); Point of departure; Phenomenon,,,,,https://ideas.repec.org/a/bla/glopol/v10y2019i1p52-59.html https://onlinelibrary.wiley.com/doi/10.1111/1758-5899.12636,http://dx.doi.org/10.1111/1758-5899.12636,,10.1111/1758-5899.12636,2906913379,,0,040-795-519-766-962; 043-651-995-046-41X; 046-784-474-614-096; 051-330-602-248-073; 065-528-014-150-768; 079-183-677-457-063; 098-002-978-019-239; 105-161-522-936-135; 118-027-735-704-770; 122-740-834-718-041; 124-748-796-247-013; 133-706-330-733-328; 184-880-708-884-069,2,false,, 042-129-940-882-287,Prosecution of piracy cases – the Kenya experience,,2013,journal article,Commonwealth Law Bulletin,03050718; 17505976,Informa UK Limited,United Kingdom,Alexander M. Muteti,"The paper broadly captures the legal framework for the prosecution of piracy cases in Kenya, given the experience that Kenya has gained from piracy prosecutions since 2006. It also underscores the need for regional, coastal and flag states to co-operate in the repression of piracy off the coast of Somalia in line with the UN Security Council resolutions on the subject. The challenges that Kenya has encountered in piracy prosecutions are also highlighted, and suggestions on how best states can co-operate in this regard are made. International co-operation is identified as a key component to the success in combatting piracy.",39,1,73,77,Political science; Law; Security council,,,,,https://www.tandfonline.com/doi/full/10.1080/03050718.2012.751206,http://dx.doi.org/10.1080/03050718.2012.751206,,10.1080/03050718.2012.751206,2000710602,,0,,3,false,, 042-156-996-724-548,International Law Regime Against Piracy,2009-12-31,2009,journal article,Annual Survey of International & Comparative Law,,,,Lawrence Azubuike,,15,1,4,,International trade; Political science; International law,,,,,https://digitalcommons.law.ggu.edu/cgi/viewcontent.cgi?article=1127&context=annlsurvey https://paperity.org/p/81877132/international-law-regime-against-piracy https://digitalcommons.law.ggu.edu/annlsurvey/vol15/iss1/4/,https://paperity.org/p/81877132/international-law-regime-against-piracy,,,1550732519,,0,,13,false,, 042-539-233-422-54X,Problems of the investigation and prosecution in case of piracy at sea,,2015,journal article,"Zbornik radova Pravnog fakulteta, Novi Sad",05502179,Centre for Evaluation in Education and Science (CEON/CEES),,Kiš Amarila,"Sea piracy became a current topic around 2008 when the number of attacks increased in the Gulf of Aden. However it is more or less repressed by now, piracy has a unique shifting nature: it decreases in one region, but it increases in another, therefore it is always present to some extent. Besides, Somali piracy was the first that made international community take steps and these strategies and programmes serve as an important lesson that can be partly adaptable in other cases as well. It reveals important questions around enforcement jurisdiction and the most exciting problem: prosecutions. This paper attempts to briefly take a glance at those difficulties that can set back the success of a piracy prosecution and if there is a progress. First, it presents the root-cause: jurisdiction. National laws regulate piracy in a very different way or they don't criminalize them at all and this can lead to serious consequences. In the following chapter the process of investigation is presented. Collecting evidence is incredibly difficult in case of piracy and if it fails, prosecutions fail too. In the end the paper attempts to focus on the trial and what follows: costs of prosecutions, asylum-seekers, human rights considerations and prison facilities",49,1,361,374,Political science; Law,,,,,https://core.ac.uk/display/88806901 https://paperity.org/p/224727740/problems-of-the-investigation-and-prosecution-in-case-of-piracy-at-sea https://scindeks-clanci.ceon.rs/data/pdf/0550-2179/2015/0550-21791501361K.pdf,http://dx.doi.org/10.5937/zrpfns49-8319,,10.5937/zrpfns49-8319,2617662659,,0,,0,true,cc-by,gold 042-809-139-363-683,Varied Incident Rates of Global Maritime Piracy: Toward a Model for State Policy Change:,2020-07-31,2020,journal article,International Criminal Justice Review,10575677; 15563855,SAGE Publications,United States,Joshua Regan,Maritime piracy is a problem that plagues our navigable seas. This study provides a quantitative understanding of factors that influence the frequency of yearly maritime piracy occurrences. Using a...,32,4,105756772094444,387,International trade; Political science; Maritime piracy; State policy,,,,,http://journals.sagepub.com/doi/10.1177/1057567720944448 https://journals.sagepub.com/doi/full/10.1177/1057567720944448,http://dx.doi.org/10.1177/1057567720944448,,10.1177/1057567720944448,3046673237,,0,005-024-793-331-596; 013-464-458-988-434; 018-349-378-358-633; 021-986-010-928-319; 022-994-245-071-918; 024-013-108-178-470; 027-475-395-959-514; 027-815-412-143-874; 029-559-126-519-28X; 030-895-879-453-543; 031-543-020-825-831; 035-378-531-904-75X; 043-012-631-735-213; 045-107-709-389-002; 045-521-907-509-857; 046-080-440-146-436; 046-203-204-496-538; 046-632-191-529-892; 061-851-203-161-866; 063-252-947-956-846; 063-869-348-539-696; 064-979-682-815-418; 072-411-783-351-251; 073-442-651-837-311; 087-843-516-415-250; 094-142-482-453-84X; 111-965-420-681-996; 113-698-730-758-898; 115-016-680-239-636; 120-656-725-714-768; 121-623-161-029-751; 122-740-834-718-041; 133-970-030-338-687; 134-930-039-004-632; 137-821-785-114-135; 139-074-715-870-02X; 145-275-781-468-133; 161-935-804-652-533; 162-168-085-127-864; 165-612-772-410-431; 168-797-627-310-939; 169-456-327-819-355; 184-698-636-094-074; 189-484-813-376-223,1,true,cc-by,green 042-883-456-163-429,Uncertainty on Somalia’s Beaches—The Legal Regime of Onshore Anti-Piracy Operations,2013-08-22,2013,journal article,Journal of Conflict and Security Law,14677954; 14677962,Oxford University Press (OUP),United Kingdom,Frederic Wiesenbach,,19,1,85,112,International trade; Political science; Law,,,,,http://jcsl.oxfordjournals.org/content/19/1/85.abstract https://academic.oup.com/jcsl/article/19/1/85/1095176,http://dx.doi.org/10.1093/jcsl/krt019,,10.1093/jcsl/krt019,2318312349,,0,,3,false,, 042-971-803-859-835,Alternative Intellectual Property Systems for the Digital Age,,2005,journal article,Media International Australia,1329878x; 2200467x,SAGE Publications,Australia,Susanna Leisten; Terry Flew; Greg Hearn," This paper investigates the current turbulent state of copyright in the digital age, and explores the viability of alternative compensation systems. The paper critically appraises the increased recourse to digital rights management (DRM) technologies, which are designed to restrict access to and usage of digital content. Considerable technical challenges associated with DRM systems have necessitated increasingly aggressive recourse to the law. A number of controversial aspects of copyright enforcement are discussed and contrasted with those arising from alternative levy-based compensation systems. This paper undertakes consideration of alternative models for managing the copyright bargain in the digital era. ",114,1,87,98,,,,,,https://core.ac.uk/download/10879660.pdf,http://dx.doi.org/10.1177/1329878x0511400111,,10.1177/1329878x0511400111,,,0,,1,true,,green 043-046-633-267-973,Parental Indifference and Children’s Digital Piracy in South Korea: Mediation Effects of Low Self-Control and Misconception,2018-07-03,2018,journal article,Asian Journal of Criminology,18710131; 1871014x,Springer Science and Business Media LLC,Germany,Hyunin Baek; Jason Nicholson; George E. Higgins; Michael Losavio,"Digital piracy is a global concern for society. Although adolescents’ digital piracy in South Korea is pervasive, its cause has rarely been examined. Using data collected by the Korean Institute of Criminology (KIC) in 2009, this study conducted structural equation modeling to determine if low self-control and social learning theory accounted for digital piracy. This study found that parental indifference increased adolescents’ digital piracy through low self-control and misconception about digital piracy. However, there were no direct effects of parental indifference on the digital piracy behaviors. In particular, the mediation effect in the model combining low self-control and misconception was greater compared to other models. Overall, the combination of low self-control and social learning theory provided a more meaningful framework to explain adolescents’ digital piracy. Results of this study can offer ways to aid in the examination and remediation of this particular form of deviant behaviors on the Internet by adolescents.",13,4,293,309,The Internet; Social learning theory; Mediation; Low self-control; Digital piracy; Direct effects; Structural equation modeling; Social psychology,,,,,https://link.springer.com/article/10.1007/s11417-018-9271-3 https://link.springer.com/10.1007/s11417-018-9271-3,http://dx.doi.org/10.1007/s11417-018-9271-3,,10.1007/s11417-018-9271-3,2810458529,,0,001-213-229-342-451; 003-621-909-349-361; 003-828-680-029-252; 003-926-015-090-87X; 004-133-248-301-486; 005-726-118-137-649; 008-082-772-191-103; 008-559-423-635-533; 010-146-711-506-660; 011-778-065-470-123; 011-970-832-954-189; 014-684-417-715-713; 020-973-534-331-792; 027-975-767-588-12X; 028-615-356-511-184; 034-885-462-405-42X; 036-631-405-977-504; 037-710-506-349-517; 050-987-273-793-192; 052-519-517-658-380; 058-919-953-064-002; 067-339-005-241-596; 072-084-774-976-983; 072-462-106-236-192; 073-708-384-179-996; 073-738-879-896-476; 079-550-611-873-904; 080-347-678-825-853; 080-608-943-134-256; 085-606-440-229-889; 086-204-925-368-435; 088-141-375-865-257; 091-442-836-589-45X; 094-541-177-678-055; 096-762-470-199-768; 098-570-250-639-553; 104-700-366-658-586; 116-760-844-878-63X; 116-953-447-460-185; 123-538-500-409-553; 125-894-267-538-829; 126-434-935-959-784; 132-074-983-506-465; 136-460-283-421-226; 137-152-579-904-51X; 139-041-303-026-120; 145-427-405-840-931; 150-021-302-220-052; 161-026-451-451-876; 170-359-671-564-794; 175-905-268-229-256; 199-252-553-076-186,3,false,, 043-512-687-088-474,"Law of the Sea Piracy and International Maritime Crimes in ASEAN: Prospects for Cooperation edited by Robert C. BECKMAN and J. Ashley ROACH. Cheltenham: Edward Elgar Publishing, 2012. xiv + 257 pp. Hardcover: £70.",2013-08-16,2013,journal article,Asian Journal of International Law,20442513; 20442521,Cambridge University Press (CUP),United Kingdom,Aaron Casavant,,3,02,427,428,Publishing; Political science; Law and economics; Law of the sea; Economic history,,,,,http://journals.cambridge.org/action/displayFulltext?type=6&fid=8970994&volumeId=3&issueId=02&aid=8970993 https://www.cambridge.org/core/services/aop-cambridge-core/content/view/S2044251313000167,http://dx.doi.org/10.1017/s2044251313000167,,10.1017/s2044251313000167,2112329744,,0,,0,false,, 043-605-906-356-532,Highjackers and hostages: arbitral piracy after Nisshin v. Cleaves,,2011,journal article,Lloyd's Maritime and Commercial Law Quarterly,03062945,,,James Hayton,,,4,565,580,Advertising; Business,,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=3936966,https://dialnet.unirioja.es/servlet/articulo?codigo=3936966,,,1039694606,,0,,0,false,, 043-629-284-268-138,Allowing digital piracy for strategic benefits to businesses,2014-11-04,2014,journal article,"Journal of Information, Communication and Ethics in Society",1477996x; 17588871,Emerald,United Kingdom,Halimin Herjanto; Sanjaya S. Gaur; Chayanin Saransomrurtai; Wee Hock Quik,"Purpose – The purpose of this paper is to review the digital piracy literature and present the positive impacts of digital piracy and its benefit to businesses. A great deal of the literature discusses the consequences of digital piracy, but, in most cases, the focus is on the negative consequences. Design/methodology/approach – The authors draw on both the theoretical and empirical academic literature on digital piracy so as to analyze the ways in which digital piracy positively contributes to digital businesses. Findings – The paper provides information on the positive consequences of digital piracy and demonstrates that the benefits include product diffusion, network externality, innovation, cost reduction, an effective promotional and publicity vehicle, and technology standardization. Originality/value – This paper investigates potential benefits of digital piracy and provides insights which may offer a fuller picture of the consequences of digital piracy.",12,4,314,322,Product (category theory); Business; Marketing; Standardization; Publicity; Value (ethics); Originality; Cost reduction; Digital piracy; Network effect,,,,,https://philpapers.org/rec/HERADP https://www.emeraldinsight.com/doi/full/10.1108/JICES-12-2013-0056 https://www.emerald.com/insight/content/doi/10.1108/JICES-12-2013-0056/full/html https://dblp.uni-trier.de/db/journals/jices/jices12.html#HerjantoGSQ14 https://doi.org/10.1108/JICES-12-2013-0056,http://dx.doi.org/10.1108/jices-12-2013-0056,,10.1108/jices-12-2013-0056,2015640596,,0,004-140-508-203-475; 004-149-765-542-962; 004-873-323-580-619; 010-841-241-786-956; 026-161-995-943-665; 027-229-273-393-010; 029-119-208-561-853; 030-080-739-971-640; 031-629-351-442-680; 036-092-772-615-548; 037-206-342-629-551; 041-326-767-334-557; 058-901-110-153-896; 070-387-433-147-234; 075-439-907-756-802; 084-276-283-502-216; 084-502-083-697-859; 086-184-514-450-404; 094-835-101-367-609; 098-560-472-811-225; 104-508-757-344-250; 107-007-285-779-662; 118-675-220-855-858; 126-996-752-002-343; 127-396-698-906-436; 129-154-209-747-00X; 137-347-597-413-765; 152-181-748-409-517; 153-552-384-031-475; 186-132-647-421-819; 187-378-405-740-645,6,false,, 043-829-854-686-312,"Software Rental, Piracy and Copyright Protection, 5 Computer L.J. 125 (1984)",,1984,journal article,The John Marshall Journal of Information Technology & Privacy Law,,,,Debra S. Wilson,,5,1,6,,Business; Software; Computer security; Renting,,,,,https://repository.jmls.edu/jitpl/vol5/iss1/6/ https://repository.law.uic.edu/jitpl/vol5/iss1/6/ https://repository.law.uic.edu/cgi/viewcontent.cgi?article=1526&context=jitpl,https://repository.jmls.edu/jitpl/vol5/iss1/6/,,,617777576,,0,,1,false,, 043-891-537-578-403,In Search of a Sustainable and Coherent Strategy Assessing the Kaleidoscope of Counter-piracy Activities in Somalia,2012-09-01,2012,journal article,Journal of International Criminal Justice,14781387; 14781395,Oxford University Press (OUP),United Kingdom,Bibi van Ginkel; Lennart Landman,"In this contribution, the authors sketch an overview of the different initiatives taken by the international community to counter Somali piracy, as well as the different policy goals that are pursued. Five strategies are highlighted: protection and deterrence, law enforcement, capacity building, providing security and stabilization, and the unravelling of criminal financial networks. While the earliest responses uniquely focused on the 'symptoms' of piracy, some current countermeasures also take the root causes into account. This is reflected in the shift from a mainly sea-based approach to strategies that also incorporate land-based measures. The article demonstrates that each of these strategies has its own priorities that may at times be in conflict one with the other as well as with the overarching goal of countering piracy. The authors stress that in the implementation of the different strategies (including, but not limited to, the judicial one), it is important to take note of and be sensitive to the local context, and to take into account the possible contradictions, conflicts and synergies with other counter-piracy initiatives.",10,4,727,748,Sociology; Law; Financial networks; Somali; Kaleidoscope; Capacity building; International community; Context (language use); Law enforcement; Deterrence theory,,,,,https://academic.oup.com/jicj/article-abstract/10/4/727/809366 https://www.rug.nl/research/portal/publications/in-search-of-a-sustainable-and-coherent-strategy-assessing-the-kaleidoscope-of-counterpiracy-activities-in-somalia(d8c3ae52-6eb1-47a5-8c03-978733c7a85d)/export.html http://jicj.oxfordjournals.org/lookup/doi/10.1093/jicj/mqs058 http://academic.oup.com/jicj/article-abstract/10/4/727/809366,http://dx.doi.org/10.1093/jicj/mqs058,,10.1093/jicj/mqs058,2035333909,,0,,6,false,, 043-983-054-976-034,Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model,,2016,journal article,Information Systems Research,10477047; 15265536,Institute for Operations Research and the Management Sciences (INFORMS),United States,Paul Benjamin Lowry; Jun Zhang; Chuang Wang; Mikko T. Siponen,The dramatic increase in social media use has challenged traditional social structures and shifted a great deal of interpersonal communication from the physical world to cyberspace. Much of this so...,27,4,962,986,Imitation; Social learning theory; Psychology; Interpersonal communication; Social structure; Deindividuation; Cyberspace; Social media; Social psychology; Social learning,,,,,https://pubsonline.informs.org/doi/abs/10.1287/isre.2016.0671 https://psycnet.apa.org/record/2017-12981-010 http://hub.hku.hk/bitstream/10722/246590/1/content.pdf http://hub.hku.hk/handle/10722/246590 https://doi.org/10.1287/isre.2016.0671 https://dblp.uni-trier.de/db/journals/isr/isr27.html#LowryZWS16 https://ideas.repec.org/a/inm/orisre/v27y2016i4p962-986.html https://dlnext.acm.org/doi/10.1287/isre.2016.0671 https://dl.acm.org/doi/abs/10.1287/isre.2016.0671 https://econpapers.repec.org/RePEc:inm:orisre:v:27:y:2016:i:4:p:962-986 https://core.ac.uk/display/95561439 https://core.ac.uk/download/95561439.pdf,http://dx.doi.org/10.1287/isre.2016.0671,,10.1287/isre.2016.0671,2511439785,,0,000-877-581-578-602; 003-033-842-151-084; 004-401-138-193-902; 004-997-434-845-493; 005-123-424-892-180; 005-574-527-221-876; 005-795-006-696-787; 006-815-840-573-983; 007-017-463-678-391; 007-886-761-127-269; 008-922-132-480-782; 008-995-697-267-134; 009-299-623-546-736; 009-604-238-587-994; 010-176-062-515-344; 010-575-029-745-373; 011-987-790-794-412; 013-425-010-292-015; 013-869-354-513-472; 014-889-793-224-247; 016-793-797-069-447; 019-980-305-666-652; 020-973-534-331-792; 022-190-215-020-286; 022-445-179-702-782; 022-942-573-600-482; 024-445-418-759-624; 025-097-592-980-154; 026-494-742-706-253; 027-517-120-017-336; 027-722-941-653-930; 029-643-494-588-600; 031-629-351-442-680; 032-946-061-922-067; 034-814-513-668-425; 035-217-131-211-885; 036-028-511-736-767; 036-917-207-765-707; 037-477-820-648-752; 041-983-422-993-952; 044-794-359-125-226; 046-348-192-698-26X; 049-450-147-921-629; 051-039-097-882-503; 053-438-857-974-429; 053-887-605-009-220; 055-141-086-806-149; 055-357-183-852-836; 056-982-270-091-465; 060-822-607-399-070; 061-014-438-200-331; 062-376-498-598-673; 064-213-335-536-036; 066-478-152-163-827; 066-644-342-273-93X; 066-660-706-410-262; 066-957-884-570-91X; 067-699-690-380-509; 068-216-093-123-341; 068-343-835-354-352; 068-561-010-571-796; 069-292-598-532-790; 071-377-595-357-936; 071-679-165-049-689; 075-226-306-121-490; 075-685-837-091-713; 076-002-755-144-43X; 076-078-172-541-397; 076-191-469-539-161; 077-196-015-241-810; 077-442-408-299-854; 078-221-917-889-593; 080-142-224-521-995; 080-539-351-548-790; 080-896-730-897-291; 081-906-728-085-449; 085-137-097-166-032; 085-514-330-991-030; 087-244-964-548-773; 087-775-367-790-601; 088-656-957-801-037; 090-239-591-794-542; 090-262-757-561-833; 093-099-209-553-076; 095-893-404-441-652; 097-678-488-627-462; 099-248-377-957-39X; 103-022-458-376-643; 104-262-027-058-415; 104-332-066-382-075; 106-251-278-414-321; 107-348-417-993-384; 108-825-783-545-325; 109-194-158-803-550; 110-168-972-061-658; 110-475-215-241-950; 113-009-270-138-316; 115-108-327-872-420; 117-299-852-195-189; 124-910-335-472-050; 125-389-060-871-408; 126-132-705-417-118; 127-331-943-340-345; 133-313-335-331-355; 134-692-988-441-892; 138-090-686-300-768; 139-174-618-886-706; 147-454-181-506-681; 150-527-549-363-854; 162-177-330-736-781; 165-651-170-191-915; 166-763-023-015-164; 171-096-114-972-642; 172-282-089-008-709; 174-638-357-266-737; 176-744-627-476-323; 178-091-174-583-771; 186-635-379-735-970,190,true,cc-by-nc-nd,green 044-134-406-381-035,Perspectives on the Growing Trend of Child Piracy,,2014,journal article,Case Western Reserve Journal of International Law,00087254,,,Romeo Dallaire Lt. Gen.,,46,1,11,,Political science; Law; Genocide; Criminology,,,,,https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1028&context=jil https://scholarlycommons.law.case.edu/jil/vol46/iss1/3/,https://scholarlycommons.law.case.edu/jil/vol46/iss1/3/,,,1824627463,,0,,0,false,, 044-355-623-299-168,Where Security Meets Justice: Prosecuting Maritime Piracy in the International Criminal Court,2013-11-19,2013,journal article,Asian Journal of International Law,20442513; 20442521,Cambridge University Press (CUP),United Kingdom,Melanie O'Brien,"The International Criminal Court (ICC) was established to prosecute crimes that ""threaten the peace, security and well-being of the world"". Maritime piracy has a long history as a threat to international security and was in fact the first international crime. Yet piracy was excluded from the Rome Statute. In the years since the drafting of the Rome Statute, piracy has increased dramatically to become more like the threat it was in the ""Golden Age of Piracy"". Criminal accountability for piracy has been minimal, due to logistical and jurisdictional difficulties. This paper offers an analysis of the potential of the ICC for prosecuting pirates: why it should be considered as a potential forum for ensuring criminal accountability for piracy, how piracy fits within the ICC's jurisdiction, and whether or not piracy should be added to the Rome Statute as a stand-alone crime or under the rubric of crimes against humanity.",4,1,81,102,Rubric; Economic Justice; Statute; Political science; Law; Accountability; Crimes against humanity; Jurisdiction; Criminal court; International security,,,,,https://espace.library.uq.edu.au/view/UQ:349699 http://www98.griffith.edu.au/dspace/bitstream/handle/10072/61944/93567_1.pdf;sequence=1 https://research-repository.griffith.edu.au/bitstream/10072/61944/1/93567_1.pdf https://research-repository.griffith.edu.au/handle/10072/61944 https://www.cambridge.org/core/services/aop-cambridge-core/content/view/S204425131300026X https://www.cambridge.org/core/journals/asian-journal-of-international-law/article/where-security-meets-justice-prosecuting-maritime-piracy-in-the-international-criminal-court/ADA5F3BC6254BCC1E5E87CF2F71205E1,http://dx.doi.org/10.1017/s204425131300026x,,10.1017/s204425131300026x,2024463596,,0,001-824-828-062-585; 009-053-093-251-26X; 015-420-516-757-65X; 017-498-362-116-317; 018-902-831-047-51X; 019-074-817-585-085; 019-140-930-373-335; 020-482-566-227-31X; 024-480-850-184-616; 027-367-011-520-193; 029-480-475-525-192; 039-036-972-553-110; 040-814-353-181-980; 052-467-295-289-388; 053-168-710-948-560; 064-622-980-816-652; 067-502-476-871-620; 072-580-620-081-274; 072-906-730-316-393; 077-331-231-343-247; 080-064-689-475-502; 088-437-397-004-194; 089-627-664-146-757; 105-161-522-936-135; 109-844-794-976-462; 118-727-299-769-734; 127-503-106-497-36X; 150-278-374-692-140; 156-338-217-544-259; 160-255-685-097-85X; 167-575-945-647-844; 184-698-636-094-074; 189-484-813-376-223; 194-402-771-820-160; 196-350-296-966-072,5,true,,green 044-596-549-067-189,"Somali Piracy: Jurisdictional Issues, Enforcement Problems and Potential Solutions",2010-09-29,2010,journal article,Georgetown Journal of International Law,15505200,,,Christopher Totten; Matthew Bernal,,41,2,377,,Political science; Law; Somali; Enforcement,,,,,https://digitalcommons.kennesaw.edu/facpubs/381/,https://digitalcommons.kennesaw.edu/facpubs/381/,,,1586369000,,0,,2,false,, 044-683-986-132-941,"Coercion, Conviction, Conversion: Sovereign Selves and Interior States in Colonial Piracy Trials and Narratives",2013-12-19,2013,journal article,Law and Literature,1535685x,,,Erica Burleigh,"AbstractThis essay argues that the legal and religious rhetoric surrounding Anglo-American piracy trials in the late seventeenth and early eighteenth centuries staged an emerging understanding of individual will and sovereignty as both an extension of and in conflict with political sovereignty. Published reports of piracy trials and execution sermons emphasized the role of an alleged pirate’s intention in determining whether he had, in fact, committed piracy, but simultaneously insisted that intention was irrelevant to determining guilt. This rhetorical double bind was played out in colonial venues that themselves exemplified the extension and consequent dispersal of imperial power. By reading both the context and the content of such trials, this essay demonstrates how legal rhetoric sought to legitimate England’s colonial authority by first identifying Englishmen accused of piracy as her political subjects, then stripping them of both that political identity (by declaring them natural law enemies of all ...",,,,,Rhetoric; Sociology; Sovereignty; Law; Coercion; Conviction; Hostis humani generis; Context (language use); Colonialism; Politics,,,,,https://www.tandfonline.com/doi/abs/10.1525/lal.2012.24.2.151,https://www.tandfonline.com/doi/abs/10.1525/lal.2012.24.2.151,,,1199206705,,0,,0,false,, 044-733-528-204-170,Human Rights in Counter-Piracy Operations: No Legal Vacuum but Legal Uncertainty,2013-10-17,2013,journal article,Piracy at Sea,21968772; 21968780,Springer Berlin Heidelberg,,Anna Petrig,"The Security Council has set an ambitious goal for itself: the full and durable eradication of piracy. In order to achieve this objective, it has amongst others set up an ad hoc legal framework authorizing States and regional organizations to take counter-piracy enforcement measures in Somali territorial waters and on its mainland. The powers conferred by the Resolutions supplement the existing legal instruments to combat piracy on the high seas, such as the United Nations Convention on the Law of the Sea.",,,31,45,International waters; Human rights; Political science; Order (exchange); United Nations Convention on the Law of the Sea; Law; Somali; Enforcement; Mainland; Territorial waters,,,,,https://edoc.unibas.ch/36039/ https://rd.springer.com/chapter/10.1007/978-3-642-39620-5_4 https://link.springer.com/chapter/10.1007%2F978-3-642-39620-5_4 https://core.ac.uk/display/33300253 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3360331,http://dx.doi.org/10.1007/978-3-642-39620-5_4,,10.1007/978-3-642-39620-5_4,1876747004,,0,025-784-266-343-445; 061-453-006-799-349; 063-203-515-670-958; 109-844-794-976-462; 121-282-418-242-37X; 166-909-956-462-475; 168-404-940-361-871,1,false,, 044-828-647-114-217,"Lending an ""Invisible Hand"" to the Navy: Armed Guards as a Free Market Assistance to Defeating Piracy",2012-09-22,2012,journal article,Case Western Reserve Journal of International Law,00087254,,,Brittany E. Pizor,,45,1,545,,Business; International trade; Free market; Navy; Invisible hand; Maritime piracy; Private security,,,,,https://scholarlycommons.law.case.edu/jil/vol45/iss1/10/ https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1056&context=jil,https://scholarlycommons.law.case.edu/jil/vol45/iss1/10/,,,2314908682,,0,,2,false,, 044-947-788-045-966,From Blackbeard to Jack Sparrow—Who are today’s pirates and why do we care? The effect the legal definition of piracy has on the international shipping industry and maritime insurance coverage,2013-10-25,2013,journal article,Journal of Law and Commerce,21647984; 07332491,"University Library System, University of Pittsburgh",,Jamie Schumacher,"Today’s pirates may seem more like terrorists, and their effect can be felt on a variety of sectors within society, most notably international commerce. The shipping industry deals with the threat of pirate attacks on a regular basis. In order to prevent a profit loss from those attacks, the industry has sought insurance coverage. The difficulty arises within these insurance policies as to the definition of “piracy,” and whether acts that more closely resemble terroristic activities as opposed to the traditional notion of piracy are covered. This Student Note evaluates the evolving definition of piracy, both within the United States’ court system and in international law. The lack of a consistent definition raises the argument that policy coverage varies too significantly to effectively protect the economic loss associated with a pirate attack. The Note concludes by noting that regardless of how piracy is defined, the threat of attacks still exists. Additionally, due to liability under the United Nations Convention for the International Sale of Goods (CISG), insurance coverage within the shipping industry will still be sought.",32,1,135,153,Economics; Profit (economics); Law and economics; Law; Liability; Sparrow; Convention; Legal definition; Insurance coverage; International law; Insurance policy,,,,,https://jlc.law.pitt.edu/ojs/jlc/article/view/56 https://jlc.law.pitt.edu/ojs/jlc/article/download/56/61 https://core.ac.uk/download/pdf/296521723.pdf,http://dx.doi.org/10.5195/jlc.2013.56,,10.5195/jlc.2013.56,2005601007,,0,,0,true,cc-by-nc-nd,gold 045-198-203-067-619,The Impacts Of The War On Terrorism On Maritime Shipping,2011-03-02,2011,journal article,International Business & Economics Research Journal (IBER),21579393; 15350754,Clute Institute,,Arthur P. James; H.G. Van Dell,"The terrorist acts that destroyed the World Trade Center and part of the Pentagon have, of course, changed much of the world in many ways since September 2001. Among those effects has been a pronounced and noticeable shift in airport and aircraft security. Much less noticeable to most Americans has been the impact of added security and changed priorities on maritime transportation systems. But maritime security actually has a far greater impact on commerce than does air security because most cargo moves worldwide via commercial ocean-going vessels. Security requirements and wartime priorities are compelling the world’s governments to more closely monitor and inspect all vessels and cargo entering their nation’s ports. The US Coast Guard’s inspections are forcing tremendous delays upon entering vessels. The consequences of losing millions of dollars daily both for shipping companies and cargo interests create severe economic and logistical problems that impact all transportation modes. The new US embargo on 24 small countries may force them into bankruptcy unless they comply with US requests to end terrorism. These countries depend on exports and imports for a large portion of their GDP, which will be dramatically reduced unless they join the war against terrorism. This paper examines five impacts on the US and world shipping industry caused by the war on terrorism--those on: 1) vessel and port security; 2) transportationand trade-related communications; 3) trade levels; 4) marine insurance; and 5) maritime and related freight rates. Then the authors draw some conclusions regarding possibilities of reflagging of ships and effects on the status of the US merchant marine industry.",1,8,,,Economy; Business; International trade; Terrorism; Maritime security; Port security; Pentagon; World trade center; Coast guard; Bankruptcy; Spanish Civil War,,,,,https://www.cluteinstitute.com/ojs/index.php/IBER/article/view/3962/4015 https://core.ac.uk/download/pdf/268107364.pdf,http://dx.doi.org/10.19030/iber.v1i8.3962,,10.19030/iber.v1i8.3962,2183840023,,0,093-664-827-556-126,0,true,,bronze 045-225-129-466-152,Somali Piracy-Implications for Oceanborne Commerce and Regional Security and Challenges to International Law,2011-05-02,2011,journal article,Australian and New Zealand Maritime Law Journal,18340881,,,Ademun Odeke,"The article analyses the history and causes of Somalia piracy in social- economic, geo-political and panoramic context. It also deals with commercial and security threats of the piracy as well as its challenges to oceanborne trade and to traditional doctrines of international law. In doing so the article focuses on 6 major areas: examination of the threats to maritime commerce, strategic sealanes and vital energy sources; threats to maritime, regional and global security; challenges to international law and existing world order; threats to international financial order; threats to international economic order; outline of future prospects for the piracy; and concluding remarks.",25,1,134,160,Political science; Order (exchange); Public international law; Law; Somali; Context (language use); Energy source; International security; Law of the sea; International law,,,,,https://ssl.law.uq.edu.au/journals/index.php/maritimejournal/article/download/149/196 https://ssl.law.uq.edu.au/journals/index.php/maritimejournal/article/view/149,https://ssl.law.uq.edu.au/journals/index.php/maritimejournal/article/view/149,,,2522888520,,0,,6,false,, 045-326-929-514-960,Copyright and book piracy in Pakistan,,2005,journal article,IFLA Journal,03400352; 17452651,SAGE Publications,United States,Khalid Mahmood; Muhammad Ilyas,Pakistan has to face a tremendous pressure from Western countries due to widespread book piracy. This study presents the results of a survey of the book trade regarding copyright and book piracy in the country. International conventions to which Pakistan is a signatory and national copyright law and its implementation are described. American views on the situation of copyright in Pakistan are summarized. The survey reveals that the high price of foreign books is the main cause of book piracy. Local publishers and booksellers are the major beneficiaries of book piracy. Suggestions are given to protect intellectual copyright in Pakistan. Concludes that measures to minimize book piracy will not be successful until books at low price are available for local readers.,31,4,324,332,Political science; Law and economics; Law; Face (sociological concept); Copyright law,,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=3889514 https://journals.sagepub.com/doi/abs/10.1177/0340035205061397,http://dx.doi.org/10.1177/0340035205061397,,10.1177/0340035205061397,2078554909,,0,080-147-692-276-401; 107-020-261-746-563,3,false,, 045-440-821-059-264,Somali Piracy: The Local Contexts of an International Obsession,,2011,journal article,"Humanity: An International Journal of Human Rights, Humanitarianism, and Development",21514372,Project Muse,,Roland Marchal,,2,1,31,50,Political science; Law; Somali; Criminology,,,,,https://spire.sciencespo.fr/hdl:/2441/1suuqan4q89tu889od70cigbm0/ https://muse.jhu.edu/article/421344/pdf https://spire.sciencespo.fr/hdl:/2441/1suuqan4q89tu889od70cigbm0/resources/2.1-somali-piracy.pdf,http://dx.doi.org/10.1353/hum.2011.0004,,10.1353/hum.2011.0004,1993785689,,0,025-245-794-036-411; 068-510-283-298-975; 068-922-083-581-785; 079-607-709-289-911; 104-043-662-116-901; 139-229-216-861-296; 173-534-645-194-069,39,true,,green 045-444-518-047-322,BSA announces piracy prosecutions in Europe,,1991,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1991,2,4,5,Business; Computer security; Computer science,,,,,,http://dx.doi.org/10.1016/0142-0496(91)90041-3,,10.1016/0142-0496(91)90041-3,,,0,,0,false,, 045-489-396-852-495,THE GLOBAL RESPONSE TO DIGITAL MUSIC PIRACY,,2000,journal article,UCLA Entertainment Law Review,19395523; 10732896,California Digital Library (CDL),,Liz Robinson,,7,2,,,Internet privacy; Computer science; Multimedia; Digital audio,,,,,https://escholarship.org/uc/item/8tn5n86k https://escholarship.org/uc/item/8tn5n86k.pdf https://escholarship.org/content/qt8tn5n86k/qt8tn5n86k.pdf?t=nnaaak,http://dx.doi.org/10.5070/lr872027003,,10.5070/lr872027003,2765794433,,0,,0,true,,bronze 045-521-907-509-857,The Changing Nature of Contemporary Maritime Piracy Results from the Contemporary Maritime Piracy Database 2001–10,2014-05-23,2014,journal article,British Journal of Criminology,00070955; 14643529,Oxford University Press (OUP),United Kingdom,Anamika Twyman-Ghoshal; Glenn Pierce,,54,4,652,672,Economy; Political science; Maritime piracy,,,,,https://academic.oup.com/bjc/article-abstract/54/4/652/448958 http://bjc.oxfordjournals.org/content/54/4/652.full.pdf,http://dx.doi.org/10.1093/bjc/azu019,,10.1093/bjc/azu019,2330373675,,0,003-242-914-995-130; 006-341-057-389-867; 032-735-230-263-307; 047-390-510-033-665; 069-282-287-257-139; 085-888-641-946-33X; 104-283-813-005-655; 113-589-375-707-427; 122-740-834-718-041; 129-991-433-699-952; 132-448-358-300-756; 134-572-297-864-961; 149-197-393-969-029; 152-378-433-943-132; 153-087-716-704-584; 155-546-090-672-412; 160-758-256-694-458; 176-943-273-894-705; 185-104-823-389-543; 189-484-813-376-223; 192-548-100-346-575; 198-365-526-040-377; 198-731-555-287-704,9,false,, 045-523-328-248-831,"""Piracy"" in the Caribbean",,1961,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),United States,C. G. Fenwick,,55,2,426,428,Political science,,,,,http://www.jstor.org/stable/2196127?origin=crossref,http://dx.doi.org/10.2307/2196127,,10.2307/2196127,2319130666,,0,,3,false,, 045-680-037-049-428,Economic Analysis on Pirecy,,2005,journal article,Commercial Research,,,,Liu Li-na,"The Economics of law is a field developing very fast in the fields of the western law science and that of the western economics. It explains the legal problem with economics methods. They regard profit as starting point and result in legal system.Especially economic theory is brought forth in the field of piracy,assuming responsibility and damage compensation.It turns from later study event to beforehand analysis. Therefore,we need to make a efficiency analysis about the principle of determining liability in terms of the relationship between preventing costs and expecting benefits. The two different damage compensations are defined through ""Hand formula"",social costs differentiation intrigued by pirecy is weighed with economic methods. When preventing costs are less than anticipated benefits,the precaution of piracy is necessary and efficient. If the efficient precaution measure is not taken,the action of piracy is inefficient,and will be punished by the law.",,,,,Public economics; Economics; Profit (economics); Law and economics; Liability; Western law; Economic analysis,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-BUSI200514070.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-BUSI200514070.htm,,,2379943477,,0,,0,false,, 045-809-891-056-402,The European Union at the Horn of Africa: The Contribution of Critical Geopolitics to Piracy Studies,2013-03-27,2013,journal article,Global Policy,17585880; 17585899,Wiley,United Kingdom,Basil Germond,"Critical geopolitics highlights the construction of threats, space and identities along an inside-outside line, and the subsequent normalization of the practice of power projection beyond one’s own external boundary so as to obtain security within. When applied to the EU’s response to piracy at the Horn of Africa, this approach allows understanding the role of geographical representations and the subsequent normalization of power projection activities as a response to piracy. Ultimately, this article demonstrates that the EU’s geopolitical discourse and power projection activities transcend the somewhat benign image given by the Union as a civilian or normative power, although geopolitical interests and global governance principles are not incompatible.",4,1,80,85,Normalization (sociology); Political economy; Sociology; French horn; Geopolitics; Power (social and political); Global governance; Critical geopolitics; European union; Development economics; Projection (mathematics),,,,,https://ideas.repec.org/a/bla/glopol/v4y2013i1p80-85.html https://onlinelibrary.wiley.com/doi/pdf/10.1111/j.1758-5899.2012.00191.x https://eprints.lancs.ac.uk/id/eprint/53655 https://econpapers.repec.org/RePEc:bla:glopol:v:4:y:2013:i:1:p:80-85,http://dx.doi.org/10.1111/j.1758-5899.2012.00191.x,,10.1111/j.1758-5899.2012.00191.x,1594738852,,0,012-405-416-232-261; 019-354-808-338-396; 020-000-404-452-210; 041-241-309-815-481; 041-814-042-031-981; 079-065-565-762-832; 097-553-811-149-642; 111-666-362-226-951; 119-896-479-812-940; 128-444-873-401-508; 147-432-286-070-143; 191-778-293-265-92X,6,false,, 046-137-294-271-11X,Heightened interest in piracy by US feds,,1993,journal article,Computer Fraud & Security Bulletin,01420496,Mark Allen Group,United Kingdom,Charlotte Dunlap,,1993,9,2,,,,,,,https://www.sciencedirect.com/science/article/pii/014204969390225L,http://dx.doi.org/10.1016/0142-0496(93)90225-l,,10.1016/0142-0496(93)90225-l,1979018868,,0,,0,false,, 046-162-575-488-088,"Copyright and Commerce: The DMCA, Trusted Systems, and the Stabilization of Distribution",,2004,journal article,The Information Society,01972243; 10876537,Informa UK Limited,United Kingdom,Tarleton Gillespie,"The Digital Millennium Copyright Act (DMCA) has been criticized for granting too much power to copyright holders, offering them new technological controls that may harm the public interest. But by considering this exclusively as a copyright issue, we overlook how the DMCA anticipates a technological and commercial infrastructure for regulating not only copying but every facet of the purchase and use of cultural goods. In upholding the law in Universal v. Reimerdes, the courts not only stabilized these market-friendly arrangements in cultural distribution; they extended these arrangements into realms as diverse as encryption research and journalism, with consequences for the very production of knowledge.",20,4,239,254,Journalism; Business; Encryption; Law and economics; Power (social and political); Public interest; Harm; Digital Millennium Copyright Act; Production (economics); Copying,,,,,https://www.tandfonline.com/doi/full/10.1080/01972240490480938 https://dblp.uni-trier.de/db/journals/tis/tis20.html#Gillespie04 http://hdl.handle.net/1813/3473,http://dx.doi.org/10.1080/01972240490480938,,10.1080/01972240490480938,3123490998,,0,000-170-586-491-953; 000-727-814-951-946; 010-295-956-627-881; 017-356-522-721-898; 024-349-123-838-245; 027-989-705-549-237; 033-074-759-110-248; 035-046-426-074-933; 035-258-146-760-802; 038-882-555-942-306; 040-172-831-827-730; 041-060-610-245-913; 042-765-961-319-984; 044-600-069-371-068; 048-669-881-646-342; 051-097-290-437-124; 055-683-126-358-720; 057-749-675-462-653; 062-596-102-015-852; 066-372-696-549-423; 071-329-342-532-592; 077-862-918-460-063; 078-274-339-135-982; 079-907-361-627-231; 082-325-789-181-697; 084-995-084-309-350; 088-106-669-324-719; 094-497-051-889-740; 098-389-798-960-805; 111-893-099-859-339; 113-346-149-208-017; 117-599-284-115-121; 117-873-034-771-440; 127-194-183-758-520; 131-926-479-549-731; 141-060-246-291-977; 142-336-262-312-118; 142-844-274-829-780; 143-060-042-805-836; 147-786-241-922-582; 153-645-401-207-480; 157-084-071-143-418; 164-788-863-270-369; 175-754-905-943-247; 188-723-290-662-560; 196-742-004-377-552; 197-285-857-489-228,41,true,,green 046-203-204-496-538,It's a Pirate's Life for Some: The Development of an Illegal Industry in Response to an Unjust Global Power Dynamic,,2010,journal article,Indiana Journal of Global Legal Studies,10800727; 15430367,Indiana University Press,United States,Elliot A. Anderson,"This Note discusses the domestic and international economic effects of the recent surge of piracy off the coast of Somalia, and uses Somali piracy as a method of exploring conflicting ideological conditions that arise from globalization. In exploring the underlying motivations for this trend, it identifies a dichotomy between primary needs satisfaction within underdeveloped nations and the satisfaction of secondary interests in developed nations, and explains how globalization may be exacerbating the turn toward piracy. This Note first discusses the recent rise in piracy and then explores how the contemporary history of Somalia has engendered the upsurge. Next, it considers how piracy has influenced the economy of coastal Somalia, followed by a look at the ideological intersection between primary domestic interests and secondary global interests. Finally, this Note explores some of the international implications of the rise of piracy in Africa, and whether further expansion is a possibility.",17,2,319,339,Economy; Sociology; Contemporary history; Ideology; Globalization; Power (social and political); Somali,,,,,https://www.jstor.org/stable/10.2979/gls.2010.17.2.319 https://www.repository.law.indiana.edu/ijgls/vol17/iss2/9/ https://muse.jhu.edu/article/394202/pdf https://www.repository.law.indiana.edu/cgi/viewcontent.cgi?article=1425&context=ijgls,http://dx.doi.org/10.2979/gls.2010.17.2.319,,10.2979/gls.2010.17.2.319,2132531641,,0,101-965-654-950-607,11,true,,green 046-420-641-381-430,Piracy off West Africa from 2010 to 2014: an analysis,2016-12-06,2016,journal article,WMU Journal of Maritime Affairs,1651436x; 16541642,Springer Science and Business Media LLC,Sweden,Hans Liwång,"Piracy is one of the most frequent maritime threats. However, despite the importance of how maritime piracy is to be reduced, it is substantially less investigated than maritime safety. Piracy off Somalia is the most investigated case of piracy, but those results are not necessarily generalizable. Piracy off West Africa has been shown to be more diverse, successful and dangerous. This study investigates and analyses piracy off West Africa with the aim to understand how different operations and security measures affect the consequences of piracy. This study has identified several different intents and shows that most attacks are relatively close to shore and correspond to areas of high ship density. Attacks with the intent of theft at night-time are generally performed close to shore, and more complicated attacks against ships under way are more common during daytime and farther from shore. Five types of measures are found to have high effectiveness if the attack is detected during approach; after boarding, only two measures have high effectiveness. Of the effective measures, it can be concluded that all but one are dependent on detecting the attack. Therefore, detecting the pirates is key but must be accompanied by a set of measures because no measure alone can protect a ship given the operational conditions off West Africa. The risks associated with piracy off West Africa are estimated to be of the same magnitude as the risks posed by Somali piracy at its peak.",16,3,385,403,Shore; Public international law; Geography; Somali; Maritime security; Maritime piracy; Maritime safety; West africa; High effectiveness; Computer security,,,,Swedish Defence University,https://rd.springer.com/article/10.1007/s13437-016-0121-9 https://link.springer.com/article/10.1007/s13437-016-0121-9 https://fhs.diva-portal.org/smash/record.jsf?pid=diva2:1052423 https://link.springer.com/content/pdf/10.1007%2Fs13437-016-0121-9.pdf http://fhs.diva-portal.org/smash/record.jsf?pid=diva2:1052423 http://www.diva-portal.org/smash/record.jsf?pid=diva2:1162156,http://dx.doi.org/10.1007/s13437-016-0121-9,,10.1007/s13437-016-0121-9,2560565587,,0,011-945-264-750-115; 018-690-148-060-662; 019-788-841-103-300; 026-832-808-767-972; 036-499-413-563-576; 045-107-709-389-002; 047-701-346-382-614; 048-257-198-891-166; 057-021-758-199-799; 060-089-932-112-994; 070-472-720-107-215; 070-789-767-369-664; 081-381-728-445-812; 085-704-079-453-036; 103-435-671-346-676; 117-364-093-235-095; 118-017-988-717-802; 122-671-564-586-600; 191-436-918-310-322,4,false,, 046-534-914-774-543,"Software piracy, inequality and the poor: evidence from Africa",2014-07-08,2014,journal article,Journal of Economic Studies,01443585,Emerald,United Kingdom,Simplice A. Asongu,"Purpose – Poverty and inequality undoubtedly remain substantial challenges to economic and human developments amid growing emphasis on intellectual property rights (IPRs) (with recent advances in information and communication technology (ICTs)) and good governance. In the first empirical study on the incidence of piracy on inequality in Africa, the purpose of this paper is to examine how a plethora of factors (IPRs laws, education and ICTs and government quality) are instrumental in the piracy-inequality nexus. Design/methodology/approach – Two-stage least squares estimation approaches are applied in which piracy is instrumented with IPRs regimes (treaties), education and ICTs and government quality dynamics. Findings – The main finding suggests that, software piracy is good for the poor as it has a positive income-redistributive effect; consistent with economic and cultural considerations from recent literature. ICTs and education (dissemination of knowledge) are instrumental in this positive redistribut...",41,4,526,553,Empirical research; Economics; Poverty; Good governance; Human development (humanity); Intellectual property; Inequality; Economic growth; Income distribution; Information and Communications Technology,,,,,https://mpra.ub.uni-muenchen.de/43860/ https://econpapers.repec.org/article/emejespps/v_3a41_3ay_3a2014_3ai_3a4_3ap_3a526-553.htm https://ideas.repec.org/p/pra/mprapa/43860.html https://researchportal.vub.be/en/publications/software-piracy-inequality-and-the-poor-evidence-from-africa https://www.emerald.com/insight/content/doi/10.1108/JES-10-2012-0141/full/html https://socionet.ru/publication.xml?h=RePEc:eme:JESpps:v:41:y:2014:i:4:p:526-553 https://www.emeraldinsight.com/doi/abs/10.1108/JES-10-2012-0141,http://dx.doi.org/10.1108/jes-10-2012-0141,,10.1108/jes-10-2012-0141,2169000759,,0,006-463-752-020-581; 008-896-495-853-748; 012-558-297-950-849; 015-808-798-057-897; 016-639-348-836-879; 017-153-449-730-092; 021-455-819-040-944; 022-264-398-959-067; 028-630-596-457-020; 033-659-512-493-092; 039-883-767-744-759; 041-849-157-283-572; 043-305-653-465-196; 044-884-973-451-274; 047-010-436-077-442; 049-698-234-112-01X; 054-663-257-958-510; 057-745-132-024-560; 058-453-337-550-945; 058-682-219-560-287; 062-169-487-131-224; 063-085-822-993-592; 066-237-973-648-031; 082-142-791-780-355; 084-276-283-502-216; 087-959-536-613-70X; 088-992-946-940-907; 089-840-672-381-047; 096-861-531-565-56X; 097-165-496-887-789; 105-803-797-619-085; 107-007-285-779-662; 110-231-183-577-925; 125-495-818-933-457; 133-339-104-238-036; 144-135-264-427-99X; 145-489-062-191-725; 145-811-348-738-768; 154-513-291-663-187; 169-041-921-929-413; 185-197-322-646-367; 191-344-983-602-980,47,true,,green 046-534-964-448-068,Piracy Prosecutions in National Courts,,2011,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Maggie Gardner,"At least for the time being, the international community must rely on national courts to prosecute modern-day pirates. The first wave of domestic piracy prosecutions suggests, however, that domestic courts have yet to achieve the necessary consistency and expertise in resolving key questions of international law in these cases. This article evaluates how courts trying modern-day pirates have addressed common questions of international law regarding the exercise of universal jurisdiction, the elements of the crime of piracy, and the principle of nullum crimen sine lege. In doing so, it evaluates five decisions issued in 2010 by courts in Kenya, the Netherlands, the Seychelles and the United States, and it proposes some clear answers to these recurrent questions of international law in domestic piracy prosecutions.",,,,,Political science; United Nations Convention on the Law of the Sea; Law; Consistency (negotiation); Universal jurisdiction; International community; International law; Nullum crimen nulla poena sine praevia lege poenali,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1967746 https://www.ssrn.com/abstract=1967746,http://dx.doi.org/10.2139/ssrn.1967746,,10.2139/ssrn.1967746,1989907633,,0,013-242-689-300-71X; 049-166-666-318-890; 052-372-599-800-876; 152-378-433-943-132; 169-480-499-080-059; 182-580-432-426-093; 187-383-183-403-710; 196-189-338-783-453,0,true,,green 046-852-386-944-134,The interplay between international law and national law in the first italian prosecution of piracy: the M/V MONTECRISTO case,2015-10-22,2015,journal article,The Italian Yearbook of International Law Online,22116133,Brill,,Marta Bo,"This note scrutinizes the complex relationship between international law and national criminal law in the prosecution of piracy. UN Security Council Resolutions on Somalia have marked the beginning of a new era in counter-piracy, with much wider involvement of States and international organizations in patrols in the Horn of Africa and with an increasing number of piracy trials in courts in Europe, the US, and Africa. Increased State cooperation in enforcement and adjudication has evinced the weaknesses and ambiguities inherent in the provisions of the United Nations Convention on the Law of the Sea (UNCLOS) which deal with piracy. This article questions the suitability of the UNCLOS definition of piracy as a standalone legal basis for detention in light of the requirements of legal certainty that must be satisfied in order to permit the arrest and the “pre-transfer arrest” of piracy suspects. This question seems to have been recently overlooked by the Italian Court of Cassation whose reasoning, while correct in relation to the assertion of jurisdiction over the pirates arrested on board the M/V Montecristo, seems flawed with regard to the assumption of jurisdiction over the pirates captured aboard the “mothership” and then transferred to Italy by the British unit participating to the NATO counter-piracy mission.",24,1,289,314,Human rights; Political science; United Nations Convention on the Law of the Sea; Law; Criminal law; Adjudication; Jurisdiction; Legal certainty; European union; International law,,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=5441660 https://booksandjournals.brillonline.com/content/journals/10.1163/22116133-90000083,http://dx.doi.org/10.1163/22116133-90000083a,,10.1163/22116133-90000083a,3112396991,,0,,0,false,, 047-010-436-077-442,The relationship between copyright software protection and piracy: Evidence from europe,,2006,journal article,European Journal of Law and Economics,09291261; 15729990,Springer Science and Business Media LLC,Netherlands,Antonio Rodríguez Andrés,"This paper provides an empirical analysis of the relationship between software protection and national piracy rates across 23 European countries over a period of three years (1994, 1997, and 2000). The analysis not only constructs a new index of copyright software protection but remedies previous econometric and methodological shortcomings by applying a macro level panel data technique. Results indicate that copyright software protection and income are the most determinant factors of software piracy. In addition, the model predicts an inverted U relationship between piracy and per capita income. Moreover, the above findings are robust to the inclusion of other descriptors suggested by the empirical literature on piracy.",21,1,29,51,Public economics; Per capita income; Actuarial science; Economics; Public finance; Software; Enforcement; Index (economics); Intellectual property; Panel data; Commercial law,,,,,https://ideas.repec.org/a/kap/ejlwec/v21y2006i1p29-51.html https://link.springer.com/article/10.1007%2Fs10657-006-5670-5 https://EconPapers.repec.org/RePEc:kap:ejlwec:v:21:y:2006:i:1:p:29-51,http://dx.doi.org/10.1007/s10657-006-5670-5,,10.1007/s10657-006-5670-5,2074659138,,0,000-146-899-335-847; 002-961-337-439-146; 007-473-910-949-501; 008-896-495-853-748; 010-566-998-387-793; 010-994-533-078-502; 011-473-737-510-486; 012-558-297-950-849; 013-709-145-598-016; 015-808-798-057-897; 017-619-716-693-348; 019-227-255-742-812; 021-160-963-136-280; 029-165-881-721-658; 037-191-917-699-616; 038-338-844-116-685; 039-883-767-744-759; 041-893-696-570-720; 042-057-592-838-529; 042-176-320-852-417; 043-305-653-465-196; 043-467-028-301-681; 045-523-803-520-989; 046-165-382-970-445; 048-844-080-479-092; 051-869-771-954-007; 052-671-409-814-557; 056-134-823-809-165; 058-080-844-249-541; 059-077-318-219-51X; 061-060-745-498-059; 067-447-260-092-776; 070-846-287-317-572; 073-948-478-252-368; 074-716-472-183-799; 078-410-292-183-154; 086-216-752-861-616; 087-289-536-311-226; 087-333-122-116-178; 089-444-156-098-849; 096-977-975-759-335; 097-165-496-887-789; 097-637-794-608-082; 101-874-873-388-77X; 103-047-934-034-494; 116-466-565-455-178; 118-675-220-855-858; 126-996-752-002-343; 128-569-618-310-077; 129-154-209-747-00X; 130-338-450-309-163; 132-742-419-605-391; 140-860-761-833-178; 144-135-264-427-99X; 146-379-268-595-433; 148-032-869-900-114; 150-594-241-601-430; 153-552-384-031-475; 162-331-341-062-164; 162-445-978-992-866; 171-221-578-087-895; 173-719-285-876-103; 177-478-714-335-235; 178-384-778-047-100; 189-005-253-412-589; 191-344-983-602-980; 197-386-724-962-811,98,false,, 047-159-828-372-614,Non-State Actors and Global Crime Governance: Explaining the Variance of Public-Private Interaction,2015-01-28,2015,journal article,The British Journal of Politics and International Relations,13691481; 1467856x,SAGE Publications,United States,Anja P. Jakobi,"This article:Shows the variance of non-state actors in global crime governance and transnational governance in general, and shows that existent accounts fail to explain this variance.Proposes a model of how we can understand the different roles of non-state actors, distinguishing normative from rationalist reasons for non-state actor involvement.Compares different forms of current global crime governance (human trafficking, conflict diamonds, money laundering, cybercrime) to explore the validity of the model.Shows that non-state activism and public debate are usually only related to a specific type of crime, turning a ‘blind eye’ to other forms of crime and their governance.Argues that this creates problems with regard to oversight and discussion of global crime governance, exemplified with regard to intelligence surveillance via internet traffic.Global crime governance has become a major area of international activity, including a growing number of public and private regulatory efforts. Yet it is puzzlin...",18,1,72,89,Political economy; Economics; Cultural criminology; State (polity); Cybercrime; Transnational governance; Money laundering; Public debate; Public administration; Corporate governance; Normative,,,,,http://journals.sagepub.com/doi/abs/10.1111/1467-856x.12064 https://journals.sagepub.com/doi/10.1111/1467-856X.12064 http://journals.sagepub.com/doi/full/10.1111/1467-856X.12064 https://core.ac.uk/download/28906863.pdf,http://dx.doi.org/10.1111/1467-856x.12064,,10.1111/1467-856x.12064,1912973626,,0,005-390-764-007-957; 007-574-709-573-402; 007-985-015-191-932; 012-004-671-274-840; 013-451-362-156-817; 020-435-088-811-244; 022-892-019-229-126; 023-815-687-780-367; 026-436-570-519-682; 026-755-467-053-093; 027-931-625-349-524; 029-570-175-723-313; 029-929-653-697-403; 030-918-438-625-505; 032-121-068-837-010; 032-696-828-896-206; 033-693-804-516-574; 034-273-427-084-15X; 037-659-975-906-59X; 039-735-462-414-199; 040-985-683-151-801; 046-064-194-686-452; 046-960-020-748-807; 048-084-385-775-90X; 048-581-051-437-254; 054-885-736-787-96X; 058-652-015-085-640; 058-712-517-990-474; 059-481-532-517-109; 060-730-725-452-794; 063-009-650-932-907; 063-158-380-111-381; 066-927-802-832-780; 072-164-090-677-640; 072-255-411-557-476; 072-937-652-267-101; 077-816-797-220-962; 078-126-789-565-395; 082-427-841-280-404; 095-421-061-786-644; 096-352-575-985-739; 104-791-281-704-420; 114-162-091-100-66X; 114-616-836-245-50X; 116-222-257-785-019; 116-266-987-906-083; 118-037-413-226-250; 118-098-030-723-363; 119-150-114-696-499; 122-589-834-107-76X; 134-594-239-465-003; 136-052-672-644-236; 136-561-681-821-885; 143-019-203-916-752; 147-680-820-133-785; 148-460-439-813-652; 150-569-449-238-453; 152-532-065-418-619; 159-760-922-838-933; 160-371-662-917-833; 172-841-633-802-905; 178-313-915-711-074; 179-388-884-405-332; 188-191-783-452-866; 194-100-605-585-552; 196-051-533-916-045; 197-520-621-617-489,7,true,, 047-193-163-900-716,Is the Crime of Piracy Obsolete,,1925,journal article,Harvard Law Review,0017811x,JSTOR,United States,Edwin D. Dickinson,,38,3,334,,Political science,,,,,https://repository.law.umich.edu/articles/2124/ https://repository.law.umich.edu/cgi/viewcontent.cgi?article=3126&context=articles,http://dx.doi.org/10.2307/1328811,,10.2307/1328811,2796996956,,0,,32,false,, 047-349-775-410-45X,The piracy crusade: how the music industry's war on sharing destroys markets and erodes civil liberties,2014-09-29,2014,journal article,"Information, Communication & Society",1369118x; 14684462,Informa UK Limited,United Kingdom,Atle Mikkola Kjøsen,In the The piracy crusade Aram Sinnreich aims to debunk the music industry's narrative that informs the laws and policies that regulate sharing of music over the internet. In this narrative – creat...,18,12,1460,1463,The Internet; Political science; Music industry; Narrative; Law; Civil liberties,,,,,https://www.tandfonline.com/doi/full/10.1080/1369118X.2014.961499 https://www.tandfonline.com/doi/pdf/10.1080/1369118X.2014.961499,http://dx.doi.org/10.1080/1369118x.2014.961499,,10.1080/1369118x.2014.961499,2043622992,,0,000-484-404-733-088; 009-864-072-409-143; 020-583-266-300-354; 025-882-171-215-511; 057-911-577-823-673; 062-285-605-303-137; 078-863-120-928-078; 136-923-294-386-292; 163-053-433-863-793; 177-136-456-533-369; 199-623-943-838-000,0,false,, 047-390-510-033-665,The Routine Activities of Maritime Piracy,2000-10-01,2000,journal article,Security Journal,09551662; 17434645,Springer Science and Business Media LLC,United States,John L. Worrall,"Maritime piracy has been romanticized extensively by writers and film-makers, but has otherwise been consigned to the past. Over the last five years, however, there has been a phenomenal increase in the number of attacks on commercial seafarers and their vessels. Modern-day piracy is frequently a violent and ruthless practice, and it inspires considerable fear among the ship-owners and crew members who are responsible for carrying their cargo into the territorial waters of other nations. This paper introduces the subject of modern-day maritime piracy, reviews theoretical explanations of this emerging crime control problem, then attempts to explain the recent spate of piratical attacks by invoking a routine activities approach.",13,4,35,52,Political science; Airport security; Occupational safety and health; Law; Organised crime; Crime control; Subject (philosophy); Crew; Access control; Territorial waters,,,,,https://link.springer.com/10.1057/palgrave.sj.8340064 https://link.springer.com/article/10.1057/palgrave.sj.8340064 https://link.springer.com/content/pdf/10.1057%2Fpalgrave.sj.8340064.pdf,http://dx.doi.org/10.1057/palgrave.sj.8340064,,10.1057/palgrave.sj.8340064,2017464148,,0,,18,false,, 047-463-217-583-072,OPEN SOURCE SEBAGAI ALTERNATIF PENGURANGAN PELANGGARAN HAK CIPTA PROGRAM KOMPUTER DI INDONESIA,2008-10-01,2008,journal article,LAW REFORM,25808508; 18584810,Institute of Research and Community Services Diponegoro University (LPPM UNDIP),,Nuzulia Kumala Sari,"Program  komputer  sebagai  hasil  pemikiran  intelektual  dari pembuat program atau pencipta diakui sebagai suatu Karya Cipta, yaitu karya dari perwujudan cipta,  rasa  dan  karsa  nya  yang  dilindungi dengan  hak  cipta. Pelanggaran Hak Cipta di bidang program komputer pada saat ini marak terjadi di Indonesia.Berdasarkan pengamatan UTR (United Trade Representative) Indonesia berada dalam kelompok negara Priority Watch list , yaitu daftar negara yang dianggap perlu diawasi karena penegakan hukumnya di anggap lemah terhadap pelanggaran Hak Milik Intelektual, dan menobatkan Indonesia sebagai nomor tiga dalam daftar “20 Country with the Highest Piracy Rates”. Penelitian ini bermaksud memperoleh kejelasan masalah: (a) pelanggaran hak cipta program komputer di Indonesia; (b) perlindungan hak cipta program komputer dalam UU Hak Cipta di Indonesia; (c) Open Source sebagai alternatif mengurangi tingkat pelanggaran hak cipta program komputer di Indonesia. Metode pendekatan yang digunakan dalam penelitian ini adalah metode pendekatan yuridis-normatif yaitu melihat hukum dalam perspektif hukum positif atau hukum di konsep kan sebagai norma-norma positif di dalam sistem perundang- undangan. Dalam pendekatan ini lebih jauh melihat substansi, asas, doktrin, maupun peraturan dalam hukum positif mengenai hak cipta. Spesifikasi penelitian bersifat deskriptif analitis dengan menggunakan metode pengumpulan data Sekunder yang dilakukan melalui studi kepustakaan atau teknik dokumentasi. Hasil penelitian menunjukkan bahwa: (a) Gejala pelanggaran hak cipta program komputer dilakukan dengan lima kategori (b) Di Indonesia,  program  komputer  termasuk  dalam  salah  satu  karya yang dilindungi dengan hak cipta (c)  Dengan menggunakan open  source hak  ekonomi dari  pemegang  Hak  Cipta  telah  dilepas  dari  semula, sehingga  setiap  pengguna  dapat  dengan  bebas  untuk  memperbanyak, mendistribusikan ulang, menyewakan bahkan merubah atau menambah Source Code dari suatu program, jadi biaya lisensi dapat dikatakan menjadi nol rupiah.  Atas dasar penelitian tersebut, direkomendasikan:(a)sosialisasi terhadap  penggunaan software open source yang relatif masih baru ini sehingga masyarakat pengguna  software  dapat   mengetahui  adanya  software  alternatif   yang   aman digunakan dan mudah untuk dioperasikan. Aman artinya software yang digunakan tersebut tidak melanggar hukum dan mudah dioperasikan artinya pengoperasiannya tidak  jauh  berbeda  dengan  sistem  operasi  yang  sekarang  ada;  (b) penggunaan software open source dapat dioptimalkan pemanfaatannya karena berbagai potensi dan keunggulan yang dimilikinya, sehingga dapat digunakan dalam berbagai bidang.  K ata K un c i : H ak Cipta ; Pelanggaran Hak Cipta Program Komputer ; Open Source",4,1,31,43,,,,,,https://www.neliti.com/id/publications/110695/open-source-sebagai-alternatif-pengurangan-pelanggaran-hak-cipta-program-kompute https://ejournal.undip.ac.id/index.php/lawreform/article/download/13550/10218 https://ejournal.undip.ac.id/index.php/lawreform/article/view/13550 https://media.neliti.com/media/publications/110695-ID-none.pdf,http://dx.doi.org/10.14710/lr.v4i1.13550,,10.14710/lr.v4i1.13550,2609333900,,0,,0,true,cc-by-sa,gold 047-547-799-392-951,Universal Jurisdiction over Operation of a Pirate Ship: The Legality of the Evolving Piracy Definition in Regional Prosecutions,,2013,journal article,North Carolina Journal of International Law and Commercial Regulation,,,,Samuel Shnider,,38,2,473,,Political science; Law; Universal jurisdiction; Principle of legality,,,,,https://scholarship.law.unc.edu/ncilj/vol38/iss2/3/ https://scholarship.law.unc.edu/cgi/viewcontent.cgi?article=1987&context=ncilj,https://scholarship.law.unc.edu/ncilj/vol38/iss2/3/,,,2729032259,,0,,4,false,, 048-130-114-536-645,"Piracy, paramountcy, and protectorates",,1975,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),United States,Alfred P. Rubin,,69,2,459,460,Political science,,,,,http://ci.nii.ac.jp/ncid/BA2579966X,http://dx.doi.org/10.2307/2200293,,10.2307/2200293,1976348152,,0,,6,false,, 048-146-427-479-916,More on piracy,,1982,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,4,6,3,3,Business; Computer security; Computer science; Internet privacy,,,,,,http://dx.doi.org/10.1016/0142-0496(82)90024-8,,10.1016/0142-0496(82)90024-8,,,0,,0,false,, 048-227-258-939-604,Fourth Circuit draws on UN Convention on the Law of the Sea and modern practice in defining piracy,,2012,journal article,American Journal of International Law,00029300,,,John R. Crook,,106,4,853,855,Political science; United Nations Convention on the Law of the Sea; Law,,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=4120299,https://dialnet.unirioja.es/servlet/articulo?codigo=4120299,,,181903172,,0,,0,false,, 048-374-603-743-005,Competing with Piracy: A Multichannel Sequential Search Approach,,2013,journal article,Journal of Management Information Systems,07421222; 1557928x,Informa UK Limited,United States,Xianjun Geng; Young Jin Lee,"We consider an online market where consumers may obtain digital goods from two mutually exclusive channels: a legitimate channel consisting of many law-abiding retailers and a piracy channel consisting of many piracy services. We analyze consumer choice, retailer strategy, and piracy control using a sequential-search approach where information acquisition is costly for some consumers (nonshoppers), yet costless for others (shoppers). First, we show that a nonshopper's channel choice is determined by a simple comparison of two reservation prices. Second, we analyze how piracy threats affect in-channel pricing among retailers. If the in-channel competition intensity among retailers is high, piracy does not affect retailer pricing. If the intensity is medium, retailers respond to piracy by giving up some shoppers and, surprisingly, raising prices. If the intensity is low, the legitimate channel loses some shoppers as well as some nonshoppers to the piracy channel. Third, we consider several mechanisms for fi...",30,2,159,184,Advertising; Business; Communication channel; Search cost; Digital goods; Control (management); Consumer choice; Price dispersion; Reservation; Competition (economics),,,,,http://dblp.uni-trier.de/db/journals/jmis/jmis30.html#GengL13 https://www.jmis-web.org/articles/361 https://dblp.uni-trier.de/db/journals/jmis/jmis30.html#GengL13 https://www.tandfonline.com/doi/abs/10.2753/MIS0742-1222300206,http://dx.doi.org/10.2753/mis0742-1222300206,,10.2753/mis0742-1222300206,2036461448,,0,000-260-367-052-319; 003-950-884-954-553; 006-974-340-306-772; 013-172-960-188-569; 015-554-842-248-934; 016-941-342-626-413; 017-619-716-693-348; 021-473-566-954-279; 023-408-407-435-30X; 024-762-222-109-733; 025-801-534-025-091; 030-823-075-021-486; 033-515-397-981-935; 036-092-772-615-548; 039-898-832-968-073; 046-719-607-140-509; 047-415-077-240-96X; 049-698-234-112-01X; 051-971-637-591-971; 054-205-310-182-865; 064-183-717-699-32X; 066-174-220-915-486; 074-236-235-932-992; 074-777-270-980-043; 080-208-184-106-680; 087-010-768-796-663; 090-428-567-864-910; 093-068-966-014-086; 099-509-086-969-14X; 104-899-223-470-691; 108-734-327-531-516; 118-179-693-472-854; 125-956-821-859-998; 130-829-259-176-725; 153-552-384-031-475; 171-610-183-380-105; 193-634-144-895-266; 198-329-693-708-794,22,false,, 048-426-624-560-808,Climate change and maritime security narrative: the case of the international maritime organisation,2018-08-02,2018,journal article,Journal of environmental studies and sciences,21906483; 21906491,Springer Publishing Company,United States,Basil Germond; Fong Wa Ha,"Both climate change and maritime security are currently ranking high on states' and international organisations' political and governance agendas. However, academics and practitioners alike have hardly tackled the actual interlinkages and dependencies between the two issues. Taking the International Maritime Organization (IMO) as a case study, this article pioneers the use of corpus linguistic method to unravel the nonexistence of a narrative linking climate change impacts and the occurrence of maritime criminality despite some connections in practice. However, direct narrative links between climate change and migration as well as migration and maritime security were found, which can point at an indirect link between climate change and maritime security. The article concludes on the implications of these findings for academics and practitioners alike. The latter are encouraged to reflect on their current narrative in a bid to contribute to a better acknowledgement of the existing links between the impacts of climate change on natural and human systems and aspects of maritime security.",9,1,1,12,Global warming; Climate change; Political economy; Human systems engineering; Political science; Narrative; Acknowledgement; Maritime security; Corporate governance; Sustainable development,Corpus linguistics; Discourse; Global warming; IMO; Maritime criminality; Migration,,,Economic and Social Research Council; Economic and Social Research Council,https://europepmc.org/articles/PMC6383619 http://clok.uclan.ac.uk/24616/ https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6383619 https://link.springer.com/content/pdf/10.1007%2Fs13412-018-0509-2.pdf https://pubmed.ncbi.nlm.nih.gov/30873334/ https://link.springer.com/article/10.1007/s13412-018-0509-2 https://paperity.org/p/143695718/climate-change-and-maritime-security-narrative-the-case-of-the-international-maritime https://ideas.repec.org/a/spr/jenvss/v9y2019i1d10.1007_s13412-018-0509-2.html https://eprints.lancs.ac.uk/id/eprint/126494/ https://core.ac.uk/download/161510479.pdf,http://dx.doi.org/10.1007/s13412-018-0509-2,30873334,10.1007/s13412-018-0509-2,2885687167,PMC6383619,0,001-217-509-666-483; 014-925-412-403-475; 017-392-582-866-472; 025-451-834-355-773; 029-203-296-534-813; 034-577-002-498-325; 036-701-729-641-637; 037-023-205-795-818; 042-608-921-365-24X; 043-668-449-148-532; 043-708-393-558-295; 052-627-226-126-905; 056-418-584-475-739; 056-560-855-545-557; 058-874-413-569-783; 059-155-613-765-282; 062-549-861-335-732; 063-714-182-238-976; 066-408-768-597-603; 078-126-526-131-552; 079-601-536-258-318; 080-495-000-630-467; 085-268-901-477-668; 089-857-348-186-961; 099-643-426-001-133; 105-443-140-295-235; 106-866-919-500-002; 109-609-430-196-369; 115-687-842-571-410; 119-999-406-255-890; 121-478-583-714-312; 126-004-556-369-856; 128-684-789-794-276; 139-707-985-231-882; 141-928-620-037-703; 155-422-089-571-599; 160-963-087-683-207; 173-744-092-335-68X,5,true,cc-by,hybrid 048-674-932-254-848,PERLINDUNGAN HUKUM HAK KEKAYAAN INTELEKTUAL TERHADAP TINDAKAN PELANGGARAN PEMBAJAKAN BUKU ELEKTRONIK MELALUI MEDIA ONLINE,2019-10-01,2019,journal article,AL IMARAH : JURNAL PEMERINTAHAN DAN POLITIK ISLAM,2684799x; 25410067,Institut Agama Islam Negeri (IAIN) Bengkulu,,Etry Mike,"This time progress of science and technology and the increase of national development activities make the sociaty in various aspects of life also experienced an increase therefore the effort of creation and renewal of a legislation is required to be guaranteed a legal certainty. As well as in the field of science art, and literature are closely related to the problem of Intellectual Property Rights, because increasing of technology activities marked by the emergence of innovative new discoveries but unfortunately in the middle development of science and technology sector is not supported by public awareness and market participants to be honest in understanding the importance of protecting Intellectual Property Rights on a product produced by someone. The rise of piracy toward books that happening at this time indicates the weakness of the enforcement of copyright in Indonesia. Books in electronic format should be able to provide a solution to the high price of textbooks but in fact precisely this book in electronic format becomes easier to be plowed online by irresponsible elements to be reproduced in order to gain individual benefits only",2,2,,,Political science; Order (exchange); Law and economics; Legislation; Legal certainty; Happening; Enforcement; National development; Intellectual property; Product (business),,,,,https://ejournal.iainbengkulu.ac.id/index.php/alimarah/article/view/1449 https://ejournal.iainbengkulu.ac.id/index.php/alimarah/article/download/1449/1243 https://core.ac.uk/download/pdf/229576204.pdf,http://dx.doi.org/10.29300/imr.v2i2.1449,,10.29300/imr.v2i2.1449,2978315252,,0,,0,true,cc-by-nc-sa,gold 048-709-343-041-163,The Norwegian DeCSS Litigation – A DVD Piracy Trial,2004-07-01,2004,journal article,Business Law Review,01436295,,,Thomas Andersen,,25,7,187,189,Advertising; Political science; DeCSS; Norwegian,,,,,,,,,2597741858,,0,,0,false,, 048-957-698-372-108,A Study on Insurance issues of Marine Piracy based upon M/V Samho Jewel,,2012,journal article,Law review,,,,Ji Sang Gyu,,,47,293,312,Political science; Law; Ransom,,,,,,,,,3119498395,,0,,0,false,, 048-999-258-624-215,Establishing an Effective Mechanism of the Jurisdictions over Piracy,,2014,journal article,"International Journal of e-Education, e-Business, e-Management and e-Learning",20103654,IACSIT Press,,Yang Shu,"domestic law. Moreover, the specific tribunals that prosecute pirates should be introduced in this mechanism. This piece of article consists of three parts. Part I describe the definitions of piracy in important international treaties, and discuss the contradictions among these treaties and between international law and domestic law. Part II outlines the jurisdictions over piracy, and explains the flaws in UNCLOS. Part III considers the specific tribunal that prosecutes pirates. The Conclusion is concerned with uniformity in the rules against piracy and the competent tribunal that fairly judge pirates.",4,2,,,Political science; United Nations Convention on the Law of the Sea; Law; Tribunal; Mechanism (sociology); Part iii; International law; Municipal law,,,,,http://www.ijeeee.org/Papers/322-W10014.pdf,http://dx.doi.org/10.7763/ijeeee.2014.v4.322,,10.7763/ijeeee.2014.v4.322,2326934257,,0,010-818-012-402-722; 051-393-025-360-687; 053-914-517-018-945; 054-035-533-666-366; 097-398-920-358-956; 122-261-057-954-85X; 176-431-351-812-973,0,false,, 049-200-660-846-066,East Germany- haven for software piracy,,1990,journal article,Computers & Security,01674048,Elsevier BV,United Kingdom,Hans Gliss,,9,5,391,393,Political science; Software; Haven; Economic history,,,,,https://dblp.uni-trier.de/db/journals/compsec/compsec9.html#Gliss90,http://dx.doi.org/10.1016/0167-4048(90)90068-5,,10.1016/0167-4048(90)90068-5,2028489042,,0,,0,false,, 049-313-252-332-884,The implications of piracy on marine insurance: some considerations for the shipowner,2012-02-07,2012,journal article,WMU Journal of Maritime Affairs,1651436x; 16541642,Springer Science and Business Media LLC,Sweden,Costas Lambrou,"A prominent feature of modern day piracy is the ransom that is demanded for the safe release of the ship, cargo and crew. The recent upsurge of this type of piracy, in areas of the world that are of strategic importance to the shipping industry, has created many challenges for shipowners, underwriters and the law relating to marine insurance. The aim of this paper is to examine how the marine insurance market is being affected by the threat of modern day piracy, and seeks to identify the options that are available for the recovery of a ransom payment by the shipowner. Moreover, this study aims to identify the legal issues that might prevent a shipowner from recovering a ransom payment under an insurance policy or from the other interests in a common adventure. The study establishes that a reasonably made ransom payment by the shipowner will amount to an extraordinary expense that is taken to minimise or avert a loss. Such an act can generally be recovered under the insurance policy as a sue and labour expense or from other interests in the common adventure as a general average expense. However, illegality, unseaworthiness and exemption clauses in a marine policy are identified as being legal issues that may prevent a shipowner from recovering the ransom payment. Some of these problems may be overcome if clauses are carefully drafted to specifically cater for modern day piracy in a marine insurance policy. Several inconsistencies may also be resolved by transferring the piracy peril to war risks cover. The shipowner’s duty is to respond to the changing circumstances, by ensuring that his vessel is sufficiently equipped and the crew is properly trained to resist a hijacking.",11,1,129,141,Payment; Economics; Public international law; Law and economics; Law; Underwriting; Duty; Crew; Ransom; Adventure; Insurance policy,,,,,https://rd.springer.com/article/10.1007/s13437-012-0019-0 https://link.springer.com/article/10.1007/s13437-012-0019-0/fulltext.html https://link.springer.com/article/10.1007/s13437-012-0019-0 https://trid.trb.org/view/1411811,http://dx.doi.org/10.1007/s13437-012-0019-0,,10.1007/s13437-012-0019-0,2120351482,,0,011-657-872-520-085; 018-421-175-465-723; 019-107-258-013-264; 056-633-973-029-486; 129-531-052-364-377; 146-733-080-345-570; 176-789-466-151-876; 179-829-784-044-841,1,false,, 049-455-798-729-289,"In the absence of the domestication of other maritime instruments, can Nigeria suppress piracy off its coast through the instrumentality of the ISPS Code?",2016-11-30,2016,journal article,MARITIME LAW REVIEW,15981053,Korean Institute of Maritime Law,,Kalu Kingsley Anele,"Consequent upon the grave implications of piracy, it is trite that the implementation of relevant maritime security instruments is one of the major mechanisms in suppressing piratical acts. More importantly, such instruments should enhance the prevention and encourage the repelling of piratical attacks against vessels as well as provide a platform for introducing and enforcing other mechanisms to counter piracy. And it is imperative to highlight that the nature of the Nigerian piracy involves territorial interface: the port and its surroundings, the country’s coast, and the high seas; which warrants the introduction and use of a legal regime that encapsulates these circumstances. Against this backdrop, the International Ship and Port Facilities Security Code introduces a regime that is applicable across maritime zones in preventing and overcoming insecurity as a result of piracy by apportioning roles to the stakeholders in the maritime sector. In view of that, this paper explores the use of the code to combat piracy off the coast of Nigeria, in addition, for the purpose of global anti-piracy. The paper argues that the effective and comprehensive implementation of the code reduces the vulnerability of vessels to piratical attack, enhances assessment and evaluation of piracy risks as well as strengthens capacity building in repelling piratical acts, among others, thereby reducing the incidence of piracy off the Nigerian coast.",28,3,205,274,Card security code; International trade; Port (computer networking); International waters; Code (semiotics); Geography; Maritime security; Capacity building; Genealogy; Vulnerability (computing),,,,,http://scholar.dkyobobook.co.kr/searchDetail.laf?barcode=4010025015444 http://db.koreascholar.com/article.aspx?code=320144 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002167214,http://dx.doi.org/10.14443/kimlaw.2016.28.3.9,,10.14443/kimlaw.2016.28.3.9,2567079940,,0,,0,false,, 049-463-385-370-052,Piracy on the increase in Philippines,,1997,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,1997,7,5,5,Business; Computer security; Computer science; Internet privacy,,,,,,http://dx.doi.org/10.1016/s1361-3723(97)89544-9,,10.1016/s1361-3723(97)89544-9,,,0,,0,false,, 049-548-077-721-300,How do hospitality and tourism students view software piracy,,2005,journal article,Asia Pacific Journal of Tourism Research,10941665; 17416507,Informa UK Limited,United Kingdom,Rob Law; Donna Wong,"Ever since the introduction of commercial software, software piracy has been an issue in most, if not all, regions. To address this issue, most official authorities have been trying to stop the spread of pirated software in their own jurisdictions. In spite of the generally agreed importance of intellectual property rights, hospitality and tourism researchers have rarely, if ever, investigated the issue of software piracy. The absence of published articles on the issue of software piracy is particularly true in the context of hospitality and tourism education. This paper reports on a study that examined the perceptions and experiences of hospitality and tourism students on software piracy. On the basis of the empirical results collected from hospitality and tourism students in Hong Kong, it is concluded that most students have used or purchased pirated software. In addition, low prices and easy accessibility are the major reasons for the widespread use of pirated software.",10,3,263,273,Hospitality; Business; Marketing; Spite; Tourism; Software; Commercial software; Context (language use); Intellectual property; Hospitality industry,,,,,https://core.ac.uk/display/61129215 https://www.cabdirect.org/cabdirect/abstract/20063021738 https://www.tandfonline.com/doi/full/10.1080/10941660500309648 https://www.cabdirect.org/abstracts/20063021738.html https://research.polyu.edu.hk/en/publications/how-do-hospitality-and-tourism-students-view-software-piracy,http://dx.doi.org/10.1080/10941660500309648,,10.1080/10941660500309648,2085527848,,0,002-442-900-777-730; 020-492-550-168-49X; 033-349-220-802-574; 039-883-767-744-759; 041-326-767-334-557; 041-643-503-282-852; 045-374-340-641-605; 056-919-599-177-828; 062-180-644-489-615; 086-413-462-529-140; 098-378-498-642-940; 113-227-246-254-726; 161-416-152-526-00X; 190-030-157-709-809,6,false,, 049-659-644-922-179,Maritime piracy as a violation of human rights: a way forward for its effective prevention and suppression?,,2013,journal article,The International Journal of Human Rights,13642987; 1744053x,Informa UK Limited,United Kingdom,Tom Obokata,"This article analyses the regulation of maritime piracy from a human rights perspective. After a brief historical development of piracy in international law, the article highlights the key weaknesses inherent in the current legal framework as represented by the United Nations Convention on the Law of the Sea 1982 and the Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation 1988, and explains how international human rights law can alleviate some of these problems. Finally, key obligations imposed upon states as well as a challenge posed by extraterritorial application of human rights law will be analysed.",17,1,18,34,Human rights; Political science; United Nations Convention on the Law of the Sea; Public international law; Law; Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation; Principle of legality; Law of the sea; International law; International human rights law,,,,,https://www.tandfonline.com/doi/full/10.1080/13642987.2012.690218,http://dx.doi.org/10.1080/13642987.2012.690218,,10.1080/13642987.2012.690218,2053322265,,0,,3,false,, 050-005-371-218-209,Reducing Book Piracy: The Role of the Higher Education Sector,2014-08-13,2014,journal article,International Research in Education,23275499,"Macrothink Institute, Inc.",,Evelyn Chiyevo Garwe,"The objective of this paper was to address the rampant infringement of intellectual property rights in Zimbabwe, with respect to the literary industry. The paper identifies the various forms of book piracy in Zimbabwe, their causes and effects and strategies to deal with the scourge with specific emphasis on the contribution of the higher and tertiary sector. The methodology included observation, analysis of documentary evidence, and in-depth interviews with key informants inclusive of government officials, higher and tertiary education officials, Zimbabwe International Book Fair leadership, publishers, authors, parents, students and book vendors. The findings revealed that unlawful reprography and abuse of publication rights are the main forms of book piracy in Zimbabwe. The causes of book piracy were identified as book scarcity, poverty and ignorance of the copyright laws. The impact of book piracy was positive as far as the beneficiaries were concerned but had debilitating effects to the copyright owners. The paper suggests ways in which the higher education sector could contribute to the reduction of book piracy initially by their academic staff and students and ultimately by the whole nation through ripple effects. These ways include awareness, advocacy and enforcement of copyright laws; revitalization of libraries as well as encouraging curriculum inclusiveness. The paper contributes to the on-going anti-book piracy debate and provides useful information to Librarians, higher education institutions as well as policy makers.",2,2,72,82,Scarcity; Higher education; Government; Political science; Poverty; Enforcement; Intellectual property; Public relations; Tertiary sector of the economy; Curriculum,,,,,http://researchdatabase.ac.zw/537/ https://www.macrothink.org/journal/index.php/ire/article/view/5649 http://acascipub.com/International%20Open%20Journal%20of%20Educational%20Research/IOJER_Vol.%202%20%20No.%201%20May%202014/Reducing.pdf https://www.macrothink.org/journal/index.php/ire/article/download/5649/4927,http://dx.doi.org/10.5296/ire.v2i2.5649,,10.5296/ire.v2i2.5649,2034209868,,0,017-256-016-567-48X; 027-989-705-549-237; 043-219-796-399-340; 082-156-801-416-117; 185-230-559-621-186,1,true,cc-by,hybrid 050-030-391-738-898,Combating Software Piracy: A Statutory Proposal to Strengthen Software Copyright,2015-01-22,2015,journal article,Depaul Law Review,00117188,,,William Christopher Graft,,34,4,993,,Business; Statutory law; Software; Computer security,,,,,https://via.library.depaul.edu/cgi/viewcontent.cgi?article=2219&context=law-review https://via.library.depaul.edu/law-review/vol34/iss4/5/,https://via.library.depaul.edu/law-review/vol34/iss4/5/,,,338151505,,0,,2,false,, 050-034-327-238-66X,Piracy and universal jurisdiction,,2013,journal article,Macquarie Law Journal,1445386x,,,Tamsin Phillipa Paige,"This article will examine the history of piracy jure gentium and the law as it currently stands, showing that piracy does not lie within the realm of universal jurisdiction or international criminal law. The history component will separate the rhetoric of ‘pirates’ and ‘piracy’ from the legal definition, a practice that is often lacking in considerations of piracy jure gentium. The examination of the current law will explore the codification of piracy in UNCLOS, particularly the articulation of jurisdiction in Article 105 as it compares to the universal jurisdiction afforded other jus cogens crimes. From this it will be clear that piracy is not a crime of universal jurisdiction based on the heinousness of the crime, as is the case with international crimes, but rather a crime of concurrent municipal jurisdiction based on the stateless nature of the crime.",12,,131,154,Stateless protocol; Rhetoric; Political science; United Nations Convention on the Law of the Sea; As is; Law; Criminal law; Universal jurisdiction; Jurisdiction; Realm,,,,,http://dro.deakin.edu.au/view/DU:30118270,http://dro.deakin.edu.au/view/DU:30118270,,,3123683456,,0,,5,false,, 050-092-638-200-71X,The jurisdictional challenges to the prosecution of piracy cases in Kenya: mixed fortunes for a perfect model in the global war against piracy,2012-04-04,2012,journal article,WMU Journal of Maritime Affairs,1651436x; 16541642,Springer Science and Business Media LLC,Sweden,Paul Musili Wambua,"Since 2008 Kenya has distinguished itself in the global war against piracy by undertaking prosecutions in the national courts of suspected pirates arrested in the high seas and handed over by navies of leading maritime nations under bilateral agreements (MOUs) entered into between Kenya and these leading maritime nations. As of July 2011, Kenya had over 20 convicted pirates serving jail terms ranging between 7 and 20 years and over 100 suspected pirates awaiting trial in national courts. This is the largest number of suspected pirates held and tried in any one state at any given time in modern history. To achieve this, Kenya had to effect far reaching changes in the law. In the initial stages, suspected pirates were charged under Kenya’s Penal Code (Cap 63 Laws of Kenya). However, the high court in the case of Re Mohamud Mohamed Dashi and eight others [2010] eKLR, ruled that Kenya had no jurisdiction to try suspected pirates under that law. In September 2009, Kenya passed a new law (the Merchant Shipping Act), which not only defined more comprehensively and extensively the offence of piracy, but also extended the jurisdiction of Kenyan courts to try piracy committed by non-nationals. Though the law gives Kenya a very broad jurisdiction to try suspected pirates, the process is still fraught with challenges due to lack of financial and human resources. In the case of Republic vs Hassan Jama Haleys Alias Hassan Jamal and five others [2010] eKLR, the court commented thus:; “… I must note that the ‘piracy trials’ have presented a unique challenge to the Kenyan legal system. We cannot ignore the fact that these are suspects who having been arrested by foreign naval forces on the High Seas are brought to Kenya for trial. They are strangers in the country, do not understand the legal system, may not know what their rights are and do not understand the language… the Kenyan Government and the International partners supporting these trials put in place a system to provide free legal representation for the suspects…”",11,1,95,113,Sociology; Government; Modern history; International waters; Public international law; Kenya; Law; Adjudication; High Court; Jurisdiction,,,,,https://link.springer.com/10.1007/s13437-012-0021-6 https://paperity.org/p/8726639/the-jurisdictional-challenges-to-the-prosecution-of-piracy-cases-in-kenya-mixed-fortunes http://erepository.uonbi.ac.ke/handle/11295/39139 https://link.springer.com/article/10.1007%2Fs13437-012-0021-6 https://core.ac.uk/display/81883230 https://link.springer.com/content/pdf/10.1007%2Fs13437-012-0021-6.pdf https://profiles.uonbi.ac.ke/musili/publications/jurisdictional-challenges-prosecution-piracy-cases-kenya-mixed-fortunes-perfect- https://trid.trb.org/view/1411819,http://dx.doi.org/10.1007/s13437-012-0021-6,,10.1007/s13437-012-0021-6,1978200200,,0,101-661-151-578-708,9,true,cc-by,hybrid 050-126-374-772-118,Aerial Piracy and Extended Jurisdiction in Japan,,1984,journal article,International and Comparative Law Quarterly,00205893; 14716895,Cambridge University Press (CUP),United Kingdom,Ruwantissa Abeyratne,,33,3,596,613,Political science; Law; Jurisdiction,,,,,https://www.cambridge.org/core/journals/international-and-comparative-law-quarterly/article/aerial-piracy-and-extended-jurisdiction-in-japan/705527D4D7E0A068D4FCEF8DC6A0EED8,http://dx.doi.org/10.1093/iclqaj/33.3.596,,10.1093/iclqaj/33.3.596,2115252203,,0,,0,false,, 050-159-228-713-022,"Douglas Guilfoyle (ed), Modern Piracy. Legal challenges and responses.",2014-05-27,2014,journal article,Australian and New Zealand Maritime Law Journal,18340881,,,Michael Underdown,"Book review: Douglas Guilfoyle (ed), Modern Piracy. Legal challenges and responses. Edward Elgar, Cheltenham (2013). xvi, 354 pp.; ISBN 9781849804844",28,1,48,50,Political science; Law; Law of the sea,,,,,https://ssl.law.uq.edu.au/journals/index.php/maritimejournal/article/download/221/249 https://ssl.law.uq.edu.au/journals/index.php/maritimejournal/article/view/221,https://ssl.law.uq.edu.au/journals/index.php/maritimejournal/article/view/221,,,1508840389,,0,,0,false,, 050-439-315-421-892,A Critical Appraisal of The Anti-Piracy Law of Nigeria,2021-10-10,2021,journal article,"Journal of Law, Policy and Globalization",22243240,,,Victor Nonso Enebeli; David Chibuike Njoku,"Nigeria’s June 2019 law on piracy and other maritime offences is an important step in securing the country’s coastline and seas. The Ant-Piracy law on Suppression of Piracy and Other Maritime Offences Act, [1] 2019 (POMO Act) aims to ‘prevent and suppress piracy, armed robbery and any other unlawful act against a ship, aircraft and any other maritime craft, including fixed and floating platforms.’ It also observed that this law gives effect to the United Nations Convention on the Law of the Sea, 1982 (UNCLOS) and the Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation, 1988 (SUA). Despite the enactment of this huge law and policies targeted at ameliorating the numerous problems at Nigeria’s coastline and seas, the situation in Nigeria seems degenerating owing to the fact that there are no adequate compliance of the laws as well as the ineffective implementation or enforcement of the law. This paper seeks to critically evaluate the impacts of the Act and also its weaknesses. It also discusses Nigeria’s capacity to implement its new law and detect and prosecute crimes. Analysis includes an evaluation of the steps taken by the governments of the region and the effectiveness of the implemented strategies to counter the threat posed by piracy in the region. In identifying the barriers and challenges to combat piracy, a comprehensive arrangement based effective cooperation is proposed in the paper. Keywords : PIRACY LAW, NIGERIA DOI: 10.7176/JLPG/113-06 Publication date: September 30 th 2021 * PhD & LLM (Coventry), BL (Nigeria), LLB (London Met), Lecturer, Department of Public Law, Faculty of Law, Rivers State University. Email: victor.enebeli@yahoo.co.uk , Phone: 09020176657 ** LL.M (RSU) in view; BL (Abuja); LL.B (UK); Dip-in-Law (UK). Senior Associate Tuduru Ede, SAN & Co. Port Harcourt, Rivers State, Nigeria. Email: david.chibuike22@yahoo.com/ikemefula20@yahoo.com . 08065357894, 08052339985 [1] https://lawnigeria.com/2019/12/suppression-of-piracy-and-other-maritime-offences-act-2019/ accessed 04/08/2021",113,,47,62,Critical appraisal; Political science; Public law; United Nations Convention on the Law of the Sea; Law; State (polity); Phone; Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation; Craft; Enforcement,,,,,https://www.iiste.org/Journals/index.php/JLPG/article/view/57370 https://iiste.org/Journals/index.php/JLPG/article/download/57370/59244,https://www.iiste.org/Journals/index.php/JLPG/article/view/57370,,,3206311809,,0,,0,false,, 050-649-580-010-424,The (Un)importance of Somali piracy,2015-06-14,2015,journal article,"Crime, Law and Social Change",09254994; 15730751,Springer Science and Business Media LLC,Netherlands,Karen Clark,"Although maritime piracy off the Somali coast has garnered a lot of media attention, little scholarly work has investigated its influence in the region and its long term consequences. This paper examines the causes of piracy and how it relates to the geopolitics of the Horn of Africa. Contemporary cases of Somali piracy and their political, legal and economic impacts are reviewed both in terms of how they affect the Somali population as well as the impact on the enterprise of private global shipping. Finally, the reaction by the international community to Somalia as compared to the involvement of the stable democracy of Somaliland is discussed.",63,5,269,280,Economy; Political science; Economic impact analysis; Geopolitics; Somali; International community; Population; Scholarly work; Democracy; Politics,,,,,https://link.springer.com/content/pdf/10.1007%2Fs10611-015-9565-7.pdf https://link.springer.com/article/10.1007/s10611-015-9565-7/fulltext.html,http://dx.doi.org/10.1007/s10611-015-9565-7,,10.1007/s10611-015-9565-7,630525099,,0,016-082-594-977-321; 016-132-887-210-40X; 031-391-312-149-679; 040-626-569-617-458; 042-761-115-032-636; 045-535-616-207-549; 071-513-785-964-685; 093-801-939-621-752; 101-367-879-267-438; 116-189-727-490-564; 123-771-174-984-368; 148-678-349-100-52X; 153-642-005-386-903; 169-281-542-185-015; 172-257-499-843-411,1,false,, 050-727-113-788-879,EU gets tough on intellectual property piracy,,2004,journal article,Computer Law & Security Review,02673649,Elsevier BV,United Kingdom,Stephen Saxby,,20,3,163,,Political science; Law; Intellectual property,,,,,https://dblp.uni-trier.de/db/journals/clsr/clsr20.html#Saxby04d https://www.sciencedirect.com/science/article/pii/S0267364904000305,http://dx.doi.org/10.1016/s0267-3649(04)00030-5,,10.1016/s0267-3649(04)00030-5,2067496434,,0,,1,false,, 050-735-127-896-002,"The Constitution of Piracy in International Law——From the Perspective of Article 101 of ""United Nations Convention on the Law of the Sea""",,2010,journal article,Journal of Shanxi University,,,,LI Weng-pei,"This paper focuses on the Article 101 of 1982 ""United Nations Convention on the Law of the Sea ""and expounds the contents of it word by word.And it also points out the latest development and the deficiencies which the Article embodied and makes some specific suggestions for how to face the new challenge to Article 101 in piracy problem of Somalia Democratic Republic.",,,,,Political science; United Nations Convention on the Law of the Sea; Law; Perspective (graphical); Constitution; Face (sociological concept); Freedom of navigation; Law of the sea; International law; Democracy,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-SXDD201003021.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-SXDD201003021.htm,,,2365070921,,0,,0,false,, 050-786-677-226-759,"Understanding digital piracy through the lens of psychosocial, criminological and cultural factors",,2017,journal article,International Journal of Technology Policy and Law,17424240; 17424259,Inderscience Publishers,,Sanjeev P. Sahni; Garima Jain; Indranath Gupta,"World's leading reports on piracy published by organisation such as WIPO and BSA have not explicitly explained the act of digital piracy from a psychosocial, cultural and criminological perspective. A total of 624 studies were identified which discussed the digital piracy phenomenon from varied perspective such as economic, political, legal, cultural, psychological, criminological and sociological factors. Relevant papers were further shortlisted from the identified studies by following an inclusion criterion of psychosocial, criminological and cultural factors that impact the behaviour of the perpetrators of digital piracy. Based on these criteria, 74 studies were included in this review which included following factors: social learning theory, self-control theory, neutralising techniques and justification of perpetrators, ethical, moral and religious predisposition of digital piracy. Theoretical constructs in explaining digital piracy and collectivistic and individualistic economies. It also identified potential area of future research based on critical construct of existing literature.",3,1,28,,Social learning theory; Psychosocial; Psychology; Individualism; Construct (philosophy); Perspective (graphical); Inclusion (disability rights); Criminology; Social psychology; Politics; Collectivism,,,,,https://www.inderscience.com/link.php?id=85233 https://www.inderscienceonline.com/doi/abs/10.1504/IJTPL.2017.085233 http://dspace.jgu.edu.in:8080/jspui/handle/10739/1129,http://dx.doi.org/10.1504/ijtpl.2017.085233,,10.1504/ijtpl.2017.085233,2739123324,,0,003-828-680-029-252; 004-661-719-279-959; 005-014-989-182-407; 005-720-717-762-377; 005-745-685-547-074; 006-514-369-290-463; 007-311-552-230-481; 009-299-623-546-736; 010-124-089-161-975; 011-970-832-954-189; 012-558-297-950-849; 012-715-612-090-508; 013-425-010-292-015; 018-602-054-510-017; 020-973-534-331-792; 026-161-995-943-665; 027-159-635-778-954; 027-240-896-003-442; 028-630-596-457-020; 028-999-447-590-450; 030-566-392-829-265; 030-626-859-642-624; 042-840-674-327-735; 046-989-664-357-368; 051-851-761-421-930; 051-873-992-963-021; 053-315-489-683-555; 054-009-033-869-379; 054-549-558-630-210; 056-157-179-063-156; 058-806-863-894-52X; 061-246-670-613-627; 062-759-008-820-920; 063-597-878-494-580; 066-124-129-788-062; 067-339-005-241-596; 068-815-982-198-76X; 069-037-892-373-868; 071-293-161-244-776; 071-535-679-259-648; 072-084-774-976-983; 074-777-270-980-043; 085-514-330-991-030; 085-606-440-229-889; 087-010-768-796-663; 093-998-078-350-63X; 094-565-529-045-486; 096-401-039-718-213; 097-982-725-112-929; 098-842-252-573-961; 099-342-173-833-089; 104-563-034-257-032; 117-162-239-345-081; 123-538-500-409-553; 126-248-125-585-953; 126-772-810-967-037; 129-001-092-183-45X; 150-021-302-220-052; 160-358-377-281-104; 160-590-940-346-090; 162-034-926-577-736; 175-905-268-229-256; 184-374-565-859-074; 186-132-647-421-819; 192-012-326-206-406; 197-360-983-613-805,3,false,, 051-017-386-422-40X,The enemy of all: piracy and the law of nations,2010-07-01,2010,journal article,Choice Reviews Online,00094978; 15238253,American Library Association,,,,47,11,47,6524-47-6524,,,,,,,http://dx.doi.org/10.5860/choice.47-6524,,10.5860/choice.47-6524,,,0,,0,false,, 051-122-898-035-467,International law and counter-piracy in the Indian Ocean,,2012,journal article,Journal of the Indian Ocean Region,19480881; 1948108x,Informa UK Limited,United States,Douglas Guilfoyle,"Abstract International discussion of Somali piracy is now largely conducted in the language of law enforcement, not war or terrorism. The aim of this paper is to explain in a brief and practical way to non-lawyers the relevant legal categories and controversies surrounding Somali piracy and to suggest why the response to piracy has remained in the law enforcement ‘box’. It does this by considering piracy through the lens of four legal ‘paradigms’: the law of armed conflict; the international law of piracy; the law of terrorism (including terrorist financing); and the law applicable to transnational organised crime. The contention will be that the law enforcement paradigm is not only legally justifiable but also highly pragmatic and that the other categories may hold fewer benefits than observers might assume.",8,2,202,218,Sociology; Comparative law; Public law; Law; Terrorism; Law enforcement; Law of the sea; International law; Private law; Commercial law,,,,,https://www.tandfonline.com/doi/full/10.1080/19480881.2012.730753 https://research.monash.edu/en/publications/international-law-and-counter-piracy-in-the-indian-ocean,http://dx.doi.org/10.1080/19480881.2012.730753,,10.1080/19480881.2012.730753,2002588407,,0,001-314-267-090-745; 002-647-153-422-90X; 003-933-546-077-004; 010-233-896-660-204; 018-656-999-902-160; 020-482-566-227-31X; 023-316-194-980-540; 024-173-301-649-142; 024-847-127-639-990; 025-784-266-343-445; 030-203-355-031-657; 037-394-472-600-790; 039-234-329-493-662; 042-790-285-210-506; 043-909-584-046-47X; 047-318-164-879-679; 050-013-757-145-858; 055-624-820-500-870; 056-261-334-019-439; 061-453-006-799-349; 065-403-020-300-946; 067-706-721-291-908; 079-072-262-124-839; 079-818-696-463-06X; 083-011-007-517-876; 087-346-670-699-522; 106-619-699-607-570; 114-785-391-767-037; 116-539-016-154-668; 132-213-404-560-983; 150-042-133-767-411; 156-846-892-670-700; 168-404-940-361-871; 179-076-306-683-514; 189-289-684-003-020; 194-215-333-300-858; 195-281-252-911-296,3,false,, 051-179-133-852-147,Influence of Psycho-social Factors on Youths’ Attitude towards Internet Fraud in Nigeria,,2015,journal article,Procedia - Social and Behavioral Sciences,18770428,Elsevier BV,,Samuel Sunday Fasanmi; Daniel Sarah Kaburuk; Adenike Bosede Ariyo,"The study examined the influence of psycho-social factors on youths’ attitude towards Internet fraud in Nigeria. Opinions of two hundred undergraduate students of Department of Computer Science, Benue State University, Makurdi were randomly sampled for this study. A battery of test such as Big-Five Personality Inventory, Need Achievement Questionnaire, and Attitude towards Internet Fraud Questionnaire were administered to the students. It was found out that sex, age, need for achievement, psychoticism, neuroticism and extraversion were significantly, independently and jointly predicted youths’ attitude towards Internet fraud {F (6, 199) = 55.52, p < .01, Adjusted R2 = .622}. It was also found out that sex (β =0.134, t = 2.317, p < .05) and need for achievement (β =0.702, t =12.183, p < .05) had significant, independent prediction on youths’ attitude towards Internet fraud in Benue State, Nigeria. It was thus recommended that Africans should re-examine their value system; the child needs to be oriented towards his culture right from birth. The adopted curriculum of Western Education should be modified or adapted. More beneficial aspect of African culture should be introduced in the formal school system. Our yardstick for measuring affluence has to be changed to discourage our youths from exchange of money or gift for sex or prostitution. The implications of the study were discussed.",182,,110,115,Extraversion and introversion; Psychology; Need for achievement; Personality Assessment Inventory; Personality; Test (assessment); Psychoticism; Internet fraud; Social psychology; Neuroticism,,,,,https://www.sciencedirect.com/science/article/pii/S1877042815030207 https://core.ac.uk/display/82591749 https://core.ac.uk/download/pdf/82591749.pdf,http://dx.doi.org/10.1016/j.sbspro.2015.04.745,,10.1016/j.sbspro.2015.04.745,303459410,,0,011-008-055-529-653; 073-020-934-641-343; 133-826-493-080-129; 139-546-590-596-962,2,true,,gold 051-201-735-914-980,Somali Piracy and the Human Rights of Seafarers,2016-03-01,2016,journal article,Netherlands Quarterly of Human Rights,09240519,,,Sofia Galani,"Somali piracy has attracted the world's attention over the last decade and whilst Somali piracy abates, the debate on its various aspects remains lively. This paper aims to shed light on one partic...",2016,1,71,98,Human rights; Political science; Law; Somali,,,,,http://journals.sagepub.com/doi/10.1177/016934411603400105 https://research-information.bris.ac.uk/en/publications/somali-piracy-and-the-human-rights-of-seafarers https://core.ac.uk/display/83928689 https://research-information.bristol.ac.uk/files/51015860/S_Galani_Somali_Piracy_and_the_Human_Rights_of_Seafarers_pdf.pdf https://research-information.bris.ac.uk/en/publications/somali-piracy-and-the-human-rights-of-seafarers(f1b55499-6d21-4538-9d35-84fa5cf6d777)/export.html https://research-information.bris.ac.uk/files/51015860/S_Galani_Somali_Piracy_and_the_Human_Rights_of_Seafarers_pdf.pdf https://journals.sagepub.com/doi/abs/10.1177/016934411603400105 https://core.ac.uk/download/83928689.pdf,https://research-information.bris.ac.uk/en/publications/somali-piracy-and-the-human-rights-of-seafarers,,,2191521288,,0,,2,true,, 051-226-418-564-455,The Behavioral Model of Digital Music Piracy on the Web,,2007,journal article,Journal of Information Systems,08887985,,,Jung-Hee Han; Hwal-Sik Chang,"The purpose of this research is to identify multidimensional motivation factors that determine the piracy of copyrighted digital music. The model is based on TPB(theory of planned behavior) as well as other models in consumer behavior. An empirical study resulted in the following findings. first Both individual's attitude toward music piracy and individual's perceived behavior control have positive impacts on the individual's behavioral intention of piracy. It turned out that perceived behavior control has a stronger impact on behavioral intention than attitude does. Second, the level of individual's moral judgment has negative impacts on both the attitude and behavioral intention toward music piracy. Third, individual's experience in music piracy positively affects the attitude, but does not directly or indirectly affect the behavior intention. Fourth, an economic gain from music piracy is not a significant factor in determining both attitude and behavioral intention. Fifth, the risk of being prosecuted for music piracy is a major factor in determining one's attitude, although the risk is not significant enough to change one's behavioral intention. This research found that individuals' intention to pirate digital music is mainly affected by the moral and ethical standards of the individuals and by the extra resources and abilities they possess. Such factors as economic gain and law enforcement were not significant enough to alter one's behavioral intention. This research is significant in that it established a behavioral model to understand the piracy of copyrighted digital music and that it empirically tested the model with Internet users in Korea. This is one of the first empirical studies in Korea to touch such ethically and perhaps politically sensitive issues as online music piracy.",16,1,135,158,Empirical research; Psychology; Consumer behaviour; Music piracy; Law enforcement; Affect (psychology); Social psychology; Behavioral modeling; Digital audio; Theory of planned behavior,,,,,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBSTB0_2007_v16n1_135 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001050097,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=JBSTB0_2007_v16n1_135,,,61081008,,0,,3,false,, 051-346-551-428-205,Intellectual Property Piracy and Counterfeiting in Nigeria: The Impending Economic and Social Conundrum,2011-08-30,2011,journal article,Journal of Politics and Law,19139055; 19139047,Canadian Center of Science and Education,,K. M Waziri,"Nigeria's status as a favourable destination for foreign direct investment as well as a place where local creative talent can flourish is in jeopardy due to the activities of individuals that place no value on intellectual property (IP). Experts have highlighted that one major snag to development of intellectual property in Nigeria is piracy and counterfeiting. It has ripped off many producers, manufacturers, artists, marketers and stakeholders of the benefits of their creativity and also prevented the industry from rapid financial growth and development. It is in this light that we intend to look at the place of piracy and counterfeiting to the social and economic development in Nigeria.",4,2,196,,Creativity; Business; Law; Value (economics); Foreign direct investment; Market economy; Intellectual property,,,,,https://ccsenet.org/journal/index.php/jpl/article/view/12011 https://ccsenet.org/journal/index.php/jpl/article/download/12011/8435,http://dx.doi.org/10.5539/jpl.v4n2p196,,10.5539/jpl.v4n2p196,2161340579,,0,021-474-470-560-210; 185-030-549-413-563,8,true,cc-by,hybrid 051-387-810-880-935,International Law in Crisis: Piracy off the Coast of Somalia,2011-03-22,2011,journal article,Case Western Reserve Journal of International Law,00087254,,,Milena Sterio,,44,1,291,301,Political science; Law; Maritime piracy; International law,,,,,https://engagedscholarship.csuohio.edu/cgi/viewcontent.cgi?article=1803&context=fac_articles https://paperity.org/p/82472640/international-law-in-crisis-piracy-off-the-coast-of-somalia https://scholarlycommons.law.case.edu/jil/vol44/iss1/16/ https://works.bepress.com/milena_sterio/15/ https://engagedscholarship.csuohio.edu/law_other_events/12/ https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1096&context=jil,https://paperity.org/p/82472640/international-law-in-crisis-piracy-off-the-coast-of-somalia,,,1579374823,,0,,1,false,, 051-634-405-893-893,"Contemporary Piracy, Terrorism and Disorder at Sea: Challenges for Sea-Lane Security in the Indian Ocean",2002-11-01,2002,journal article,Maritime Studies,18727859; 22129790,"Centre for Maritime Research, MARE",Germany,Vijay Sakhuja,"(2002). Contemporary Piracy, Terrorism and Disorder at Sea: Challenges for Sea-Lane Security in the Indian Ocean. Maritime Studies: Vol. 2002, No. 127, pp. 1-9.",2002,127,269,281,Economy; Law; Terrorism; Sea lane; Indian ocean; History,,,,,http://www.tandfonline.com/doi/abs/10.1080/07266472.2002.10878688 https://content.taylorfrancis.com/books/download?dac=C2015-0-58359-6&isbn=9781315689487&doi=10.4324/9781315689487-17&format=pdf https://www.taylorfrancis.com/books/e/9781315689487/chapters/10.4324/9781315689487-17,http://www.tandfonline.com/doi/abs/10.1080/07266472.2002.10878688,,,797812824,,0,,1,false,, 051-705-552-083-386,Highest piracy rates for Czech Republic and Slovakia,,1996,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,1996,2,4,4,Czech; Business; Philosophy; Linguistics,,,,,,http://dx.doi.org/10.1016/s1361-3723(97)82594-8,,10.1016/s1361-3723(97)82594-8,,,0,,0,false,, 051-851-761-421-930,Theory of Planned Behavior and Ethics Theory in Digital Piracy: An Integrated Model,2010-11-21,2010,journal article,Journal of Business Ethics,01674544; 15730697,Springer Science and Business Media LLC,Netherlands,Cheolho Yoon,"Since digital piracy has posed a significant threat to the development of the software industry and the growth of the digital media industry, it has, for the last decade, held considerable interest for researchers and practitioners. This article will propose an integrated model that combines the theory of planned behavior (TPB) and ethics theory, the two theories that are most often used in digital piracy studies. Data were obtained from university students in China, and the model was examined using the structural equation model (SEM). The results show that moral obligation and justice, derived from ethics theories and TPB variables, such as attitude, subjective norms, and perceived behavioral control, influence the behavioral intentions of individuals to commit digital piracy. The attitude of individuals toward digital piracy is also found to be influenced by perceived benefits, perceived risk, and habit.",100,3,405,417,Business ethics; Economic Justice; Sociology; Commit; Risk perception; Digital media; Moral obligation; Structural equation modeling; Social psychology; Theory of planned behavior,,,,,https://link.springer.com/10.1007/s10551-010-0687-7 https://dialnet.unirioja.es/servlet/articulo?codigo=3673675 https://philpapers.org/rec/YOOTOP https://ideas.repec.org/a/kap/jbuset/v100y2011i3p405-417.html https://econpapers.repec.org/RePEc:kap:jbuset:v:100:y:2011:i:3:p:405-417,http://dx.doi.org/10.1007/s10551-010-0687-7,,10.1007/s10551-010-0687-7,2081973090,,0,001-289-589-706-264; 005-014-989-182-407; 007-559-358-394-991; 009-299-623-546-736; 009-951-353-757-924; 010-854-534-444-434; 017-619-716-693-348; 019-623-803-893-73X; 019-735-544-215-243; 020-862-797-519-306; 024-178-065-161-008; 026-188-326-311-687; 026-283-018-089-565; 028-999-447-590-450; 032-653-897-764-354; 042-171-698-948-426; 043-821-438-952-54X; 044-763-858-798-124; 054-205-310-182-865; 061-887-275-818-235; 064-779-133-399-822; 070-808-488-260-608; 071-535-679-259-648; 072-813-199-606-608; 074-499-155-635-714; 074-777-270-980-043; 077-583-896-139-647; 087-448-979-013-450; 089-181-535-078-862; 093-545-552-759-239; 094-855-671-335-797; 098-777-100-429-858; 111-967-642-990-937; 114-673-913-339-632; 115-330-951-875-93X; 115-469-182-036-053; 124-076-116-602-319; 138-959-981-189-28X; 141-947-149-029-560; 154-247-701-466-495; 160-358-377-281-104; 173-630-745-244-692; 178-384-778-047-100,222,false,, 052-273-260-148-424,China’s Legal Enforcement on Anti-Piracy in South China Sea,2010-05-18,2010,journal article,Asian Social Science,19112025; 19112017,Canadian Center of Science and Education,Canada,Yingying Deng,"The South China Sea is considered the most dangerous area for piracy in the world.China has a strong economic interest in South China Sea and Strait of Malacaa maritime security. In recent year, China has taken effective measures in combating piracy in the South China Sea. In order to build the legislation and law-enforcement on anti-piracy, the author put forward some suggestion.",6,6,94,,International trade; Political science; China; Order (business); Legislation; Maritime security; Enforcement; South china,,,,,http://www.ccsenet.org/journal/index.php/ass/article/view/6229 https://www.ccsenet.org/journal/index.php/ass/article/download/6229/4925,http://dx.doi.org/10.5539/ass.v6n6p94,,10.5539/ass.v6n6p94,2091342299,,0,,0,true,cc-by,hybrid 052-408-223-154-61X,An Analysis of the Impact of Economic Wealth and National Culture on the Rise and Fall of Software Piracy Rates,2007-07-11,2007,journal article,Journal of Business Ethics,01674544; 15730697,Springer Science and Business Media LLC,Netherlands,Trevor T. Moores,"A number of studies have investigated and found a significant relationship among economic wealth, Hofstede’s national culture dimensions, and software piracy rates (SPR). No study, however, has examined the relationship between economic wealth, culture, and the fact that national SPRs have been declining steadily since 1994. Using a larger sample than has previously been available (57 countries), we confirm the expected negative relationship between economic wealth, culture (individualism and masculinity) and levels of software piracy. The rate of decline in software piracy, however, is found to be a cultural phenomenon, with two factors (power distance (PDI) and uncertainty avoidance (UAI)) working in opposition. Similar results are found for a subset of 37 relatively poor countries. This suggests that, while the rise in economic wealth seen for most countries should lead to a reduction in software piracy, the rate of decline is determined by cultural factors. Global strategies for dealing with software piracy are discussed.",81,1,39,51,Business ethics; Uncertainty avoidance; Economics; Negative relationship; Global strategy; Opposition (politics); Intellectual property; Development economics; Economic growth; Hofstede's cultural dimensions theory; National wealth,,,,,https://link.springer.com/article/10.1007/s10551-007-9479-0 https://link.springer.com/content/pdf/10.1007%2Fs10551-007-9479-0.pdf https://dialnet.unirioja.es/servlet/articulo?codigo=2716790 https://www.jstor.org/stable/25482196 https://EconPapers.repec.org/RePEc:kap:jbuset:v:81:y:2008:i:1:p:39-51 https://ideas.repec.org/a/kap/jbuset/v81y2008i1p39-51.html,http://dx.doi.org/10.1007/s10551-007-9479-0,,10.1007/s10551-007-9479-0,2044572924,,0,007-559-358-394-991; 009-292-371-162-047; 012-558-297-950-849; 017-168-651-863-296; 018-526-526-964-024; 026-188-326-311-687; 030-225-208-891-574; 033-349-220-802-574; 037-552-295-726-800; 039-506-005-538-250; 039-883-767-744-759; 040-736-564-197-367; 042-057-592-838-529; 049-813-154-354-036; 055-788-063-462-184; 062-180-644-489-615; 074-777-270-980-043; 075-366-126-807-799; 077-583-896-139-647; 083-456-848-718-009; 083-761-708-494-366; 096-122-662-201-767; 113-007-590-297-560; 134-477-681-611-250; 150-594-241-601-430; 172-754-651-308-964; 175-602-270-496-697,44,false,, 052-479-998-409-604,Harmonizing Iprs on Software Piracy: Empirics of Trajectories in Africa,,2012,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Simplice A. Asongu,"In the current efforts of harmonizing the standards and enforcement of IPRs protection worldwide, this paper explores software piracy trajectories and dynamics in Africa. Using a battery of estimation techniques that ignore as well as integrate short-run disturbances in time-dynamic fashion, we answer the big questions policy makers are most likely to ask before harmonizing IPRs regimes in the battle against software piracy. Three main findings are established. (1) African countries with low software piracy rates are catching-up their counterparts with higher rates; implying despite existing divergent IPRs systems, convergence in piracy rate could be a genuine standard-setting platform. (2) Legal origins do not play a very significant role in the convergence process. (3) A genuine timeframe for standardizing IPRs laws in the fight against piracy is most likely between a horizon of 4 to 8 years. In other words, full (100%) convergence within the specified horizon will mean the enforcements of IPRs regimes without distinction of nationality and locality. Policy implications and caveats are discussed.",,,,,International trade; Economics; Convergence (economics); Software; Battle; Enforcement; Locality; Intellectual property; Panel data,,,,,https://ssrn.com/abstract=2493241 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2493241,http://dx.doi.org/10.2139/ssrn.2493241,,10.2139/ssrn.2493241,3124714509,,0,003-120-061-431-142; 008-896-495-853-748; 012-558-297-950-849; 015-808-798-057-897; 017-153-449-730-092; 018-075-278-238-815; 022-264-398-959-067; 022-518-779-347-993; 028-630-596-457-020; 029-476-172-710-41X; 036-159-702-886-637; 039-883-767-744-759; 041-385-438-010-463; 041-849-157-283-572; 041-893-696-570-720; 042-335-426-642-552; 043-305-653-465-196; 045-638-979-146-951; 046-127-440-118-73X; 047-010-436-077-442; 049-698-234-112-01X; 054-663-257-958-510; 055-252-252-974-001; 058-453-337-550-945; 059-077-318-219-51X; 060-029-094-849-473; 062-169-487-131-224; 062-338-941-342-801; 064-893-720-411-223; 065-657-617-085-185; 066-237-973-648-031; 068-809-693-165-274; 071-046-582-807-006; 072-498-861-728-275; 075-401-188-052-732; 083-798-097-606-101; 085-796-193-840-794; 087-959-536-613-70X; 097-165-496-887-789; 097-287-626-930-331; 098-929-261-686-185; 105-744-555-035-389; 107-007-285-779-662; 107-605-926-265-849; 107-947-697-683-923; 110-231-183-577-925; 112-650-832-546-977; 121-394-722-855-679; 123-847-715-999-019; 125-495-818-933-457; 127-396-485-243-755; 132-558-492-977-554; 133-793-936-162-353; 140-177-608-473-755; 144-135-264-427-99X; 145-811-348-738-768; 154-513-291-663-187; 163-395-334-414-976; 185-020-775-542-401; 185-197-322-646-367; 191-344-983-602-980; 193-892-719-391-272,28,true,,green 052-573-927-841-353,Somali Piracy -- Are We at the End Game?,,2014,journal article,Case Western Reserve Journal of International Law,00087254,,,Jon Huggins; Liza Kane-Hartnett,"The Oceans Beyond Piracy (OBP) program was initiated at the absolute height of the Somali piracy crisis in the fall of 2010. At that time, nearly 700 hostages were being held in over 30 ships off the coast of Somalia. In order to understand the complex nature of the piracy attacks, and the equally complex response, OBP cultivated a relationship with multiple stakeholders across the international navies, maritime nations, industry, advocacy groups and academia.",46,1,355,,International trade; Political science; Order (business); Somali; Water transport; Maritime piracy,,,,,https://oceansbeyondpiracy.org/sites/default/files/attachments/jon_cleveland_document_2.pdf https://scholarlycommons.law.case.edu/jil/vol46/iss1/16/ https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1041&context=jil,https://scholarlycommons.law.case.edu/jil/vol46/iss1/16/,,,1829194552,,0,,2,false,, 052-597-866-635-72X,Music Piracy and the Audio Home Recording Act,,2002,journal article,Duke law and technology review,,,,Tia Hall,,1,1,1,8,Internet privacy; Electronic media; Psychology; Digital media; Audio Home Recording Act; Music piracy; Multimedia,,,,,https://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1064&context=dltr https://scholarship.law.duke.edu/dltr/vol1/iss1/65/,https://scholarship.law.duke.edu/dltr/vol1/iss1/65/,,,1589708829,,0,,2,false,, 052-664-895-650-416,Organised Crime and the Internet: Implications for National Security,,2013,journal article,The RUSI Journal,03071847; 17440378,Informa UK Limited,United Kingdom,Peter Grabosky,"Before being able to establish whether certain kinds of organised cyber-crime constitute a security threat, it is important to consider the wide variation in structure and targets of cyber-criminal organisations, some of which are state agencies or state-sponsored organisations, or involve collaboration between states and private entities. Peter Grabosky argues that some forms of organised cyber-crime may be a nuisance but they cannot be regarded as threats to national or international security, while cyber-crimes do impact on national security and can lead to international conflict. In either case, traditional definitions of organised crime do not accurately reflect the nature or organised cyber-crime.",158,5,18,25,The Internet; Political science; Organised crime; State (polity); International conflict; Public relations; International security; National security,,,,,https://openresearch-repository.anu.edu.au/bitstream/1885/75419/8/Organized%20Crime%20and%20the%20Internet%20RUSI%20Final%20May%202013.pdf https://www.tandfonline.com/doi/abs/10.1080/03071847.2013.847707 https://openresearch-repository.anu.edu.au/handle/1885/75419 https://digitalcollections.anu.edu.au/handle/1885/75419 https://core.ac.uk/download/156678768.pdf,http://dx.doi.org/10.1080/03071847.2013.847707,,10.1080/03071847.2013.847707,2288212450,,0,,13,true,,green 052-677-846-742-288,"The S omali Piracy Challenge: Operational Partnering, the Rule of Law, and Capacity Building",,2011,journal article,The Loyola University Chicago International Law Review,15589226,,,Brian Wilson,,9,1,45,,Business; Law and economics; Rule of law; Capacity building,,,,,https://lawecommons.luc.edu/cgi/viewcontent.cgi?article=1010&context=lucilr http://lawecommons.luc.edu/cgi/viewcontent.cgi?article=1010&context=lucilr,http://lawecommons.luc.edu/cgi/viewcontent.cgi?article=1010&context=lucilr,,,3124469435,,0,,0,false,, 053-032-595-434-501,International software piracy,,1992,journal article,Computer,00189162,Institute of Electrical and Electronics Engineers (IEEE),United States,Suzanne P. Weisband; Seymour E. Goodman,"It is argued that with the rapid changes in the global business environment and the western stake in expanding markets, protection of intellectual property and prevention of software piracy are among the most important international problems facing western economies. The inherent nature of software, which makes it easy to replicate and difficult to protect under copyright laws, is discussed. Measures developed to protect intellectual property rights and regulate software piracy are reviewed. Steps that must be taken to ensure the wide accessibility of software and to remove the incentives for piracy are outlined. >",25,11,87,90,Law and economics; Software; Industrial property; Incentive; Intellectual property; Computer security; Computer science,,,,,http://ieeexplore.ieee.org/document/166426/ https://arizona.pure.elsevier.com/en/publications/international-software-piracy https://arizona.pure.elsevier.com/en/publications/news-from-the-committee-on-public-policy-international-software-p,http://dx.doi.org/10.1109/2.166426,,10.1109/2.166426,1996474791,,0,057-538-087-033-828,11,false,, 053-056-005-201-617,Piracy and the Law of the Sea: An Empty Vessel?,,2013,journal article,SAIS Review of International Affairs,19454724,Project Muse,,Paul Hallwood,"This paper examines the law and economics of international enforcement against maritime piracy. It explains why, under the United Nations Convention on the Law of the Sea, countries choose to underinvest in enforcement to the extent that shipping companies have been forced to increase their use of on-board security guards. The paper examines the recommendations of several legal scholars for dealing with enforcement, and while these arguments have merit, important objections to them are discussed. Free riding on enforcement against criminals on the high seas is an illustration of the anarchy of the international system, the paper argues.",33,2,117,126,International waters; Political science; United Nations Convention on the Law of the Sea; Law; Enforcement; Maritime piracy; Law of the sea; Free riding,,,,,https://muse.jhu.edu/journals/sais_review/v033/33.2.hallwood.pdf https://muse.jhu.edu/article/527059/summary,http://dx.doi.org/10.1353/sais.2013.0017,,10.1353/sais.2013.0017,2047435792,,0,009-532-915-173-888; 018-792-475-484-46X; 020-632-608-804-893; 031-780-301-052-432; 054-735-949-413-335; 069-499-665-176-30X; 093-045-823-782-49X; 142-151-023-358-433; 147-454-181-506-681; 147-456-715-066-529; 160-758-256-694-458; 194-402-771-820-160,1,false,, 053-149-307-654-745,"Navigating the ‘dark waters of globalisation’: Global markets, inequalities and the spatial dynamics of risk",2015-10-30,2015,journal article,Risk Management,14603799; 17434637,Springer Science and Business Media LLC,United States,Denis Fischbacher-Smith; Liam Smith,"The links between the processes of globalisation and the generation of risk have been brought into sharp focus as a function of a series of accidents and terrorist attacks on Western interests and their supply chains. The increasingly interconnected nature of organisations, the dependence of western economies on a set of global supply chains, the export of hazardous goods and services, and the recruitment of staff from a global recruitment pool, all generate the potential for new forms of hazard and require organisations to reconfigure and extend the capabilities of their control and monitoring systems. Our aim in this article is to review the challenges that globalisation processes can generate for organisational effectiveness and, in particular, on the performance of processes around risk management and the prevention of crises.",17,3,179,203,Finance; Supply chain; Contingency plan; Economics; Goods and services; Information exchange; Enterprise risk management; Globalization; Risk management; Hazard; Economic system,,,,,https://rd.springer.com/article/10.1057/rm.2015.12 https://cyberleninka.org/article/n/750690.pdf https://core.ac.uk/display/81702655 https://paperity.org/p/76693686/navigating-the-dark-waters-of-globalisation-global-markets-inequalities-and-the-spatial https://link.springer.com/article/10.1057/rm.2015.12 http://eprints.gla.ac.uk/110054/ https://cyberleninka.org/article/n/750690 https://link.springer.com/content/pdf/10.1057%2Frm.2015.12.pdf https://core.ac.uk/download/42364828.pdf,http://dx.doi.org/10.1057/rm.2015.12,,10.1057/rm.2015.12,2342206023,,0,000-294-091-813-847; 000-731-413-595-620; 000-871-282-094-694; 003-499-639-959-12X; 003-547-898-093-256; 007-535-067-088-429; 008-159-982-704-037; 008-710-425-290-574; 011-104-582-802-05X; 013-425-255-662-440; 015-275-392-195-043; 015-461-715-153-964; 015-675-211-137-980; 015-819-516-238-694; 016-018-095-806-249; 016-534-111-854-664; 017-397-981-692-898; 017-896-086-430-601; 017-960-373-756-456; 018-521-790-216-719; 021-731-666-385-439; 022-179-533-824-274; 023-844-726-823-546; 024-349-027-835-036; 024-421-119-718-922; 025-014-361-668-140; 025-143-427-047-090; 025-479-336-479-698; 026-272-756-788-700; 026-652-316-580-724; 026-724-327-243-491; 026-864-978-183-079; 026-897-501-340-066; 027-022-850-352-772; 028-630-596-457-020; 028-772-483-420-84X; 028-953-765-789-461; 034-356-253-890-613; 035-396-111-796-667; 035-796-063-077-31X; 037-826-038-614-213; 039-201-743-690-281; 041-705-613-533-430; 042-016-394-208-373; 042-215-094-865-429; 042-739-794-796-038; 043-707-184-383-949; 043-748-039-981-978; 044-238-973-138-038; 044-699-466-018-295; 044-882-064-039-523; 047-232-809-544-466; 047-473-900-048-161; 047-795-378-209-680; 048-050-717-945-157; 050-023-349-173-584; 050-322-378-133-741; 051-166-453-713-645; 053-368-652-546-438; 053-528-284-661-204; 055-232-943-425-45X; 055-892-573-979-896; 055-921-159-593-293; 056-065-368-943-20X; 056-446-876-747-976; 056-998-695-446-731; 057-875-200-294-753; 058-296-475-451-711; 058-950-804-620-488; 062-964-950-279-312; 063-010-231-460-51X; 063-400-842-052-631; 064-442-452-989-48X; 064-815-400-984-459; 067-242-537-063-590; 067-664-341-903-017; 068-882-421-007-038; 070-921-671-744-875; 072-968-204-052-555; 074-538-033-924-824; 075-998-338-944-221; 080-194-550-981-932; 083-063-963-037-797; 086-391-553-306-79X; 087-953-562-253-595; 088-346-932-991-280; 095-582-881-785-37X; 095-621-169-943-767; 095-755-178-587-438; 098-383-741-446-963; 101-874-029-271-330; 104-932-816-971-637; 108-091-611-517-125; 108-302-373-472-773; 111-200-202-249-295; 111-298-466-531-479; 111-965-420-681-996; 112-865-308-568-684; 113-852-143-150-645; 114-699-863-046-975; 115-183-552-168-421; 117-127-915-134-113; 118-985-522-157-119; 120-312-094-275-21X; 121-106-537-861-541; 121-525-768-354-623; 125-910-743-428-581; 131-785-053-939-584; 132-825-705-558-542; 133-116-209-185-323; 137-451-223-326-907; 138-512-919-611-784; 141-071-579-680-827; 141-072-103-758-283; 146-559-861-376-133; 158-709-138-264-032; 162-168-085-127-864; 165-478-556-730-137; 166-492-338-087-160; 176-659-763-537-139; 179-043-520-420-634; 189-819-624-162-682; 190-908-039-598-661; 194-940-160-263-885; 197-489-377-623-410; 198-894-622-024-207; 198-971-457-445-003,5,true,cc-by,hybrid 053-514-669-365-492,Piracy and off-hire: extraneous causes revisited,,2010,journal article,Lloyd's Maritime and Commercial Law Quarterly,03062945,,,John Weale,,,4,574,578,Economics; Law and economics; Law,,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=3352706,https://dialnet.unirioja.es/servlet/articulo?codigo=3352706,,,66177071,,0,,0,false,, 053-628-820-399-456,Back to the future: The digital millennium copyright act and the trans-pacific partnership,2017-08-12,2017,journal article,Laws,2075471x,MDPI AG,,Matthew Rimmer,"The Trans-Pacific Partnership (TPP) is a trade agreement, which seeks to regulate copyright law, intermediary liability, and technological protection measures. The United States Government under President Barack Obama sought to export key features of the Digital Millennium Copyright Act 1998 (US) (DMCA). Drawing upon the work of Joseph Stiglitz, this paper expresses concerns that the TPP would entrench DMCA measures into the laws of a dozen Pacific Rim countries. This study examines four key jurisdictions—the United States, Canada, Australia, and New Zealand—participating in the TPP. This paper has three main parts. Part 2 focuses upon the takedown-and-notice scheme, safe harbours, and intermediary liability under the TPP. Elements of the safe harbours regime in the DMCA have been embedded into the international agreement. Part 3 examines technological protection measures—especially in light of a constitutional challenge to the DMCA. Part 4 looks briefly at electronic rights management. This paper concludes that the model of the DMCA is unsuitable for a template for copyright protection in the Pacific Rim in international trade agreements. It contends that our future copyright laws need to be responsive to new technological developments in the digital age—such as Big Data, cloud computing, search engines, and social media. There is also a need to resolve the complex interactions between intellectual property, electronic commerce, and investor-state dispute settlement in trade agreements.",6,3,11,,Pacific Rim; International trade; Political science; Law; Trade agreement; Digital Millennium Copyright Act; International trade law; Liability; Investor-state dispute settlement; Intellectual property; Digital rights management,,,,,https://works.bepress.com/matthew_rimmer/285/download/ https://eprints.qut.edu.au/108690/ https://www.mdpi.com/2075-471X/6/3/11 https://www.canlii.org/en/commentary/doc/2017CanLIIDocs3580 https://doaj.org/article/71f6ff62a6a84908aeaa541443416a7a https://osf.io/zdupv/#! https://works.bepress.com/matthew_rimmer/285/ https://www.elgaronline.com/view/9781788973311.00010.xml https://core.ac.uk/display/89299524 https://www.mdpi.com/2075-471X/6/3/11/pdf https://ideas.repec.org/a/gam/jlawss/v6y2017i3p11-d107784.html https://core.ac.uk/download/89299524.pdf,http://dx.doi.org/10.3390/laws6030011,,10.3390/laws6030011,2748652642,,0,001-055-364-026-469; 020-949-053-745-492; 028-161-223-442-353; 031-334-841-228-128; 035-769-247-873-560; 040-989-207-479-126; 076-152-794-161-711; 092-252-163-755-650; 094-764-535-044-561; 112-969-589-673-697; 132-959-493-309-571; 135-560-243-860-453; 135-639-983-134-58X; 141-187-841-672-529; 147-622-503-346-888; 153-516-777-171-366; 153-556-090-709-189; 160-044-929-602-315; 165-601-447-975-435; 184-806-992-681-465; 187-290-290-225-232,1,true,cc-by,gold 053-943-946-423-765,PIRACY AS A THREAT TO INTERNATIONAL PEACE AND SECURITY,,2015,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,A Varfolomeev Anton,"The study focuses on specific issues in the system of international security related to modern-day piracy. The first part examines the adequacy of the classical approach treating piracy as a common crime with an international element, comparing contemporary piracy to other illegal activities committed by non-state actors. The second part deals with the status of the threat to international peace and security potentially applicable to piracy. The essay concludes with a brief case study on the role of the UN Security Council in suppressing piracy off the coast of Somalia under norms of international security law.",,,,,Political science; Law; Element (criminal law); Security council; International peace; International security; Security studies,,,,,https://publications.hse.ru/view/147912359 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2594817 https://www.hse.ru/data/2015/04/15/1095636350/14IR2015.pdf https://publications.hse.ru/en/preprints/147912359,http://dx.doi.org/10.2139/ssrn.2594817,,10.2139/ssrn.2594817,2277970350,,0,,2,true,,green 054-035-533-666-366,Countering Persistent Contemporary Sea Piracy: Expanding Jurisdictional Regimes,2010-12-31,2010,journal article,The American University law review,00031453,,,Joseph M Isanga,"As long as pirates perceive that the international community is unwilling or lacking the capacity to prosecute, piracy will continue to thrive. It is evident that piracy threatens international trade and maritime life throughout the world. Not only does piracy cause substantial disruption and loss to the world economy, which is heavily reliant on maritime shipping, it also leads to escalating costs associated with increasingly steep ransom demands and higher insurance premiums. This article recommends various normative and procedural reforms and, in particular, advocates for the expansion of the jurisdiction of the International Tribunal on the Law of the Sea (ITLOS) as a permanent forum for the prosecution of suspected pirates.",59,5,4,,International trade; Political science; United Nations Convention on the Law of the Sea; Law; Jurisdiction; World economy; Tribunal; International community; Ransom; Normative,,,,,https://commons.cu-portland.edu/lawfaculty/104/ https://digitalcommons.csp.edu/cgi/viewcontent.cgi?article=1104&context=lawfaculty https://digitalcommons.csp.edu/lawfaculty/104/ https://paperity.org/p/82030790/countering-persistent-contemporary-sea-piracy-expanding-jurisdictional-regimes https://digitalcommons.wcl.american.edu/cgi/viewcontent.cgi?article=1252&context=aulr https://digitalcommons.wcl.american.edu/aulr/vol59/iss5/4/ https://works.bepress.com/joseph-isanga/21/download/,https://digitalcommons.csp.edu/lawfaculty/104/,,,3125697075,,0,,8,false,, 054-302-282-600-883,Perlindungan Hukum Hak Cipta Terhadap Musik Di Indonesia Yang Di Upload Di Media Massa,2019-06-27,2019,journal article,Jurnal Panorama Hukum,25276654; 25281992,University of Kanjuruhan Malang,,Hafid Zakariya,"In this era of globalization, people are pampered with any technology made easy with technological developments. With this technology able to create many opportunities one of them for the development of music in Indoneisa with social media in Indonesia can be rapidly spread and can be accessed by everyone so that the music can be Opportunities for artists to be commercialized. But with these developments many Parties are not responsible by doing music piracy by downloading so as to save or record with recording technology and storage nowadays, such as Memory card or flash disk with different types of brands. The advancement of storage technology has made it easier for users to record or duplicate a large number of creations that appear on internet media with ease and cheap cost even free, thus it does not comply with article 9 paragraph (3) UUHC Number 28 Year 2014: Any person without permission the creator or copyright holder is prohibited from making a reproduction and/or commercial use of the creation. And article 4 Law No 28 year 2014 part of article by article is a right that is only intended for the author, so that no other party can exploit that right without the permission of the creator. Copyright holders who are not creators only have a portion of the exclusive right of economic rights. Legal protections that government grants to songwriters or rights holders are now in two ways, first being a site blocking that is deemed to commit copyright infringement despite not running maximally and not reducing The occurrence of violations, and the second is to socialize both the songwriters or the rightsholders on the importance of registering the creation, as well as to the public about the culture respecting the work of the nation for law enforcement rights Intellectual property can be implemented well and currently the government has established a new institution of non-Ministry called Creative Economic Agency (BEKRAF). The liability made by the provider of free download sites is not compliant with the law. Providers of illegal sites even circumcarent their existence as illegal sites by way of positioning itself as a song search site that does not upload songs in the site but rather equate its site with search sites such as Google and Ymail.",4,1,57,63,,,,,,http://ejournal.unikama.ac.id/index.php/jph/article/download/3307/2365 https://core.ac.uk/download/270289636.pdf,http://dx.doi.org/10.21067/jph.v4i1.3307,,10.21067/jph.v4i1.3307,3005721323,,0,,0,true,cc-by,gold 054-490-538-255-165,The Cynical Pirate: How Cynicism Effects Music Piracy,,2010,journal article,Journal of Management Information and Decision Sciences,15247252,,,Darryl J. Woolley,"INTRODUCTION Since early in the 1990's, software publishers have been concerned about their losses from software piracy. The music recording industry now faces a much larger threat than the software industry. Its very existence is in question as music is extensively pirated through internet downloads and copying CD's. The total cost of pirating music is estimated at $12.5 billion annually, of which $5 billion is a direct cost to the recording industry. The recording industry has experienced dropping profits and has lowered employment because of the effects of music piracy (Blyth, 2008). Many argue that as a result of music piracy, the structure of the industry must change and the era of both big record labels and superstar bands is ending (Dvorak, 2003). Nevertheless, many people, especially college students, do not seem to regard music piracy as unethical. Understanding consumer attitudes may be an important step in developing a solution to the economic problem of music piracy. This study develops a model based on the Theory of Reasoned Action (Fishbein & Ajzen, 1975) to promote further understanding of attitudes toward music piracy and how those attitudes influence music piracy behavior. Music piracy is a socially accepted illegal practice. Understanding attitudes toward music piracy can lead to greater understanding of people's relationship to their society. It may be useful for the recording industry in determining strategies. It gives greater understanding of a significant phenomenon on college campuses and how it influences students on the campuses. The results of a survey reported in this paper show that the Theory of Reasoned Action is descriptive of attitudes toward music piracy. It finds that college students frequently pirate music and that students' peers have a large influence on their piracy behavior, but that other referent groups do not. However, people that are more cynical toward business are more likely to engage in music piracy than other students. SOFTWARE AND DIGITAL MUSIC PIRACY Both software and digital music are intellectual rights products. A purchaser of software or digital music does not purchase ownership of the software or digital music, but rather purchases the right to use the product. The cost of both products is primarily in the original production; manufacture of multiple copies only slightly increases cost. Piracy consists of copying and/or distributing unlicensed copies of music or software productions. Because both music and software can be copied without physically taking the media on which they are stored, the loss associated with software and digital music piracy differs from traditional theft in that the cost is an opportunity cost of lost sales rather than a physical loss. Software piracy has been a concern for two decades, but music piracy is a comparatively recent problem. Software piracy has been extensively studied, but digital music piracy has not yet been subjected to the same level of research. Music and software productions are protected by copyright law and electronic copies are further regulated by a variety of laws including the Digital Performance Right in Sound Recordings Act of 1995, the No Electronic Theft Act of 1997, and the Digital Millennium Copyright Act of 1998 (Imfeld & Ekstrand, 2005). The two primary methods employed to pirate music are to copy music from purchased CDs and to download music files from the internet. Music files differ in several significant ways from software files: music files are smaller than software files (and thus more easily copied and transferred), but legal music files are less expensive than software applications; unlike pirated software, pirated copies of music often are inferior to copies legally purchased on CDs (Gopal et al., 2004). Music piracy is destroying the music industry. Between 2003 and 2006, 800 music stores went out of business (Keen, 2007). Many experts believe that the music industry must change its structure, and that the era of music production is over (Dvorak, 2003). …",13,1,31,,The Internet; Advertising; Theory of reasoned action; Business; Music industry; Digital Millennium Copyright Act; Copying; Music piracy; Digital performance; Digital audio,,,,,https://www.questia.com/library/journal/1G1-241861851/the-cynical-pirate-how-cynicism-effects-music-piracy,https://www.questia.com/library/journal/1G1-241861851/the-cynical-pirate-how-cynicism-effects-music-piracy,,,1519036585,,0,,14,false,, 054-521-190-746-543,Catwalk Copycats: Why Congress Should Adopt a Modified Version of the Design Piracy Prohibition Act,,2007,journal article,Journal of Intellectual Property Law,,,,Laura C. Marshall,,14,2,305,,Economics; Law; TRIPS Agreement; Fashion design,,,,,https://digitalcommons.law.uga.edu/cgi/viewcontent.cgi?article=1310&context=jipl https://digitalcommons.law.uga.edu/jipl/vol14/iss2/4/,https://digitalcommons.law.uga.edu/jipl/vol14/iss2/4/,,,2601993966,,0,,1,false,, 054-583-104-584-239,Fighting Piracy in Somalia (and Elsewhere): Why More Is Needed,2010-12-30,2010,journal article,Fordham International Law Journal,07479395,,,Milena Sterio,"This Article argues that pirates should be treated as terrorists and that piracy-fighting countries should rely on a variety of antiterrorist conventions to justify the capture and prosecution of pirates. To provide a comprehensive outlook on piracy, Part I of this Article describes the history of piracy and its reappearance in the modern world. Part II briefly describes the resurgence of modern-day piracy, first in Southeast Asia and then in Somalia. Part III provides the current international legal framework for battling piracy, by focusing first on the definition of piracy in international law, and then on the existing international legal authority to apprehend and prosecute pirates. Part IV describes the existing options and solutions for fighting pirates, including domestic prosecutions, prosecutions in ad hoc tribuals, regional partnerships, and the aid of international maritime organizations. Part V advocates the need to fight piracy more aggressively, explaining the similarity between pirates and terorists. Finally, Part V also advocates the need to rebuild Somalia and its institutions, as this is the only permanent solution to eradicate piracy in this region of the world. FIGHTING PIRACY IN SOMALIA (AND ELSEWHERE): WHY MORE IS NEEDED",33,2,372,,Variety (cybernetics); Political science; Law and economics; Part iii; Southeast asia; International law,,,,,http://engagedscholarship.csuohio.edu/cgi/viewcontent.cgi?article=1195&context=fac_articles https://works.bepress.com/milena_sterio/77/ https://ir.lawnet.fordham.edu/ilj/vol33/iss2/3/ https://engagedscholarship.csuohio.edu/cgi/viewcontent.cgi?article=1195&context=fac_articles https://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=2182&context=ilj,http://engagedscholarship.csuohio.edu/cgi/viewcontent.cgi?article=1195&context=fac_articles,,,3125510232,,0,,5,false,, 054-641-526-608-301,Cyberspace: A New Threat to the Sovereignty of the State,2016-09-29,2016,journal article,Management Studies,23282185,David Publishing Company,,Jackson Adams; Mohamad Albakajai,"This paper discusses one of the contemporary challenging issues—it is the challenge of e-commerce to the sovereignty of the state, where governments are unable to implement their own laws on disputed cases resulting from trans-border e-commerce interactions. The objective of the current research is to draw attention to the impact of international characteristics of e-commerce on the sovereignty of state, and to identify the factors affecting this sovereignty. The issue of the dynamicity of time and place will be taken into consideration, where activities carried out over the internet are characterized by their cross-border dimension. Based on real e-commerce case studies disputed on international level, this paper will draw on the legal perspective of cyberspace, identifying the relationship between cyberspace and state sovereignty, and outlining the mechanisms by which cyberspace could cross borders and the territory of the state despite all the precautions taken by the state to protect its sovereignty.",4,6,,,The Internet; Political science; Sovereignty; Law and economics; Law; State (polity); Dimension (data warehouse); Cyberspace; International level,,,,,https://core.ac.uk/display/146502700 http://www.davidpublisher.org/index.php/Home/Article/index?id=26237.html http://repository.essex.ac.uk/21291/ https://core.ac.uk/download/146502700.pdf,http://dx.doi.org/10.17265/2328-2185/2016.06.003,,10.17265/2328-2185/2016.06.003,2550499714,,0,008-137-083-288-810; 009-514-102-680-269; 021-423-479-747-559; 030-899-277-825-598; 033-420-560-047-084; 034-205-857-138-977; 044-586-919-559-764; 048-097-214-391-744; 057-347-564-093-603; 061-769-603-850-633; 072-532-938-064-793; 080-439-877-470-504; 088-949-838-836-906; 125-732-022-247-386; 131-541-479-251-583; 154-228-049-562-908; 173-445-221-534-950; 192-244-778-512-335; 197-267-019-857-539,5,true,cc-by-nc,hybrid 054-766-528-178-295,Sustainable Strategy for Piracy Management in Nigeria,2012-10-09,2012,journal article,Journal of Management and Sustainability,19254733; 19254725,Canadian Center of Science and Education,,Lawal B. Dogarawa,"Piracy is a universal hostility that leads to loss of valuables including the lives of crew members, ships, monies, supplies and cargoes. Piracy is an international crime without universally acceptable ways to control it. Piracy and armed robbery at sea increase and decrease in opposite directions when there is more or less government control measures respectively. It is believed that attacks are being under-reported because successful attacks tend to reflect negatively on the master's competence; it embarrasses the coastal State where the act occurs and also increases insurance cost and at the same time disrupts the vessel’s schedule that is caused by marine board investigation. Pirates employ ambush tactics, send distress signals to unsuspecting ships, falsify documents, impersonate as security officials, attacks big ships, monitor ship-to-shore communications and operate swiftly and change location. The challenge of piracy in Nigeria includes ensuring that all ships within the country’s territorial waters are duly registered and the rehabilitation of youths that were abandoned political touts who turned into piracy as a means of livelihood and the provision of adequate resources for constant sea patrol. Sustainable administration of piracy in Nigeria can be archived through moral suasion, encouragement of piracy control volunteers, continuous safety and security training for crew and port officials as well as the introduction of check-points for all ships within the nation territorial waters.",3,1,119,,Competence (human resources); Distress signal; International trade; Economics; Moral suasion; Crew; Sustainable strategy; Livelihood; Economic growth; Territorial waters; Politics,,,,,https://www.ccsenet.org/journal/index.php/jms/article/download/21235/13768 https://www.ccsenet.org/journal/index.php/jms/article/view/21235,http://dx.doi.org/10.5539/jms.v3n1p119,,10.5539/jms.v3n1p119,2146362829,,0,018-581-182-598-228; 085-933-591-820-64X; 168-089-262-885-045; 198-160-988-578-332,1,true,cc-by,hybrid 054-828-640-686-32X,Balancing video-game piracy issues,,2004,journal article,IEEE Security & Privacy Magazine,15407993; 15584046,Institute of Electrical and Electronics Engineers (IEEE),United States,P.F. Gorder,"The Business Software Alliance (BSA), an international software publishers' association, placed the global software piracy rate at 39 percent in 2002, down from 40 percent the year before, and from a high of 49 percent in 1994. This paper discusses how to balance the video-game piracy issues.",2,1,17,17,Balance (accounting); Software; Alliance; Video game; Computer security; Computer science; Business software; Association (object-oriented programming),,,,,http://ieeexplore.ieee.org/document/1264845/ https://ieeexplore.ieee.org/document/1264845/,http://dx.doi.org/10.1109/msecp.2004.1264845,,10.1109/msecp.2004.1264845,1978550159,,0,,1,false,, 055-269-531-639-071,Research on Piracy and It’s Legislation in China,,2009,journal article,Journal of Jilin Normal University,,,,Wang Zhen,"The piracy has been a kind of serious crime in international criminal law.But up to now,there is no law on piracy in China.Considering the strategy,it is necessary to make law on piracy to beat the crime,and that will do good to protect the interests of our country.",,,,,Political science; China; Law; Legislation,,,,,http://en.cnki.com.cn/Article_en/CJFDTotal-SLXS200901006.htm,http://en.cnki.com.cn/Article_en/CJFDTotal-SLXS200901006.htm,,,2367107603,,0,,0,false,, 055-294-038-829-204,Piracy: Today and in the Future,,2011,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Timothy Mark Kaufmann,,,,,,Engineering; International trade; Law; North african; International law,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1907811 https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID1907811_code1700805.pdf?abstractid=1907811&mirid=1&type=2 https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID1907811_code1700805.pdf?abstractid=1907811&mirid=1,http://dx.doi.org/10.2139/ssrn.1907811,,10.2139/ssrn.1907811,2263400824,,0,000-966-237-638-703; 004-544-558-082-094; 012-842-483-580-851; 036-499-023-008-323; 053-864-370-387-865; 109-161-711-575-290; 126-656-256-173-88X; 136-903-914-721-752,0,false,, 055-308-735-030-531,Piracy and Due Process,2018-11-28,2018,journal article,Michigan journal of international law,10522867,,,Andrew Kent,"This Article engages the long-running debate about the geographical and contextual scope of U.S. constitutional protections. There is agreement that both citizens and noncitizens enjoy largely equal rights when present within the United States, and that when they venture abroad, U.S. citizens carry most of their constitutional rights with them. But beyond that, there are many disputes. Do noncitizens have any constitutional protection from the U.S. government when it acts against them outside U.S. borders? Does it matter whether the location is the ungoverned high seas or the sovereign territory of another nation? Does the context matter? Is law enforcement different from military force? Does it matter whether the subject is an internationally-recognized sovereign versus a non-state actor?; ; Scholars have tried to bring the original understanding of the Constitution to bear on these questions, with some hoping to show that individual rights were understood to be global and universal. A vision of extraterritorial constitutional rights for all has most recently been offered by Professor Nathan Chapman, in an article entitled Due Process Abroad, addressing the legal framework for English and American governmental efforts to suppress piracy. Chapman argues that, outside the context of state-to-state warfare, due process required that anyone, anywhere, suspected of violating criminal or civil anti-piracy statutes could only be proceeded against by judicial process, rather than military force.; ; I conclude that Chapman's historical arguments for global due process are unsupported and unsound. By first examining piracy suppression in the law of nations, English domestic law, and English government practice in the centuries leading up to American independence, and then American law and government practice during the Founding and antebellum periods, I conclude that pirates on the high seas were viewed as outside the protection of domestic and international law and thus could lawfully be subject to summary violence. Although both England and the early United States did frequently use the criminal justice system to address piracy, due process did not require that approach. The extensive use of law enforcement methods (with its attendant procedural protections) was driven by a mix of factors, sounding in international law, government policy, and a concern for fair treatment. These considerations, rather than a misplaced theory about the original meaning of the Constitution, should be at the center of our debates about counterterrorism and other extraterritorial security efforts today, as they were in our predecessors' approach to piracy.",39,3,385,451,Criminal justice; Statute; Political science; Sovereignty; Law; Constitution; Constitutionality; Law enforcement; International law; Municipal law,,,,,https://repository.law.umich.edu/mjil/vol39/iss3/4/ https://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=1939&context=faculty_scholarship https://repository.law.umich.edu/cgi/viewcontent.cgi?article=1936&context=mjil https://ir.lawnet.fordham.edu/faculty_scholarship/940/,https://repository.law.umich.edu/mjil/vol39/iss3/4/,,,3121258929,,0,,0,false,, 055-585-798-034-05X,Las descargas de contenidos audiovisuales en Internet entre estudiantes universitarios,2016-07-01,2016,journal article,Comunicar,11343478; 19883293,Grupo Comunicar,Spain,Juliana Duarte-Hueros; Ana Duarte-Hueros; Soledad Ruano-López,"El presente trabajo analiza el fenomeno de las descargas de contenidos audiovisuales –peliculas y series de television– que habitualmente practican los universitarios a traves de Internet; sus actitudes ante las descargas ilegales y la formacion que tienen en relacion a la situacion legal de las mismas. Estas cuestiones conforman una realidad que aunque a priori parece ser demasiado frecuente, se encuentra todavia muy poco explorada y es escasamente tratada desde una perspectiva cientifica en nuestro contexto. Los datos se obtuvieron a partir de un cuestionario disenado ad hoc, administrado a estudiantes de tres Grados universitarios (Comunicacion Audiovisual, Educacion Primaria y Educacion Social), por considerar que se trata de titulaciones en las que un conocimiento de base etico y legal ante las descargas de contenidos en la red es urgente y necesario para unos jovenes que se estan preparando con el proposito de dedicarse a la formacion e informacion de los futuros ciudadanos del siglo XXI. Los resultados del estudio muestran como el consumo de contenidos procedentes de la industria audiovisual (televisiva y cinematografica), es una practica asentada entre los universitarios, que tienen actitudes claramente favorables hacia ella pero que prestan escasa importancia a cuestiones eticas y legales ante las descargas no legales, ademas de tener muy baja formacion en estas cuestiones. Los resultados sugieren la necesidad de poner en marcha acciones educomunicativas para mejorar sus competencias informacionales y digitales.",24,48,49,57,,,,,,http://rabida.uhu.es/dspace/handle/10272/12555 https://www.revistacomunicar.com/index.php?contenido=detalles&numero=48&articulo=48-2016-05 https://dehesa.unex.es/handle/10662/6769 https://www.redalyc.org/pdf/158/15846325005.pdf https://dehesa.unex.es:8443/bitstream/10662/6769/1/C48_2016_05.pdf https://dialnet.unirioja.es/servlet/articulo?codigo=5563115 https://dialnet.unirioja.es/descarga/articulo/5563115.pdf https://www.revistacomunicar.com/verpdf.php?numero=48&articulo=48-2016-05 https://www.scipedia.com/public/Duarte-Hueros_et_al_2016a https://core.ac.uk/download/60675231.pdf,http://dx.doi.org/10.3916/c48-2016-05,,10.3916/c48-2016-05,2358816681,,0,001-104-544-098-740; 009-299-623-546-736; 010-053-134-166-260; 012-654-176-852-003; 012-715-612-090-508; 013-761-822-969-653; 017-336-435-985-512; 019-051-460-101-751; 019-747-485-280-050; 028-999-447-590-450; 032-377-752-218-311; 032-425-621-482-810; 036-288-246-851-895; 037-206-342-629-551; 040-050-765-801-00X; 043-826-731-177-063; 051-989-300-772-49X; 058-081-424-637-980; 059-997-434-457-453; 072-194-527-499-566; 075-321-119-967-023; 076-597-457-143-055; 082-361-824-236-859; 086-646-048-607-18X; 087-231-665-868-352; 098-992-871-237-784; 103-349-549-253-539; 114-556-841-480-844; 118-853-563-951-736; 129-557-302-447-358; 130-981-187-689-738; 153-009-627-742-331; 156-793-703-478-079; 161-446-165-980-313; 161-983-364-382-133; 173-259-717-688-022; 175-365-689-563-063; 176-540-732-445-081; 199-541-149-232-619,1,true,cc-by-nc,gold 055-586-705-076-977,Counterfeiting and piracy: the industry perspective,2010-03-31,2010,journal article,Journal of Intellectual Property Law & Practice,17471532; 17471540,Oxford University Press (OUP),,Stephan Engels,,5,5,327,331,Political science; Law and economics; Perspective (graphical),,,,,https://academic.oup.com/jiplp/article-abstract/5/5/327/925880,http://dx.doi.org/10.1093/jiplp/jpq023,,10.1093/jiplp/jpq023,2004029942,,0,,4,false,, 055-784-452-247-500,"Internet piracy reaching epidemic proportions, threatens E-commerce",,1999,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,1999,11,8,8,Internet privacy; The Internet; Business; Computer security; Computer science; World Wide Web,,,,,,http://dx.doi.org/10.1016/s1361-3723(99)80056-6,,10.1016/s1361-3723(99)80056-6,,,0,,0,false,, 056-212-088-181-447,Orchestrating the Response: Somali Piracy and Ontological Complexity,2013-03-27,2013,journal article,Global Policy,17585880; 17585899,Wiley,United Kingdom,Christian Bueger,"Contemporary piracy is a complex and intricate problem. This article discusses different sources of complexity of the problem and suggests paying attention to ontological complexity. To unravel ontological complexity one has to ask the very fundamental question: Why is piracy actually considered to be problematic? Addressing this question leads to a set of different paradigms of piracy which underpin counter-piracy policy. Each of these paradigms works with different presumptions, foregrounds different dimensions and suggests other types of measures. Five paradigms of counter-piracy are outlined: Firstly, a security paradigm, which stresses that piracy is a threat; secondly, a legal paradigm, within which piracy is a crime; thirdly, an economic paradigm within which piracy is a business model; fourthly, a development paradigm that interprets piracy as a problem of structural root causes; and fifthly a humanitarian paradigm in which piracy is the source of suffering for individuals. These paradigms produce a range of tensions between each other. The article concludes in stressing the importance of paying attention to this complexity to increase reflexivity in drafting counter-piracy policies.",4,1,86,93,Epistemology; Reflexivity; Sociology; Set (psychology); Root (linguistics); Law; Somali; Business model,,,,,https://ideas.repec.org/a/bla/glopol/v4y2013i1p86-93.html https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1758-5899.2012.00194.x https://econpapers.repec.org/RePEc:bla:glopol:v:4:y:2013:i:1:p:86-93,http://dx.doi.org/10.1111/j.1758-5899.2012.00194.x,,10.1111/j.1758-5899.2012.00194.x,2105162892,,0,011-738-585-361-872; 012-703-976-561-544; 012-782-551-491-569; 018-329-648-998-406; 020-238-155-083-345; 021-139-867-511-697; 025-784-266-343-445; 028-467-937-942-167; 040-151-438-868-138; 052-037-327-693-60X; 056-147-935-794-618; 062-536-903-808-698; 063-203-515-670-958; 065-317-923-661-274; 065-396-198-364-16X; 073-502-705-654-062; 073-767-052-211-806; 080-171-581-481-170; 089-326-096-722-744; 122-740-834-718-041; 127-071-505-103-739; 127-126-210-218-745; 132-869-453-746-073; 132-886-511-869-587; 151-731-714-353-313; 151-809-172-565-473; 160-758-256-694-458; 162-262-736-074-50X; 180-490-305-918-94X; 193-799-421-521-680,6,false,, 056-439-560-466-97X,Maritime Piracy: A Sustainable Global Solution,2014-12-31,2014,journal article,Case Western Reserve Journal of International Law,00087254,,,Paul R. Williams; Lowry Pressly,,46,1,177,,Business; International trade; Water transport; Maritime piracy; International finance,,,,,https://digitalcommons.wcl.american.edu/cgi/viewcontent.cgi?article=2267&context=facsch_lawrev https://scholarlycommons.law.case.edu/jil/vol46/iss1/10/ https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1035&context=jil https://works.bepress.com/paul_williams/56/ https://digitalcommons.wcl.american.edu/facsch_lawrev/1266/,https://scholarlycommons.law.case.edu/jil/vol46/iss1/10/,,,2215115825,,0,,3,false,, 056-526-444-504-671,When Protest Goes to Sea: Theorizing Maritime Violence by Applying Social Movement Theory to Terrorism and Piracy in the Cases of Nigeria and Somalia,2020-07-10,2020,journal article,Ocean Development & International Law,00908320; 15210642,Informa UK Limited,United Kingdom,Patricia Schneider,"The article applies social movement theory to piracy and terrorism as a common conceptual roof, contextualizing and theorizing these phenomena. The cases of Nigeria and Somalia were chosen because ...",51,4,283,306,Political science; Terrorism; Social movement theory; Criminology,,,,,https://www.tandfonline.com/doi/full/10.1080/00908320.2020.1781383,http://dx.doi.org/10.1080/00908320.2020.1781383,,10.1080/00908320.2020.1781383,3041357170,,0,,0,false,, 056-576-316-550-185,The Brazilian approach to internet intermediary liability: blueprint for a global regime?,2015-12-28,2015,journal article,Internet Policy Review,21976775,"Internet Policy Review, Alexander von Humboldt Institute for Internet and Society",,Nicolo Zingales,"While intermediary liability is becoming an issue of increasing importance in internet governance discussions, little is being made at the institutional level to minimise conflicts across jurisdictions and ensure the compliance of intermediary liability laws with fundamental rights and the freedom to innovate. The experience leading to the adoption of the Brazilian “Marco Civil da Internet” offers concrete insights for the definition of a baseline framework at the international level. This article also suggests the creation of a global forum of discussion on intermediary liability, allowing the interests of a variety of stakeholders to be taken into account in the definition and implementation of those baseline principles.",4,4,,,Baseline (configuration management); The Internet; Accounting; Variety (cybernetics); Blueprint; Political science; Law and economics; Liability; Internet governance; Compliance (psychology); Fundamental rights,,,,,https://research.tilburguniversity.edu/en/publications/the-brazilian-approach-to-internet-intermediary-liability-bluepri-2 https://www.econstor.eu/handle/10419/106847 https://www.narcis.nl/publication/RecordID/oai%3Atilburguniversity.edu%3Apublications%2Fdd41cbb2-aef6-47da-8e36-bdcc51f42445 http://sro.sussex.ac.uk/id/eprint/78896/ https://www.econstor.eu/bitstream/10419/106847/1/816923949_rev.pdf https://policyreview.info/articles/analysis/brazilian-approach-internet-intermediary-liability-blueprint-global-regime https://core.ac.uk/download/161346053.pdf,http://dx.doi.org/10.14763/2015.4.395,,10.14763/2015.4.395,2274750745,,0,,3,true,cc-by,gold 056-633-973-029-486,Piracy as a maritime offence: some public policy considerations,,2007,journal article,The Journal of Business Law,00219460,,,Jingjing Xu,,,6,639,655,Public policy; Business; Law,,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=2356750,https://dialnet.unirioja.es/servlet/articulo?codigo=2356750,,,69159311,,0,,1,false,, 056-737-870-594-534,"Cyber Deviance among Adolescents and the Role of Family, School, and Neighborhood: A Cross-National Study",,,journal article,International Journal of Cyber Criminology,09742891,K. Jaishankar,India,Reinis Udris,"IntroductionWith the advent of new technologies and the ubiquity of the Internet, the world is now more connected than ever. Internet access around the world is increasing rapidly and, at the moment, Internet access for household stands at an average of 71.6% for OECD countries (Organisation for Economic Co-operation and Development, 2012). The Internet has proven to be extremely helpful, but it doesn't come without a cost. Cyber crime, software piracy, illegal downloading, hacking, and cyber bullying among others have all become part of our daily lives. Both illegal downloading and hacking, each for its own reason, have attracted a lot of attention from researchers and media alike. While the main issue with illegal downloading is copyrights and the vast amounts of money that music and movie producers don't receive due to sharing (Navarro, Marcum, Higgins, & Ricketts, 2014), hacking poses a security risk and can be potentially devastating to individuals, companies or countries alike. Theft of personal and financial data through hacking can be used against individuals and at the same time critically damage the reputation of a company(Nelson, 2014). Younger generations have been shown to adopt new technologies faster, leading to the debate of digital natives and digital immigrants (Prensky, 2012), which makes adolescents the perfect sample to study the link between technology and behavior.Digital Piracy and Illegal DownloadingIllegal downloading of software, movies and especially music has become an increasingly contentious issue. Setting aside the moral and legal debate of what pertains lawful and unlawful downloading (for a good discussion see Cluley, 2013), a number of studies have tried explain downloading and online piracy. The two most widely used theoretical frameworks are social learning theory and self-control theory. In support of the social learning perspective Hinduja and Ingram (2009) found that real-life association with deviant peers was the biggest predictor of music piracy, although online peers and online media were also significant factors. Morris and Higgins (2010) employed vignettes and asked their respondents ""How likely would it be for you to [go on-line and find a copy of the movie and download it for free, download the CD illegitimately under these circumstances, to have friends ask you to make a copy it]"" to measure the possibility of digital piracy. The results indicated at modest support for Aker's social learning theory (Morris & Higgins, 2010). Lastly, lending credence to the social learning approach, Navarro et al. (2014) found that associating with deviant peers increased an individual's likelihood of committing software, movie or music piracy.Research concerning digital piracy and self-control is sparse and oftentimes done in conjunction with the social learning theory. Higgins, Wolfe, and Marcum (2008) employed the full scale of self-control, which was developed by Grasmick, Tittle, Bursik, and Arneklev (1993). Their dependent variable was ""I would go to the web-site with the intention to download the CD under these circumstances"", which does not specify if the CD is music, movies, or software (Higgins et al., 2008). In this way the authors encompass all the possible types of digital piracy, but at the same time it is impossible to differentiate between them. In light of the limitations of the study, the authors found that low self-control and especially the impulsivity subscale are significantly associated with the intention of digital piracy (Higgins et al., 2008). This is in line with Higgins and Wilson (2006) who examined the link between self-control, differential association and software piracy. Their findings supported low self-control and differential association, however the statistical significance was lost in the sub-sample group with high morals (Higgins & Wilson, 2006). Thus one's morals can possibly negate the influence of low self-control or differential association. …",10,2,127,,Internet privacy; The Internet; Sociology; Social learning theory; Digital media; Digital native; Differential association; Music piracy; Reputation; Social psychology; Social learning,,,,,https://zenodo.org/record/163393 https://www.questia.com/library/journal/1P3-4258837771/cyber-deviance-among-adolescents-and-the-role-of-family,http://dx.doi.org/10.5281/zenodo.163393,,10.5281/zenodo.163393,2599774265,,0,007-562-804-124-084; 015-496-348-103-729; 020-973-534-331-792; 022-942-573-600-482; 037-710-506-349-517; 039-422-271-580-373; 048-860-812-213-004; 049-021-033-885-10X; 049-283-568-695-986; 063-587-658-302-584; 070-660-090-646-684; 072-084-774-976-983; 084-605-776-523-933; 092-166-066-718-902; 095-421-061-786-644; 095-902-135-480-89X; 096-401-039-718-213; 099-342-173-833-089; 105-107-208-959-905; 110-513-198-198-78X; 123-493-955-766-470; 126-772-810-967-037; 127-254-760-129-567; 128-481-263-896-876; 136-747-584-426-774; 153-023-143-705-332; 161-026-451-451-876; 161-446-165-980-313; 162-249-599-068-560,18,true,cc-by-nc-sa,gold 056-976-801-520-96X,Piracy and Sovereign Rights: Addressing Piracy in the Straits of Malacca without Degrading the Sovereign Rights of Indonesia and Malaysia,,2010,journal article,The Santa Clara Journal of International Law,,,,Carrie R. Woolley,,8,2,447,,International trade; Political science; Sovereignty; Law,,,,,https://digitalcommons.law.scu.edu/scujil/vol8/iss2/4/ https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?article=1090&context=scujil,https://digitalcommons.law.scu.edu/scujil/vol8/iss2/4/,,,1593591964,,0,,4,false,, 057-138-123-938-681,Anti-piracy policy and quality differential in markets for information goods,2013-11-08,2013,journal article,European Journal of Law and Economics,09291261; 15729990,Springer Science and Business Media LLC,Netherlands,Javier M. López-Cuñat; Francisco Martínez-Sánchez,"In this paper we analyze the strategic decisions of the government, the incumbent and the pirate in a market where the good is piratable. Like in other studies, we show that deterred or accommodated piracy can occur in equilibrium, but pure monopoly cannot occur for any anti-piracy policy. We prove that the initial quality differential between the original and the pirated product is essential to explain the effects of an increase in the quality of pirated product on both the level of piracy and the optimal monitoring rate. Assuming a one-stage entry process and a sufficiently high quality differential, we show that the incumbent always prefers to move first and make a credible commitment to a price. However, this is not true with a two-stage entry process.",39,2,375,401,Government; Economics; Microeconomics; Public finance; Information good; Quality (business); Monopoly; Industrial organization; Product (business); Commercial law; Differential (mechanical device),,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=5635306 http://www.ivie.es/downloads/docs/wpasad/wpasad-2011-02.pdf https://link.springer.com/article/10.1007/s10657-013-9425-9 https://econpapers.repec.org/RePEc:kap:ejlwec:v:39:y:2015:i:2:p:375-401 https://link.springer.com/10.1007/s10657-013-9425-9 https://ideas.repec.org/a/kap/ejlwec/v39y2015i2p375-401.html,http://dx.doi.org/10.1007/s10657-013-9425-9,,10.1007/s10657-013-9425-9,2033722672,,0,001-173-331-072-968; 003-982-789-982-915; 005-444-494-708-307; 010-868-742-674-100; 016-870-716-539-360; 018-789-763-774-907; 039-350-981-279-016; 039-883-767-744-759; 048-844-080-479-092; 048-844-713-038-626; 049-437-351-989-704; 049-698-234-112-01X; 050-683-526-710-058; 061-640-896-685-282; 063-859-665-255-524; 068-150-895-888-726; 070-331-504-926-612; 089-488-734-659-56X; 098-688-156-643-752; 102-302-436-405-87X; 108-502-427-799-701; 122-774-617-866-545; 133-328-711-058-703; 133-699-350-072-106; 138-504-189-703-600; 140-131-325-230-370; 142-989-369-390-130; 159-831-384-445-328; 162-331-341-062-164; 164-272-313-185-293,11,true,,green 057-169-630-663-653,"Piracy, corruption and the rule of law: Some correlations",,1998,journal article,Trends in Organized Crime,10844791; 19364830,Springer Science and Business Media LLC,United States,Jon Vagg,,3,4,72,76,Economics; Law; Corruption; Rule of law,,,,,https://link.springer.com/article/10.1007/s12117-998-1064-0,http://dx.doi.org/10.1007/s12117-998-1064-0,,10.1007/s12117-998-1064-0,2190175934,,0,,0,false,, 057-217-381-086-712,Assessing Current Trends and Efforts to Combat Piracy,,2014,journal article,Case Western Reserve Journal of International Law,00087254,,,Sulakshna Beekarry,,46,1,161,,Current (fluid); International trade; Political science; Law; Law reform; Territorial jurisdiction; Maritime piracy,,,,,https://scholarlycommons.law.case.edu/jil/vol46/iss1/9/ https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1034&context=jil https://paperity.org/p/82413317/assessing-current-trends-and-efforts-to-combat-piracy,https://scholarlycommons.law.case.edu/jil/vol46/iss1/9/,,,2339532097,,0,,0,false,, 057-954-195-418-947,Differences and Similarities between Gulf of Guinea and Somalia Maritime Piracy: Lessons Gulf of Guinea Coastal States Should Learn from Somali Piracy,,2016,journal article,"Journal of Law, Policy and Globalization",22243240,,,Devotha Edward Mandanda; Guo Ping,"Maritime piracy in African waters started to flourish in 21 st century when Pirates focus their activities in the two sides of the Continent. Between 2005 and 2012 piracy activities were rampant in the Horn of Africa and the East Africa Coastal waters. Thereafter, piracy activities prospered in West Africa Gulf of Guinea States. To date the same are still persisting in the Gulf of Guinea Coastal States. The impact brought by African piracy to the shipping industry and maritime transportation at large, have touched a range of nations from developed countries to the developing countries. Because of that, the International and Regional communities set up strategies to fight and repress piracy activities within the Continent. Maritime piracy is a crime and was firstly considered as crime by the customary international law even before codification of the same in 1958 Geneva Convention on the High Seas and later the 1982 United Nations Convention on the Law of the Sea. The United Nations Convention on the Law of the Sea (UNCLOS) has not set for the punishment of pirates but it has rest to the individual countries to prosecute and punish piracy offenders according to the laws of a particular country.  In defining what constitutes acts of piracy, the UNCLOS does not consider acts committed within the territorial waters of a State to be piracy, instead, it considers only those acts that are committed on the high seas for the private ends. The International law perception of what constitutes acts of piracy lead the governments of Gulf of Guinea coastal states to be solely responsible for maritime security of their countries as well as eliminating piracy acts happening in their area. Different from piracy off the coast of Somalia, a stateless country, Gulf of Guinea countries have stable governments and thus the principle of sovereignty applies. Despite the differences in nature for the acts of piracy that are happening in the two regions of the African continent, the same are still falling under the same umbrella of criminality of the acts of piracy. So whatever the differences there are still some similarities which basing on the same, the other part of the continent (West Africa) should draw the attention from, and copy the strategies of combating and eliminating acts of piracy in their region.This paper focuses on differences and similarities between Gulf of Guinea piracy and piracy off the coast of Somalia, what lessons Gulf of Guinea Coastal States should learn from Somali piracy for them to effectively combat and eliminate piracy activities within their area. Keywords: Piracy, Crime, Gulf of Guinea, Somalia.",56,,40,53,Economy; International waters; Political science; United Nations Convention on the Law of the Sea; Sovereignty; Law; Maritime security; Customary international law; Convention on the High Seas; International law; Territorial waters,,,,,https://iiste.org/Journals/index.php/JLPG/article/view/34712 https://iiste.org/Journals/index.php/JLPG/article/download/34712/35693,https://iiste.org/Journals/index.php/JLPG/article/view/34712,,,2578949271,,0,198-432-745-595-222,0,false,, 058-633-388-259-558,Maritime Threats to the South and Southeast Asia: Scope for a Regional Agreement,2017-04-30,2017,journal article,Kathmandu School of Law Review,20912110,"Kathmandu School of Law Review, Kathmandu School of Law, Nepal",,Utpal Kumar Raha; Raju Kd,"Piracy has continued to be a thriving criminal activity in the seas and pirates are considered to be the enemy of mankind. Recent reports show that more than half of the piracy reports reported have been from the area of Southeast Asia. Along with piracy, armed robbery, illicit trafficking, and smuggling have broadened and deepened the nature and scope of this threat. The Law of the Sea Convention (UNCLOS III) 1982, SUA Convention, 1988 and the regional agreements establish the legal frameworks then several organizations have enhanced enforcement measures in the suppression of sea perils. This paper attempts to examine the drawbacks in the existing legal framework and maritime security arrangements and to provide suggestions to fill the gaps. It further argues that India should take the lead in entering into a regional maritime security agreement with South and South East Asian nations within the ambit of UNCLOS 1982. This is important in the background of South China Sea Dispute and consequent maritime security issues in the region.",,,49,61,Regional science; Geography; Scope (project management); Southeast asia,,,,,http://kslreview.org/index.php/kslr/article/download/995/834,http://dx.doi.org/10.46985/jms.v5i1.995,,10.46985/jms.v5i1.995,3080426707,,0,,0,true,cc-by,gold 058-682-219-560-287,Fighting software piracy: which governance tools matter in Africa?,2013-01-10,2013,journal article,Journal of Business Ethics,01674544; 15730697,Springer Science and Business Media LLC,Netherlands,Antonio Rodríguez Andrés; Simplice A. Asongu,"This article integrates previously missing components of government quality into the governance-piracy nexus in exploring governance mechanisms by which global obligations for the treatment of IPRs are effectively transmitted from international to the national level in the battle against piracy. It assesses the best governance tools in the fight against piracy and upholding of intellectual property rights (IPRs). The instrumentality of IPR laws (treaties) in tackling piracy through good governance mechanisms is also examined. Findings demonstrate that: (1) while all governance tools under consideration significantly decrease the incidence of piracy, corruption-control is the most effective weapon; (2) but for voice and accountability, political stability and democracy, IPR laws (treaties) are instrumental in tackling piracy through government quality dynamics of rule of law, regulation quality, government effectiveness, corruption-control, and press freedom. Hence, the need for a policy approach most conducive to expanding development is to implement an integrated system of both IPRs and corollary good governance policies. Moreover, our findings support the relevance of good governance measures in developing countries wishing to complement their emerging IPR regimes.",118,3,667,682,Business ethics; Economy; Nexus (standard); Government; Economics; Law and economics; Accountability; Rule of law; Good governance; Intellectual property; Corporate governance,,,,,https://socionet.ru/publication.xml?h=RePEc:kap:jbuset:v:118:y:2013:i:3:p:667-682 https://link.springer.com/article/10.1007/s10551-013-1620-7/fulltext.html https://link.springer.com/article/10.1007/s10551-013-1620-7 https://rd.springer.com/article/10.1007/s10551-013-1620-7 https://researchportal.vub.be/en/publications/fighting-software-piracy-which-governance-tools-matter-in-africa https://www.econstor.eu/handle/10419/87824 https://dialnet.unirioja.es/servlet/articulo?codigo=4529793 https://EconPapers.repec.org/RePEc:kap:jbuset:v:118:y:2013:i:3:p:667-682 https://www.econstor.eu/bitstream/10419/123556/1/agdi-wp12-017.pdf https://ideas.repec.org/a/kap/jbuset/v118y2013i3p667-682.html https://philpapers.org/rec/ANDFSP,http://dx.doi.org/10.1007/s10551-013-1620-7,,10.1007/s10551-013-1620-7,2121832379,,0,002-002-118-291-029; 002-929-435-736-398; 003-120-061-431-142; 003-812-755-378-582; 008-896-495-853-748; 012-558-297-950-849; 013-765-194-873-383; 017-619-716-693-348; 018-075-278-238-815; 021-404-432-486-431; 027-674-475-235-155; 027-989-705-549-237; 028-526-275-182-847; 028-630-596-457-020; 035-438-882-798-006; 036-868-938-840-100; 039-883-767-744-759; 041-849-157-283-572; 042-057-592-838-529; 042-675-010-023-548; 043-305-653-465-196; 043-448-779-132-854; 045-523-803-520-989; 047-010-436-077-442; 048-844-080-479-092; 049-698-234-112-01X; 056-134-823-809-165; 058-080-844-249-541; 063-085-822-993-592; 066-237-973-648-031; 069-187-883-880-837; 070-846-287-317-572; 071-049-038-387-881; 071-737-539-334-023; 072-166-078-734-816; 072-971-242-544-566; 075-920-526-383-214; 078-410-292-183-154; 079-004-174-053-220; 084-864-570-554-378; 087-626-348-606-734; 091-856-524-538-557; 096-977-975-759-335; 097-165-496-887-789; 097-637-794-608-082; 101-874-873-388-77X; 103-047-934-034-494; 105-803-797-619-085; 107-007-285-779-662; 108-534-046-972-503; 110-231-183-577-925; 111-538-496-609-353; 118-675-220-855-858; 124-655-841-474-707; 126-996-752-002-343; 129-154-209-747-00X; 129-798-330-692-606; 131-502-427-206-412; 133-792-324-438-318; 135-800-520-334-495; 141-997-096-450-524; 144-004-380-049-21X; 144-135-264-427-99X; 145-489-062-191-725; 145-811-348-738-768; 159-771-177-761-457; 171-221-578-087-895; 193-561-037-050-01X,109,true,cc0,green 058-980-519-122-030,Factors influencing music piracy,2011-05-03,2011,journal article,Criminal Justice Studies,1478601x; 14786028,Informa UK Limited,United Kingdom,James Popham,"A number of studies have illustrated that age, sex, computer skills, access to broadband Internet services, and number of devices owned by a respondent are effective predictors of engagement in electronic music piracy. However, these findings have relied on data collected from undergraduate student samples. This paper reassesses factors of music piracy using a more representative sample of the general population. Using a logistic regression model, the findings suggest that most of the variables considered in past research significantly increase the odds connected with public engagement in electronic music piracy.",24,2,199,209,Advertising; Odds; Psychology; Computer literacy; Public engagement; Respondent; Music piracy; Population; Electronic music; Internet access,,,,,https://www.tandfonline.com/doi/full/10.1080/1478601X.2011.561648,http://dx.doi.org/10.1080/1478601x.2011.561648,,10.1080/1478601x.2011.561648,2070456230,,0,005-136-753-965-857; 008-669-373-663-807; 008-869-861-374-883; 010-146-711-506-660; 019-556-239-937-932; 020-973-534-331-792; 042-786-401-828-652; 042-840-674-327-735; 045-995-923-655-066; 046-989-664-357-368; 048-334-711-391-32X; 049-741-612-491-119; 058-806-863-894-52X; 061-166-302-924-595; 072-573-717-324-10X; 074-535-102-405-726; 077-227-720-946-014; 087-074-163-882-940; 088-141-375-865-257; 099-342-173-833-089; 123-456-041-700-43X; 144-718-754-537-547; 153-864-616-299-263; 154-247-701-466-495; 184-067-406-678-487; 185-717-607-055-348,14,false,, 059-214-207-477-995,Somali Piracy and the Human Rights of Seafarers,,2016,journal article,Netherlands Quarterly of Human Rights,09240519; 22147357,SAGE Publications,,Sofia Galani," Somali piracy has attracted the world's attention over the last decade and whilst Somali piracy abates, the debate on its various aspects remains lively. This paper aims to shed light on one particular aspect of Somali piracy that remains unexplored – the violations of the human rights of seafarers, and especially those taken hostage. Despite the suffering of seafarers at the hands of pirates, their protection seems to fall beyond the human rights framework due to the non-State status of pirates. The lack of a human rights-oriented approach is reflected by significant counter-piracy responses, including the United Nations Security Council Resolutions, criminal responses and the conduct of naval operations that are reviewed here. Therefore, it is suggested that the traditional negative obligations of States and the evolution of the positive human rights obligations of States can offer a legal avenue for the better protection of the human rights of seafarers. ",34,1,71,98,,,,,,https://core.ac.uk/download/83928689.pdf,http://dx.doi.org/10.1177/016934411603400105,,10.1177/016934411603400105,,,0,,0,true,cc-by-nc-sa,green 059-232-334-554-446,The Enrica Lexie Incident and the Status of Anti-Piracy Security Personnel on Board,2021-09-09,2021,journal article,Journal of Conflict and Security Law,14677954; 14677962,Oxford University Press (OUP),United Kingdom,Marco Odello,"Abstract; This article focuses on a specific issue that emerged in the Arbitral Award on the Enrica Lexie case delivered in May 2020. The dispute involved Italy and India in relation to the killings of Indian fishermen by Italian marines in the waters outside India. The incident raised several legal issues concerning the application of the law of the sea, the legal determination of anti-piracy actions by States and jurisdictional immunities. The purpose of this article is to focus on one specific issue that emerges from this case: the uncertain legal status of security personnel deployed on private vessels in relation to anti-piracy protection. The first part of the article shall consider the status of military personnel deployed on merchant ships for anti-piracy protection. The problem is central to the matter because, depending on the definition of their status, limitations on the exercise of jurisdiction by other States may emerge. The second part of this article discusses more broadly the status of military and private security personnel in actions that could be defined as ‘international policing or security’ activities, which should be better clarified through better international cooperation, exchange of information and clear rules. A more defined legal setting for anti-piracy activities would prevent possible future disputes in similar cases. Furthermore, it would be useful to have clearer rules that could be applied also to face other types of crimes that occur on the sea.",26,3,551,576,Business; Law; On board,,,,,http://academic.oup.com/jcsl/advance-article-pdf/doi/10.1093/jcsl/krab014/40342272/krab014.pdf,http://dx.doi.org/10.1093/jcsl/krab014,,10.1093/jcsl/krab014,3200976248,,0,,0,true,cc-by-nc,hybrid 059-652-056-960-604,Authorizing Piracy on the Cyber Seas: An Initiative to Compensate Rights Holders of Sound Recordings by Making Music Free,,2012,journal article,The George Washington International Law Review,15349977,,,William Wallace,"I. INTRODUCTION During the summer of 1999, a music-enthusiast and tech-savvy seventeen-year-old by the name of Shawn Fanning created one of the Internet's first digital music file sharing services.1 Annoyed at the time and effort it took to find digital music online, Fanning developed Napster, the now infamous peer-to-peer (P2P) file sharing program that allowed users to download copyrighted music files at no cost.2 Within a matter of months, Napster became one of the fastest-growing software applications, reaching 26.4 million unique global users by early 2001.3 The Record Industry of America (RIAA) responded with legal action, alleging contributory copyright infringement and, on February 12, 2001, the Ninth Circuit ruled that Napster must cease allowing users from trading copyrighted files through its software.4 Although the RIAA was victorious, this was only the beginning of the record industry's fight against digital music piracy. After Napster's collapse, users scattered across a bevy of alternative file sharing sites that began to surface.5 By July of 2001, news outlets were already reporting on the many successive P2P services growing out of Napster's demise, such as KaZaa, Aimster, and AudioGalaxy. 6 The newer sites ran with ever-increasing levels of sophistication, and made it increasingly difficult for record industries across the globe to shut them down.7 In the subsequent years, developed nations and record industries across the world have continued to fight piracy.8 A confluence of factors has upset such efforts, however, leading to greater revenue losses for copyright holders.9 Losses accrue as international file sharing pirates develop innovative ways to dodge efforts to curb piracy and undeveloped nations fail to implement copyright protections domestically.10 Despite attempts to induce noncompliant nations to adopt and enforce stronger domestic copyright laws, piracy remains omnipresent.11 The means by which the developed world has sought to eradicate piracy have failed to compensate rights holders for lost profits.12 This Note proposes a solution. First, this Note discusses the technologies that have facilitated music piracy over the Internet, and explains the effect piracy has had on the economies of nations. Second, it explains how modern intellectual property conventions have updated older copyright conventions to meet new challenges in the Internet age. Third, it discusses both the failures of these conventions and the reasons why copyright conventions and copyright enforcement will fail to curb music piracy. This Note argues that, because aggressive enforcement has failed, the global community needs to take a new approach.13 This Note proposes the creation, through treaty, of an international organization (IO) that will levy websites that facilitate P2P music file sharing in order to compensate rights holders for revenues lost as a result of music piracy. In exchange for registration with this IO, hosts and users of these sites will be granted immunity from civil and criminal liability in an effort to encourage registration. The IO will also have the power to investigate and prosecute copyright infringers within member states, investigate infringement in non-member states, and reach out to non-members to encourage ratification of the treaty. II. BACKGROUND Digital music piracy rates have increased as the ability to share files has expanded. Attempts by various nations to curb music piracy by using punishment as a deterrent have failed. This section will first address how file sharing has increased access to pirated markets and led to the decline of global music sales. Second, it will explain how the decline in music sales has resulted in an underinvestment in talent, has kept investors out of certain markets, and has yielded job losses. Third, it will explain how attempts to curb music piracy rates have failed and will continue to fail. A. …",44,1,141,,The Internet; Business; Law; Ninth; Ratification; Treaty; Copyright infringement; Music piracy; Intellectual property; File sharing,,,,,https://www.questia.com/library/journal/1P3-2823618751/authorizing-piracy-on-the-cyber-seas-an-initiative,https://www.questia.com/library/journal/1P3-2823618751/authorizing-piracy-on-the-cyber-seas-an-initiative,,,761118687,,0,,1,false,, 060-299-876-846-322,Piracy in the Offing: The Law of Lands and The Limits of Sovereignty at Sea,,2012,journal article,Anthropological Quarterly,15341518; 00035491,Project Muse,United States,Jennifer L. Gaynor,"This article uses the offing as a metaphor to theorize piracy in relation to pivotal moments in Southeast Asia's maritime engagement with the world. ""In the offing"" usually indicates that something is about to happen. This figurative meaning derives from a literal one that refers to the visible sea beyond inshore navigational hazards. Nautically apt, the offing's literal sense also provides a useful metaphor for analyzing piracy. Like the physical location of the offing, piracy entails both an embodied orientation as well as a more general relation of structured perceptions between those aboard ship and those on shore. Yet shore-based political authorities have had an inordinate power to define what counts as piracy and who is determined to be a pirate. While designations of piracy illuminate the efforts of states to manage the limits of their sovereignty, the boundary between legitimate plunder and that which is not has often been negotiated across social arenas in which legal (and other) legitimacies are differentially acknowledged. Like the space of the offing, acts that might be considered piracy and those who do them thus entail questions of definition, visibility, and point of view-matters that for piracy unfold in relation to particular configurations of politics, power, and cultural comprehension. The question of piracy comes under scrutiny here in three such configurations:first, in the relations between Southeast Asian polities and between them and China during the 15th century; second, in the context of early 17th century Dutch trade in Southeast Asia along with the European political and legal setting; and third, in connection with 19th century views on piracy's proliferation in the region and inter-colonial attempts to curb it. This analysis informs a discussion of infamous ethnic names that signified ""pirates"" in colonial European and Southeast Asian discourses. It then also anchors critical observations about contemporary piracy and the notion of failed states.",85,3,817,857,Sociology; Sovereignty; Law; Scrutiny; Power (social and political); Political authorities; Metaphor; Context (language use); Southeast asian; Politics,,,,,https://www.questia.com/library/journal/1P3-2746395531/piracy-in-the-offing-the-law-of-lands-and-the-limits https://muse.jhu.edu/article/484375/summary,http://dx.doi.org/10.1353/anq.2012.0036,,10.1353/anq.2012.0036,2072883424,,0,006-837-985-975-999; 009-079-683-168-429; 009-581-224-074-072; 010-540-493-834-96X; 015-209-221-391-298; 015-730-950-764-741; 016-799-888-340-324; 017-182-813-371-448; 018-902-831-047-51X; 024-233-521-536-707; 026-997-882-826-876; 033-851-453-160-545; 035-939-886-805-088; 036-822-354-894-910; 038-276-541-183-177; 039-347-075-683-589; 039-503-179-647-162; 045-626-347-861-799; 048-595-522-754-625; 051-013-635-108-000; 051-525-120-152-757; 054-995-767-766-018; 055-244-366-839-641; 064-725-777-684-107; 065-395-714-338-001; 068-763-079-528-708; 069-058-023-596-288; 076-469-081-449-147; 078-088-533-977-236; 081-086-585-903-852; 082-156-080-750-931; 083-382-588-585-625; 085-588-410-428-610; 087-494-518-271-614; 088-527-352-144-918; 094-629-109-304-699; 096-420-519-066-887; 102-050-191-593-615; 103-939-251-188-463; 108-904-091-427-446; 111-641-099-664-813; 112-499-087-564-69X; 113-982-693-442-760; 114-347-337-562-866; 116-576-842-138-734; 119-542-402-642-893; 127-825-414-084-93X; 134-231-858-077-154; 134-375-259-315-715; 136-473-857-571-075; 141-269-484-915-99X; 147-642-928-959-098; 150-104-602-829-082; 154-498-957-156-243; 155-546-090-672-412; 157-323-403-416-431; 158-148-296-089-738; 158-661-702-874-174; 160-186-006-041-525; 162-269-887-988-538; 168-026-948-966-044; 168-677-908-226-008; 173-859-327-811-426; 176-559-084-921-106; 179-245-562-746-996; 179-829-784-044-841; 186-880-417-131-123; 187-318-543-209-161,16,false,, 060-366-903-647-335,Legal Basis to Punish the Piracy Crime at Somali Waters,,2010,journal article,Journal of Henan Public Security Academy,,,,Liu Jie-hua,"With the crime of piracy at the Gulf of Aden,Somali waters becoming increasingly serious,piracy has become one of the focuses of international politics.So United Nations Security Council adopted a number of decisions on this issue,and the first batch of China's navy to escort ships also went to the Gulf of Aden Somali waters on December 26,2008.But whether our country has jurisdiction on the crime of piracy is the critical factor about the legality of the activities of China's navy to escort.Through the treaties and some other laws,we know that we have the jurisdiction on the crime of piracy,including the international law and the Chinese criminal law.",,,,,Political science; China; Law; Criminal law; Navy; Somali; Jurisdiction; Security council; Principle of legality; International law,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-HLKD201004033.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-HLKD201004033.htm,,,2385677877,,0,,0,false,, 061-160-371-003-151,"Piracy, state capacity and root causes",,2013,journal article,African Security Review,10246029; 21540128,Informa UK Limited,United Kingdom,Nikolaos Biziouras,"By comparing the Somali experience of piracy with the emerging situation in the Gulf of Guinea, I show that increases in the enforcement aspects of state capacity in the Gulf of Guinea states are necessary but not sufficient tools to combat the emergence, growth, and institutionalisation of piracy. Such tools would require state-building measures that would minimise the incentives of individuals to join piracy organisations and they would have to effectively deal with youth unemployment, income inequality, and environmental degradation.",22,3,111,122,Business; Institutionalisation; Environmental degradation; Somali; State-building; Enforcement; Youth unemployment; Incentive; Development economics; Economic inequality,,,,,https://www.tandfonline.com/doi/full/10.1080/10246029.2013.790318 https://www.usna.edu/PoliSci/facultybio/Faculty%20Documents/Biziouras%20Published%20Works/BiziourasAfrSecRev,http://dx.doi.org/10.1080/10246029.2013.790318,,10.1080/10246029.2013.790318,2036255773,,0,,5,false,, 061-337-086-253-283,"Hollywood, the MPAA, and the formation of anti-piracy policy.",2016-10-17,2016,journal article,International Journal of Cultural Policy,10286632; 14772833,Informa UK Limited,United Kingdom,Paul McDonald,"Combating piracy is fundamental to the policy ‘priorities’ of the Motion Picture Association of America, the trade association representing the major Hollywood entertainment corporations. As the MPAA implements a multitude of actions to fight piracy, it is impossible to locate the formation of the Association’s anti-piracy policy in any single source. Instead, this article sees MPAA anti-piracy policy as formed across three fronts: the legal, through anti-piracy litigation; the political, by the MPAA joining with other trade groups from across the copyright industries to lobby for stronger domestic copyright laws and influence US trade policy; and the discursive, seen in the production of statistics to evidence the value of copyright to the US economy and consequent harms caused by piracy. Examining these actions confirms the cultural and economic influence of MPAA policy but the article is also concerned with how Hollywood’s anti-piracy efforts are challenged and contested from various directions.",22,5,686,705,Economy; Political economy; Commercial policy; Economics; Hollywood; Multitude; Trade association; Intellectual property; Movie theater; Film industry; Politics,,,,,https://www.cabdirect.org/cabdirect/abstract/20163370067?q=(ed%3a%22Hill%2c+J.+%22) https://core.ac.uk/display/77065033 https://www.tandfonline.com/doi/full/10.1080/10286632.2016.1223635 https://www.tandfonline.com/doi/full/10.1080/10286632.2016.1223635?ai=z4&mi=3fqos0 https://www.growkudos.com/publications/10.1080%252F10286632.2016.1223635,http://dx.doi.org/10.1080/10286632.2016.1223635,,10.1080/10286632.2016.1223635,2535554132,,0,015-927-018-573-535; 016-825-469-452-256; 021-464-065-507-847; 029-885-393-543-560; 050-583-079-688-072; 055-744-263-803-823; 058-476-149-994-591; 069-834-438-995-343; 071-321-301-725-009; 088-621-279-167-179; 089-697-919-759-736; 110-987-805-406-478; 112-967-130-332-144; 113-898-911-328-164; 114-218-783-362-169; 116-276-372-214-565; 117-244-934-947-534; 123-242-063-905-336; 124-618-118-400-511; 127-396-698-906-436; 146-492-122-484-153; 149-669-261-384-62X; 153-556-090-709-189; 158-570-334-024-649; 188-040-089-709-598; 196-007-167-423-313,4,false,, 061-440-176-511-448,Legal Consideration about Regulation Framework of Bio-piracy,,2011,journal article,Environment and Sustainable Development,14746778,,,WU Qiong,"Bio-piracy means that the researchers of Biological genetic resources make use of servers' resources without the latter's consent and then exclusive the benefit by using the intellectual property rights.Bio-piracy seriously damages the interests of the developing countries as the resources servers,which violates the principle of national sovereignty and a series of regulation measures developed by ""The Convention on Biological Diversity"" and its protocols.Our country is supposed to draw lessons from international legislation and combine with our own conditions to establish the genetic resources protection law system.",,,,,Economics; Sovereignty; Law and economics; Law; Legislation; Damages; Convention on Biological Diversity; Genetic resources; Intellectual property; Developing country; Server,,,,,https://en.cnki.com.cn/Article_en/CJFDTOTAL-HJKD201104011.htm,https://en.cnki.com.cn/Article_en/CJFDTOTAL-HJKD201104011.htm,,,2359788529,,0,,0,false,, 061-490-878-326-875,Maritime Piracy in the Modern Era in Latin America: Discrepancies in the Regulation,2020-10-05,2020,journal article,Acta Hispanica,26769719; 14167263,University of Szeged,,Amarilla Kiss,"Maritime piracy is an activity that was considered defunct long ago and that Latin American countries experience it again in the 21st century. Since 2016 the number of attacks has increased dramatically involving armed robbery, kidnapping and massacre. Modern day piracy has nothing to do with the romantic illusion of the pirates of the Caribbean, this phenomenon is associated with the governmental, social or economic crisis of a state. When it appears, we can make further conclusions regarding the general conditions of the society in these states. But do these attacks really constitute piracy under international law? Does Latin American piracy have unique features that are different from piracy in the rest of the world? The study attempts to answer the questions why piracy matters in Latin America and how it relates to drug trafficking and terrorism. Apart from that, the study presents a legal aspect comparing the regulation of international law to domestic law, especially to the national law of Latin American states.",,II,121,128,Economy; Latin Americans; Political science; Maritime piracy,,,,,http://ojs.bibl.u-szeged.hu/index.php/acthisp/article/download/32998/33109,http://dx.doi.org/10.14232/actahisp.2020.0.121-128,,10.14232/actahisp.2020.0.121-128,3097401134,,0,,0,true,,gold 061-659-010-105-091,"A Comparison of Neorealism, Liberalism, and Constructivism in Analysing Cyber War",2016-11-01,2016,journal article,Andalas Journal of International Studies (AJIS),23559500; 23018208,Universitas Andalas,,Rika Isnarti,"Cyberwar can be considered as one of phenomena in International Relations. However, recently, there are not many literature about International Relations theory talking about cyber war or cyberspace generally. The phenomena of cyberspace is matter to International Relations as it involved sovereignty, state interactions and other elements in International Relations theory. On the other hand, cyber space blurs many concept in International Relations such as sovereignty is borderless in the realms of cyber space. Therefore, this articles analyses three perspectives in International Relations in analyzing cyber war. It explains what cyber war in context of International Relations, how three theories in International Relations with their elements analyses actors and interaction in cyber space. Finally, it found that Neorealism is the most adequate theory among other two theories in analyzing cyber war.",5,2,151,165,Epistemology; Constructivism (international relations); Cyberwarfare; Political science; Sovereignty; International relations theory; Cyberspace; Cyber Space; International relations,,,,,http://ajis.fisip.unand.ac.id/index.php/ajis/article/download/53/43 http://ajis.fisip.unand.ac.id/index.php/ajis/article/view/53 https://core.ac.uk/download/pdf/229506376.pdf,http://dx.doi.org/10.25077/ajis.5.2.151-165.2016,,10.25077/ajis.5.2.151-165.2016,2801832089,,0,,0,true,cc-by-nc-sa,gold 061-782-493-706-839,PIRACY AT SEA AND CHINA'S RESPONSE,2000-08-01,2000,journal article,Lloyd's Maritime and Commercial Law Quarterly,03062945,,,Zou Keyuan,,,3,364,382,Advertising; Political science; China; Commerce,,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=2802900,https://dialnet.unirioja.es/servlet/articulo?codigo=2802900,,,118221121,,0,,4,false,, 061-851-203-161-866,Piracy in a Failed State,2012-03-01,2012,journal article,Journal of East Asia and international law,19769229,Yijun Institute of International Law,South Korea,Akiko Sugiki,"The main purpose of this paper is to examine an alternative approach to statebuilding in Somalia to resolve issues regarding maritime piracy off the Somali coast. The sharp increase in piracy in Somalia is often regarded as a consequence of the collapse of the State after 1991. Solutions for curtailing piracy therefore depend upon the reconstruction of the State in Somalia. However, as has been the case in many post-conflict countries, Somalia has experienced a number of unsuccessful attemps at state-building because the current state-building model based on the western conception of statehood does not account for the realities of Somali society. Reviving a unified Somalia is thus counter-productive to securing peace, order and stability. By closely examining state-building approaches, this paper shows that the‘ mediated state’approach is the most appropriate model not only for resolving issues regarding state-building, but also for tackling the root causes of piracy in Somalia.",5,1,61,92,Political science; Order (exchange); State (polity); Somali; Failed state; State-building; Maritime piracy; Development economics,,,,,https://keio.pure.elsevier.com/ja/publications/piracy-in-a-failed-state-how-state-building-can-stabilize-the-sit,https://keio.pure.elsevier.com/ja/publications/piracy-in-a-failed-state-how-state-building-can-stabilize-the-sit,,,2116967485,,0,,1,false,, 061-938-655-948-274,LEGAL FRAMEWORK FOR THE ENFORCEMENT OF CYBER LAW AND CYBER ETHICS IN NIGERIA.,2016-07-23,2016,journal article,INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY,22773061,CIRWOLRD,,Nneka Obiamaka Umejiaku; Mercy Ifeyinwa Anyaegbu,"Cyber law deals with codified rules that govern the exchange of communication and information for the protection of intellectual property rights, freedom of speech and public access to information in cyber space. Cyber ethics on the other hand is the application of responsible behavior on the Internet. Currently in Nigeria, the Cyber Crime Act was promulgated in 2015 to tackle online offences. This paper examined the legal framework which regulates public access to information in the cyber space in Nigeria. The paper also highlights lapses inherent in Nigerian legal system. Based on the findings, the paper proffers a number of recommendations. It also observes that due to rapid development in technology, law and ethics should be combined to protect the society from the menace of cybercrime.",15,10,7130,7139,The Internet; Business; Law; Cybercrime; Enforcement; Cyber Space; Public access; Cyber crime; Intellectual property; Computer security,,,,,http://cirworld.org/index.php/ijct/article/view/5278 http://www.cirworld.com/index.php/ijct/article/download/5278/pdf https://core.ac.uk/download/322473244.pdf,http://dx.doi.org/10.24297/ijct.v15i10.12,,10.24297/ijct.v15i10.12,2487474608,,0,,2,true,cc-by,hybrid 062-137-637-964-947,Can we continue to effectively police digital crime,2017-06-08,2017,journal article,Science & justice : journal of the Forensic Science Society,13550306,Forensic Science Society,United Kingdom,Graeme Horsman,"Abstract Now approximately 30 years old, the field of digital forensics is arguably facing some of its greatest challenges to date. Whilst currently supporting law enforcement in numerous criminal cases annually, questions are beginning to emerge regarding whether it can sustain this contribution, with digital crime remaining prevalent. In his first live interview in September 2015, Head of MI5, Andrew Parker indicated that individuals are now engaging in computing acts which are beyond the control of authorities, confirming earlier remarks made by British Prime Minister David Cameron in the wake of the Charlie Hebdo attacks. Such comments cast doubt on the future effectiveness of the digital forensic discipline and its ability to effectively investigate those who implement the latest forms of technology to carry out illicit acts. This article debates the controversial question, could we be facing an era where digital crime can no longer be effectively policed?",57,6,448,454,Sociology; Law; Law enforcement; Cyber crime; Prime minister; Computer forensics; Digital forensics,Crime; Cyber-crime; Digital forensics; Research; Security,,,,https://europepmc.org/article/MED/29173458 https://research.tees.ac.uk/ws/files/6385420/621796.pdf https://sure.sunderland.ac.uk/7400/ https://core.ac.uk/display/83955750 https://www.sciencedirect.com/science/article/abs/pii/S1355030617300801 https://www.ncbi.nlm.nih.gov/pubmed/29173458 http://www.sciencedirect.com/science/article/pii/S1355030617300801 https://research.tees.ac.uk/en/publications/can-we-continue-to-effectively-police-digital-crime https://core.ac.uk/download/83955750.pdf,http://dx.doi.org/10.1016/j.scijus.2017.06.001,29173458,10.1016/j.scijus.2017.06.001,2622507813,,0,004-305-936-893-970; 004-553-537-193-953; 007-460-815-938-318; 007-738-295-913-523; 016-983-559-523-04X; 019-831-293-743-518; 020-102-901-076-831; 021-635-319-328-35X; 027-023-893-191-352; 029-638-263-419-336; 029-743-976-871-124; 035-381-853-639-810; 046-240-766-487-724; 049-072-992-078-856; 051-554-120-123-211; 055-542-241-433-061; 057-182-959-994-032; 060-883-619-119-004; 064-214-213-364-517; 077-532-025-251-756; 078-327-902-374-330; 078-385-199-956-202; 086-419-575-179-359; 087-932-943-720-094; 090-752-043-508-733; 107-225-992-852-975; 107-864-540-671-760; 111-349-579-792-04X; 111-709-004-594-25X; 114-884-641-066-625; 134-369-102-934-63X; 134-709-778-635-793; 134-927-490-231-285; 137-298-307-797-644; 142-535-519-963-074; 165-354-182-797-278; 196-748-384-573-21X,22,true,cc-by-nc-nd,green 062-276-179-498-909,Virtual Witness Confrontation in Criminal Cases: A Proposal to Use Videoconferencing Technology in Maritime Piracy Trials,2012-11-01,2012,journal article,Vanderbilt Journal of Transnational Law,00902594,,,Yvonne M. Dutton,"Maritime piracy is a serious problem, yet states are not prosecuting captured pirates with any regularity. One of the many reasons cited to explain this phenomenon focuses on the expense and difficulty of mounting cases of such international proportions and which involve evidence, suspects, victims, and witnesses from around the globe. In an effort to help close the impunity gap that surrounds piracy, this Article offers a potential solution to the difficulties associated with obtaining live witness testimony. It proposes a rule to allow witnesses under some circumstances to testify remotely by way of two-way, live videoconferencing technology. While remote testimony need not become the norm in maritime piracy cases, the proposed rule is carefully structured to balance both the public’s and the defendant’s interest in a fair trial.",45,5,1283,,Internet privacy; Political science; Videoconferencing; Globe; Witness; Impunity; Balance (metaphysics); Fair trial; Maritime piracy; Phenomenon,,,,,https://scholarworks.iupui.edu/handle/1805/4457,https://scholarworks.iupui.edu/handle/1805/4457,,,3124624474,,0,,1,false,, 062-441-041-298-96X,Can Shari'a be a Deterrent for Intellectual Property Piracy in Islamic Countries?,2011-10-26,2011,journal article,The Journal of World Intellectual Property,14222213; 17471796,Wiley,United Kingdom,Nora El-Bialy; Moamen Gouda,"This study examines the stance of Islamic legal traditions (Shari'a) towards intellectual property (IP) piracy. Although Muslims may differ on what Shari'a dictates, most of them view Shari'a as God's law and as a main ingredient of Islamic belief system. Since piracy rates in Islamic countries are considerably high in light of existing formal IPR laws, it becomes essential to test if Shari'a has any relation with such phenomenon. Our hypothesis is that, although Muslim countries have formal institutions or laws that protect intellectual property rights (IPR), little attention is given to informal institutions, or human morals, regarding IPR piracy, which negatively affects the enforcement level of IPR laws in these countries. Muslims may not be convinced that IPR violations, although illegal, are unethical or forbidden by Islamic Shari'a. In order to test the level of adherence of Muslims to Shari'a to support our hypothesis, we develop a “religious loyalty” index (RLI). Comparing adherence of followers of different religions with those of Islam, Muslim countries have the highest religiosity level, positively affecting obedience level to Shari'a. Consequently, an investigation of how Shari'a views IPR piracy is conducted. As Islam generally prohibits IPR piracy, the study concludes by offering a set of policy recommendations that can effectively help in minimizing IPR piracy in Muslim countries.",14,6,441,466,Economics; Obedience; Order (exchange); Law; Loyalty; Enforcement; Religiosity; Intellectual property; Islam; Phenomenon,,,,,https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1747-1796.2011.00428.x https://dialnet.unirioja.es/servlet/articulo?codigo=6227733,http://dx.doi.org/10.1111/j.1747-1796.2011.00428.x,,10.1111/j.1747-1796.2011.00428.x,1574951302,,0,002-002-118-291-029; 002-355-604-344-572; 004-206-320-722-15X; 005-310-174-757-229; 007-793-217-708-817; 008-438-866-157-955; 008-740-362-902-437; 008-753-407-998-974; 009-294-953-134-547; 012-558-297-950-849; 015-214-697-003-912; 015-808-798-057-897; 016-451-815-723-415; 017-168-651-863-296; 018-931-969-162-011; 019-382-258-896-833; 021-623-162-821-665; 021-762-370-157-615; 024-898-886-503-891; 026-988-129-934-16X; 039-883-767-744-759; 040-693-530-318-768; 041-893-696-570-720; 046-864-792-391-836; 047-502-066-511-459; 049-813-154-354-036; 053-176-445-484-311; 053-956-378-667-86X; 059-077-318-219-51X; 061-866-141-222-548; 063-239-958-234-906; 068-316-203-002-857; 070-290-886-732-275; 072-166-078-734-816; 073-319-898-099-660; 074-716-472-183-799; 075-313-990-590-351; 077-957-815-298-026; 088-653-607-010-282; 089-206-440-586-184; 097-165-496-887-789; 097-637-794-608-082; 107-165-872-073-561; 107-605-926-265-849; 111-622-105-510-826; 116-155-669-059-059; 124-032-418-964-871; 125-495-818-933-457; 138-520-139-466-352; 144-135-264-427-99X; 145-811-348-738-768; 147-049-277-521-692; 150-594-241-601-430; 154-513-291-663-187; 167-706-147-274-876; 179-748-255-795-194; 191-344-983-602-980; 195-006-477-696-885,8,false,, 062-844-613-006-018,A Note on re Piracy Jure Gentium,,1935,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),United States,Charles Fairman,,29,03,508,512,,,,,,https://www.cambridge.org/core/services/aop-cambridge-core/content/view/S0002930000168599,http://dx.doi.org/10.1017/s0002930000168599,,10.1017/s0002930000168599,2605833238,,0,,2,false,, 063-085-822-993-592,Harmonizing IPRs on Software Piracy: Empirics of Trajectories in Africa,2012-11-18,2012,journal article,Journal of Business Ethics,01674544; 15730697,Springer Science and Business Media LLC,Netherlands,Simplice A. Asongu,"In the current efforts of harmonizing the standards and enforcement of IPRs protection worldwide, this paper explores software piracy trajectories and dynamics in Africa. Using a battery of estimation techniques that ignore as well as integrate short-run disturbances in time-dynamic fashion, we answer the big questions policy makers are most likely to ask before harmonizing IPRs regimes in the battle against software piracy. Three main findings are established. (1) African countries with low software piracy rates are catching-up their counterparts with higher rates; implying despite existing divergent IPRs systems, convergence in piracy rate could be a genuine standard-setting platform. (2) Legal origins do not play a very significant role in the convergence process. (3) A genuine timeframe for standardizing IPRs laws in the fight against piracy is most likely between a horizon of 4 to 8 years. In other words, full (100%) convergence within the specified horizon will mean the enforcements of IPRs regimes without distinction of nationality and locality.",118,1,45,60,Business ethics; Economy; International trade; Economics; Convergence (economics); Software; Battle; Enforcement; Locality; Intellectual property; Panel data,,,,,https://link.springer.com/content/pdf/10.1007%2Fs10551-012-1552-7.pdf https://mpra.ub.uni-muenchen.de/42466/ https://link.springer.com/article/10.1007/s10551-012-1552-7/fulltext.html https://www.econstor.eu/handle/10419/123559 https://www.econstor.eu/bitstream/10419/123559/1/agdi-wp12-025.pdf https://ideas.repec.org/a/kap/jbuset/v118y2013i1p45-60.html https://econpapers.repec.org/article/kapjbuset/v_3a118_3ay_3a2013_3ai_3a1_3ap_3a45-60.htm https://dialnet.unirioja.es/servlet/articulo?codigo=4514727 https://mpra.ub.uni-muenchen.de/42466/1/mpra_paper_42466.pdf https://socionet.ru/publication.xml?h=RePEc:pra:mprapa:42466 https://link.springer.com/article/10.1007%2Fs10551-012-1552-7,http://dx.doi.org/10.1007/s10551-012-1552-7,,10.1007/s10551-012-1552-7,2123993862,,0,003-120-061-431-142; 008-896-495-853-748; 012-558-297-950-849; 015-808-798-057-897; 017-153-449-730-092; 018-075-278-238-815; 019-922-761-145-695; 022-264-398-959-067; 028-630-596-457-020; 029-476-172-710-41X; 035-733-027-037-304; 036-159-702-886-637; 036-354-171-090-712; 039-883-767-744-759; 041-385-438-010-463; 041-849-157-283-572; 042-335-426-642-552; 043-305-653-465-196; 044-884-973-451-274; 045-638-979-146-951; 046-127-203-871-082; 046-127-440-118-73X; 047-010-436-077-442; 049-698-234-112-01X; 050-271-313-947-720; 054-663-257-958-510; 059-077-318-219-51X; 062-169-487-131-224; 062-338-941-342-801; 063-173-092-315-254; 064-893-720-411-223; 066-237-973-648-031; 068-809-693-165-274; 072-498-861-728-275; 083-798-097-606-101; 086-665-683-815-168; 087-959-536-613-70X; 094-846-844-599-623; 097-165-496-887-789; 097-287-626-930-331; 098-929-261-686-185; 107-007-285-779-662; 107-605-926-265-849; 110-231-183-577-925; 112-111-608-526-67X; 112-650-832-546-977; 115-363-641-460-270; 118-348-885-347-77X; 121-394-722-855-679; 124-655-841-474-707; 125-495-818-933-457; 127-396-485-243-755; 129-798-330-692-606; 132-558-492-977-554; 133-793-936-162-353; 140-177-608-473-755; 144-135-264-427-99X; 145-811-348-738-768; 152-323-892-837-971; 185-020-775-542-401; 185-197-322-646-367; 191-344-983-602-980; 193-305-032-595-202,108,true,,green 063-357-796-552-895,"Rascals, Scoundrels, Villains, and Knaves: The Evolution of the Law of Piracy from Ancient Times to the Present*",,2011,journal article,International Journal of Legal Information,07311265; 23314117,Cambridge University Press (CUP),,Rebecca Fantauzzi,"AbstractThis paper begins by tracking the history of piracy from Greek and Roman times, to the Golden Age of piracy, into modern day. It also looks at the motivations for becoming a pirate and the “piracy cycle.” The paper then moves into a discussion of how piracy has influenced the law, such as its impact on Universal Jurisdiction and international treaties like the UN Convention on the Law of the Sea; however, a stable definition of what constitutes “piracy” has become troublesome, even with the abundance of legal sources related to the subject. The paper then moves into a discussion of three US court cases dealing with the issue of piracy: the first from the Golden Age of piracy, the second in the early part of this century showing how piracy is not always prosecuted in the traditional sense, and finally with the case of the famous pirate the US Navy SEALS captured during the rescue of Captain Richard Phillips of theMaersk Alabama.Finally, the paper concludes the discussion using the modern day situation of Somalia to show how the “piracy cycle” is still capable of explaining what draws people to piracy, how that particular situation has been combated by the international community, and how neighboring countries, like Kenya, are using their own court systems to the advantage of the rest of the world.",39,3,346,383,Jurisdiction; Law; Navy; Convention; Political science; Subject (documents); History; Computer science; Library science,,,,,,http://dx.doi.org/10.1017/s0731126500006259,,10.1017/s0731126500006259,,,0,005-166-417-199-767; 011-005-547-783-54X; 036-773-575-493-581; 121-102-113-403-979; 141-487-600-688-33X,0,false,, 063-520-461-748-455,Piracy As a Non-commercial Investment Risk and MIGA,,2010,journal article,Journal of Shiyan Technical Institute,,,,Tan Guang-fei,"Increasing frequency of ""piracy"" may cause impact and damage to private direct investment to foreign countries.As a global multilateral investment guarantee mechanism,MIGA is the best choice to deal with piracy in the area of investment because of its advantages.However,when MIGA provides guarantee service for investment injured by piracy,it will inevitably involve a number of problems.For this reason,the writer tries to make relevant recommendations.",,,,,Finance; Business; International trade; Investment (macroeconomics); Mechanism (sociology); Non commercial; Foreign direct investment; Service (economics); Financial risk,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-SYZJ201004013.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-SYZJ201004013.htm,,,2374716484,,0,,0,false,, 063-859-665-255-524,Pricing and pirate product market formation,2004-01-01,2004,journal article,Journal of Product & Brand Management,10610421,Emerald,United Kingdom,Theo Papadopoulos,"Explores the relationship between legitimate product pricing, copyright law enforcement and the formation of black markets for pirate products. The analytical framework is illustrated using the market for sound recordings as a case study. Investigates copyright owner strategies to combat piracy, including price discounting to establish a legitimate market and lobbying for increased enforcement and infringement penalties. An elementary regression model is employed to examine the empirical relationship between legitimate sound recording price, black market distribution channels and piracy. The empirical model supports the hypotheses that piracy is directly related to legitimate price and the size of black markets.",13,1,56,63,Product market; Economics; Microeconomics; Music industry; Market environment; Empirical relationship; Black market; Enforcement; Distribution (economics); Industrial organization; Discounting,,,,,https://vuir.vu.edu.au/1268/ http://www.emeraldinsight.com/doi/pdfplus/10.1108/10610420410523858 https://www.emerald.com/insight/content/doi/10.1108/10610420410523858/full/html http://eprints.vu.edu.au/1268/ https://core.ac.uk/display/10826924,http://dx.doi.org/10.1108/10610420410523858,,10.1108/10610420410523858,2038682926,,0,002-027-772-737-807; 006-907-877-133-007; 032-818-802-508-394; 111-851-448-578-178; 125-092-301-009-062; 139-157-527-606-014; 171-778-745-224-219,33,false,, 063-985-768-594-85X,National-Level Determinants of Global Music Piracy and Online Music Sales: An Exploratory Study,2014-01-02,2014,journal article,Journal of Global Information Technology Management,1097198x; 23336846,Informa UK Limited,United Kingdom,Saini Das; Arunabha Mukhopadhyay; Kallol Bagchi,"Piracy adversely affects online music sales. This article aims to investigate the factors that affect global music piracy directly and electronic business indirectly. These factors can be grouped into three categories: economic, legal/regulatory, and technological. On analyzing data from 68 countries, a country’s economic status and regulatory status emerge as the primary factors affecting music piracy. Technology indirectly affects music piracy by acting as a mediator between a nation’s economic status and the music piracy rate. Hence, a nation can reduce its music piracy rate and enhance e-business by devising stricter laws to safeguard intellectual property, punishing violations of information and communication technology related laws more strictly, allowing more free trade with other countries, inspiring attitudinal changes about inappropriate copying behavior through awareness campaigns, and encouraging increased and secure broadband usage.",17,1,6,25,Advertising; Business; Socioeconomic status; Marketing; Copying; Music piracy; Intellectual property; Free trade; Electronic business; Information and Communications Technology; Exploratory research,,,,,https://www.tandfonline.com/doi/full/10.1080/1097198X.2014.910988 https://www.tandfonline.com/doi/pdf/10.1080/1097198X.2014.910988,http://dx.doi.org/10.1080/1097198x.2014.910988,,10.1080/1097198x.2014.910988,2033749286,,0,004-148-371-925-982; 005-014-989-182-407; 005-726-118-137-649; 005-805-453-463-041; 006-466-564-041-24X; 007-473-910-949-501; 009-292-371-162-047; 009-951-353-757-924; 010-059-973-627-993; 010-854-534-444-434; 011-191-859-195-028; 011-373-379-515-317; 012-385-759-934-550; 012-558-297-950-849; 015-214-402-560-552; 015-266-295-564-99X; 016-403-634-914-929; 017-168-651-863-296; 022-509-785-910-67X; 025-882-454-923-868; 028-077-340-153-102; 028-615-356-511-184; 031-107-672-940-578; 033-485-482-315-713; 034-575-860-169-246; 038-534-382-454-214; 041-893-696-570-720; 042-057-592-838-529; 046-989-664-357-368; 049-813-154-354-036; 053-956-378-667-86X; 054-549-558-630-210; 056-010-340-136-061; 067-196-710-757-664; 080-208-184-106-680; 081-683-472-855-159; 087-947-492-346-989; 088-483-162-727-731; 094-975-964-418-891; 095-167-638-688-248; 107-250-046-589-490; 115-330-951-875-93X; 121-394-722-855-679; 140-730-249-077-646; 141-013-526-650-848; 141-047-753-905-965; 149-942-899-361-325; 153-552-384-031-475; 154-854-669-856-198; 162-331-341-062-164; 192-558-581-524-713,10,false,, 064-294-605-482-03X,The Law of Piracy: The Origins,,1988,journal article,International law studies,21546266,,,Alfred P. Rubin,,63,1,2,,Political science; Law; Law of war; Law of the sea,,,,,https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1766&context=ils https://digital-commons.usnwc.edu/ils/vol63/iss1/2/,https://digital-commons.usnwc.edu/ils/vol63/iss1/2/,,,3184976272,,0,,0,false,, 064-374-304-681-609,From Piracy on the High Seas to Piracy in the High Skies: A Study of Aircraft Hijacking,,1972,journal article,Cornell International Law Journal,00108812,,,Peter M. Jacobson,,5,2,161,188,Advertising; Business; International trade; International waters,,,,,https://scholarship.law.cornell.edu/cgi/viewcontent.cgi?article=1556&context=cilj https://scholarship.law.cornell.edu/cilj/vol5/iss2/3/,https://scholarship.law.cornell.edu/cilj/vol5/iss2/3/,,,846836559,,0,,0,false,, 064-616-988-230-073,"Breaks, Flows, and other in-between Spaces: Rethinking Piracy and Copyright Governance",,2006,journal article,Policy Futures in Education,14782103,SAGE Publications,United Kingdom,Shujen Wang,"This article uses three case studies to examine the intersecting developments of technology, capitalism, and globalization through the contradictions and paradoxes of copyright governance and piracy. China is used as a case study to investigate the relations among the state, law, and global capitalism.",4,4,410,420,Political economy; Economics; Social system; China; Globalization; State (polity); Computer software; Corporate governance; Capitalism; International law; Economic system,,,,,https://eric.ed.gov/?id=EJ795453 https://journals.sagepub.com/doi/10.2304/pfie.2006.4.4.410 http://pfe.sagepub.com/content/4/4/410.full.pdf+html http://journals.sagepub.com/doi/pdf/10.2304/pfie.2006.4.4.410 https://journals.sagepub.com/doi/pdf/10.2304/pfie.2006.4.4.410,http://dx.doi.org/10.2304/pfie.2006.4.4.410,,10.2304/pfie.2006.4.4.410,1893509929,,0,043-524-786-622-714; 087-891-577-187-155; 100-006-427-654-840; 123-231-186-122-434; 192-437-098-865-728,2,false,, 064-768-956-507-720,Human Aspects in Digital Rights Management: The Perspective of Content Developers,,2016,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Marcella Favale; Neil MacDonald; Shamal Faily; Christos Gatzidis,"Legal norms and social behaviours are some of the human aspects surrounding the effectiveness and future of DRM security. Further exploration of these aspects would help unravel the complexities of the interaction between rights protection security and law. Most importantly, understanding the perspectives behind the circumvention of content security may have a significant impact on DRM effectiveness and acceptance at the same time. While there has been valuable research on consumer acceptability (The INDICARE project, Bohle 2008, Akester 2009), there is hardly any work on the human perspective of content creators. Taking video games as a case study, this paper employs qualitative socio-legal analysis and an interdisciplinary approach to explore this particular aspect of content protection.",,,,,Internet privacy; Sociology; Work (electrical); Perspective (graphical); Content (Freudian dream analysis); Content security; Legal norm; Digital rights management,,,,,https://core.ac.uk/display/74204544 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2729199 https://core.ac.uk/download/74204544.pdf,http://dx.doi.org/10.2139/ssrn.2729199,,10.2139/ssrn.2729199,2268685003,,0,000-489-896-622-60X; 000-905-236-609-004; 003-564-285-388-005; 008-203-063-151-844; 008-750-557-965-576; 009-788-774-300-028; 014-237-918-766-135; 016-201-688-241-496; 020-927-385-784-474; 022-350-574-902-598; 027-361-210-226-483; 039-587-992-216-489; 040-693-557-169-475; 042-303-139-110-864; 057-512-593-590-218; 064-353-658-741-231; 077-029-861-861-092; 088-621-279-167-179; 098-367-735-464-882; 100-597-102-530-222; 108-523-632-602-94X; 131-669-188-430-584; 136-137-207-615-467; 183-609-427-733-219,0,true,,green 064-934-054-885-248,"Piracy, Trademark Protection and Anti-unfair Competition",,2003,journal article,Journal of Shanxi University,,,,Zhang Jian-hua,"Piracy, a behavior that attracts much attention in the law and international business field, can be regulated from the perspective of trademark law and anti-unfair competition law. By analyzing the relevant provisions of the trademark law and anti-unfair competition law and the relationship between them, and referring to the international treaty, the article makes a research on how to perfect the trademark protection in the anti-unfair competition law.",,,,,Business; International business; Law; Unfair competition; Competition law; Trademark; International treaty,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-SXDD200303016.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-SXDD200303016.htm,,,2363663165,,0,,0,false,, 065-088-364-229-402,"Cybercrimes in Nigeria: Analysis, Detection and Prevention",2016-09-30,2016,journal article,FUOYE Journal of Engineering and Technology,25790625; 25790617,"Faculty of Engineering, Federal University Oye-Ekiti",,Bolaji Omodunbi; Precious Odiase; O. M. Olaniyan; Adebimpe O. Esan,"Over the years, the alarming growth of the internet and its wide acceptance has led to increase in security threats. In Nigeria today, several internet assisted crimes known as cybercrimes are committed daily in various forms such as fraudulent electronic mails, pornography, identity theft, hacking, cyber harassment, spamming, Automated Teller Machine spoofing, piracy and phishing. Cybercrime is a threat against various institutions and people who are connected to the internet either through their computers or mobile technologies. The exponential increase of this crime in the society has become a strong issue that should not be overlooked. The impact of this kind of crime can be felt on the lives, economy and international reputation of a nation. Therefore, this paper focuses on the prominent cybercrimes carried out in the various sectorsin Nigeria and presents a brief analysis of cybercrimes in tertiary institutions in Ekiti-State. In conclusion, detection and prevention techniques are highlighted in order to combat cybercrimes in Nigeria .",1,1,,,Internet privacy; The Internet; Engineering; Spamming; Spoofing attack; Cybercrime; Pornography; Computer security; Identity theft; Phishing; Hacker,,,,,http://journal.engineering.fuoye.edu.ng/index.php/engineer/article/download/16/pdf https://engineering.fuoye.edu.ng/journal/index.php/engineer/article/download/16/pdf http://journal.engineering.fuoye.edu.ng/index.php/engineer/article/view/16 https://core.ac.uk/download/pdf/235186040.pdf,http://dx.doi.org/10.46792/fuoyejet.v1i1.16,,10.46792/fuoyejet.v1i1.16,2621930607,,0,024-496-616-601-772; 070-292-700-180-492,15,true,,gold 065-173-271-043-541,Organized crime: High seas piracy,,1998,journal article,Trends in Organized Crime,10844791; 19364830,Springer Science and Business Media LLC,United States,Sarah Gibbons,,3,4,84,85,International waters; Political science; Law; Organised crime; Criminology,,,,,https://link.springer.com/article/10.1007/s12117-998-1067-x https://link.springer.com/10.1007/s12117-998-1067-x,http://dx.doi.org/10.1007/s12117-998-1067-x,,10.1007/s12117-998-1067-x,2574736396,,0,,0,false,, 065-243-273-636-034,A Note on China's Legal and Operational Responses to International Piracy,,2013,journal article,Ocean Development & International Law,00908320; 15210642,Informa UK Limited,United Kingdom,Chi Manjiao,"This article reviews China's responses to international piracy from the legal perspective by looking at China's treaty practices with regard to piracy suppression, China's enhanced overseas naval escort operations, China's domestic antipiracy law in both substantive and procedural aspects, and piracy prosecution under Chinese law. Notwithstanding its contribution to the suppression of piracy, China has a need to improve its domestic laws for more efficient and effective piracy suppression.",44,1,113,122,Chinese law; Political science; China; Law; Perspective (graphical); Treaty,,,,,https://www.tandfonline.com/doi/full/10.1080/00908320.2013.750980 https://dspace.xmu.edu.cn/handle/2288/87523 https://core.ac.uk/display/41381545,http://dx.doi.org/10.1080/00908320.2013.750980,,10.1080/00908320.2013.750980,2116785523,,0,,0,false,, 065-749-092-221-399,STRENGTHENING INDONESIA’S ROLE IN INDIAN OCEAN THROUGH INDIAN OCEAN RIM ASSOCIATION CHAIRMANSHIP IN 2015-2017,2018-08-06,2018,journal article,Jurnal Pertahanan & Bela Negara,26207400; 26205262,Indonesia Defense University,,Ari Setiyanto,"Indonesian government concerned to determine the future of the Pacific and Indian Ocean Region through new vision as the world maritime fulcrum. The elected President, Joko Widodo realized the importance to strengthen the priority in maritime sector. Expanding globalization and growing needs of energy security leads Indian Ocean region as an important area for the global security. Regionalism has implications for both security and development in a region. Significant growth in Indian Ocean region urges a cooperation approach between littoral countries located around the Indian Ocean and lead the establishment of Indian Ocean Rim Association (IORA). As Indonesia will be a chairman in IORA by the third quarter of 2015, Indonesia can play an important role and influence the region with its chairmanship in IORA, both in terms of economy and security. Indonesia could develop a comprehensive maritime cooperation through the IORA. The cooperation will lead to acomplishment of the Indonesia’s national interests. On the other side,  the potential trade volume in the Indian Ocean region cannot be reached because of limited maritime infrastructure that facilitate the current trade. IORA should develop a master plan or blueprint on connectivity that will provide the infrastructure development agenda with the Public-Private Partnership to accelerate the infrastructure development. By this situation, the development of maritime infrastructure can be a double advantage for Indonesia because it will connect APEC and IORA. The important things to consider in terms of security is a potential threat both in security and defense if the government decided to open and build a deep seaport in Western Sumatera and Java Island.It is important to evaluate the potential threats and challenges if Indonesia wants to be a fulcrum ofworld maritime activity. Keywords : IORA, diplomacy, maritime security, regional integration, maritime fulcrum, regionalism",5,2,115,132,International trade; Political science; Globalization; Energy security; Maritime security; Regional integration; Iora; International security; Regionalism (international relations); Diplomacy,,,,,http://jurnal.idu.ac.id/index.php/JPBH/article/view/360/235 http://jurnal.idu.ac.id/index.php/JPBH/article/download/360/235 https://core.ac.uk/download/pdf/230516961.pdf,http://dx.doi.org/10.33172/jpbh.v5i2.360,,10.33172/jpbh.v5i2.360,2900734674,,0,,0,true,,gold 065-938-082-016-001,Piracy: A Treasure Box of Otherness,2020-11-01,2020,journal article,European Journal of International Law,09385428; 14643596,Oxford University Press (OUP),United Kingdom,Mickey Zar,"This article explores the connection between maritime and digital piracy, and pursues the thought that the common moniker is much more than rhetorical flourish. Golden Age maritime piracy (1650-1730) and today’s piracy in cyberspace are by no means identical; there is no one ideal form of piracy. And yet, pirates of the literal and virtual High Seas share a crucial feature: their social role as others. Piracy itself is a social function, its content is otherness. Dominant accounts of piracy note its character as a mode of resistance, but frame that resistance as either economic or political. Neither of these explanations of piracy’s resistance is sufficient on its own. The comparison of Golden Age maritime piracy with current digital piracy is telling, because what these two modes of piracy have in common is the way they highlight the relationship of capital and the state system. In other words, piracy’s political attack is not simply an assault on the idea of sovereignty, but rather a more specific critique of the way the system of sovereign states advances the interests of capital. The legal treatment of piracy, making it the pillar of universal jurisdiction, highlights the particular threat that piracy presents to the world order: the crime is political because it is an affront to the economic-political alliance that is capitalism, old or new.",31,4,1401,1428,International waters; Sovereign state; Political science; Sovereignty; Law and economics; Universal jurisdiction; Cyberspace; Capitalism; Capital (economics); Politics,,,,,https://academic.oup.com/ejil/article/31/4/1401/6136184,http://dx.doi.org/10.1093/ejil/chaa084,,10.1093/ejil/chaa084,3129606077,,0,,0,false,, 066-229-040-177-581,Mobile Phone Technology and Online Sexual Harassment among Juveniles in South Korea: Effects of Self-control and Social Learning,,,journal article,International Journal of Cyber Criminology,09742891,K. Jaishankar,India,Kyung-Shick Choi; Seong-Sik Lee; Jin Ree Lee,"Mobile phones are increasingly developing into a technology-based device that everyone is dependent on. While previous research has been extensive in examining different theoretical explanations for interpreting juvenile delinquency, research on mobile induced online sexual harassment among juvenile populations have been rather scarce and limited. As a result of this dearth, the present study employs a theoretical approach in rationalizing why juveniles commit online sexual harassment using their mobile phones. Elements from both social learning and self-control theories are used to assess the causes for online sexual harassment using mobile phones. By conducting binomial logistic regression analyses, this study finds that both social learning and low self-control components are salient factors in determining the causes of juvenile sexual harassment in cyberspace. From these findings, policies will be introduced to address the major causes of juvenile online sexual harassment using mobile phones",11,1,110,,Social learning theory; Psychology; Mobile phone; Harassment; Self-control; Social psychology; Social learning,,,,,https://vc.bridgew.edu/crim_fac/42/ https://zenodo.org/record/495776/files/Choietalvol11issue1IJCC2017.pdf https://www.questia.com/library/journal/1P4-1963103025/mobile-phone-technology-and-online-sexual-harassment https://zenodo.org/record/495776 https://vc.bridgew.edu/cgi/viewcontent.cgi?article=1043&context=crim_fac https://core.ac.uk/download/pdf/144776769.pdf,http://dx.doi.org/10.5281/zenodo.495776,,10.5281/zenodo.495776,2788252826,,0,,14,true,cc-by-nc-sa,gold 066-229-189-396-379,Review of Piracy and Law in the Ottoman Mediterranean,2019-06-01,2019,journal article,Middle East Quarterly,10739467,,,Raymond Ibrahim,,,,,,Ancient history; Mediterranean climate; History,,,,,https://www.meforum.org/58708/piracy-and-law-in-the-ottoman-mediterranean,https://www.meforum.org/58708/piracy-and-law-in-the-ottoman-mediterranean,,,2951671753,,0,,0,false,, 066-543-368-395-086,Three strikes law: a least cost solution to rampant online piracy,2010-03-23,2010,journal article,Journal of Intellectual Property Law & Practice,17471532; 17471540,Oxford University Press (OUP),,Charn Wing Wan,,5,4,232,244,Advertising; Business; Least cost; Computer security,,,,,http://jiplp.oxfordjournals.org/content/5/4/232.abstract https://academic.oup.com/jiplp/article/5/4/232/824697,http://dx.doi.org/10.1093/jiplp/jpq008,,10.1093/jiplp/jpq008,2095891180,,0,,7,false,, 066-794-564-330-382,Strengthening Indonesia’s Role In Indian Ocean Through IORA,2017-10-27,2017,journal article,Jurnal Pertahanan,25499459; 20879415,Indonesia Defense University,,Ari Setiyanto,"Indonesian government concerned to determine the future of the Pacific and Indian Ocean Region through new vision as the world maritime fulcrum. Significant growth in Indian Ocean region urges a cooperation approach between littoral countries located around the Indian Ocean and lead the establishment of Indian Ocean Rim Association (IORA). The cooperation will lead to the accomplishment of the Indonesia’s national interests. On the other side, the potential trade volume in the Indian Ocean region cannot be reached because of limited maritime infrastructure that facilitates the current trade. IORA should develop a master plan or blueprint on connectivity that will provide the infrastructure development agenda with the Public-Private Partnership to accelerate the infrastructure development. By this situation, the development of maritime infrastructure can be a double advantage for Indonesia because it will connect APEC and IORA. The important things to consider in terms of security is a potential threat both to security and defense if the government decided to open and build a deep seaport in Western Sumatera and Java Island.It is important to evaluate the potential threats and challenges if Indonesia wants to be a fulcrum of world maritime activity.",3,1,15,32,Business; Government; International trade; Blueprint; Iora; Indian ocean; Master plan; Trade volume; Indonesian government; General partnership,,,,,http://jurnal.idu.ac.id/index.php/DefenseJournal/article/download/156/112 http://jurnal.idu.ac.id/index.php/DefenseJournal/article/view/156 https://core.ac.uk/download/pdf/230516655.pdf,http://dx.doi.org/10.33172/jp.v3i1.156,,10.33172/jp.v3i1.156,2774338238,,0,010-933-217-930-581; 023-043-924-740-071; 059-292-545-273-702,2,true,cc-by-nc,gold 066-910-008-462-371,The Questionnaire on Piracy,,1926,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),United States,Edwin D. Dickinson,,20,4,750,752,,,,,,http://www.jstor.org/stable/2188696?origin=crossref,http://dx.doi.org/10.2307/2188696,,10.2307/2188696,2323225896,,0,,0,false,, 066-930-424-834-945,Software piracy rife in Latin America,,1997,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,1997,7,5,5,Computer science; Software; Computer security; Latin Americans,,,,,,http://dx.doi.org/10.1016/s1361-3723(97)89541-3,,10.1016/s1361-3723(97)89541-3,,,0,,0,false,, 067-051-728-992-235,IMPLEMENTASI PENEGAKAN KETENTUAN PIDANA TERHADAP PELANGGARAN HAK KEKAYAAN INTELEKTUAL REGIM HAK CIPTA,2018-04-20,2018,journal article,Yustitia,19789963,Universitas Wiralodra,,Dudung Indra Ariska,"Indonesia as an archipelago has a very rich diversity of cultural arts. This is in line with the diversity of ethnicity, trabs and religion as a whole is a national potential which needs to be protected. After the enactment of Law No. 19 of 2002, the creators in the field of literature and science received legal protection so that it is no longer turned off the creativity of its employees. Normatively, if there is piracy, the sanctions imposed are very severe, namely a seven-year prison sentence and / or a maximum fine of IDR 5,000,000,000.00 (five billion rupiah). In fact, piracy is still ongoing. The current development of piracy is due to law enforcement carried out by law enforcement officers in this case the police are not carried out thoroughly and thoroughly, or in other words run half-heartedly so that there is no single case of piracy in the film sector that can be used as jurisprudence",4,1,16,36,Political science; Law; Sanctions; Diversity (business); Law enforcement; Prison sentence; Legal protection; Cultural arts; Jurisprudence,,,,,https://yustitia.unwir.ac.id/index.php/yustitia/article/view/36 https://yustitia.unwir.ac.id/index.php/yustitia/article/download/36/38,http://dx.doi.org/10.31943/yustitia.v4i1.36,,10.31943/yustitia.v4i1.36,2997948830,,0,,0,true,cc-by,gold 067-245-740-210-879,"Vom Out-Law zum In-Law: Piraterie, Recht und Familie in Pirates of the Caribbean. Current Problems of Gypsy Studies/From Out-Law to In-Law: Piracy, Law and Family in Pirates of the Caribbean",,2011,journal article,Behemoth,21917582; 18662447,Walter de Gruyter GmbH,,Irmtraud Hnilica,,4,3,,,Law; History,,,,,,http://dx.doi.org/10.1515/behemoth.2011.023,,10.1515/behemoth.2011.023,2327824035,,0,,1,true,cc-by-nc-nd,gold 067-262-783-758-855,Interaction effects in software piracy.,,2007,journal article,Business Ethics: A European Review,09628770; 14678608,Wiley,United Kingdom,Eric K W Lau,"The paper presents an exploratory attempt to analyse self-reported leniency toward software piracy systematically, using an approach based on empirical factors, rather than ethical factors. The empirical factors studied were: (i) social acceptance of software piracy; (ii) the cost of original software; (iii) urgency of the subject's need for software; (iv) availability of original software; (v) knowledge of computer software copyright law; (vi) gender; (vii) monthly household income; and (viii) education level. It provides new insights to software companies and government officials who are developing programmes to promote the concept of anti-piracy among software consumers. This is also the first exploratory research to study the interaction effects among factors influencing the reported leniency towards software piracy, at the individual level.",16,1,34,47,Government; Economics; Marketing; Software; Household income; Computer software; Social acceptance; Copyright law; Individual level; Exploratory research,,,,,https://philpapers.org/rec/KINIEI https://dialnet.unirioja.es/servlet/articulo?codigo=2219900 https://papers.ssrn.com/sol3/Delivery.cfm?abstractid=955371 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=955371 https://onlinelibrary.wiley.com/doi/full/10.1111/j.1467-8608.2006.00467.x,http://dx.doi.org/10.1111/j.1467-8608.2006.00467.x,,10.1111/j.1467-8608.2006.00467.x,2146871802,,0,005-014-989-182-407; 007-559-358-394-991; 010-292-330-210-925; 018-516-475-127-664; 026-161-995-943-665; 029-159-571-119-302; 033-349-220-802-574; 036-576-410-271-494; 044-777-542-862-916; 045-107-783-519-194; 048-019-955-984-455; 056-353-538-684-770; 062-180-644-489-615; 063-862-591-134-240; 067-748-179-965-145; 069-632-609-683-067; 072-194-527-499-566; 087-114-507-795-511; 094-835-101-367-609; 098-912-574-320-570; 100-436-172-024-424; 114-556-841-480-844; 128-354-106-684-501; 138-334-704-586-850; 144-206-316-278-590; 147-777-072-867-660; 158-588-204-895-564; 159-365-844-214-235; 167-706-147-274-876; 184-875-292-712-645,20,false,, 067-445-377-706-074,Appraising the Impact of the Nigerian Copyright Act and Regulations in Combating Piracy in Nigeria,,2022,journal article,Beijing Law Review,21594627; 21594635,"Scientific Research Publishing, Inc.",,Uchechukwu Uguru; Moses C. Umobong,"Copyright Piracy is pervasive in Nigeria and consequently, it has affected the fortunes of copyright owners. The Copyright Act provides for anti-piracy measures in section 25 of the Act, which empowers the Nigerian Copyright Commission to make regulations to combat menace. Based on this power, the Copyright Commission has made regulations and adopted various measures to combat copyright piracy in Nigeria. This paper examined the impact of the Copyright Act anti-piracy measures and the copyright regulations on the war against piracy in Nigeria. It was found that the anti-piracy measures provisions of the Copyright Act and the regulations made pursuant to the Act have impacted positively on the fight against piracy particularly in the music and film industries where the Commission has successfully deployed litigation to hold violators accountable. Despite the positive impact, the paper also found that the efforts of the Commission to prevent piracy are inadequate, especially in the area of online/internet piracy where the Commission has not developed measures to prevent breach of copyright in the music industry. The paper recommended amongst others the strengthening of the anti-piracy measures under the Copyright Act and the proper training and equipment of the Nigerian Copyright Commission to enforce the Copyright Act.",13,2,247,264,Commission; Intellectual property; Business; Copyright Act; Law,,,,,,http://dx.doi.org/10.4236/blr.2022.132016,,10.4236/blr.2022.132016,,,0,012-088-714-180-889; 042-687-400-967-761; 044-671-107-179-72X; 051-346-551-428-205; 052-562-225-400-891; 073-649-661-122-975; 094-963-426-068-558; 117-892-583-865-240; 133-886-256-320-779,0,true,,gold 067-624-359-532-721,Multi-industry alliance to beat piracy,,1999,journal article,Computers & Security,01674048; 18726208,Elsevier BV,United Kingdom,,,18,7,595,595,Beat (acoustics); Alliance; Computer science; Computer security; Business; Aeronautics; Acoustics; Engineering; Law; Political science; Physics,,,,,,http://dx.doi.org/10.1016/s0167-4048(99)82015-x,,10.1016/s0167-4048(99)82015-x,,,0,,0,false,, 067-633-098-250-412,Ninth Circuit Rules Antiwhaling Group Engaged in Piracy,,2013,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),,,,107,3,666,668,,,,,,,http://dx.doi.org/10.1017/s0002930000011192,,10.1017/s0002930000011192,,,0,,0,false,, 067-706-721-291-908,Maritime Piracy and the Construction of Global Governance,2013-05-07,2013,journal article,,,Routledge,,Michael J. Struett; Jon D. Carlson; Mark T. Nance,"1: Constructing Pirates, Piracy, and Governance: An Introduction, Michael Struett and Mark Nance Section 1: Constructions through Law 2: Cicero's Ghost: Rethinking the Social Construction of Piracy, Harry Gould 3: A Global War on Piracy: International Law and the Use of Force Against Sea Pirates, Eric Heinze 4: Maritime Piracy and the Impunity Gap: Domestic Implementation of International Treaty Provisions, Yvonne Dutton Section 2: Constructions through Institutions 5. Security Communities, Alliances, and Macrosecuritization: The Practices of Counter-Piracy Governance, Christian Bueger and Jan Stockbruegger 6. Conflicting Constructions: Maritime Piracy and Cooperation under Regime Complexes, Mark Nance and Michael Struett 7. Frame, Humanitarianism, and Legitimacy: Explaining the Anti-Piracy Regime in the Gulf of Aden, Kevin McGahan and Terence Lee Section 3: Rethinking the Construction of Global Governance for Maritime Piracy 8. The limit(ation)s of International Society? The English School, Somali Pirates and the burdens of interpretation, Brent Steele 9. Conclusion, Bruce Cronin",67,2,15,,Political science; Law; Global governance; Use of force; Somali; Cicero; Impunity; Corporate governance; Legitimacy; International law,,,,,https://ci.nii.ac.jp/ncid/BB17899407 https://works.bepress.com/jondcarlson/30/1/download/ https://digital-commons.usnwc.edu/nwc-review/vol67/iss2/15/ https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1338&context=nwc-review https://www.taylorfrancis.com/books/e/9780203111550,http://dx.doi.org/10.4324/9780203111550,,10.4324/9780203111550,1520274513,,0,019-151-726-667-313; 037-041-896-615-773; 057-170-521-550-316; 060-564-404-094-593; 119-455-375-459-771; 134-080-637-398-856; 160-778-757-487-594; 175-554-611-078-394; 178-545-454-759-333; 179-829-784-044-841; 182-175-294-895-350; 186-847-595-824-112; 196-350-296-966-072,12,false,, 067-883-387-891-568,"Piracy, the Protection of Vital State Interests and the False Foundations of Universal Jurisdiction in International Law",2014-04-03,2014,journal article,Diplomacy & Statecraft,09592296; 1557301x,Informa UK Limited,United Kingdom,Matthew Garrod,"It is widely asserted by courts and in legal scholarship that for hundreds of years universal jurisdiction has applied to the crime of piracy. However, the alleged historical legal foundations of universality need challenge. The central argument of this analysis is that jurisdiction over “piracy” is better understood under the protective principle, which arose out of the necessity of maritime Powers roughly between the seventeenth and eighteenth centuries to protect certain of their vital interests, not least their overseas trade routes and colonial trade and settlements. It follows that there is a need to re-conceptualise jurisdiction over piracy as the protection of vital State interests shared by the international community, a concept misinterpreted as universal jurisdiction.",25,2,195,213,Human settlement; Political science; Law; Universal jurisdiction; State (polity); Jurisdiction; International community; Argument; Colonialism; International law,,,,,http://sro.sussex.ac.uk/id/eprint/57366/ https://researchportal.port.ac.uk/en/publications/piracy-the-protection-of-vital-state-interests-and-the-false-foun https://www.tandfonline.com/doi/abs/10.1080/09592296.2014.907060 https://researchportal.port.ac.uk/portal/files/1513867/GARROD_2014_cright_DS_Piracy_the_protection_of_vital_state_interests.pdf https://core.ac.uk/download/29587436.pdf,http://dx.doi.org/10.1080/09592296.2014.907060,,10.1080/09592296.2014.907060,1981947310,,0,,4,true,cc-by-sa,green 067-934-914-979-340,The impact and effectiveness of UNCLOS on counter-piracy operations,2016-01-27,2016,journal article,Journal of Conflict and Security Law,14677954; 14677962,Oxford University Press (OUP),United Kingdom,Tamsin Phillipa Paige,"The laws that criminalise piracy are well established, however, what is less clear is how these laws are being applied and the impact that they have in the world. This article addresses these questions primarily through a case study on Somali piracy, particularly the impact of direct criminal enforcement. The waning issue of Somali piracy was the first significant test of these laws since their entry into international law as a jus cogens norm in the mid-19th century. The case study relies primarily on qualitative data gathered through interviews with individuals engaged in enforcement through prosecution, investigation or prison services, conducted in the Seychelles in 2013. The examination parses the direct and indirect impact of these laws, concluding that they are ineffective in the context of direct enforcement of criminal law; however, their existence is has given rise to political engagements and the use of other legal regimes rendering them very effective in an indirect manner when piracy is addressed as a broader security issue.",22,1,97,123,Political science; United Nations Convention on the Law of the Sea; Norm (philosophy); Law; Criminal law; Somali; Enforcement; Context (language use); Prison; International law,,,,,http://academic.oup.com/jcsl/article-abstract/22/1/97/2453205 http://jcsl.oxfordjournals.org/content/early/2016/01/27/jcsl.krv028.abstract https://academic.oup.com/jcsl/article-abstract/22/1/97/2453205 http://dro.deakin.edu.au/view/DU:30118271 http://hdl.handle.net/10536/DRO/DU:30118271,http://dx.doi.org/10.1093/jcsl/krv028,,10.1093/jcsl/krv028,3124593033,,0,,1,false,, 067-984-283-608-644,Decoding Article 8 of the International Law Commission’s Articles on State Responsibility: Attribution of Cyber Operations by Non-State Actors,2016-09-25,2016,journal article,Journal of Conflict and Security Law,14677954; 14677962,Oxford University Press (OUP),United Kingdom,Kubo Mačák,"I would like to gratefully acknowledge the generous support of the Minerva Center for the Rule of Law under Extreme Conditions at the Faculty of Law and Department of Geography and Environmental Studies, University of Haifa, Israel and of the Israeli Ministry of Science, Technology and Space.",21,3,405,428,Attribution; Law; Commission; State (polity); Rule of law; State responsibility; Space (commercial competition); International law; Environmental studies,,,,,https://academic.oup.com/jcsl/article/21/3/405/2525375 http://academic.oup.com/jcsl/article-abstract/21/3/405/2525375 https://ore.exeter.ac.uk/repository/handle/10871/23129 https://core.ac.uk/display/77031583 https://ore.exeter.ac.uk/repository/bitstream/10871/23129/1/Macak%20-%20Decoding%20Article%208%20%2820%20March%202016%29.pdf https://core.ac.uk/download/77031583.pdf,http://dx.doi.org/10.1093/jcsl/krw014,,10.1093/jcsl/krw014,2517510945,,0,,8,true,,green 068-249-845-139-102,PIRATES OF THE SOUTH CHINA SEAS,2018-01-02,2018,journal article,Asian Affairs,03068374; 14771500,Informa UK Limited,United Kingdom,Martin Purbrick,Piracy has been endemic in the South China and surrounding seas for centuries. There is a long history of piracy waxing and waning depending on the political and economic situation in the region. T...,49,1,11,26,Economy; China; Economic situation; South china; Politics; History,,,,,https://www.tandfonline.com/doi/full/10.1080/03068374.2018.1416010,http://dx.doi.org/10.1080/03068374.2018.1416010,,10.1080/03068374.2018.1416010,2792829992,,0,,4,false,, 068-287-209-977-962,Record Piracy and Modern Problems of Innocent Infringement: A Comparative Analysis of United States and British Copyright Law,,1981,journal article,Santa Clara law review,01460315,,,Frank L. Fine,,21,2,357,,Comparative law; Political science; Law; Copyright infringement; Copyright law,,,,,https://digitalcommons.law.scu.edu/lawreview/vol21/iss2/3/ https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?article=2095&context=lawreview,https://digitalcommons.law.scu.edu/lawreview/vol21/iss2/3/,,,3023121667,,0,,0,false,, 068-418-497-707-226,Piracy in the Horn of Africa and its effects on the global supply chain,2010-09-14,2010,journal article,Journal of Transportation Security,19387741; 1938775x,Springer Science and Business Media LLC,Germany,Alexa K. Sullivan,"This article explores how maritime piracy impacts international business and disrupts the global supply chain. Piracy has increased exponentially near the Horn of Africa and this article examines the vessels attacked, methods of attack, and the types of weapons used by the Somali pirates. Evaluated are current anti-piracy measures that are used by commercial vessels to prevent and defend against pirate attacks. There is a symbiotic relationship between globalization and technology and if the increase in piracy continues, it will adversely disrupt this dependency.",3,4,231,243,Supply chain; Engineering; French horn; International trade; International business; Globalization; Somali; Maritime piracy; Poison control; Computer security; Supply chain management,,,,,https://www.safetylit.org/citations/index.php?fuseaction=citations.viewdetails&citationIds[]=citjournalarticle_479503_38 https://link.springer.com/article/10.1007/s12198-010-0049-9,http://dx.doi.org/10.1007/s12198-010-0049-9,,10.1007/s12198-010-0049-9,2049923933,,0,033-834-491-377-687; 075-374-324-914-018; 121-581-061-262-350; 122-740-834-718-041; 177-926-282-294-594; 189-260-364-703-563,24,false,, 068-725-791-569-573,Rightless Enemies: Schmitt and Lauterpacht on Political Piracy,2012-03-08,2012,journal article,Oxford Journal of Legal Studies,01436503; 14643820,Oxford University Press (OUP),United Kingdom,Walter Rech,,32,2,235,263,Political science; Law; Politics,,,,,http://ojls.oxfordjournals.org/content/32/2/235.abstract https://academic.oup.com/ojls/article-pdf/32/2/235/4348080/gqs001.pdf https://academic.oup.com/ojls/article-abstract/32/2/235/1511462,http://dx.doi.org/10.1093/ojls/gqs001,,10.1093/ojls/gqs001,2314596592,,0,,5,false,, 068-996-371-887-772,EVOLUTION OF ORGANIZATIONAL AND LEGAL COUNTERACTION TO PIRACY AT SEA,,2022,journal article,EURASIAN LAW JOURNAL,20734506,Eurasian Law Journal,,,,6,169,,,Business; Political science; Law and economics,,,,,,http://dx.doi.org/10.46320/2073-4506-2022-6-169-82-86,,10.46320/2073-4506-2022-6-169-82-86,,,0,,0,false,, 069-306-885-473-484,"Barry H. Dubner, The International Law of Sea Piracy, Developments in International Law, vol. II, Martinus Nijhoff Publ., The Hague 1980, XIII +76 pp.",,1984,journal article,Netherlands International Law Review,0165070x; 17416191,Springer Science and Business Media LLC,United Kingdom,P. V. McDade,,31,01,138,139,Political science; Law; International law,,,,,https://www.cambridge.org/core/journals/netherlands-international-law-review/article/barry-h-dubner-the-international-law-of-sea-piracy-developments-in-international-law-vol-ii-martinus-nijhoff-publ-the-hague1980-xiii-76-pp/B297EBC6067E163B427DA7AA5F4484AF http://journals.cambridge.org/abstract_S0165070X00013267,http://dx.doi.org/10.1017/s0165070x00013267,,10.1017/s0165070x00013267,1965610702,,0,,0,false,, 069-430-187-882-81X,Piracy rates still too high,,1997,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,1997,3,4,4,Computer science; Business; Computer security,,,,,,http://dx.doi.org/10.1016/s1361-3723(97)83566-x,,10.1016/s1361-3723(97)83566-x,,,0,,0,false,, 069-525-041-630-697,Using online tools to estimate the geographic and demographic profile of potential business software piracy in China,,2012,journal article,International Journal of Intellectual Property Management,14789647; 14789655,Inderscience Publishers,Switzerland,Kyle Hutzler; Katherine Linton,"This analysis attempts to illustrate geographic and demographic drivers of internet-enabled piracy in China using publicly available data on internet searches provided by Google and Baidu, China’s most prominent search engine. Using a basket of search terms selected because they appear to be reasonably associated with the piracy of business software, we find substantial regional variation in the propensity to conduct internet searches in China that are related to software piracy. Guangdong, Jiangsu, and Zhejiang provinces appear to be the locations with the largest amount of piracy-related internet searches, based on Google data. In other locations, particularly China’s western provinces, internet users appear substantially less likely to conduct piracy-related internet searches, even when the results are weighted to take into account lower internet populations. Based on Baidu data, our results also suggest that piracy-related searches are disproportionately performed by 20- to 29-year-old male college-educated students and by information technology (IT) workers. The approach described in this article may yield valuable insights on the demographic characteristics of internet piracy in China.",5,3/4,227,,Internet privacy; The Internet; Information technology; Demographic profile; China; Geography; Software; Intellectual property; Business software; Yield (finance),,,,,https://www.inderscienceonline.com/doi/full/10.1504/IJIPM.2012.049879 https://www.inderscience.com/link.php?id=49879,http://dx.doi.org/10.1504/ijipm.2012.049879,,10.1504/ijipm.2012.049879,3125490882,,0,014-082-506-216-299; 017-619-716-693-348; 023-062-004-155-746; 026-621-534-864-651; 027-763-914-268-501; 067-262-783-758-855; 103-047-934-034-494; 132-074-983-506-465; 167-706-147-274-876; 191-344-983-602-980,4,false,, 069-755-166-766-989,Maritime Piracy and the Impunity Gap: Insufficient National Laws or a Lack of Political Will?,,2011,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Yvonne M. Dutton,"Nations are not prosecuting piracy suspects with any regularity. One reason cited for this culture of impunity is the lack of domestic legislation to facilitate the prosecution of suspected pirates. But, what exactly is lacking: legislation or the political will to prosecute pirates? After all, universal jurisdiction over piracy has existed for more than 100 years. In addition, most nations are parties to the United Nations Convention on the Law of the Sea (UNCLOS) and the Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation (SUA Convention), both of which authorize and encourage nations to cooperate in prosecuting acts of maritime piracy. Given this legal framework, should we not expect that nations would have domestic laws criminalizing piracy and would use those laws to try the pirates they have gone to such lengths to capture? This article explores these questions by examining the domestic anti-piracy laws in about fifty states for which information is available in English. The analysis supports a conclusion that on the whole states lack the political will to share in the burden of prosecuting pirates since relatively few states have enacted comprehensive anti-piracy laws that include a framework for exercising universal jurisdiction over pirate attacks. The analysis also shows that the laws states have enacted may not be sufficient to allow for a successful prosecution for today’s pirates. Although states may have many reasons to sit back and wait for others to prosecute maritime piracy offenses, this Article concludes that all states must embrace their duty to share in the burden of prosecuting pirates, which means that all states must first pass the necessary domestic laws criminalizing maritime piracy.",,,,,Political science; United Nations Convention on the Law of the Sea; Law; Universal jurisdiction; Legislation; Duty; Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation; Impunity; Convention; Politics,,,,,https://papers.ssrn.com/sol3/Delivery.cfm?abstractid=1931870 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1931870 https://scholarworks.iupui.edu/handle/1805/4455,http://dx.doi.org/10.2139/ssrn.1931870,,10.2139/ssrn.1931870,1559606087,,0,,7,true,,green 070-794-086-458-334,Waterborne Crime: Examining Contemporary Piracy,2009-09-09,2009,journal article,Deviant Behavior,01639625; 15210456,Informa UK Limited,United Kingdom,Craig J. Forsyth; Kay H. Gisclair; York A. Forsyth,"This article examines modern piracy. Descriptive data from 1,683 narrative piracy reports from 2003 through 2007 were used. The following characteristics about each case of piracy were analyzed (for this article) within this period: date; type of victim/vessel; geographical sub-region; location (latitude/longitude); whether or not the vessel was boarded; whether or not the vessel was hijacked; whether or not any hostages were taken; whether or not there was a theft; how many injuries and deaths occurred; and whether or not the aggressor was apprehended. Factors that contribute to piracy and its continuation are discussed.",30,8,669,679,Narrative; Period (music); Computer security; Descriptive statistics; Criminology; History,,,,,https://www.tandfonline.com/doi/full/10.1080/01639620902797655,http://dx.doi.org/10.1080/01639620902797655,,10.1080/01639620902797655,2093375344,,0,017-415-073-786-983; 020-941-957-292-610; 047-561-435-012-103; 063-287-024-534-83X; 089-343-032-933-58X; 100-848-561-222-214,7,false,, 071-041-869-816-636,Uncharted Waters: The Private Sector's Fight Against Piracy on the High Seas,,2010,journal article,Brooklyn law review,00072362,,,Michael G. Scavelli,,76,1,8,,Advertising; Private sector; Business; International trade; International waters,,,,,https://brooklynworks.brooklaw.edu/blr/vol76/iss1/8/ https://brooklynworks.brooklaw.edu/cgi/viewcontent.cgi?article=1220&context=blr,https://brooklynworks.brooklaw.edu/blr/vol76/iss1/8/,,,2545707283,,0,,0,false,, 071-245-365-416-131,Firm turns China piracy into contract,,1996,journal article,Computers & Security,01674048,Elsevier BV,United Kingdom,Helen Meyer,,15,6,515,,Business; China; Market economy,,,,,http://www.sciencedirect.com/science/article/pii/0167404896901078#! http://linkinghub.elsevier.com/retrieve/pii/0167404896901078,http://dx.doi.org/10.1016/0167-4048(96)90107-8,,10.1016/0167-4048(96)90107-8,2000221298,,0,,0,false,, 071-268-348-082-071,Fighting Piracy with Censorship: The Operation in Our Sites Domain Seizures v. Free Speech,,2013,journal article,Journal of Intellectual Property Law,,,,Michael Joseph Harrell,,21,1,137,,Internet privacy; Domain (software engineering); Trademark; Free speech; Computer security; Computer science; Censorship,,,,,https://digitalcommons.law.uga.edu/jipl/vol21/iss1/6/,https://digitalcommons.law.uga.edu/jipl/vol21/iss1/6/,,,2294483135,,0,,0,false,, 071-368-568-746-51X,e-Government and the Cameroon cybersecurity legislation 2010: Opportunities and challenges,2012-12-15,2012,journal article,The African Journal of Information and Communication (AJIC),20777213; 20777205,"Wits School of Literature, Language and Media (SLLM)",,Patricia Ngeminang Asongwe,,,12,0,,Business; E-Government; Legislation; Public administration; Engineering ethics,,,,,https://wiredspace.wits.ac.za/handle/10539/19714?show=full https://core.ac.uk/download/188775844.pdf,http://dx.doi.org/10.23962/10539/19714,,10.23962/10539/19714,2287496130,,0,,5,true,cc-by,gold 071-461-348-492-788,Novell wages war on Israeli software piracy,,1999,journal article,Computers & Security,01674048,Elsevier BV,United Kingdom,Sandy Nichol,,18,4,339,,Political science; Software; Computer security,,,,,https://www.sciencedirect.com/science/article/pii/S0167404899907307,http://dx.doi.org/10.1016/s0167-4048(99)90730-7,,10.1016/s0167-4048(99)90730-7,2060434266,,0,,0,false,, 071-514-414-969-895,Dynamic injunctions against Internet intermediaries: An overview of emerging trends in India and Singapore,2019-12-30,2019,journal article,The Journal of World Intellectual Property,14222213; 17471796,Wiley,United Kingdom,Pratik P. Dixit,"Abstract The courts generally resort to website blocking injunctions to protect the rights of the content creators from digital piracy. However, merely disabling access to infringing websites does not necessarily ensure protection of copyright as there are dynamic ways of accessing an online location. The courts, therefore, have sought to develop new mechanisms to counter the menace of digital piracy. Recently, the Delhi High Court granted India's first dynamic injunction against Internet intermediaries to combat digital piracy in cinematographic works. A dynamic injunction would allow a plaintiff to extend the main injunction order against mirror websites providing access to the flagrantly infringing online locations that were the subject of the main injunction. This note primarily aims to analyse the concept of dynamic injunctions. The author examines and compares the Indian position to that in Singapore to highlight the different trends that have emerged with respect to dynamic injunction. The principal conclusion is that, despite the near similarities of the dynamic injunctions issued by the courts in the two countries, the dynamic injunction issued by the Indian court seeks to effectively protect the rights of the website operators as it affords constant judicial supervision.",23,1,65,74,The Internet; Intermediary; Business; Order (exchange); Position (finance); Law; High Court; Principal (commercial law); Intellectual property; Plaintiff,,,,,https://onlinelibrary.wiley.com/doi/abs/10.1111/jwip.12140 https://dialnet.unirioja.es/servlet/articulo?codigo=7268279,http://dx.doi.org/10.1111/jwip.12140,,10.1111/jwip.12140,2996760323,,0,005-489-014-814-100; 013-936-906-537-569; 023-993-728-429-357; 051-166-901-667-17X; 057-423-487-956-39X; 070-387-433-147-234; 077-628-388-396-328; 089-129-517-178-255; 106-122-728-761-785; 117-503-843-250-356; 119-024-852-222-327; 190-835-443-859-195,0,false,, 071-585-022-678-261,Attempts to Codify the International Law of Piracy within the Framework of the League of Nations,2012-01-21,2012,journal article,Polish Review of International and European Law,25447432; 22992170,Uniwersytet Kardynala Stefana Wyszynskiego,,Zbigniew B. Rudnicki,,1,1-2,91,105,Political science; Law and economics; Law; League; International law,,,,,http://czasopisma.uksw.edu.pl/index.php/priel/article/view/1154/0,http://dx.doi.org/10.21697/priel.2012.1.1.04,,10.21697/priel.2012.1.1.04,2612181990,,0,,0,true,,bronze 071-891-483-853-400,Russian Media Piracy in the Context of Censoring Practices,,2015,journal article,International Journal of Communication,19328036,,,Kiriya Iliya; Sherstoboeva Elena,"This article suggests that media piracy in Russia is a cultural phenomenon caused largely by long-standing state ideological pressures. It also questions the common approach that considers the issue of piracy in economic or legal terms. In Russia, piracy historically concerned not only copyright issues but also censoring practices, and the sharing of pirated content is a socially acceptable remnant of Soviet times. This article uses an institutional approach to show how state anticopyright policy was used in the Soviet era to curtail freedom of speech. Analysis of the new antipiracy law reveals that current state policy intended to protect copyright may also be used to control content; moreover, this analysis concludes that the new policy is not likely to curb piracy.",9,1,839,851,Censoring (clinical trials); Ideology; Economics; Law and economics; Law; Control (management); State (polity); Context (language use); Institutional approach; State policy; Censorship,,,,,https://scholars.cityu.edu.hk/en/publications/russian-media-piracy-in-the-context-of-censoring-practices(c542394b-839d-42a3-9881-bcb803ef4fe1).html https://publications.hse.ru/articles/134866458,https://scholars.cityu.edu.hk/en/publications/russian-media-piracy-in-the-context-of-censoring-practices(c542394b-839d-42a3-9881-bcb803ef4fe1).html,,,2355862277,,0,007-626-305-671-227; 012-423-566-529-14X; 012-780-465-338-956; 026-621-534-864-651; 052-427-942-541-900; 054-602-360-522-601; 073-735-192-497-168; 079-307-523-131-986; 085-682-470-860-705; 091-186-981-848-833; 105-508-059-510-414; 120-186-515-061-451; 120-246-404-976-132; 126-414-855-843-353; 153-516-313-692-85X; 157-113-203-414-911; 160-590-940-346-090; 186-153-303-697-830; 195-483-056-513-210,4,true,cc-by-nc-nd,gold 072-029-150-499-494,Relevance of International Criminal Law to Piracy in Asian waters,,2004,journal article,Maritime Studies,07266472; 08102597,Informa UK Limited,,Edward N. Eadie,,2004,136,21,33,Relevance (law); Political science; Law; Criminal law,,,,,http://www.tandfonline.com/doi/abs/10.1080/07266472.2004.10878744,http://dx.doi.org/10.1080/07266472.2004.10878744,,10.1080/07266472.2004.10878744,286284580,,0,,2,false,, 072-084-774-976-983,Digital Piracy: Assessing the Contributions of an Integrated Self‐Control Theory and Social Learning Theory Using Structural Equation Modeling,,2006,journal article,Criminal Justice Studies,1478601x; 14786028,Informa UK Limited,United Kingdom,George E. Higgins; Brian D. Fell; Abby L. Wilson,"Digital piracy is an emerging white‐collar crime that requires empirical investigation. Using a nonrandom sample of 392 university undergraduates, the present study examined how self‐control theory and social learning theory come together to explain digital piracy. The findings revealed that low self‐control and social learning theory could come together in different ways to explain digital piracy. That is, out of five models examined, the findings revealed that social learning theory partially mediated the effect that self‐control had on digital piracy. Implications of these findings are also discussed.",19,1,3,22,Social learning theory; Psychology; Digital piracy; Self-control; Sample (statistics); Structural equation modeling; Social psychology,,,,,https://www.tandfonline.com/doi/abs/10.1080/14786010600615934,http://dx.doi.org/10.1080/14786010600615934,,10.1080/14786010600615934,2095441871,,0,003-828-680-029-252; 004-661-719-279-959; 005-136-753-965-857; 006-465-773-786-673; 009-294-953-134-547; 009-984-166-362-338; 010-124-924-045-274; 010-292-330-210-925; 013-545-106-760-422; 014-082-506-216-299; 018-819-348-464-72X; 020-973-534-331-792; 021-147-681-624-407; 021-581-207-965-265; 022-466-358-171-211; 022-634-145-782-991; 023-906-216-969-247; 027-240-896-003-442; 028-549-386-742-28X; 028-615-356-511-184; 031-480-472-677-985; 032-658-891-951-899; 032-888-443-351-535; 034-374-497-430-612; 039-694-917-895-93X; 041-756-193-271-330; 041-891-384-512-506; 042-143-102-272-982; 046-989-664-357-368; 052-519-517-658-380; 055-277-965-963-485; 057-717-174-338-850; 061-246-670-613-627; 062-850-626-837-137; 066-124-129-788-062; 067-339-005-241-596; 069-633-802-438-279; 070-660-090-646-684; 071-715-854-040-546; 074-233-198-758-572; 075-206-405-175-082; 078-449-241-037-227; 084-991-506-273-426; 091-442-836-589-45X; 092-123-502-721-527; 096-401-039-718-213; 096-762-470-199-768; 098-570-250-639-553; 099-342-173-833-089; 101-108-234-017-881; 102-635-628-220-584; 104-904-305-990-328; 116-760-844-878-63X; 116-953-447-460-185; 122-847-477-478-149; 125-894-267-538-829; 127-945-112-133-405; 128-354-106-684-501; 129-181-608-160-998; 150-021-302-220-052; 159-296-642-285-178; 164-283-046-147-287; 170-862-671-156-203; 175-905-268-229-256; 175-940-530-591-247; 178-091-174-583-771,147,false,, 072-157-245-005-73X,Sixteen Years after the Passage of the U.S. Semiconductor Chip Protection Act: Is International Protection Working,,,journal article,Berkeley Technology Law Journal,10863818,,,Leon Radomsky,"Sixteen years ago, the U.S. Congress passed the Semiconductor Chip Protection Act (""SCPA"") in an attempt to provide national protection from chip piracy to U.S. chip manufacturers and encourage international efforts to reduce chip piracy worldwide. In this Article, the author evaluates the SCPA's effectiveness. The author concludes that the Act has influenced foreign legislation and international treaty provisions, but has provided virtually no real chip protection. Instead, technological advances, market changes, and improvements in industry practice have protected chip manufacturers from chip piracy. Before reaching his conclusion, the author describes the origins of the SCPA and gives an overview of the Act, including general provisions and a criticism of the protected subject matter's scope. The author then compares foreign chip protection acts and international chip provisions with the SCPA, arguing that worldwide chip piracy has declined mostly for reasons unrelated to foreign chip legislation. While changes in technology and the market have mostly rendered chip protection laws obsolete in technologically advanced nations, the author concludes by hinting that such laws might be helpful in less technologically developed nations.",15,3,1049,,Business; Law and economics; Legislation; Scope (project management); Semiconductor chip; International treaty; Subject matter; Telecommunications; Criticism,,,,,https://scholarship.law.berkeley.edu/btlj/vol15/iss3/4/ https://lawcat.berkeley.edu/record/1117225/files/fulltext.pdf http://lawcat.berkeley.edu/record/1117225/files/fulltext.pdf http://scholarship.law.berkeley.edu/btlj/vol15/iss3/4/,http://dx.doi.org/10.15779/z38jh4w,,10.15779/z38jh4w,85155928,,0,,6,false,, 072-843-470-380-237,Finding out the 'Achilles' Heels': Piracy Suppression under International Law and Chinese Law,2012-05-30,2012,journal article,Journal of East Asia and International Law,19769229; 22879218,Yijun Institute of International Law,South Korea,Manjiao Chi,,5,1,1,1,Law; Political science,,,,,,http://dx.doi.org/10.14330/jeail.2012.5.1.01,,10.14330/jeail.2012.5.1.01,,,0,,0,true,cc-by-nc,hybrid 073-510-087-842-874,A ‘criminal personas’ approach to countering criminal creativity,2006-10-09,2006,journal article,Crime Prevention and Community Safety,14603780; 17434629,Springer Science and Business Media LLC,United Kingdom,Kevin Hilton; Alastair Irons,"This paper describes a pilot study of a “criminal personas” approach to countering criminal creativity. The value of the personas approach has been assessed by comparing the identification of criminal opportunity, through “traditional” brainstorming and then through “criminal personas” brainstorming. The method involved brainstorm sessions with Computer Forensics Practitioners and with Product Designers, where they were required to generate criminal scenarios, select the most serious criminal opportunities, and propose means of countering them. The findings indicated that there was merit in further research in the development and application of the “criminal personas” approach. The generation of criminal opportunity ideas and proposal of counter criminal solutions were both greater when the brainstorm approach involved the group responding through their given criminal personas.",8,4,248,259,Creativity; Brainstorming; Psychology; Crime prevention; Fear of crime; Poison control; Persona; Public relations; Civil law (common law); Computer forensics,,,,,https://link.springer.com/content/pdf/10.1057%2Fpalgrave.cpcs.8150027.pdf http://nrl.northumbria.ac.uk/1472/1/A%20%E2%80%98Criminal%20Personas%E2%80%99%20Approach%20to%20Countering%20Criminal%20Creativity.pdf https://researchportal.northumbria.ac.uk/en/publications/a-criminal-personas-approach-to-countering-criminal-creativity https://link.springer.com/article/10.1057%2Fpalgrave.cpcs.8150027 https://sure.sunderland.ac.uk/id/eprint/1660/ https://core.ac.uk/display/5892099 https://northumbria-test.eprints-hosting.org/id/document/264946 http://nrl.northumbria.ac.uk/1472/ https://core.ac.uk/download/4147249.pdf,http://dx.doi.org/10.1057/palgrave.cpcs.8150027,,10.1057/palgrave.cpcs.8150027,1996223519,,0,000-817-486-678-475; 002-741-526-422-584; 012-447-533-377-748; 030-140-230-756-253; 032-851-225-517-761; 042-178-112-531-343; 044-551-356-866-110; 046-921-662-261-37X; 049-559-825-531-099; 054-600-516-205-380; 058-258-440-575-178; 061-952-652-627-281; 071-027-978-673-311; 076-509-330-487-771; 081-629-608-065-133; 091-074-146-228-650; 119-113-819-818-430; 121-140-777-839-393; 128-811-038-738-475; 141-115-848-443-427; 148-185-991-983-037; 167-468-288-819-322,4,true,,green 073-649-661-122-975,Book Piracy in Nigeria: Issues and Strategies,,2014,journal article,The Journal of Academic Librarianship,00991333,Elsevier BV,United Kingdom,Christopher Nkiko,"Abstract Book piracy is an illegal and illegitimate reproduction of other people's intellectual property for economic reasons without prior consent or authorization. This paper examines the intricate dimension of book piracy in the Nigerian Publishing Industry. It notes the dangers the trend portends to qualitative education and scholarship in general. The paper identifies the different forms of book piracy as: local reproduction of fast moving titles using newsprint or poor textured paper, abuse of publication rights, hi-tech reproduction overseas, circumventing the e-book version, illegal reprography, unauthorized excessive production by printers, and translation without permission. Some of the causes of book piracy are poverty, book scarcity, ignorance of the copyright laws by the public and the uncooperative attitude of some countries in endorsing international treaties on intellectual property rights. The paper recommends the following as panacea to stemming the tide of the menace: cost reduction strategies, national book policy and commissioning of local authorship, awareness and enforcement of copyright laws, revitalization of libraries, sanctions on countries showing complacency towards piracy, special algorithms to detect illegal downloads, security printing devices and moral suasion.",40,3,394,398,Scarcity; Sociology; Publishing; Law; Panacea (medicine); Scholarship; Sanctions; Enforcement; Intellectual property; Reprography,,,,,https://www.sciencedirect.com/science/article/pii/S0099133313001171 https://core.ac.uk/display/79124590 http://eprints.covenantuniversity.edu.ng/7213/ http://www.sciencedirect.com/science/article/pii/S0099133313001171 https://core.ac.uk/download/322349119.pdf,http://dx.doi.org/10.1016/j.acalib.2013.09.005,,10.1016/j.acalib.2013.09.005,2029069163,,0,060-225-239-248-811; 102-089-600-071-040; 193-567-112-001-216,12,true,, 073-659-399-662-253,If Words Could Kill: Can the Government Regulate Any Online Speech?,2011-06-15,2011,journal article,Pittsburgh Journal of Environmental and Public Health Law,21647976,"University Library System, University of Pittsburgh",,Laura Pontzer,"From the inception of American jurisprudence, an individual’s right to freedom of speech and expression guaranteed by the First Amendment to the United States Constitution 1 has been given some of the strongest protection available. 2 The most celebrated legal minds in American history have consistently advocated the necessity of an open and honest exchange of ideas as fundamental to democratic society, 3 even when the ideas expressed may be unpopular or of little value. 4 Nonetheless, it is equally well-established that not all speech is protected, particularly where the speech in question poses a threat to public order. 5 Although First Amendment law continues to evolve, the media available to Americans wishing to express their ideas seem to be evolving exponentially faster, particularly in the forum provided by the Internet. 6 Indeed, the vast expansion and availability of Internet media seem to continually outstrip the much more gradual evolution of the law, not only in the United States but worldwide.",5,2,,,The Internet; Sociology; Government; Law; Constitution; Value (ethics); Expression (architecture); Public order; Democracy; Jurisprudence,,,,,http://pjephl.law.pitt.edu/ojs/index.php/pjephl/article/view/27 http://pjephl.law.pitt.edu/ojs/index.php/pjephl/article/download/27/27 http://d-scholarship.pitt.edu/17771/1/27%2D53%2D1%2DSM.pdf http://d-scholarship.pitt.edu/17771/ https://core.ac.uk/download/pdf/296286589.pdf,http://dx.doi.org/10.5195/pjephl.2011.27,,10.5195/pjephl.2011.27,2047942093,,0,,1,true,cc-by-nc-nd,hybrid 073-718-997-266-549,International Law—Piracy Iure Gentium—Actual Robbery not an Essential Element,,1935,journal article,The Cambridge Law Journal,00081973; 14692139,Cambridge University Press (CUP),United Kingdom,null C. H. L.,,5,3,395,396,Element (criminal law); Political science; Law; Law and economics; Economics,,,,,,http://dx.doi.org/10.1017/s000819730012478x,,10.1017/s000819730012478x,,,0,,0,false,, 073-738-879-896-476,An exploratory analysis of software piracy using cross-cultural data,,2004,journal article,International Journal of Technology Management,02675730; 17415276,Inderscience Publishers,United Kingdom,Lee Chadwick Simmons,"This study examines three cultural predictors of attitude towards software piracy: Long Term Orientation, Power Distance and Individualism-Collectivism. About 80 University students in each of five countries (Australia, Hong Kong, Singapore, Taiwan and USA) were surveyed on their attitude towards piracy and their level of the three constructs. The data shows that the three constructs are significant predictors of attitude towards piracy. Long Term Orientation is shown to be a strong predictor.",28,1,139,,Advertising; Psychology; Cross-cultural; Software; Orientation (mental); Shame; Exploratory analysis; Individualism collectivism; Term (time); Hofstede's cultural dimensions theory; Social psychology,,,,,https://www.inderscienceonline.com/doi/abs/10.1504/IJTM.2004.005058,http://dx.doi.org/10.1504/ijtm.2004.005058,,10.1504/ijtm.2004.005058,2013657089,,0,175-602-270-496-697,9,false,, 074-095-993-544-028,"1995 Agreement regarding Intellectual Property Rights between China and the United States: Promises for International Law or Continuing Problems with Chinese Piracy, The",,1996,journal article,Tulsa Journal of Comparative and International Law,1073192x,,,Frank Prohaska,,4,1,169,,Political science; China; Law; Agreement; Intellectual property; International law,,,,,http://digitalcommons.law.utulsa.edu/cgi/viewcontent.cgi?article=1110&context=tjcil https://digitalcommons.law.utulsa.edu/cgi/viewcontent.cgi?article=1110&context=tjcil,http://digitalcommons.law.utulsa.edu/cgi/viewcontent.cgi?article=1110&context=tjcil,,,970400614,,0,,0,false,, 074-108-720-397-923,"Book Review: The Law and Practice of Piracy at Sea: European and International Perspectives , by Panos Koutrakos and Achilles Skordas. (Oxford: Hart Publishing, 2014)",2015-12-01,2015,journal article,Common Market Law Review,01650750,,,Roberto Virzo,"Roberto Virzo reviews The Law and Practice of Piracy at Sea: European and International Perspectives, by Panos Koutrakos and Achilles Skordas.",52,6,1717,1719,Publishing; Human rights; Political science; Law; Law of the sea,,,,,https://iris.unisannio.it/handle/20.500.12070/6781,https://iris.unisannio.it/handle/20.500.12070/6781,,,3124854855,,0,,0,false,, 074-490-398-716-059,"In Code, We Trust? Regulation and Emancipation in Cyberspace",2004-12-15,2004,journal article,SCRIPT-ed,17442567,Wiley,,Zhu Chenwei,,1,4,585,610,Code (cryptography); Emancipation; Cyberspace; Computer security; Computer science,,,,,https://www.research.ed.ac.uk/portal/files/18457602/Zhu_In_Code_We_Trust.pdf http://www.law.ed.ac.uk/ahrb/script-ed/issue4/zhu.asp https://core.ac.uk/download/28973644.pdf,http://dx.doi.org/10.2966/scrip.010404.585,,10.2966/scrip.010404.585,2133963300,,0,038-882-555-942-306,0,true,cc-by-nc-nd,gold 074-639-585-311-228,Internet users sued for software piracy,,1996,journal article,Computers & Security,01674048,Elsevier BV,United Kingdom,Helen Meyer,,15,8,688,,Internet privacy; Software; Internet users; Computer security; Computer science,,,,,http://www.sciencedirect.com/science/article/pii/S0167404897897155 https://www.sciencedirect.com/science/article/pii/S0167404897897155,http://dx.doi.org/10.1016/s0167-4048(97)89715-5,,10.1016/s0167-4048(97)89715-5,2037393963,,0,,0,false,, 074-664-251-749-865,Ninth Circuit Rules Antiwhaling Group Engaged in Piracy,,2013,journal article,American Journal of International Law,00029300,,,John R. Crook,,107,3,666,668,Mathematics education; Psychology; Ninth; Group (periodic table),,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=5235568,https://dialnet.unirioja.es/servlet/articulo?codigo=5235568,,,2273693452,,0,,0,false,, 074-786-431-347-631,Economics of digital piracy,,2009,journal article,Information Economics and Policy,01676245; 18735975,Elsevier BV,Netherlands,,,21,2,169,169,Economics; Econometrics; Industrial organization; Microeconomics,,,,,,http://dx.doi.org/10.1016/j.infoecopol.2009.04.003,,10.1016/j.infoecopol.2009.04.003,,,0,,0,true,,bronze 075-109-043-564-632,An insight into piracy prosecutions in the Republic of Seychelles,2015-04-03,2015,journal article,Commonwealth Law Bulletin,03050718; 17505976,Informa UK Limited,United Kingdom,Anthony Francis Tissa Fernando,"The article concentrates on the several legal issues that have come up in piracy trials before the Supreme Court in relation to jurisdiction, human rights, joint and secondary party liability, attempts, mens rea, presumption of piracy from those found cruising the high seas with weapons and sentencing. The article also deals with factual issues in relation to determining; the identity, age, nationality of accused and time of attack due to different time zones, placing reliance on GPS, video, photographic and hearsay evidence and use of system evidence from the common pattern followed by a typical piracy action group.",41,2,173,212,Mens rea; International waters; Human rights; Political science; Law; Jurisdiction; Liability; Supreme court; Hearsay; Presumption,,,,,https://www.tandfonline.com/doi/abs/10.1080/03050718.2015.1067631,http://dx.doi.org/10.1080/03050718.2015.1067631,,10.1080/03050718.2015.1067631,2298250989,,0,,1,false,, 075-138-522-296-711,Doing Europe: agency and the European Union in the field of counter-piracy practice,2016-10-31,2016,journal article,European Security,09662839; 17461545,Informa UK Limited,,Christian Bueger,"The practice turn provides new avenues for core questions of international relations and European Studies. This article draws on a practice theoretical account to shed new light on the constitution of agency in global politics. An understanding of agency as achievement that requires significant practical work and the participation in international fields of practice is developed. Drawing on the case of the field of counter-piracy practice and the European Union’s (EU’s) work to counter piracy off the coast of Somalia, it is shown how the EU achieved the position as a core actor in the field. A detailed discussion of the EU’s work in interrupting and knowing piracy, in building capacity, and in governing piracy is provided.",25,4,407,422,Agency (sociology); Political science; European studies; Law and economics; European integration; Law; Practice theory; Constitution; European union; International relations; Global politics,,,,Economic and Social Research Council,https://orca.cardiff.ac.uk/91013/ https://core.ac.uk/display/74221764 https://www.tandfonline.com/doi/full/10.1080/09662839.2016.1236020 https://www.tandfonline.com/doi/pdf/10.1080/09662839.2016.1236020 https://orca.cf.ac.uk/91013/ https://core.ac.uk/download/74221764.pdf,http://dx.doi.org/10.1080/09662839.2016.1236020,,10.1080/09662839.2016.1236020,2489243089,,0,008-715-132-937-576; 010-222-780-574-191; 012-405-416-232-261; 021-126-808-101-29X; 022-530-032-621-140; 025-710-440-691-436; 028-415-465-282-230; 028-494-778-454-45X; 038-460-681-244-138; 041-312-331-027-153; 049-640-335-145-361; 055-365-631-057-706; 058-631-969-266-271; 060-079-250-632-475; 061-375-258-043-862; 063-332-464-590-608; 073-465-989-635-620; 078-517-831-170-337; 079-590-039-904-007; 083-101-894-630-697; 099-372-184-236-850; 101-480-829-170-085; 108-213-645-249-985; 111-899-623-862-575; 120-033-617-967-96X; 136-912-457-311-823; 137-396-191-698-685; 143-676-583-717-340; 153-550-090-817-422; 165-640-649-974-213; 184-442-594-336-055,41,true,cc-by,hybrid 075-608-377-863-313,Prosecuting Pirates: Maritime Piracy and Indonesian Law,2019-06-03,2019,journal article,The Australian Journal of Asian Law,18394191,,,J. Fenton Adam; Ioannis Chapsos,,19,2,4,,Political science; United Nations Convention on the Law of the Sea; Law; Maritime security; Indonesian; Maritime piracy,,,,,https://pureportal.coventry.ac.uk/en/publications/prosecuting-pirates-maritime-piracy-and-indonesian-law,https://pureportal.coventry.ac.uk/en/publications/prosecuting-pirates-maritime-piracy-and-indonesian-law,,,3123926985,,0,,1,false,, 076-057-604-161-193,Міжнародні організації у боротьбі з піратством,2019-12-20,2019,journal article,Міжнародний науковий вісник,22185348,Uzhhorod National University,,Анатолій Мишко,"The article examines the role of international organizations in the fight against piracy as an international crime. The author determines the relevance of this problem and emphasizes the need to study the experience of fighting and counteracting this international crime within the framework of multinational cooperation. The author concludes that the development of relevant international standards of piracy, their enshrining in a comprehensive international treaty, resolutions of international organizations with the appropriate will of states should lead to the unification of state laws, the same approach to piracy around the world and thereby increase the effectiveness of countering piracy.",0,1-2(19-20),230,244,Multinational corporation; Relevance (law); Political science; Law and economics; State (polity); International treaty; Unification,,,,,http://visnyk-international.uzhnu.edu.ua/article/view/197117 http://visnyk-international.uzhnu.edu.ua/article/download/197117/197284,http://dx.doi.org/10.24144/2218-5348.2019.1-2(19-20).230-244,,10.24144/2218-5348.2019.1-2(19-20).230-244,3010990744,,0,083-094-211-952-871; 164-500-932-642-192,1,true,,bronze 076-223-490-956-051,PEMBANGUNAN KEKUATAN TNI AL DALAM RANGKA MENDUKUNG VISI INDONESIA SEBAGAI POROS MARITIM DUNIA,2018-08-06,2018,journal article,Jurnal Pertahanan & Bela Negara,26207400; 26205262,Indonesia Defense University,,Ade Supandi,"Sejak awal pemerintahan Presiden Joko Widodo telah berkomitmen untuk mengembalikan kejayaan maritim Indonesia. Pemerintah Indonesia telah meningkatkan pembangunan sektor maritim yang diharapkan dapat mendorong pertumbuhan ekonomi dan kesejahteraan rakyat Indonesia. Pemerintah Indonesia juga berupaya untuk mengoptimalkan posisi geografis Indonesia sebagai jalur perdagangan laut dunia ( Sea Lines of Trade /SLOT) untuk mewujudkan Indonesia sebagai poros pelayaran dan perdagangan dunia. Konsekuensinya adalah bahwa Indonesia harus menyediakan infrastruktur dan layanan, serta keamanan dan keselamatan maritim sesuai dengan standar internasional di wilayah Indonesia. Pada akhirnya, hal tersebut akan menuntut kemampuan TNI AL dalam memantau, mengontrol, melindungi keamanan maritim, dan kemampuan penegakan hukum untuk mewujudkan ketertiban di laut, serta perlindungan terhadap kedaulatan, aset, dan kepentingan maritim Indonesia. Untuk mencapai tujuan ini, TNI AL secara berkesinambungan mengembangkan kekuatan untuk mendukung pembangunan kelautan Indonesia. Kata Kunci: kejayaan maritim, keamanan maritim, pembangunan kekuatan TNI AL",5,2,1,24,,,,,,http://jurnal.idu.ac.id/index.php/JPBH/article/download/355/230 http://jurnal.idu.ac.id/index.php/JPBH/article/view/355 https://core.ac.uk/download/pdf/230516998.pdf,http://dx.doi.org/10.33172/jpbh.v5i2.355,,10.33172/jpbh.v5i2.355,2899791771,,0,,1,true,,gold 076-242-326-999-782,Three-Level Mechanism of Consumer Digital Piracy: Development and Cross-Cultural Validation,2014-02-06,2014,journal article,Journal of Business Ethics,01674544; 15730697,Springer Science and Business Media LLC,Netherlands,Mateja Kos Koklic; Monika Kukar-Kinney; Irena Vida,"Digital piracy as a continuing problem significantly impacts various stakeholders, including consumers, enterprises, and countries. This study develops a three-level mechanism of determinants of consumer digital piracy behavior, with personal risk as an individual factor, susceptibility to interpersonal influence as an inter-personal factor, and moral intensity as a broad societal factor. Further, it explores the role of rationalization and future piracy intent as outcomes of past piracy behaviors. The authors use survey data from four countries in the European Union to test the system of structural relationships. With an exception of the effect of consumers’ susceptibility to interpersonal influence on piracy behavior, the conceptual model receives remarkably consistent support across the four countries. Specifically, perception of personal risk and moral intensity negatively affected the reported piracy behavior in all four countries. The results further support the negative influence of moral intensity and the positive influence of past digital piracy behavior on consumers’ use of rationalization. Lastly, personal risk, rationalization, and past digital piracy behavior directly influenced consumers’ intention to engage in digital piracy in the future. The study also discusses implications of the findings and identifies areas of future research.",134,1,15,27,Advertising; Business ethics; Conceptual model; Business; Cross-cultural; Survey data collection; Perception; Interpersonal influence; European union; Rationalization (economics),,,,,https://link.springer.com/article/10.1007/s10551-014-2075-1 https://rd.springer.com/article/10.1007/s10551-014-2075-1 https://econpapers.repec.org/RePEc:kap:jbuset:v:134:y:2016:i:1:d:10.1007_s10551-014-2075-1 https://link.springer.com/article/10.1007/s10551-014-2075-1/fulltext.html https://philpapers.org/rec/KOSTMO https://dialnet.unirioja.es/servlet/articulo?codigo=5991730,http://dx.doi.org/10.1007/s10551-014-2075-1,,10.1007/s10551-014-2075-1,2042264721,,0,001-226-155-152-112; 003-111-035-592-589; 009-299-623-546-736; 010-146-711-506-660; 011-575-395-288-025; 012-715-612-090-508; 013-239-138-985-735; 013-425-010-292-015; 013-589-273-901-40X; 016-403-634-914-929; 016-647-817-541-759; 018-602-054-510-017; 020-623-653-096-393; 021-964-649-389-400; 022-618-561-425-248; 023-462-619-881-085; 025-394-856-531-856; 028-999-447-590-450; 031-187-002-607-584; 031-610-021-679-28X; 031-629-351-442-680; 032-653-897-764-354; 038-171-885-540-819; 041-781-348-238-610; 045-893-102-718-018; 046-039-902-428-59X; 048-060-330-802-96X; 051-851-761-421-930; 052-330-132-237-754; 053-088-654-972-792; 053-573-649-921-404; 057-333-560-358-777; 058-783-248-124-065; 058-899-629-850-735; 067-339-005-241-596; 071-655-570-640-433; 075-126-004-234-328; 077-049-344-635-95X; 079-961-535-351-974; 080-208-184-106-680; 081-056-192-291-667; 085-249-498-117-609; 093-231-823-419-104; 094-879-534-706-025; 097-507-095-668-064; 098-912-574-320-570; 100-603-808-990-181; 102-535-558-337-569; 104-563-034-257-032; 109-415-457-614-254; 114-673-913-339-632; 116-801-276-132-802; 123-424-899-122-558; 124-076-116-602-319; 124-170-590-601-410; 130-214-393-255-423; 134-554-284-756-778; 137-960-964-801-651; 141-947-149-029-560; 142-552-216-062-484; 147-777-072-867-660; 150-527-549-363-854; 151-835-366-839-777; 153-061-770-401-925; 160-358-377-281-104; 162-959-148-644-342; 163-453-832-966-952; 166-474-561-832-312; 167-167-483-928-306; 197-208-058-484-608,35,false,, 076-496-992-802-718,The challenge of computer piracy in Azerbaijan,2010-07-12,2010,journal article,Journal of Intellectual Property Law & Practice,17471532; 17471540,Oxford University Press (OUP),,Mustafa Salamov,,5,9,668,670,Business; Computer security,,,,,https://academic.oup.com/jiplp/article-abstract/5/9/668/880448 http://academic.oup.com/jiplp/article-abstract/5/9/668/880448,http://dx.doi.org/10.1093/jiplp/jpq081,,10.1093/jiplp/jpq081,2013791095,,0,,0,false,, 076-918-862-615-700,Online Piracy of Indian Movies: Is the Film Industry Firing at the Wrong Target?,,2013,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Arul George Scaria,"India has recently introduced some digital rights management (DRM) provisions to the Indian copyright law with the objective of providing “adequate” protection for copyrighted material in the online digital environment. Film industry was one of the biggest lobbying groups behind the new DRM provisions in India, and the industry has been consistently trying to portray online piracy as a major threat. The Indian film industry also extensively uses John Doe orders from the high courts in India to prevent the access of Internet users to websites suspected to be hosting pirated material. This paper explores two questions in the context of the new DRM provisions in India: (1) Is online piracy a threat to the Indian film industry? and (2) Are the present measures taken by the film industry the optimal measures for addressing the issue of online piracy? Based on data from an extensive empirical survey conducted in India, this paper questions the claims of the industry that online piracy is at a substantial level in India. The Internet usage related data in India also support the findings from the empirical survey. However, the paper observes that pirated Indian movie content is abundant in the Internet and this shows the existence of strong demand for those content. Based on a careful analysis of different websites hosting pirated Indian movies, the paper illustrates that the most probable consumers of those pirated movies are the millions of (potential) consumers residing abroad. The paper argues that the enactment of DRM provisions under Indian copyright law or wide sweeping John Doe orders may never be a solution for such piracy. Piracy of Indian movie content abroad is primarily attributable to the failure of the Indian film industry to explore innovative business models to reach (potential) consumers abroad. The paper argues that the Indian film industry may achieve sustainable solutions for online piracy only by making the legitimate products reach those consumers.",,,,,The Internet; Advertising; Business; Law; Context (language use); Empirical survey; Copyright law; Internet users; Business model; Digital rights management; Film industry,,,,,https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2365658_code1173057.pdf?abstractid=2175621&mirid=1&type=2 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2175621 https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2365658_code1173057.pdf?abstractid=2175621&mirid=1 https://www.ssrn.com/abstract=2175621,http://dx.doi.org/10.2139/ssrn.2175621,,10.2139/ssrn.2175621,1677967339,,0,026-656-398-185-629; 049-124-683-152-081,2,true,cc-by-nc,green 076-988-353-962-417,People v. Lol-Lo and Saraw.,,1932,journal article,Annual Digest of Public International Law Cases,2633710x; 26337118,Cambridge University Press (CUP),,,High Seas — Piracy — Robbery and Rape — Piracy Committed in Territorial Waters of a Foreign State.,1,,164,166,Computer science,,,,,,http://dx.doi.org/10.1017/cbo9781316151280.151,,10.1017/cbo9781316151280.151,,,0,,0,false,, 077-067-209-069-528,Hedging against disaster: risk and mitigation in the media and entertainment industries,2018-06-01,2018,journal article,International Journal of Digital Television,20404182; 20404190,Intellect,United Kingdom,Jean K. Chalaby,"The objective of this article is twofold. First, it seeks to identify and classify the most likely sources of potential loss for media and entertainment businesses. Adopting the World Bank’s definition of risk as a ‘possibility of loss’ and opportunity as the ‘upside of risk’, this article constructs a typology of risks that are categorized in seven types: catastrophic, financial, regulatory, technological, intellectual property (IP) related, value chain related and commercial. Combining this typology with a review of the most common risk mitigation strategies, this article demonstrates that risk management is central to the way media firms operate and has a determining influence on their output. Risk analysis, therefore, offers us a better understanding of corporate strategies in the media and entertainment industries both in terms of management and content.",9,2,167,184,Business; Marketing; Value (ethics); Risk analysis; Risk management; Intellectual property; Entertainment; Typology,,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=6530941 https://www.ingentaconnect.com/content/intellect/jdtv/2018/00000009/00000002/art00005 https://openaccess.city.ac.uk/id/eprint/20116/ https://core.ac.uk/download/159995146.pdf,http://dx.doi.org/10.1386/jdtv.9.2.167_1,,10.1386/jdtv.9.2.167_1,2811038113,,0,,5,true,,green 077-215-413-922-348,Piracy declines in USA,,1995,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1995,7,4,4,Business; Computer science; Computer security,,,,,,http://dx.doi.org/10.1016/0142-0496(95)80207-x,,10.1016/0142-0496(95)80207-x,,,0,,0,false,, 077-338-186-264-436,"Research on Anti-software Piracy,Monopoly and Profiteering in China",,2008,journal article,On Economic Problems,,,,SU Shu-feng,"Anti-software piracy is a global problem,even for the better protection of intellectual property in the United States,which still exists the problem of software piracy.Software piracy is also widespread in China,and Chinese government has attached great importance to it,which is showed as formulating relevant laws and regulations to solve the problem.In this paper,first it introduces the phenomenon of global software piracy,and analyzes the harms of the software piracy,studies the regulation of software protection,and points out the software should be protected classificatorily.Second,it discusses the relations between the anti-software piracy and the protection of infant industry,and points out that the anti-software piracy should be on the base of the protection of infant industry.Third,it discusses that anti-software piracy should be combined with anti-monopoly and anti-profiteering.Last,it brings forward the conclusion of anti-software piracy in China.",,,,,Business; Government; International trade; Infant industry; China; Profiteering; Software; Monopoly; Software protection; Intellectual property; Commerce,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-JJWT200803010.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-JJWT200803010.htm,,,2347464813,,0,,0,false,, 077-385-375-319-469,The software piracy menace,,1995,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1995,10,3,3,Computer security; Computer science; Business; Internet privacy; Software; Operating system,,,,,,http://dx.doi.org/10.1016/0142-0496(95)80027-1,,10.1016/0142-0496(95)80027-1,,,0,,0,false,, 077-418-333-028-020,New Thinking in the Fight Against Marine Piracy: Financing and Plunder Pre-Empting Piracy Before Prevention Becomes Necessary,,2014,journal article,Case Western Reserve Journal of International Law,00087254,,,Hugh R. Williamson,,46,1,335,,Business; Law and economics; Law,,,,,https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1040&context=jil https://scholarlycommons.law.case.edu/jil/vol46/iss1/15/,https://scholarlycommons.law.case.edu/jil/vol46/iss1/15/,,,1872673469,,0,,0,false,, 077-599-829-555-049,Copyright dupes: piracy and new media in Edison v. Lubin (1903),,2007,journal article,Film History: An International Journal,08922160; 15533905,Indiana University Press,United States,Peter Decherney,"The author examines the attempts of studios such as Edison to copyright films as photographs in the period prior to the inclusion of motion pictures in copyright law in 1912. The essay reviews the history of copyright law as it applies to photography, instances of piracy in this period, and Edison’s lawsuit against rival producer (and fellow pirate) Siegmund Lubin.",19,2,109,124,Photography; Political science; Law; Lawsuit; Period (music); Copyright law; Studio; New media,,,,,https://www.jstor.org/stable/25165418,http://dx.doi.org/10.2979/fil.2007.19.2.109,,10.2979/fil.2007.19.2.109,2068596411,,0,007-271-537-820-252; 015-219-502-224-233; 016-632-498-324-72X; 021-464-065-507-847; 037-626-565-454-729; 062-089-192-191-369; 075-743-333-013-28X; 080-269-557-173-173; 084-711-838-395-439; 086-519-144-850-081; 095-125-368-911-984; 113-085-082-393-904; 114-413-551-901-390; 127-247-560-460-110; 183-669-106-963-472; 190-070-861-417-582; 195-926-689-928-213,16,false,, 077-653-627-521-881,"From the Fringes of Copyright Law: Examining California's ""True Name and Address"" Internet Piracy Statute",,2008,journal article,Hastings Constitutional Law Quarterly,00945617,,,Brian McFarlin,,35,3,547,573,The Internet; Statute; Political science; Law; Copyright law,,,,,https://repository.uchastings.edu/hastings_constitutional_law_quaterly/vol35/iss3/4/ https://dialnet.unirioja.es/servlet/articulo?codigo=2669840 https://repository.uchastings.edu/cgi/viewcontent.cgi?article=1821&context=hastings_constitutional_law_quaterly,https://repository.uchastings.edu/hastings_constitutional_law_quaterly/vol35/iss3/4/,,,51426595,,0,,0,false,, 077-724-351-331-598,Keynote Address Digital Technology and Digital Piracy Issues,,2001,journal article,"Fordham Intellectual Property, Media & Entertainment Law Journal",10799699,,,Jesse Feder,,11,2,265,,Political science; Digital Millennium Copyright Act; Berne Convention; Copyright Act; Digital piracy; Computer security,,,,,https://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=1218&context=iplj https://ir.lawnet.fordham.edu/iplj/vol11/iss2/6/,https://ir.lawnet.fordham.edu/iplj/vol11/iss2/6/,,,1511131590,,0,,0,false,, 077-777-582-591-767,The Contingencies of Piracy,,2011,journal article,California Western international law journal,08863210,,,Dino Kritsiotis,,41,2,305,344,Political science,,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=3746891 https://scholarlycommons.law.cwsl.edu/cgi/viewcontent.cgi?article=1062&context=cwilj https://scholarlycommons.law.cwsl.edu/cwilj/vol41/iss2/2/,https://dialnet.unirioja.es/servlet/articulo?codigo=3746891,,,83019543,,0,,1,false,, 077-870-343-825-77X,Securitising piracy: A maritime peace mission off the Horn of Africa?,,2011,journal article,African Security Review,10246029; 21540128,Informa UK Limited,United Kingdom,Francois Vrey,"Piracy forms part of a wider array of maritime threats and vulnerabilities that are seeping into the African security landscape. While landward peacekeeping by the United Nations (UN) and other regional organisations dominates the literature – particularly with regard to Africa – piracy has become a maritime threat that has drawn significant international attention since 2007 and has become the object of international securitisation activities. Securitisation as speech acts by interested parties articulating the threats piracy hold, communication of the threat to several audiences and calling for their support and actions, as well as responses by member states, galvanised international cooperation against piracy off the Somali coast. By 2008 the UN played a prominent role in the securitisation process by creating a more conducive operating environment against piracy through four UN Security Council resolutions. The deployment of scarce naval platforms by member states in response to the UN call for action...",20,3,54,66,Software deployment; Economy; French horn; International trade; Political science; Peacekeeping; Somali; Security council; Member states,,,,,https://www.tandfonline.com/doi/pdf/10.1080/10246029.2011.614062 https://scholar.sun.ac.za/handle/10019.1/17095,http://dx.doi.org/10.1080/10246029.2011.614062,,10.1080/10246029.2011.614062,2030811622,,0,032-409-298-239-887; 044-864-566-912-290; 047-341-120-453-161; 048-886-496-348-606; 063-751-039-316-452; 065-317-923-661-274; 087-491-724-832-167; 098-656-037-623-664; 112-380-104-674-05X; 146-298-312-805-078; 163-794-021-078-332; 164-461-266-666-723; 176-799-958-874-922; 192-554-872-766-722,5,false,, 078-121-509-226-602,Legal Issues on the Attacks Againts Vessels in the Straits of Malacca,2014-01-31,2014,journal article,Indonesian Journal of International Law,23565527,Indonesian Journal of International Law,,Siti Noor Malia,"Piracy that occurs in the straits of Malacca has become a serious problem that need to be solved. The United Nations Office on Drugs and Crime (UNODC) has been combating piracy in this particular area since 2009. In an attempt to do so, UNODC creates a Counter Piracy Program (CPP) that has been implemented in several African Countries. However, UNODC doesn’t define the limitation of piracy which described in 1982 UNCLOS that only defines it as piracy on high seas. Whereas, piracy is not only takes place on high seas but also within territories of the states jurisdiction. The lack of ability to implement the provisions in national scope become another problem in regards preventing piracy in the Straits of Malacca.; ; Pembajakan yang terjadi di Selat Malaka telah menjadi masalah serius yang perlu diselesaikan. Kantor Perserikatan Bangsa-bangsa Urusan Narkoba dan Kejahatan (UNODC) telah memerangi pembajakan dikawasan ini sejak tahun 2009. Dalam upaya untuk melakukannya, UNODC menciptakan Counter Piracy Program (CPC) yang telah diterapkan di beberapa negara Afrika. Akan tetapi, UNODC tidak menentukan batasan dari pembajakan seperti yang digambarkan pada UNCLOS tahun 1982 yang hanya menganggapnya sebagai pembajakan di laut lepas. Padahal, pembajakan tidak hanya terjadi di laut lepas, tetapi juga di dalam wilayah yurisdiksi negara. Kurangnya kemampuan untuk menerapkan pasal-pasal dalam lingkup nasional menjadi masalah lain dalam hal mencegah pembajakan di Selat Malaka.",11,2,202,217,,,,,,https://scholarhub.ui.ac.id/cgi/viewcontent.cgi?article=1156&context=ijil https://scholarhub.ui.ac.id/ijil/vol11/iss2/4/ http://ijil.ui.ac.id/index.php/home/article/view/276/pdf_263 http://ijil.ui.ac.id/index.php/home/article/download/276/pdf_263 https://www.neliti.com/publications/39165/legal-issues-on-the-attacks-againts-vessels-in-the-straits-of-malacca,http://dx.doi.org/10.17304/ijil.vol11.2.276,,10.17304/ijil.vol11.2.276,2785292032,,0,,0,true,cc-by,gold 078-223-597-093-447,Free Speech in Cyberspace: A Rhetorical Analysis of SOPA and PIPA Cyberprotests,,2013,journal article,First Amendment Studies,21689725; 21689733,Informa UK Limited,United Kingdom,Catherine L. Langford,"On January 18, 2012 cyber-industrialized leaders blacked out their sites to protest proposed congressional legislation. They opposed Protection IP Act (PIPA) and Stop Online Piracy Act (SOPA), two laws that would grant unprecedented power to the U.S. government to regulate the Internet. The protests offer an important rhetorical moment in protest rhetoric as it illuminates the ways in which a brief rupture to normal operating procedures can impact significant change. The 24-hour protest, led by power brokers in the industry, did not encourage civil disobedience but promoted petitioning government, leading to an unparalleled awareness of the issue and the failure to pass the legislation.",47,2,85,105,The Internet; Rhetoric; Government; Political science; Rhetorical question; Law; Power (social and political); Legislation; Civil disobedience; Cyberspace; Public relations,,,,,https://www.tandfonline.com/doi/full/10.1080/21689725.2013.853385 https://nca.tandfonline.com/doi/full/10.1080/21689725.2013.853385,http://dx.doi.org/10.1080/21689725.2013.853385,,10.1080/21689725.2013.853385,2059540731,,0,,1,false,, 078-260-552-434-589,Software Piracy among Accounting Students: A Longitudinal Comparison of Changes and Sensitivity,2006-03-01,2006,journal article,Journal of Information Systems,08887985; 15587959,American Accounting Association,United States,Darryl J. Woolley; Martha M. Eining,"A 1991 survey found that a large proportion of accounting students pirate software. Since 1991, however, the rate of software piracy within the United States has decreased. Using the Theory of Reasoned Action (TRA), this paper analyzes whether the frequency and the underlying antecedents of software piracy also have changed among accounting students. The results indicate that students' understanding and knowledge of copyright laws have increased, but this knowledge has not influenced software piracy rates. This paper also investigates respondents' willingness to answer honestly questions dealing with software piracy. The randomized response technique allows for an evaluation of the honesty of responses to a sensitive question (i.e., software theft). In contrast to other ethics issues about which individuals have been found to be dishonest, the results indicate that participants honestly answered most questions about their piracy behavior.",20,1,49,63,Accounting; Theory of reasoned action; Psychology; Honesty; Software; Randomized Response Technique; Sensitive question; Contrast (statistics); Social psychology,,,,,https://dblp.uni-trier.de/db/journals/jisys/jisys20.html#WoolleyE06 https://dialnet.unirioja.es/servlet/articulo?codigo=5534729 https://meridian.allenpress.com/jis/article/20/1/49/75605/Software-Piracy-among-Accounting-Students-A,http://dx.doi.org/10.2308/jis.2006.20.1.49,,10.2308/jis.2006.20.1.49,2135906712,,0,003-597-551-134-907; 007-559-358-394-991; 010-287-439-737-628; 010-292-330-210-925; 012-558-297-950-849; 017-619-716-693-348; 020-862-797-519-306; 025-882-454-923-868; 026-161-995-943-665; 027-975-767-588-12X; 031-685-649-894-467; 033-349-220-802-574; 034-032-052-891-600; 038-596-588-945-522; 041-326-767-334-557; 041-781-348-238-610; 042-057-592-838-529; 056-353-538-684-770; 061-892-764-570-281; 072-719-429-027-302; 074-777-270-980-043; 091-954-928-718-756; 111-967-642-990-937; 113-806-602-092-054; 132-080-599-226-339; 145-590-802-086-389; 150-594-241-601-430; 153-552-384-031-475; 160-594-026-349-01X; 167-399-503-530-534; 167-706-147-274-876,67,false,, 078-411-303-116-622,"Prosecuting pirates: the contact group on piracy off the coast of Somalia, governance and international law",2013-03-27,2013,journal article,Global Policy,17585880; 17585899,Wiley,United Kingdom,Douglas Guilfoyle,"Since 2008 the response to Somali piracy has been highly decentralised. Criticisms have been made of the seemingly low rate of piracy prosecutions and centralised solutions, such as an international piracy court, proposed. This article explores the role of the Contact Group on Piracy off the Coast of Somalia’s Working Group 2 (WG2) as a mechanism involved in coordinating piracy prosecutions. It reviews the applicable international law and available options. It suggests that WG2 has had a discernible influence in promoting the decentralised use of national courts over the creation of a stand-alone international piracy court. It then reflects on WG2 as an example of a ‘new governance’ coordination mechanism.",4,1,73,79,Political science; Law; Somali; Contact group; International relations; Corporate governance; International law,,,,,http://onlinelibrary.wiley.com/doi/10.1111/j.1758-5899.2012.00190.x/full https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1758-5899.2012.00190.x https://econpapers.repec.org/RePEc:bla:glopol:v:4:y:2013:i:1:p:73-79 https://research.monash.edu/en/publications/prosecuting-pirates-the-contact-group-on-piracy-off-the-coast-of- https://ideas.repec.org/a/bla/glopol/v4y2013i1p73-79.html,http://dx.doi.org/10.1111/j.1758-5899.2012.00190.x,,10.1111/j.1758-5899.2012.00190.x,1500176961,,0,026-324-989-746-255; 031-859-974-391-457; 039-234-329-493-662; 044-645-874-240-748; 047-318-164-879-679; 063-203-515-670-958; 077-331-231-343-247; 083-674-054-247-394; 089-572-702-832-761; 111-986-736-467-518; 112-406-915-525-683; 113-589-375-707-427; 147-749-277-079-248,6,false,, 078-961-743-079-745,"Piracy in the Horn of Africa waters: definitions, history, and modern causes",2015-07-03,2015,journal article,African Security,19392206; 19392214,Informa UK Limited,United Kingdom,Afyare A. Elmi; Ladan Affi; W. Andy Knight; Said Mohamed,"ABSTRACTThroughout history, ocean piracy was common in different parts of the world, but it was rare in the Horn of Africa waters. Although international law clearly defines piracy, the term is often carelessly used interchangeably with different crimes (armed robbery, atrocities against the victims of shipwrecks, maritime terrorism, insurgent attacks, on sea intercommunal conflicts, and at times illegal fishing). In the first section, this article critically examines the link between the multiple definitions of the concept of piracy and how these can explain the various incidents that occurred historically on the coast of Somalia. In the second part, we explain different types of maritime attacks and criminalities that took place in the Horn of Africa waters prior to the upsurge of piracy in late the 1990s. We argue that all attacks and criminal incidents at sea cannot be classified as piracy. We explain why incidents of piracy were rare before the Somali state was established. Finally, utilizing Collier...",8,3,147,165,French horn; Poverty; Law; Terrorism; State (polity); Somali; Illegal fishing; International law; Criminology; History,,,,Qatar National Research Fund,http://qspace.qu.edu.qa/handle/10576/11509 https://www.tandfonline.com/doi/full/10.1080/19392206.2015.1069118 https://www.africabib.org/rec.php?RID=39651734X&DB=p,http://dx.doi.org/10.1080/19392206.2015.1069118,,10.1080/19392206.2015.1069118,1863705580,,0,,7,false,, 079-105-520-224-321,The Pre-History of Piracy as a Crime & Its Definitional Odyssey,,2013,journal article,Case Western Reserve Journal of International Law,00087254,,,Michael J. Kelly,This essay traces the origins of the legal definition of piracy as an international crime from its origins to the present day disputes among federal courts within the United States over how to define piracy. Customary law definitions are examined as well as that contained in the United Nations Convention on the Law of the Sea.,46,1,25,,Political science; Law; Universal jurisdiction; Convention; Legal definition; Due process,,,,,https://scholarlycommons.law.case.edu/jil/vol46/iss1/4/ https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1029&context=jil https://dspace.creighton.edu/xmlui/handle/10504/62250,https://scholarlycommons.law.case.edu/jil/vol46/iss1/4/,,,3122051652,,0,,3,false,, 079-993-654-263-009,Social cohesion in education: Cognitive research in the university community,2019-08-31,2019,journal article,International Journal of Cognitive Research in Science Engineering and Education,23348496; 2334847x,FSFEI HE Don State Technical University,Serbia,Marja Nesterova; Maryna Dielini; Andrii Zamozhskyi,"The present article highlights the results of social cohesion study fulfilled in the university community of National Pedagogical Dragomanov University. It contains the consideration of social cohesion as an important factor of interpersonal communication, other social skills which are important for the community development. The purpose of the study was to identify the level of social cohesion for university community, to test the Bertelsmann Stiftung Model of Social Cohesion at the community level. Methods that were used in the study are synthesis, analysis, math, social questionnaire, etc. In the research the only data collection tool was the author’s questionnaire. There were 112 people interviewed, among them 47 employees and 65 students of National Pedagogical Dragomanov University. According to the study results, the level of social cohesion in the university community is quite sufficient, which positively characterizes the attitude of employees and students to each other, reflects their readiness for mutual respect and support, acceptance of differences and tolerance etc. Also the research highlights weak points of social interactions that form the base for further investigations and actions on social cohesion development.",7,2,19,27,Cohesion (computer science); Data collection; Interpersonal communication; Cognitive research; Community level; University community; Community development; Social psychology; Social skills,,,,,https://dialnet.unirioja.es/descarga/articulo/7136791.pdf https://dialnet.unirioja.es/servlet/articulo?codigo=7136791 https://core.ac.uk/download/pdf/267069889.pdf,http://dx.doi.org/10.5937/ijcrsee1902019n,,10.5937/ijcrsee1902019n,2971305665,,0,001-288-376-917-485; 004-392-660-530-391; 008-067-395-965-226; 042-439-164-320-268; 054-992-755-155-806; 120-811-913-351-375; 122-585-712-415-088,5,true,cc-by,gold 080-064-689-475-502,Piracy Prosecutions in National Courts,2012-09-01,2012,journal article,Journal of International Criminal Justice,14781387; 14781395,Oxford University Press (OUP),United Kingdom,Maggie Gardner,"At least for the time being, the international community must rely on national courts to prosecute modern-day pirates. The first wave of domestic piracy prosecutions suggests, however, that domestic courts have yet to achieve the necessary consistency and expertise in resolving key questions of international law in these cases. This article evaluates how courts trying modern-day pirates have addressed common questions of international law regarding the exercise of universal jurisdiction, the elements of the crime of piracy, and the principle of nullum crimen sine lege. In doing so, it evaluates five decisions issued in 2010 by courts in Kenya, the Netherlands, the Seychelles and the United States, and it proposes some clear answers to these recurrent questions of international law in domestic piracy prosecutions.",10,4,797,821,Political science; United Nations Convention on the Law of the Sea; Law; Consistency (negotiation); Universal jurisdiction; International community; International law; Nullum crimen nulla poena sine praevia lege poenali,,,,,http://scholarship.law.cornell.edu/cgi/viewcontent.cgi?article=2661&context=facpub https://academic.oup.com/jicj/article-pdf/10/4/797/2422675/mqs045.pdf https://academic.oup.com/jicj/article-abstract/10/4/797/809286 https://scholarship.law.cornell.edu/cgi/viewcontent.cgi?article=2661&context=facpub http://jicj.oxfordjournals.org/content/10/4/797.abstract,http://dx.doi.org/10.1093/jicj/mqs045,,10.1093/jicj/mqs045,3124154342,,0,,7,true,,green 080-300-050-164-465,A study on jurisdiction in fighting against piracy,,2009,journal article,Journal of Naval University of Engineering,,,,Chen Wan-ping,"Piracy remains a serious threat to the international community in modern times.It has long been treated as a universal crime that the perpetrators are subject to punishment in any country once they are caught.But the existing international laws regarding the provisions of the crimes of piracy have limitations on the implementation of the comprehensive and effective punishments,universal jurisdiction lefts gaps.While expanding the scope of universal jurisdiction,the international community should adhere to the principles such as:country permission,country cooperation,compliance with the international treaty and the international customs.",,,,,Political science; Law; Universal jurisdiction; Punishment; Jurisdiction; International community; Scope (project management); Compliance (psychology); International treaty; Computer security; International law,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-OHJG200904011.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-OHJG200904011.htm,,,2355628336,,0,,0,false,, 080-344-600-542-673,EU-China Security Cooperation in Context,,2015,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Emil J. Kirchner; Thomas Christiansen; Han Dorussen,"The paper has two main aims. First it seeks to explore whether security cooperation between the EU and China is taking place, and if so, whether it is evenly spread across a number of security dimensions. Second it intends to investigate the underlying motives or drivers that either facilitate or inhibit EU-China security cooperation. Further, it will explain why the EU rather than EU member states is chosen as the unit of analysis, explore the development of EU-China security relations, and illustrate how historical legacies, identity aspects and differences over key issues, such as sovereignty and territorial integrity, affect EU-China security relations. In addition, it will deal with the theoretical and conceptual underpinnings of the study on EU-China security relations, paying particular emphasis to the concepts of diffusion and convergence. Whether or not EU-China security cooperation converges in one of the ten chosen security dimensions will be assessed by the degree of policy conformity the EU and China are able (or unable) to obtain with regard to threat perceptions and policy response thereto. Attention will be devoted to diffusion factors which can affect changes in the perception of threats and response thereof. Among these factors are changes in (geo-political) structure, interests and norms. A further objective of the paper will be to explore whether policy convergence on threat perceptions and response thereto might be a precondition for joint action, or whether practical cooperation can take place without prior policy convergence between the EU and China. The paper will round off with a short section introducing the security dimensions that are being examined in the more detailed study on which this paper is based.",,,,,Conformity; Political science; Sovereignty; China; Perception; Territorial integrity; Context (language use); Convergence (relationship); Unit of analysis; Economic system,,,,,https://www.ssrn.com/abstract=2631963 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2631963 https://core.ac.uk/download/74375090.pdf,http://dx.doi.org/10.2139/ssrn.2631963,,10.2139/ssrn.2631963,3121853843,,0,005-658-089-748-923; 023-672-511-213-267; 024-485-021-749-432; 029-585-802-024-215; 035-261-961-935-32X; 036-316-736-908-394; 043-516-864-055-795; 044-864-566-912-290; 054-591-857-306-073; 058-071-798-060-611; 075-746-553-698-122; 077-926-704-396-107; 083-128-427-871-272; 087-097-726-965-347; 099-935-651-526-723; 138-899-732-075-060; 181-536-847-791-485,2,true,,green 080-355-716-525-06X,Prevention of cybercrimes in smart cities of India: from a citizen’s perspective,2019-10-07,2019,journal article,Information Technology & People,09593845,Emerald,United Kingdom,Sheshadri Chatterjee; Arpan Kumar Kar; Yogesh K. Dwivedi; Hatice Kizgin,"The purpose of this paper is to identify the factors influencing the citizens of India to prevent cybercrimes in the proposed Smart Cities of India.,A conceptual model has been developed for identifying factors preventing cybercrimes. The conceptual model was validated empirically with a sample size of 315 participants from India. Data were analyzed using structural equation modeling with SPSS and AMOS softwares.,The study reveals that the “awareness of cybercrimes” significantly influences the actual usage of technology to prevent cybercrimes in Smart Cities of India. The study reveals that government initiative (GI) and legal awareness are less influential in spreading of the awareness of cybercrimes (AOC) to the citizens of the proposed smart cities.,The conceptual model utilizes two constructs from the technology adoption model, namely, perceived usefulness and ease of use. The study employs other factors such as social media, word of mouth, GIs, legal awareness and organizations constituting entities spreading awareness from different related literature works. Thereby, a comprehensive theoretical conceptual model has been proposed which helps to identify the factors that may help in preventing cybercrimes.,This study provides an insight to the policy maker to understand several factors influencing the AOC of the citizens of the proposed Smart Cities of India for the prevention of cybercrimes.,There are few existing studies analyzing the effect of AOC to mitigate cybercrimes. Thus, this study offers a novel contribution.",32,5,1153,1183,Conceptual model; Word of mouth; Business; Government; Usability; Perspective (graphical); Smart city; Social media; Knowledge management; Structural equation modeling,,,,,https://www.emerald.com/insight/content/doi/10.1108/ITP-05-2018-0251/full/pdf?title=prevention-of-cybercrimes-in-smart-cities-of-india-from-a-citizens-perspective https://doi.org/10.1108/ITP-05-2018-0251 https://bradscholars.brad.ac.uk/bitstream/10454/17295/1/Kizgin_Information_Technology_%26_People.pdf https://cronfa.swan.ac.uk/Record/cronfa44310 https://cronfa.swan.ac.uk/Record/cronfa44310/Download/0044310-18092018141356.pdf https://www.emerald.com/insight/content/doi/10.1108/ITP-05-2018-0251/full/html https://www.emeraldinsight.com/doi/full/10.1108/ITP-05-2018-0251 https://dblp.uni-trier.de/db/journals/itp/itp32.html#ChatterjeeKDK19 https://bradscholars.brad.ac.uk/handle/10454/17295 https://research.utwente.nl/en/publications/prevention-of-cybercrimes-in-smart-cities-of-india-from-a-citizen https://core.ac.uk/download/231899117.pdf,http://dx.doi.org/10.1108/itp-05-2018-0251,,10.1108/itp-05-2018-0251,2903787681,,0,001-919-067-261-265; 003-243-826-108-25X; 005-646-077-565-566; 005-776-194-490-378; 007-851-897-427-13X; 009-800-313-312-877; 010-854-534-444-434; 011-057-105-680-492; 011-854-399-312-637; 014-977-876-267-963; 015-587-739-588-448; 021-605-573-171-610; 026-503-875-304-583; 028-440-596-686-854; 028-850-532-821-342; 028-870-075-419-603; 029-290-151-898-593; 030-506-785-626-421; 030-965-285-656-563; 032-320-201-081-841; 034-344-111-114-08X; 034-463-782-270-296; 038-786-731-166-618; 039-059-766-688-710; 039-355-076-122-804; 042-495-131-141-93X; 046-875-897-903-424; 048-029-723-086-698; 051-500-502-061-85X; 051-757-998-256-477; 056-731-529-859-765; 056-842-188-873-957; 058-081-424-637-980; 059-453-393-498-922; 060-402-048-041-37X; 060-677-444-944-717; 061-566-480-776-217; 061-877-171-860-632; 063-679-289-337-375; 065-384-721-135-671; 067-989-251-148-228; 069-546-958-044-65X; 073-020-934-641-343; 073-949-296-288-698; 075-855-431-881-423; 076-819-496-188-388; 077-930-616-453-628; 078-570-750-044-390; 084-293-701-769-736; 085-659-673-673-349; 085-678-600-921-640; 086-453-763-437-182; 089-104-317-291-180; 090-080-208-972-544; 090-326-818-779-781; 090-392-126-067-295; 092-063-460-213-628; 093-264-327-635-685; 094-973-203-757-435; 096-867-891-629-069; 097-307-727-240-378; 101-981-689-947-483; 104-307-678-672-239; 110-026-833-593-378; 110-880-299-841-468; 111-612-320-385-862; 115-496-167-383-229; 115-547-184-477-216; 115-655-778-964-829; 116-953-447-460-185; 119-031-420-905-189; 128-927-381-939-690; 134-596-210-986-357; 134-628-246-757-461; 143-875-130-007-110; 145-461-557-294-49X; 153-185-834-410-586; 159-902-368-506-587; 164-233-751-793-174; 165-967-694-898-584; 168-036-345-097-619; 168-376-598-642-452; 168-867-890-175-157; 171-966-457-662-271; 178-610-347-703-586; 179-087-507-658-781; 184-280-105-967-245; 194-940-864-788-452; 196-746-353-986-258,34,true,,green 080-668-468-692-885,The Big Business of Maritime Piracy and the Modern Corsair: Dead Men Tell No Tales,,2009,journal article,"Journal of transportation law, logistics and policy",10785906,,,Katie Smith Matison,"This article considers strategies that the international maritime community can employ to combat piracy attacks, one of the principal security risks to commercial shipping in certain regions of the world. The author first outlines the international response to maritime piracy before the terrorist attacks of September 11, 2001, including the role of the International Maritime Organization, the International Maritime Bureau Piracy Reporting Center, the crime of universal jurisdiction, the United Nations Convention of the Law of the Sea (UNCLOS), and the High Seas Convention. The next section reviews later responses to piracy, including the Model National Law on Acts of Piracy and Maritime Violence, the IMO January 22, 2002 Resolution, the Convention for the Suppression of Illegal Acts Against the Safety of Maritime Navigation, and the Palermo Convention of the United Nations Convention Against Transnational Organized Crime. The author goes on to outline the international response to the upsurge in piracy off the coast of Somalia, including the underlying conditions in Somalia, the Djibouti Code of Conduct, international resources in the Horn of Africa region, and the United Nations Security Council resolutions in 2007 and 2008. Special challenges that the international community faces in combating piracy, include the challenge of high-risk zones, the underreporting of attacks, and the debate whether to arm merchant vessels. A final section outlines the U.S. response to maritime piracy, including jurisdictional issues, statutory prohibitions against piracy, the 2009 M/V Maersk Alabama hijacking, reports to Congress and to the House Committee on Transportation Hearing, and Coast Guard guidelines for United States vessels operating in high-risk waters.",76,4,,,International waters; Political science; United Nations Convention on the Law of the Sea; Law; Universal jurisdiction; Jurisdiction; United Nations Convention against Transnational Organized Crime; International community; Freedom of navigation; Law of the sea,,,,,https://www.lanepowell.com/wp-content/uploads/2010/11/Matison_JTLP_2.pdf https://trid.trb.org/view/917562,https://trid.trb.org/view/917562,,,136272449,,0,,2,false,, 080-725-345-607-538,Computer dealer awaits sentence for piracy,,1993,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1993,12,5,5,Computer science; Computer security; Sentence; Internet privacy; Business; Artificial intelligence,,,,,,http://dx.doi.org/10.1016/0142-0496(93)90259-y,,10.1016/0142-0496(93)90259-y,,,0,,0,false,, 080-778-438-120-939,Criminal Issues of Somalia Piracy Trial,,2012,journal article,Korean Journal of Comparative Criminal Law,1598091x,Korean Journal of Comparative Criminal Law,,Minyoung Choi; Sukyoon Choi,,14,1,193,214,Political science; Law; Criminal trial,,,,,https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001683070,http://dx.doi.org/10.23894/kjccl.2012.14.1.008,,10.23894/kjccl.2012.14.1.008,2608840778,,0,,0,true,cc-by-nc,hybrid 081-010-271-120-432,Bio- Piracy: Creating Proprietary Rights in Plant Genetic Resources,,1994,journal article,Journal of Intellectual Property Law,,,,James Odek,,2,1,141,,Environmental resource management; Business; Genetic resources,,,,,http://erepository.uonbi.ac.ke/handle/11295/32592 https://digitalcommons.law.uga.edu/jipl/vol2/iss1/4/ https://digitalcommons.law.uga.edu/cgi/viewcontent.cgi?article=1072&context=jipl,http://erepository.uonbi.ac.ke/handle/11295/32592,,,2213548407,,0,,21,false,, 081-524-490-694-40X,Online Piracy of Live Sports Telecasts in India,2018-10-05,2018,journal article,Marquette Sports Law Review,15336484,,,Seemantani Sharma,"This article highlights the limited protection available to sports webcasters and organizers against online piracy of their webcasts under the Indian copyright law. It posits that with growing popularity of digital viewership of sports events, this lacuna has created an uneven playing field between sports broadcasters and webcasters, which has an overall negative impact on the local sports industry.",28,2,433,,Advertising; Political science; Popularity; Field (Bourdieu); Copyright law; Webcast; Audience measurement,,,,,https://scholarship.law.marquette.edu/cgi/viewcontent.cgi?article=1732&context=sportslaw https://scholarship.law.marquette.edu/sportslaw/vol28/iss2/6/ https://paperity.org/p/162530670/online-piracy-of-live-sports-telecasts-in-india,https://scholarship.law.marquette.edu/sportslaw/vol28/iss2/6/,,,2903965619,,0,,0,false,, 081-670-584-406-670,MENAKAR PARADIGMA KEAMANAN NASIONAL MELALUI ANALISIS ISI TERHADAP UNDANG-UNDANG No. 17 TAHUN 2011 TENTANG INTELIJEN NEGARA,2018-04-12,2018,journal article,Jurnal Mandala : Jurnal Ilmu Hubungan Internasional,25990675,FISIP UPN Veteran Jakarta,,Ratih Herningtyas Surwandono,"The evolution of both domestic and international security issues have influenced the development of Indonesia intelligence and its agencies. Indonesia intelligence reform is marked by the establishment of Badan Intelijen Nasional or Indonesia National Intelligence Agency and the enactment of Law Number 17 of 2011 on The State Intelligence. In order to reveal the paradigm used in determining the direction of Indonesia’s national security policy, this paper analyzes Law Number 17 of 2011 on The State Intelligence using content analysis method. Analysis among indicators representing three paradigms; realism, liberalism, and constructivism shows that Law Number 17 of 2011 on The State Intelligence is strongly influenced by realist paradigm.",1,1,19,37,Liberalism (international relations); Constructivism (philosophy of education); Agency (sociology); Content analysis; Political science; State (polity); Public administration; International security; National security; Realism,,,,,http://ejournal.upnvj.ac.id/index.php/JM/article/download/289/231 https://ejournal.upnvj.ac.id/index.php/JM/article/download/289/231 https://core.ac.uk/download/pdf/287201871.pdf,http://dx.doi.org/10.33822/jm.v1i1.289,,10.33822/jm.v1i1.289,2919268958,,0,,0,true,cc-by,gold 081-672-655-282-214,Fighting software piracy,,1988,journal article,Computers & Security,01674048; 18726208,Elsevier BV,United Kingdom,,,7,1,101,101,Computer science; Computer security; Software; Internet privacy; Programming language,,,,,,http://dx.doi.org/10.1016/0167-4048(88)90513-5,,10.1016/0167-4048(88)90513-5,,,0,,0,false,, 082-145-752-358-235,Maritime Order and the Development of the International Law of Piracy,,1983,journal article,International Relations,00471178; 17412862,SAGE Publications,United States,J.W. Boulton,,7,5,2335,2350,Political science; Public international law; Law; Order (business); Development (topology); Law of the sea; International law,,,,,http://ire.sagepub.com/content/7/5/2335.full.pdf+html https://ire.sagepub.com/content/7/5/2335.full.pdf+html https://journals.sagepub.com/doi/abs/10.1177/004711788300700506,http://dx.doi.org/10.1177/004711788300700506,,10.1177/004711788300700506,1977902880,,0,,1,false,, 082-171-730-573-961,"Guilfoyle, Douglas (ed.). Modern Piracy: Legal Challenges and Responses",,2014,journal article,American Journal of International Law,00029300,,,Donald L. Brown,,108,4,862,865,,,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=5235715,https://dialnet.unirioja.es/servlet/articulo?codigo=5235715,,,2267378797,,0,,0,false,, 082-268-675-557-854,Maritime Piracy off the Coast of Somalia: Effectiveness of the Control Measures and Challenges Facing Prosecution,2016-11-30,2016,journal article,MARITIME LAW REVIEW,15981053,Korean Institute of Maritime Law,,Devotha Edward Mandanda; Guo Ping,"Maritime piracy is an old concept, the history of which can be traced far way back since the time when the human being started using sea as a means of transport. Its criminality was firstly been considered by the customary international law even before codification of the same in 1958 Geneva Convention on the High Seas and later the 1982 United Nations Convention on the Law of the Sea. Somali piracy emerged in the 1990s, its narrative root causes, impact brought by it and the uniqueness of how it has been combated have moved the author to write this paper. The control measures of piracy off the coast of Somalia is comprised of International and local measures. The engagement of naval forces, combined task forces 150 and 151 and local reforms and pre-emptive measures and construction of a new naval base have contributed to the elimination of piracy activities off the coast of Somalia. This paper focused on whether these control measures are effective; the paper goes further on pointing out challenges facing prosecution. More over, the definition of maritime piracy, narrative root causes of piracy off the coast of Somalia, the impact brought by piracy off the coast of Somalia, the legal aspect of maritime piracy and its enforcement by the international community and lastly, conclusion and recommendations are the areas covered by this paper.",28,3,163,204,Economy; United Nations Convention on the Law of the Sea; Narrative; Law; Geography; Control (management); Somali; Enforcement; International community; Customary international law; Convention on the High Seas,,,,,http://scholar.dkyobobook.co.kr/searchDetail.laf?barcode=4010025015437 https://db.koreascholar.com/article?code=320145,http://dx.doi.org/10.14443/kimlaw.2016.28.3.8,,10.14443/kimlaw.2016.28.3.8,2566749094,,0,,0,false,, 082-294-696-815-33X,Software Piracy — An Update,,1995,journal article,Computers & Security,01674048,Elsevier BV,United Kingdom,Geoffrey Webster,,14,5,418,,Software; Computer security; Computer science,,,,,http://linkinghub.elsevier.com/retrieve/pii/016740489597113O http://www.sciencedirect.com/science/article/pii/016740489597113O https://api.elsevier.com/content/article/PII:016740489597113O?httpAccept=text/xml,http://dx.doi.org/10.1016/0167-4048(95)97113-o,,10.1016/0167-4048(95)97113-o,2094761016,,0,,0,false,, 082-519-085-272-561,CD-ROM not safe from piracy,,1994,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1994,2,4,4,Computer security; Internet privacy; Business; Computer science,,,,,,http://dx.doi.org/10.1016/0142-0496(94)90224-0,,10.1016/0142-0496(94)90224-0,,,0,,0,false,, 082-524-658-114-859,The third United Nations Law of the Sea Treaty and the piracy question : the case of the East African Coast,2011-03-11,2011,journal article,Africa Insight,1995641x; 02562804,African Journals Online (AJOL),South Africa,Dorothy A. Nyakwaka,"The international crime of piracy was believed to have largely disappeared in modern times, or at least to have reduced to levels that would not demand international attention. However, contrary to that belief, for the past several years piracy has become endemic, particularly off the coast of Somalia and the East African coast in general. Somalia has not had a stable government since 1991, and this has partly contributed to the piracy problem off the East African coast. The Law of the Sea defines piracy in various ways and has been used to tackle the problem in East Africa. The paper focuses on the evolution of piracy, its definition as provided by the Law of the Sea, the implications of piracy on the coast, and finally solutions to the problem.",40,2,74,84,Economy; Government; Political science; United Nations Convention on the Law of the Sea; East africa; Development economics,,,,,https://www.ajol.info/index.php/ai/article/download/64378/52170 https://www.ajol.info/index.php/ai/article/view/64378,http://dx.doi.org/10.4314/ai.v40i2.64378,,10.4314/ai.v40i2.64378,1974457746,,0,,0,false,, 082-758-756-185-177,Harmonisation of National Criminal Laws on Maritime Piracy: a Regulatory Proposal for the Crime of Piracy and its Penalties,2016-08-04,2016,journal article,European Journal on Criminal Policy and Research,09281371; 15729869,Springer Science and Business Media LLC,United States,Beatriz López Lorca,"This article outlines a regulatory proposal for the crime of piracy and its penalties. Following the introduction, Section 2 addresses the duty to cooperate in the repression of maritime piracy established in Article 100 of the United Nations Convention on the Law of the Sea (UNCLOS). It also discusses the existence of an obligation to codify the crime of piracy and establish appropriate penalties, as part of the duty under Article 100. In this context, Section 4 is a de lege lata analysis of how national legislators have codified maritime piracy while Section 5 is a de lege ferenda proposal. Namely, Section 4 identifies some regulatory patterns in a wide number of jurisdictions that show to what extent there is a lack of harmonisation of domestic laws on maritime piracy. Section 5 discusses a regulatory proposal for the crime of piracy and its penalties.",23,2,115,132,Political science; United Nations Convention on the Law of the Sea; Law; Obligation; Duty; Context (language use); Section (archaeology); Proportionality principle; Maritime piracy,,,,,https://link.springer.com/10.1007/s10610-016-9325-y https://link.springer.com/article/10.1007/s10610-016-9325-y,http://dx.doi.org/10.1007/s10610-016-9325-y,,10.1007/s10610-016-9325-y,2487070238,,0,000-749-825-264-743; 015-420-516-757-65X; 025-784-266-343-445; 026-368-874-489-513; 063-203-515-670-958; 066-434-639-686-983; 075-416-950-225-650; 076-423-268-004-654; 088-109-100-747-737; 093-785-622-932-598; 096-058-470-807-795; 105-524-721-686-896; 106-619-699-607-570; 108-386-886-673-723; 115-898-144-990-52X; 122-974-694-456-570; 130-643-828-588-063; 158-233-919-592-038; 160-437-316-475-314; 164-264-093-405-097; 164-269-971-911-27X; 171-397-728-383-788; 178-287-584-875-851; 179-152-054-900-894; 185-104-823-389-543,1,false,, 083-136-168-667-663,The role of Interpol in combating maritime piracy,2014-01-01,2014,journal article,Acta Criminologica: Southern African Journal of Criminology,10128093,,,Jacques Meyer; Ian De Vries,"This article examines the scope of maritime piracy in the world, specifically in the African region. It analyses trends and focuses on the role that the International Criminal Police Organisation (INTERPOL) has played in the policing of maritime piracy. The article discusses maritime piracy as an organised crime enterprise and a serious problem that affects global security as well as the economy. The article also points out that INTERPOL, as the largest international law-enforcement agency, has an important role to play in the policing of maritime piracy.",2014,,108,120,Agency (sociology); International trade; Political science; Law; Organised crime; Scope (project management); Maritime piracy; International security,,,,,http://journals.co.za/content/crim/2014/sed-1/EJC164218 http://reference.sabinet.co.za/document/EJC164218,http://journals.co.za/content/crim/2014/sed-1/EJC164218,,,173289659,,0,,0,false,, 083-255-794-363-95X,The use of private maritime guards as an innovative means to fulfil states' duty to cooperate in the repression of maritime piracy. Part Two,2021-08-05,2021,journal article,International Journal of Maritime Crime and Security,26313855; 26313863,Centre for Business and Economic Research,,Katinka Svanberg,"This article discusses the use of PCASPs as an alternative or additional layer of protection on board ships in the fight against maritime piracy and armed robbery at sea from an international law perspective based on legal positivism. A concern is that clear-cut, international legal rules are missing on PCASPs. A particular concern is the use of force by PCASPs. The IMO, the shipping- and PMSC industry have had to resort to soft-law instruments and self-regulations. The perceived lack of legal rules concerning PCASPs and PMSCs has resulted in a lot of criticism. But does international law on maritime piracy need to develop binding international legal rules’ that are directly applicable to PCASPs? My findings are that the existing legal framework, in the Law of the Sea, SOLAS Convention, customary international law on self-defence together with the non-binding IMO guidelines and the shipping industry’s and PMSC’s self-regulations, as implemented by national laws, gives the necessary framework to adequately address the issue of PCASPs as protection against maritime piracy. The article describes maritime piracy, piracy hotspots and how interventions against piracy differ according to regions. It analyses the current legal framework on maritime piracy and armed robbery at sea in UNCLOS and the SUA Convention, flag-state jurisdiction and national laws. It defines “soft-law” and goes through regulations on PCASPs from the Montreux Document and ICoC to regulations that directly address the use of PCASPs on board ships, as the IMO Guidelines, ISO Standards, the industries standard agreements and the Guidance on the use of force.",2,1,,,Jurisdiction; Law; International law; United Nations Convention on the Law of the Sea; International waters; Convention; Business; Law of the sea; Soft law; Duty; Exclusive jurisdiction; International shipping; Political science; Ratification,,,,,,http://dx.doi.org/10.24052/ijmcs/v02is01/art-1,,10.24052/ijmcs/v02is01/art-1,,,0,,0,false,, 083-475-649-480-572,Putting a stop to software piracy,,1992,journal article,Computers & Security,01674048,Elsevier BV,United Kingdom,Lucia Withers,,11,5,490,491,Internet privacy; Software; Computer security; Computer science,,,,,https://www.sciencedirect.com/science/article/pii/016740489290250U,http://dx.doi.org/10.1016/0167-4048(92)90250-u,,10.1016/0167-4048(92)90250-u,1989635153,,0,,0,false,, 083-571-434-987-077,THE ANALYSIS OFCYBER CRIME THREAT RISK MANAGEMENT TO INCREASE CYBER DEFENSE,2017-10-03,2017,journal article,Jurnal Pertahanan & Bela Negara,26207400; 26205262,Indonesia Defense University,,Ineu Rahmawati,"Abstrak – Kemajuan teknologi dan informasi menimbulkan ancaman baru di ruang siber yakni kejahatan siber. Kejahatan siber merupakan kejahatan yang lahir sebagai suatu dampak negatif dari perkembangan aplikasi pada internet. Dalam menganalisis dampak kejahatan siber terhadap pertahanan sebuah negara, diperlukan identifikasi manajemen risiko yang dapat mengetahui seberapa besar probabilitas dan konsekuensi yang ditimbulkan dari kejahatan siber. Risiko yang dihadapi dalam mengatasi ancaman kejahatan siber tidak kalah dengan perang konvensional. Hal ini menyebabkan risiko yang diidentifikasi harus bisa menghasilkan strategi pertahanan negara dalam menghadapi ancaman kejahatan siber. Kata kunci: kejahatan siber, manajemen risiko, strategi, pertahanan negara Abstract – Increasing technology and information caused new threat in cyberspace called cyber crime. Cyber crime is a crime that emerge as a negative impact of applications development on the internet. In analyzing the impact of cyber crime towards a state defense, it is necessary to identify risk management that can know how big the probability and consequences caused by cyber crime. The risks faced in overcoming the threat of cyber crime is not inferior to conventional wars. This causes the identified risks has to be able to produce a state defense strategy in the face of cyber crime threat. Keywords: cyber crime, risk management, strategy, state defense",7,2,37,52,Political science; Cyber defense; Risk management; Criminology,,,,,http://jurnal.idu.ac.id/index.php/JPBH/article/download/193/95 http://jurnal.idu.ac.id/index.php/JPBH/article/view/193 https://core.ac.uk/download/pdf/268375038.pdf,http://dx.doi.org/10.33172/jpbh.v7i2.193,,10.33172/jpbh.v7i2.193,2803663405,,0,,0,true,,bronze 083-686-547-789-608,Giant Pink Scorpions: Fighting Piracy with Novel Digital Rights Management Technology,2016-09-28,2016,journal article,"DePaul Journal of Art, Technology & Intellectual Property Law",10610553,,,Andrew Moshirnia,"The music and movie industries have dominated the discussion on Internet piracy. Both industries have employed the use of technologies that limit the ability to share digital files of their audiovisual works, known as digital rights management technology. In addition, both industries have pursued aggressive legal action campaigns to enforce intellectual property rights against individuals who are illegally downloading files and websites that facilitate piracy. But by all counts, these efforts have failed to control the problem, and arguably damaged their reputations. ; Though music and movie piracy has received the most headlines, the PC video game industry has similarly suffered The video game industry, too, has pursued the traditional enforcement routes that other industries have used to combat piracy, with the same middling results. Thus, some developers have turned to alternative means of combating piracy, which are primarily aimed at changing the hearts and minds of its gaming community. By fostering a negative social stigma towards piracy, developers have found an effective means of protecting their intellectual property. ; This Article focuses on two primary methods that video game developers have used to combat Internet piracy. The first method is the use of open pricing models, whereby purchasers pay what they want for a particular game or package of games. The second method is the use of endogenous digital rights management technology that does not entirely restrict access to the game, but which can severely frustrate game play, often in a comical manner. The success of this latter method is unique to the game industry. Ultimately, these methods have had a positive effect on the industry's attempt to combat piracy. Intellectual property laws have already been amended and employed to combat piracy. Legislation and litigation are often the first responders to changing industry landscapes. Yet these traditional avenues have been ineffective in protecting intellectual property on the Internet. Perhaps, then, the answer lies in the video game industry's approach.",23,1,1,,The Internet; Advertising; Business; Control (management); Legislation; restrict; Enforcement; Video game; Intellectual property; Digital rights management,,,,,https://via.library.depaul.edu/cgi/viewcontent.cgi?article=1041&context=jatip https://via.library.depaul.edu/jatip/vol23/iss1/2/,https://via.library.depaul.edu/jatip/vol23/iss1/2/,,,2565538342,,0,,1,false,, 083-964-508-777-839,Efficacy of LPR Laws to Alleviate the Issues of TK Bio- Piracy,2012-01-01,2012,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Aradhana Satish Nair,,,,,,Law; Law and economics; Political science; Economics,,,,,,http://dx.doi.org/10.2139/ssrn.2117089,,10.2139/ssrn.2117089,,,0,,0,false,, 084-111-737-932-03X,CAAST targets piracy suspects,,1995,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1995,11,3,3,Computer security; Business; Computer science; Internet privacy,,,,,,http://dx.doi.org/10.1016/0142-0496(95)80055-7,,10.1016/0142-0496(95)80055-7,,,0,,0,false,, 084-292-983-849-288,Korea's Dispatch of a Naval Contingent to Somali Waters and International and Domestic Law of Piracy,,2009,journal article,SungKyunKwan Law Review,1229943x,"Institute of Legal Studies, Sungkyunkwan University",,Yeong-Don Loh,,21,3,993,1022,Economy; Political science; Somali; Municipal law,,,,,https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001405730,http://dx.doi.org/10.17008/skklr.2009.21.3.038,,10.17008/skklr.2009.21.3.038,2320533171,,0,,0,true,cc-by-nc,hybrid 084-531-667-236-012,Islam and the Cyber World,2014-09-01,2014,journal article,Journal of Educational and Social Research,2239978x; 22400524,Richtmann Publishing,,Abdi Omar Shuriye; Mosud T. Ajala,"The mixed reactions on the use of the internet technology which have resulted in different debates and crimes in the cyber world calls for assessment of the Islamic point of view of the issue. Cyber world created avenue for the Muslim Ummah in a form of virtual global community and it encouraged dialogue as well as access to information on a real time basis; and above all facilitated easy access to the Qur’an. Nonetheless, th same tool has opened doors for crimes such as pornography, victimization, bullying, stalking etc. Hence this study reviews the benefits of the internet technology and consequences of its misuse. The frame of reference in measuring both the negative and positive aspects of this technology will be the Islamic standpoint. DOI: 10.5901/jesr.2014.v4n6p513",4,6,513,,Internet privacy; The Internet; Sociology; Point (typography); Law; Stalking; Pornography; Access to information; Islam,,,,,https://www.mcser.org/journal/index.php/jesr/article/view/4120 https://core.ac.uk/display/102817851 https://www.mcser.org/journal/index.php/jesr/article/download/4120/4030 http://irep.iium.edu.my/39304/ https://core.ac.uk/download/pdf/228576746.pdf,http://dx.doi.org/10.5901/jesr.2014.v4n6p513,,10.5901/jesr.2014.v4n6p513,2039180435,,0,018-755-417-475-60X; 027-813-695-463-800; 031-776-139-440-207; 037-039-481-507-161; 042-885-585-556-025; 088-472-111-957-496; 117-177-728-835-913; 133-419-396-621-909; 198-866-198-221-659,1,true,cc-by,hybrid 084-651-149-980-235,Invisible Pirates: Women and the Gendered Roles of Somali Piracy:,2017-11-22,2017,journal article,Feminist Criminology,15570851; 1557086x,SAGE Publications,United States,Brittany Gilmer,"Women’s participation in maritime piracy activities has spanned throughout the centuries and across the globe. However, women as perpetrators of contemporary maritime piracy have yet to receive aca...",14,3,371,388,Gender studies; Political science; Globe; Somali; Maritime piracy,,,,U.S. Food and Drug Administration,http://journals.sagepub.com/doi/full/10.1177/1557085117741361 https://journals.sagepub.com/doi/abs/10.1177/1557085117741361,http://dx.doi.org/10.1177/1557085117741361,,10.1177/1557085117741361,2770870758,,0,003-289-413-860-818; 004-192-652-037-365; 009-016-498-650-821; 009-735-155-034-147; 011-120-536-745-496; 012-744-148-152-199; 026-723-211-754-551; 028-834-875-455-567; 031-847-680-380-957; 035-533-792-988-194; 045-366-283-216-484; 052-627-226-126-905; 057-099-376-185-64X; 057-862-473-906-564; 063-102-267-487-069; 063-704-391-997-830; 063-869-348-539-696; 063-997-954-685-964; 072-682-344-992-22X; 074-764-326-968-199; 074-889-032-333-496; 084-606-875-342-972; 088-878-116-664-326; 105-161-522-936-135; 114-747-496-811-535; 133-133-800-349-772; 139-044-367-254-150; 145-777-430-196-21X; 149-930-017-730-005,1,false,, 084-686-612-212-247,Foreign Fishing Piracy vs. Somalia Piracy – Does Wrong Equal Wrong?,,2010,journal article,The Barry Law Review,,,,Leticia M. Diaz; Barry Dubner,"This article is a sequel (and in some ways, a 'prequel') to our last article, On the Evolution of the Law of International Sea Piracy. That piece, prepared in April 2009, attempted to illustrate the enormous problem of sea piracy off of Somalia. It was updated through October 2009 and published in December 2009. We were invited to, and participated in, a conference sponsored by the Harvard Kennedy Center. Professor Robert Rotberg, Director of the Intrastate Conflict program at Harvard Kennedy School's Belfer Center for Science and International Affairs, was the coordinator for two days of intensive presentations and discussions (10-12 December, 2009). As a result of the conference, Harvard published a policy statement on how to combat sea piracy, with an emphasis on Somalia. In addition to your authors, the twenty-two conference panelists included individuals from different think tanks, the intelligence community, the U.S. State Department, and the military, including one of the Joint Chiefs of Staff. After each session's panelists presented individually, we launched into discussions. Prior to the conference, each panelist submitted a synopsis, which served to focus our discussions. Your authors discussed jurisdiction, sovereignty, the environment and human refugees who may be affected by sea piracy. We also learned quite a bit of new information. For example, one of the gentlemen present was from an African country. He provided a viewpoint that was both interesting and disturbing, and took us back to Somalia and a way of life that existed prior to the recent surge of piracy in that region. We left the conference inspired to write this article which sets forth a view of why Somali piracy started and some of the problems created by these illegal acts. Harvard's policy statement will speaks for itself.",14,1,4,,Refugee; Political science; Sovereignty; Law; State (polity); Somali; Jurisdiction; Think tanks; International relations; Fishing,,,,,http://lawpublications.barry.edu/cgi/viewcontent.cgi?article=1029&context=barrylrev https://lawpublications.barry.edu/cgi/viewcontent.cgi?article=1029&context=barrylrev,http://lawpublications.barry.edu/cgi/viewcontent.cgi?article=1029&context=barrylrev,,,3121731266,,0,,0,false,, 084-877-603-286-545,Genetic Resources:from Bio-piracy to Fair Access and Benefit Sharing——A Legislative Perspective,,2012,journal article,Journal of Northeastern University,,,,Sui Jun,"Bio-piracy is harmful to the countries and owners of genetic resources,and goes against the protection of biological diversity.To avoid bio-piracy,the relevant international conventions have established the principles of access and benefit sharing of genetic resources.It is great progress;however,detailed plans and specified enforcement mechanisms are still to be developed.The key to improving the relevant international legislation is to make the principles of access and benefit sharing of genetic resources enforceable.For this purpose,countries of abundant genetic resources have been dealing with this issue and made great efforts in their domestic legislation.China,one of such countries,is supposed to attain the goal via special legislation of access and benefit sharing of genetic resources,and duly modify the domestic laws and regulations of biological resources protection by fairly and reasonably supplementing or adding special clauses of access and benefit sharing in unison with different characteristics of biological resources.",,,,,Risk analysis (engineering); Business; Key (cryptography); Perspective (graphical); Legislation; Enforcement; Unison; Benefit sharing; Genetic resources; Management science; Legislature,,,,,https://en.cnki.com.cn/Article_en/CJFDTOTAL-DBDS201205014.htm,https://en.cnki.com.cn/Article_en/CJFDTOTAL-DBDS201205014.htm,,,2393358301,,0,,0,false,, 084-909-784-742-91X,Is There A Piracy Kuznets Curve,2012-01-31,2012,journal article,Review of Law & Economics,15555879,Walter de Gruyter GmbH,Germany,Sana El Harbi; Gilles Grolleau; Insaf Bekir,"We investigate empirically the relationship between software piracy and GDP per capita by considering non-linear effects. We use a panel data analysis for 100 countries over a period of 15 years. We remedy several previous econometric and methodological shortcomings and show that piracy follows a Kuznets-like curve. Concretely, piracy first increases with the level of GDP per capita, reaches a maximum, and then decreases at higher levels of income. Making people richer can be the best way to decrease piracy over the long-term horizon. Intellectual property rights holders should not aim for a decrease of piracy per se, but rather a decrease of piracy in those circumstances where it is most likely to be substituted by legal sales. Economic growth can generate by itself incentives to curb piracy.",8,2,433,456,Per capita; International trade; Economics; Kuznets curve; Incentive; Intellectual property; Monetary economics; Panel data,,,,,https://EconPapers.repec.org/RePEc:bpj:rlecon:v:8:y:2012:i:2:n:4 https://ideas.repec.org/a/bpj/rlecon/v8y2012i2n4.html,http://dx.doi.org/10.1515/1555-5879.1527,,10.1515/1555-5879.1527,1987620314,,0,,5,false,, 084-995-589-177-55X,Protection of Foreign Ships against Piracy and Terrorism at Sea: Legal Aspects,,2003,journal article,The International Journal of Marine and Coastal Law,09273522; 15718085,Brill,Netherlands,H.E. Joséluis Jesus,"This presentation gives a factual assessment of the phenomenon of piracy and other forms of terrorism at sea as well as a legal analysis of the respective international provisions to suppress such forms of violence. The points of difference between the international rules against piracy and terrorism are noted and the author calls for a more coherent approach and a more intensified cooperation in that respect. Otherwise, he argues, the freedom of navigation will be jeopardised.",18,3,363,400,Political science; Law; Terrorism; Presentation; Legal analysis; Freedom of navigation; Phenomenon; Law of the sea; International law,,,,,https://booksandjournals.brillonline.com/content/journals/10.1163/092735203770223585 https://brill.com/view/journals/estu/18/3/article-p363_4.xml?language=en,http://dx.doi.org/10.1163/092735203770223585,,10.1163/092735203770223585,2017420078,,0,,44,false,, 085-140-326-986-93X,On the Legal Issues against Somali Pirates,,2009,journal article,Hebei Law Science,,,,Liu Ji-yong,"The activity of the Somali pirates draws all the people's attention in the world and it's the main issues of the international politics nowadays. A number of solutions were made through UN Security Council and many countries sent warships to waters near Somalia to implement the task to combat piracy,including the United States,Russia,NATO,the European Union,India and China. The regulations against piracy in international law and the legality of the action of the countries is the key. That will promote the coordination and cooperation among the countries and development of the international commerce to confirm the legitimacy of the action of under the framework of the United Nations system.",,,,,Political science; China; Law; Somali; Action (philosophy); European union; International relations; Principle of legality; Legitimacy; International law,,,,,https://en.cnki.com.cn/Article_en/CJFDTOTAL-HBFX200909011.htm,https://en.cnki.com.cn/Article_en/CJFDTOTAL-HBFX200909011.htm,,,2391676350,,0,,0,false,, 085-537-291-569-081,Legislating Against Cybersquatting in Nigeria: Moving Beyond Penal Law Into Protective and Compensational Remedies,,2019,journal article,"Journal of Law, Policy and Globalization",,"International Institute for Science, Technology and Education",,,"“It appears almost to be the case that an incident of cybersquatting is an integral consequence of commercial success” – Ian J. Lloyd (2011) Abstract This paper analyses the menace of cybersquatting on the cyberian frontier in Nigeria with a look to offer real protection to owners of real trademarks and domain names. It examines the provisions of the United States Anticybersquatting Consumer Protection Act of 1999 and the practice adopted in the UK to protect real trademark owners. It examines Nigeria’s recent effort at legislating to combat cybercrime via the Cybercrime (Prohibition, Prevention Etc.) Act, 2015 especially the provisions of Section 25 dealing with cybersquatting and points out the various inadequacies of the legislation. It suggests the need to move beyond a criminal viewpoint and penal sanctions and allow for remedies in the laws of tort that secures private rights. It concludes by challenging law-making authorities in Nigeria to make laws that accord with global trends in the light of the inter-territoriality of cyberspace. Keywords: Cybersquatting, domain names, Infringement, Internet, DOI: 10.7176/JLPG/84-10 Publication date: April 30th 2019 ",,,,,,,,,,https://core.ac.uk/download/pdf/234652142.pdf,http://dx.doi.org/10.7176/jlpg/84-10,,10.7176/jlpg/84-10,,,0,,0,true,cc-by,hybrid 085-903-519-647-187,Eleven from Somalia to be Tried for Piracy in Federal Court in Virginia; Maersk Alabama Pirate Pleads Guilty; United States Supports Russian Piracy Resolution,,2010,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),,,,104,3,500,501,,,,,,,http://dx.doi.org/10.5305/amerjintelaw.104.3.0500,,10.5305/amerjintelaw.104.3.0500,,,0,,2,false,, 086-172-636-324-58X,"War on Piracy: The conflation of Somali piracy with terrorism in discourse, tactic, and law",2016-09-30,2016,journal article,Security Dialogue,09670106; 14603640,SAGE Publications,United States,Currun Singh; Arjun S. Bedi,"This article argues that since 2005, the global security discourse has confused maritime piracy off the Horn of Africa with terrorism. US and European policymakers and financiers have tapped a vulnerable public imaginary to exaggerate Somali pirates as ‘maritime terrorists’ linked to Al-Shabaab and Al-Qaeda, driving the militarization and legal obfuscation of counter-piracy operations. And while Somali piracy has all but disappeared since 2013, international naval coalitions remain deployed in the Indian Ocean, which is still declared a war risk area. The discursive conflation of piracy and terrorism has thereby launched a tactical War on Piracy that mirrors the War on Terror. While pirates were active, this approach pushed them to become more daring and dangerous in response. Drawing on interviews with piracy stakeholders in Kenya, the article concludes that the tactical extension from counter-terrorism to counter-piracy is unresponsive to the origins, motives, and realities of Somali pirates. The articl...",47,5,440,458,Conflation; The Imaginary; Political science; Law; Terrorism; Somali; Militarization; Risk area; International security; Spanish Civil War,,,,,http://journals.sagepub.com/doi/10.1177/0967010616665275 https://repub.eur.nl/pub/93562/ http://journals.sagepub.com/doi/full/10.1177/0967010616665275 http://www.narcis.nl/publication/RecordID/oai%3Arepub.eur.nl%3A32374 https://journals.sagepub.com/doi/abs/10.1177/0967010616665275 https://repub.eur.nl/pub/32374/wp543.pdf,http://dx.doi.org/10.1177/0967010616665275,,10.1177/0967010616665275,2132719547,,0,004-471-725-834-982; 006-033-662-206-235; 006-214-225-039-718; 011-779-979-888-627; 015-177-345-344-959; 016-018-095-806-249; 018-958-674-593-738; 023-017-908-012-665; 023-933-177-265-231; 024-013-108-178-470; 025-005-198-695-661; 027-453-856-896-580; 027-646-963-496-399; 028-467-937-942-167; 035-665-356-654-854; 036-385-303-167-702; 036-851-954-104-719; 037-812-743-797-150; 041-449-440-633-491; 041-509-911-030-091; 041-830-093-318-333; 043-615-435-772-060; 044-656-899-751-353; 046-203-204-496-538; 050-433-006-581-158; 053-624-882-556-797; 055-489-068-296-947; 057-301-065-335-715; 058-562-758-507-964; 059-947-700-469-364; 062-966-552-149-474; 073-469-730-145-057; 077-487-287-544-452; 079-942-736-984-635; 085-933-591-820-64X; 089-326-096-722-744; 095-671-658-879-992; 096-251-870-101-972; 096-322-529-846-052; 100-334-126-338-038; 105-161-522-936-135; 113-589-375-707-427; 120-990-389-121-587; 121-186-616-541-856; 126-085-150-257-456; 132-295-169-193-408; 137-983-597-179-814; 142-798-520-339-548; 144-074-714-917-325; 151-321-584-738-183; 160-230-087-209-937; 160-758-256-694-458; 162-945-758-413-173; 180-490-305-918-94X; 183-910-044-656-167; 189-324-206-391-090; 192-548-100-346-575; 197-623-476-961-751; 198-365-526-040-377,17,true,,green 086-353-705-573-700,REFLECTIONS ON THE EU FOREIGN POLICY OBJECTIVES BEHIND THE ‘INTEGRATED APPROACH’ IN THE RESPONSE TO PIRACY OFF SOMALIA,2009-12-30,2009,journal article,Croatian Yearbook of European Law and Policy,18455662; 18489958,Pravni Fakultet Sveucilista u Zagrebu (Law School of the University of Zagreb),Croatia,María Luisa Sánchez Barrueco,"The upsurge in pirate attacks on European vessels in the Gulf of Aden during 2008 brought the forgotten confl ict of Somalia back onto the international political agenda. It soon became clear that no initiative off the Somali coast could be effective unless it was accompanied by efforts to relieve the root causes of piracy. This article examines fi rst the essential features of the situation in Somalia, providing the necessary background to fully grasp not only the root causes of piracy, but also the risk to Western security posed by recent developments in this failed State. As regards the European Union, piracy- related incidents in the Gulf of Aden entail multi-faceted threats against European interests. A key question which arises is the extent to which the European response to Somali pirates truly follows a comprehensive, integrated approach. Following an empirical analysis of development co-operation tools implemented in Somalia over recent years, as well as a thorough assessment of the legal mandate and several shortcomings faced by the fi rst EU naval military operation, EU NAVFOR-Atalanta, we conclude that the EU response to piracy is stretched and inadequate both on land and off-shore. Therefore, the reality contradicts to a great extent political statements at the EU level. A possible explanation for this somewhat frustrating outcome is provided by a theoretical examination of the objectives (besides having an impact on the ground in Somalia) behind EU Foreign Policy. Objectives linked to the visibility of the EU as a global actor, as well as the Europeanisation of foreign and internal policies of Member States will be particularly emphasised.",5,5,195,195,Political economy; Geography; Mandate; Somali; Failed state; Military operation; Europeanisation; Political agenda; European union; Development economics; Foreign policy,,,,,https://www.cyelp.com/index.php/cyelp/article/view/86 https://www.cyelp.com/index.php/cyelp/article/download/86/60,http://dx.doi.org/10.3935/cyelp.05.2009.86,,10.3935/cyelp.05.2009.86,1587207379,,0,,3,true,cc-by-nc-nd,gold 086-540-955-251-505,"The Law of Piracy: ""Piracy"" in the Twentieth Century",,1988,journal article,International law studies,21546266,,,Alfred P. Rubin,,63,1,6,,Universality (philosophy); International waters; Political science; Law; Universal jurisdiction; Law of war; Law of the sea; International law; Territorial waters,,,,,https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1770&context=ils https://digital-commons.usnwc.edu/ils/vol63/iss1/6/,https://digital-commons.usnwc.edu/ils/vol63/iss1/6/,,,3163538342,,0,,0,false,, 086-542-819-948-569,ON THE ISSUE OF WAYS TO COUNTER MARITIME PIRACY,2022-02-19,2022,journal article,Globus: economy sciences,27133052,Serenity-group,,Egor M. Porechny,"Maritime piracy is one of the most important geopolitical problems. Statistics do not allow us to conclude that piracy is completely localized. Every year, dozens of acts of piracy are committed all over the world, which damages not only the economies of states, but also leads to the death of people. Not only the geography of piracy acts is changing, but also the methods of their commission, which significantly complicates the process of countering. In this regard, the question arises about the effectiveness of modern means of countering piracy. In the article, the author shows the most effective means of combating acts of piracy, talks about the problem of codification of the norms of international law, which prevents the creation of a single normative legal act uniting all the norms on combating piracy.",8,1(45),6,8,Normative; Commission; Political science; Geopolitics; Damages; Law and economics; Law; International trade; Political economy,,,,,,http://dx.doi.org/10.52013/2713-3052-45-1-2,,10.52013/2713-3052-45-1-2,,,0,046-492-865-880-872,0,true,,bronze 086-955-771-532-956,The Innovative Design Protection and Piracy Prevention Act: Re-Fashioning U.S. Intellectual Property Law,2014-10-14,2014,journal article,Depaul Law Review,00117188,,,Katherine M. Olson,,61,2,725,,Political science; Law; Intellectual property,,,,,https://via.library.depaul.edu/law-review/vol61/iss2/16/ https://via.library.depaul.edu/cgi/viewcontent.cgi?article=1101&context=law-review,https://via.library.depaul.edu/law-review/vol61/iss2/16/,,,279149722,,0,,0,false,, 087-094-783-170-15X,Russians say Nyet to piracy,,1992,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1992,5,5,5,Business; Internet privacy; Computer security; Computer science,,,,,,http://dx.doi.org/10.1016/s0142-0496(09)90080-7,,10.1016/s0142-0496(09)90080-7,,,0,,0,false,, 087-214-661-580-584,The Pirate and the Admiral: Europeanisation and Globalisation of Maritime Conflict Management,2019-02-19,2019,journal article,Journal of the History of International Law / Revue d'histoire du droit international,1388199x; 15718050,Brill,Netherlands,Louis Sicking,"Piracy holds a special place within the field of international law because of the universal jurisdiction that applies: any state may seize a pirate ship on the high seas and decide upon the penalties to be imposed, as is currently the case with Somali and West African pirates. Unlike today, piracy was the norm in pre-modern times. Maritime trade and piracy went hand in hand. At the same time, kings and emperors recruited their admirals from among pirates. This raises the question of how princes, states and cities distinguished between legal and illegal violence at sea. How did they deal with maritime conflict among themselves and among their respective subjects and citizens? This article puts maritime conflict management in a European, global and long term perspective while avoiding anachronistic and teleological approaches. Finally, it argues that pre-modern conflict management is relevant to understand maritime security in the twenty-first century.",20,4,429,470,International waters; Political science; Public international law; Law; Globalization; Universal jurisdiction; Maritime security; Conflict management; Europeanisation; International law,,,,,https://www.narcis.nl/publication/RecordID/oai%3Aresearch.vu.nl%3Apublications%2F04bdc851-c777-4b7d-8e22-edb14358e772 https://research.vu.nl/en/publications/the-pirate-and-the-admiral-europeanisation-and-globalisation-of-m https://brill.com/view/journals/jhil/20/4/article-p429_2.xml?language=en,http://dx.doi.org/10.1163/15718050-12340098,,10.1163/15718050-12340098,2921017375,,0,000-896-925-907-742; 007-811-981-895-060; 015-158-799-912-945; 017-204-421-471-444; 022-376-479-423-404; 024-216-889-042-09X; 029-680-053-781-475; 033-315-006-239-252; 035-939-886-805-088; 036-309-090-922-764; 040-219-306-828-925; 040-640-873-049-521; 041-809-066-417-196; 044-320-971-208-656; 055-350-072-413-417; 060-047-538-330-170; 065-927-924-897-631; 067-883-387-891-568; 070-068-126-253-215; 070-614-335-265-162; 072-188-557-191-588; 072-491-252-037-872; 076-271-027-752-088; 081-070-088-113-271; 083-175-465-503-958; 083-697-990-797-016; 084-857-928-116-810; 093-719-130-118-068; 100-853-162-248-165; 101-392-345-028-12X; 101-870-400-420-890; 102-407-753-879-711; 103-181-067-294-040; 112-742-803-812-867; 119-905-657-179-773; 122-719-541-935-222; 124-283-409-285-304; 125-378-524-744-236; 127-848-356-081-66X; 132-886-511-869-587; 139-976-138-233-225; 143-853-663-670-428; 145-266-638-789-546; 153-549-577-500-277; 158-661-702-874-174; 159-642-853-256-982; 168-120-718-694-347; 190-654-891-286-279,4,false,, 087-238-293-000-166,European piracy costing $3.5 billion,,1997,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,1997,4,3,3,Activity-based costing; Business; Computer security; International trade; Computer science; Accounting,,,,,,http://dx.doi.org/10.1016/s1361-3723(97)83545-2,,10.1016/s1361-3723(97)83545-2,,,0,,0,false,, 087-535-666-493-292,A Study on the Roles of ROK Navy against combating Piracy in Gulf of Guinea,2020-11-30,2020,journal article,Maritime Law Review,15981053; 26718235,Korean Institute of Maritime Law,,Jong-Eun Kim; 해군작전사령부 제 성분전단; Sung-Hwa Hong,,32,3,243,275,Economy; Political science; Navy,,,,,https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART002649505,http://dx.doi.org/10.14443/kimlaw.2020.32.3.10,,10.14443/kimlaw.2020.32.3.10,3107661597,,0,,1,false,, 087-658-479-785-898,Napster clones turn their attention to academic e‐books,2003-05-01,2003,journal article,New Library World,03074803,Emerald,United Kingdom,Mark Van Hoorebeek,"This article discusses the effects of “Napster‐like” clone programs on the future of academic e‐books. This review will, first, catalogue the rise and fall of Napster and the development of clone programs that facilitate peer‐to‐peer file sharing; second, examine the main methods by which e‐books are placed on the Web; third, discuss piracy and the subsequent legal issues of intellectual property. Finally, the concept of e‐books in the world of academic publications will be analysed.",104,4/5,142,148,Sociology; Library science; Clone (computing); Intellectual property; File sharing,,,,,http://www.emeraldinsight.com/doi/abs/10.1108/03074800310475954 https://www.emerald.com/insight/content/doi/10.1108/03074800310475954/full/html,http://dx.doi.org/10.1108/03074800310475954,,10.1108/03074800310475954,2089308056,,0,004-925-266-985-733; 010-836-605-088-352; 013-709-145-598-016; 015-350-054-843-682; 027-701-565-777-67X; 029-629-972-058-145; 039-224-567-946-752; 056-776-280-061-385; 060-760-379-279-622; 067-760-831-191-577; 084-485-934-859-405; 092-537-521-395-245; 095-411-950-973-467; 100-920-413-065-695; 120-171-104-186-151; 128-441-509-190-704; 161-664-763-326-552; 170-754-802-379-901; 173-133-086-178-339,12,false,, 087-747-684-285-280,Intelligent anti-piracy measure discovered,,2001,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,2001,8,4,4,Measure (data warehouse); Computer science; Computer security; Internet privacy; Business; Data mining,,,,,,http://dx.doi.org/10.1016/s1361-3723(01)00808-9,,10.1016/s1361-3723(01)00808-9,,,0,,0,false,, 088-059-073-436-69X,Virtual Border Customs: Prevention of International Online Music Piracy Within the Ever-Evolving Technological Landscape,2011-05-16,2011,journal article,Valparaiso University law review,00422363,,,Lance D. Clouse,,38,1,109,164,Advertising; Business; Online music; Commerce,,,,,https://scholar.valpo.edu/cgi/viewcontent.cgi?article=1336&context=vulr https://scholar.valpo.edu/vulr/vol38/iss1/4/,https://scholar.valpo.edu/vulr/vol38/iss1/4/,,,1497523126,,0,,0,false,, 088-141-375-865-257,The role of gender in predicting the willingness to engage in digital piracy among college students,2009-12-18,2009,journal article,Criminal Justice Studies,1478601x; 14786028,Informa UK Limited,United Kingdom,Robert G. Morris; Matthew C. Johnson; George E. Higgins,"Scholars have provided increased attention toward the issue of digital piracy in recent years; however, few studies have focused on the issue of gender in predicting digital piracy. This study explores the role of gender in predicting college students’ willingness to participate in varying forms of digital piracy (n = 585). The findings suggest that gender is not directly related to digital piracy when controlling for other factors. Furthermore, the findings suggest that the impact from existing theories of crime (social learning, self‐control, techniques of neutralization, and microanomie) are equivalent across genders. A discussion is provided in the context of future theory development and in the development of policy implications geared toward curtailing digital piracy.",22,4,393,404,Psychology; Development theory; Techniques of neutralization; Cybercrime; Context (language use); Digital piracy; Public relations; Social psychology; Social learning,,,,,https://www.tandfonline.com/doi/full/10.1080/14786010903358117,http://dx.doi.org/10.1080/14786010903358117,,10.1080/14786010903358117,2012745835,,0,000-644-495-802-797; 005-136-753-965-857; 010-146-711-506-660; 011-240-751-424-691; 011-970-832-954-189; 013-425-010-292-015; 013-446-422-693-352; 013-953-633-484-813; 016-445-988-162-336; 016-784-508-297-706; 020-911-565-436-921; 020-973-534-331-792; 022-527-075-036-569; 026-787-153-498-002; 030-492-635-038-769; 042-740-939-869-735; 046-989-664-357-368; 052-437-967-794-081; 058-806-863-894-52X; 067-339-005-241-596; 072-084-774-976-983; 092-945-483-843-213; 093-524-138-699-020; 096-401-039-718-213; 096-762-470-199-768; 098-570-250-639-553; 099-342-173-833-089; 101-108-234-017-881; 104-904-305-990-328; 109-400-305-047-930; 109-881-092-706-882; 116-760-844-878-63X; 120-417-554-411-771; 132-074-983-506-465; 138-200-974-413-518; 150-527-549-363-854; 165-651-170-191-915; 175-905-268-229-256,21,true,,bronze 088-260-669-357-903,Bezpieczeństwo teleinformatyczne w świetle europejskiej Konwencji o cyberprzestępczości,2011-06-15,2011,journal article,Przegląd Strategiczny,20846991,Adam Mickiewicz University Poznan,Poland,Jędrzej Skrzypczak,"The subject of this paper is the analysis of the main regulation of the the European Convention on Cybercrime. In particular, it attempts to answer the question whether the Convention provides sufficient level of European IT security.",,1,51,58,Political science; Law; Subject (philosophy); Convention; Convention on Cybercrime,,,,,https://repozytorium.amu.edu.pl/bitstream/10593/2149/1/Skrzypczak.pdf https://www.ceeol.com/search/article-detail?id=644594 https://repozytorium.amu.edu.pl/handle/10593/2149 https://core.ac.uk/display/154443333 https://core.ac.uk/download/154443333.pdf,http://dx.doi.org/10.14746/ps.2011.1.4,,10.14746/ps.2011.1.4,66262413,,0,,1,true,cc-by,hybrid 088-594-592-774-257,Djibouti and Beyond: Japan’s First Post-War Overseas Base and the Recalibration of Risk in Securing Enhanced Military Capabilities,2017-09-06,2017,journal article,Asian Security,14799855; 15552764,Informa UK Limited,United States,Ra Mason,"Having passed successive legislation in the past two decades to expand its use of the Japan Self Defense Force (JSDF), Japan has emerged from its post-war ‘pacifist’ shackles to assume a range of security roles that are typically associated with so-called ‘normal nations’. This article addresses how these have been crystallized in the form of an indefinitely-termed overseas base on the Horn of Africa, in Djibouti. Careful examination of pertaining Diet minutes, media discourse and government ministry papers suggests that the risks identified with this facility’s realization and status have been fundamentally recalibrated, allowing its presence and operational diversification to go largely unnoticed and unopposed – both domestically and overseas – despite representing a seemingly radical departure from common sense interpretations of Japan’s antimilitarist constitution.",14,3,339,357,Political economy; Government; Political science; Diversification (marketing strategy); Constitution; Legislation; Common sense; Self defense; Post war; Development economics; Christian ministry,,,,,https://core.ac.uk/display/131079298 https://ueaeprints.uea.ac.uk/id/eprint/64858/ https://www.tandfonline.com/doi/abs/10.1080/14799855.2017.1355303 https://core.ac.uk/download/131079298.pdf,http://dx.doi.org/10.1080/14799855.2017.1355303,,10.1080/14799855.2017.1355303,2750788964,,0,,3,true,,green 088-631-020-346-484,The application of unmanned aerial vehicles in managing port and border security in the US and Kuwait: Reflections on best practice for the UK,2020-02-27,2020,journal article,International Journal of Maritime Crime and Security,26313855; 26313863,Centre for Business and Economic Research,,Suwaid Al Abkal; Risto Henrik Aleksander Talas; Sarah Shaw; Tom Ellis,,01,01,,,Business; Port (computer networking); Best practice; Brexit; Port security; Border Security; Drone; Telecommunications,,,,,http://www.ijmcs.co.uk/details&cid=5 https://researchportal.port.ac.uk/portal/en/publications/the-application-of-unmanned-aerial-vehicles-in-managing-port-and-border-security-in-the-us-and-kuwait-reflections-on-best-practice-for-the-uk(6ff804c5-5b0f-4865-910a-f7a16d954515).html http://jbrmr.com/cdn/article_file/2020-03-02-13-43-49-PM.pdf https://core.ac.uk/download/294782250.pdf,http://dx.doi.org/10.24052/ijmcs/v01is01/art-3,,10.24052/ijmcs/v01is01/art-3,3009439879,,0,,2,true,,green 088-732-770-619-86X,"By Anna Petrig, Ed—2010: sea piracy law: selected national legal frameworks and regional legislative approaches/droit de la piraterie maritime: cadres juridiques nationaux et approches législatives régionales",2011-10-05,2011,journal article,WMU Journal of Maritime Affairs,1651436x; 16541642,Springer Science and Business Media LLC,Sweden,Chie Kojima,"The dramatic increase of piracy and armed robbery against ships in the Western Indian Ocean and the Gulf of Aden in the last years highlighted the lack of national and regional legal frameworks for the punishment for these crimes in the region. From the perspective of criminal lawyers, the United Nations Security Council Resolutions 1816(2008), 1846(2008), and 1851(2008) that authorized states to use military forces “within the territorial waters of Somalia” and “in Somalia” for the purpose of suppressing piracy and armed robbery against ships had little impact on the criminal prosecution of perpetrators. While a number of western states cooperated in taking enforcement measures off the coast of Somalia for the suppression and deterrence of acts of piracy and armed robbery against ships, they were reluctant to prosecute captured pirates in their domestic courts. A number of captured pirates were, therefore, transferred to Somalia’s neighboring states for prosecution or otherwise released without punishment. Having faced this reality, the Security Council, under Resolution 1976(2011), urged all states to criminalize piracy under their domestic law and decided to “urgently consider the establishment of specialized Somali courts to try suspected pirates both in Somalia and in the region, including an extraterritorial Somali specialized anti-piracy court [...] consistent with applicable human rights law”. It is timely in this context that the book Sea Piracy Law: Selected National Legal Frameworks and Regional Legislative Approaches/Droit de la piraterie maritime: Cadres juridiques nationaux et approches legislatives regionals, edited by Anna Petrig, is published from Duncker & Humblot. The book compiles three articles WMU J Marit Affairs (2011) 10:243–245 DOI 10.1007/s13437-011-0015-9",10,2,243,245,Human rights; Political science; Public international law; Law; Somali; Context (language use); Deterrence theory; Legislature; Municipal law; Territorial waters,,,,,https://link.springer.com/article/10.1007/s13437-011-0015-9?error=cookies_not_supported&error=cookies_not_supported&code=542115ab-d3a6-4a85-bc79-104a98ce6fce&code=d8eb8bea-f09b-4465-b0df-4e412e8af216 https://link.springer.com/article/10.1007/s13437-011-0015-9,http://dx.doi.org/10.1007/s13437-011-0015-9,,10.1007/s13437-011-0015-9,173023834,,0,,0,false,, 088-849-580-697-604,Legislation is not enough to combat software piracy,,1988,journal article,Computer Fraud & Security Bulletin,01420496,Mark Allen Group,United Kingdom,Laura Campbell,,10,12,3,6,Business; Legislation; Software; Computer security,,,,,http://linkinghub.elsevier.com/retrieve/pii/0142049688901075 http://www.sciencedirect.com/science/article/pii/0142049688901075,http://dx.doi.org/10.1016/0142-0496(88)90107-5,,10.1016/0142-0496(88)90107-5,2036469614,,0,,1,false,, 088-855-551-481-936,Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian cybercriminals,,2016,journal article,"International Journal of Law, Crime and Justice",17560616,Elsevier BV,Netherlands,Suleman Ibrahim,"Abstract This article aims to establish the particularities of cybercrime in Nigeria and whether these suggest problems with prevailing taxonomies of cybercrime. Nigeria is representative of the Sub-Saharan region, and an exemplary cultural context to illustrate the importance of incorporating social and contextual factors into cybercrime classifications. This paper anchors upon a basic principle of categorisation alongside motivational theories, to offer a tripartite conceptual framework for grouping cybercrime nexus. It argues that cybercrimes are motivated by three possible factors: socioeconomic, psychosocial and geopolitical. Whilst this contribution challenges the statistics relied on to inform the prevalence of cybercrime perpetrators across nations, it provides new ways of making sense of the voluminous variances of cybercrime. Concomitantly, it enables a clearer conceptualisation of cybercrime in Nigeria and elsewhere, because jurisdictional cultures and nuances apply online as they do offline.",47,,44,57,Conceptual framework; Sociology; Socioeconomic status; Nexus (standard); Psychosocial; Geopolitics; Cybercrime; Cultural context; Public relations; Taxonomy (general),,,,,https://cyberleninka.org/article/n/1421079 https://core.ac.uk/display/82566571 https://www.sciencedirect.com/science/article/pii/S1756061616300787 https://www.sciencedirect.com/science/article/abs/pii/S1756061616300787 https://core.ac.uk/download/pdf/82566571.pdf,http://dx.doi.org/10.1016/j.ijlcj.2016.07.002,,10.1016/j.ijlcj.2016.07.002,2508426536,,0,001-080-006-621-430; 002-585-684-118-922; 004-965-245-844-84X; 006-438-804-530-969; 011-027-737-860-793; 011-568-114-633-81X; 015-379-614-622-570; 016-611-055-745-784; 019-018-600-021-194; 020-742-535-882-31X; 021-009-242-479-230; 021-247-767-351-647; 027-113-578-824-606; 029-570-175-723-313; 030-433-105-959-798; 031-251-687-452-514; 031-584-901-404-050; 031-764-728-634-634; 033-277-921-984-569; 034-960-488-093-556; 036-744-550-710-68X; 037-995-429-148-720; 038-435-874-741-881; 042-577-662-778-015; 047-855-761-974-539; 048-214-999-047-029; 050-007-955-888-328; 050-944-414-684-185; 052-203-105-291-198; 054-504-228-886-206; 054-707-669-799-693; 057-372-064-186-277; 058-857-423-596-123; 062-465-677-174-053; 062-637-514-391-537; 066-662-255-566-362; 068-462-659-808-109; 068-825-095-491-467; 071-344-103-527-37X; 071-476-960-074-058; 073-176-345-577-188; 078-073-724-095-509; 078-452-608-209-37X; 080-290-856-171-297; 082-668-000-020-920; 087-289-666-522-988; 089-497-077-793-228; 092-580-657-904-903; 094-361-408-466-554; 098-810-652-555-766; 101-889-469-436-823; 107-611-681-555-16X; 113-055-394-822-010; 118-429-208-822-451; 122-776-046-287-53X; 128-117-380-431-540; 131-251-631-558-104; 132-954-479-691-660; 133-274-773-957-308; 134-041-745-382-569; 137-229-865-575-596; 137-298-307-797-644; 145-938-958-807-423; 147-180-639-211-223; 153-171-255-298-924; 166-287-559-701-440; 173-067-570-117-666; 194-103-674-095-411,53,true,cc-by,hybrid 088-919-144-559-214,Nature or nurture? A meta-analysis of the factors that maximize the prediction of digital piracy by using social cognitive theory as a framework,,2017,journal article,Computers in Human Behavior,07475632,Elsevier BV,United Kingdom,Paul Benjamin Lowry; Jun Zhang; Tailai Wu,"Abstract Digital piracy has permeated virtually every country and costs the global economy many billions of dollars annually. Digital piracy is the unauthorized and illegal digital copying or distribution of digital goods, such as music, movies, and software. To date, researchers have used disparate theories and models to understand individuals' motivations for stealing and sharing digital content. To establish a unified understanding of digital piracy research in order to set an agenda for future studies, we conducted a meta-analysis of the literature. We analyzed 257 unique studies with a total of 126,622 participants to examine all the major constructs and covariates used in the literature. Using social cognitive theory, we were able to resolve several contradictions and trade-offs found in the digital piracy literature. Further, our meta-analytic results suggest that four key sets of factors maximize prediction: (1) outcome expectancies (considerations of rewards, perceived risks, and perceived sanctions), (2) social learning (positive and negative social influence and piracy habit), (3) self-efficacy and self-regulation (perceived behavioral control and low self-control), and (4) moral disengagement (morality, immorality, and neutralization). Based on our results, we describe several patterns in the literature that suggest opportunities to further synthesize the literature and expand the boundaries of digital piracy research.",68,68,104,120,Internet privacy; Social influence; Social cognitive theory; Psychology; Digital goods; Copying; Digital content; Copyright infringement; Moral disengagement; Social psychology; Social learning,,,,,https://www.sciencedirect.com/science/article/pii/S0747563216307567 https://dblp.uni-trier.de/db/journals/chb/chb68.html#LowryZW17 https://dl.acm.org/doi/10.1016/j.chb.2016.11.015 https://core.ac.uk/display/95561446 https://www.infona.pl/resource/bwmeta1.element.elsevier-bf42ee58-bff1-33d0-a6d6-e94409d7a48c https://core.ac.uk/download/95561446.pdf,http://dx.doi.org/10.1016/j.chb.2016.11.015,,10.1016/j.chb.2016.11.015,2554603492,,0,001-226-155-152-112; 002-008-964-671-693; 002-418-326-034-43X; 002-803-239-151-807; 003-044-767-916-828; 004-902-541-336-18X; 005-356-599-638-405; 006-514-369-290-463; 007-311-552-230-481; 007-606-712-694-380; 009-126-873-235-396; 009-299-623-546-736; 010-146-711-506-660; 011-575-395-288-025; 011-970-832-954-189; 012-715-612-090-508; 012-736-223-459-933; 012-920-308-188-108; 013-589-273-901-40X; 015-381-893-535-56X; 016-178-397-459-142; 016-403-634-914-929; 016-714-829-732-410; 017-349-318-774-487; 018-562-467-695-263; 018-837-015-465-133; 019-459-021-342-157; 020-862-797-519-306; 021-709-225-420-349; 021-865-306-078-308; 023-337-450-642-691; 023-900-890-078-094; 024-141-350-039-344; 024-178-065-161-008; 025-002-464-898-100; 025-757-860-754-921; 026-494-742-706-253; 026-709-559-969-202; 028-999-447-590-450; 029-515-731-034-921; 031-897-094-033-050; 033-485-482-315-713; 033-545-857-174-462; 034-108-463-163-905; 034-697-067-376-78X; 035-783-038-125-989; 035-939-305-414-282; 036-054-692-608-308; 036-206-197-513-432; 036-516-944-274-927; 037-277-056-064-041; 039-363-888-980-214; 042-545-263-646-860; 042-840-674-327-735; 043-844-458-738-657; 046-039-902-428-59X; 046-189-256-421-732; 046-865-213-703-191; 047-164-784-581-057; 048-060-330-802-96X; 049-144-726-492-915; 051-851-761-421-930; 053-322-660-942-71X; 054-905-884-720-017; 056-157-179-063-156; 056-541-325-308-569; 057-333-560-358-777; 057-668-936-444-53X; 057-776-082-936-28X; 058-229-186-812-541; 058-806-863-894-52X; 061-964-503-020-505; 062-180-644-489-615; 063-480-155-453-700; 067-262-783-758-855; 067-339-005-241-596; 067-817-563-021-073; 067-946-305-534-344; 068-483-088-788-513; 069-037-892-373-868; 069-278-029-767-783; 070-516-503-749-643; 070-660-090-646-684; 072-084-774-976-983; 074-777-270-980-043; 075-126-004-234-328; 075-496-801-655-983; 076-242-326-999-782; 076-937-571-051-048; 077-752-345-760-175; 078-730-782-478-759; 084-502-083-697-859; 084-781-638-519-322; 085-514-330-991-030; 085-606-440-229-889; 085-760-995-285-660; 086-204-925-368-435; 086-646-048-607-18X; 087-741-665-010-68X; 092-255-006-507-809; 093-338-357-500-270; 093-919-507-216-802; 094-264-523-618-352; 094-565-529-045-486; 097-295-763-980-415; 097-351-657-610-641; 098-748-588-292-783; 099-342-173-833-089; 101-599-429-629-350; 104-036-536-417-038; 104-262-027-058-415; 104-700-366-658-586; 105-169-195-863-659; 105-781-479-186-830; 110-343-894-487-009; 111-506-687-957-899; 114-673-913-339-632; 115-330-951-875-93X; 116-801-276-132-802; 118-657-775-536-421; 119-547-891-588-56X; 120-703-082-001-009; 123-538-500-409-553; 124-170-590-601-410; 125-389-060-871-408; 129-001-092-183-45X; 130-214-393-255-423; 132-074-983-506-465; 138-530-419-390-216; 139-041-303-026-120; 140-730-249-077-646; 141-947-149-029-560; 148-705-606-907-81X; 152-181-748-409-517; 153-009-627-742-331; 154-247-701-466-495; 157-455-628-760-465; 159-452-444-252-73X; 160-358-377-281-104; 163-793-754-773-995; 164-595-677-804-741; 170-228-513-950-497; 170-359-671-564-794; 172-115-983-943-664; 174-750-597-633-84X; 175-905-268-229-256; 178-091-174-583-771; 185-717-607-055-348; 196-039-086-647-872; 196-232-849-257-085; 196-542-832-797-097; 199-528-639-438-533; 199-853-456-844-060,99,true,cc-by-nc-nd,green 089-282-910-429-453,Escaping Davy Jones' Locker: How the Motion Picture Industry Can Stop Digital Piracy Without Unnecessary Litigation,2006-04-01,2006,journal article,Pittsburgh Journal of Technology Law and Policy,2164800x,"University Library System, University of Pittsburgh",,Robert H. Wright,"Contrary to popular belief, motion picture piracy is not a modern phenomenon. 2 Indeed, Hollywood studios have been engaged in a continuous battle against pirates ever since theatres began showing films in the late nineteenth century. 3 One of the earliest methods of motion picture piracy, for example, was the “bicycling of prints,” a practice by which a theatre operator would literally transport film reels between multiple theatres by bicycle to avoid the cost of licensing reels for each. 4 With the advent of the Internet, however, the rate of motion picture piracy has increased exponentially. While truly measuring the extent of such illegal activity is impossible, recent estimates by the Motion Picture Association of America (“MPAA”) suggest that somewhere between 300,000 and 350,000 motion pictures are illegally downloaded from the Internet every day. 5 With Hollywood studios already losing four billion dollars in potential profits each year to analog piracy, 6 the continuous growth of digital piracy threatens the very existence of the motion picture industry. It is no surprise, then, that industry trade organizations like the MPAA are now feverishly searching for an effective way to address the problems posed by digital piracy.",6,,,,Motion (physics); The Internet; Advertising; Sociology; Law; Popular belief; Battle; Surprise; Hollywood; Studio; Film industry,,,,,http://tlp.law.pitt.edu/ojs/index.php/tlp/article/view/23 https://tlp.law.pitt.edu/ojs/index.php/tlp/article/download/23/23,http://dx.doi.org/10.5195/tlp.2006.23,,10.5195/tlp.2006.23,2088402450,,0,,0,true,cc-by-nc-nd,hybrid 089-497-077-793-228,A multi-level approach to understanding the impact of cyber crime on the financial sector,,2014,journal article,Computers & Security,01674048,Elsevier BV,United Kingdom,Monica Lagazio; Nazneen Sherif; Mike Cushman,"This paper puts forward a multi-level model, based on system dynamics methodology, to understand the impact of cyber crime on the financial sector. Consistent with recent findings, our results show that strong dynamic relationships, amongst tangible and intangible factors, affect cyber crime cost and occur at different levels of society and value network. Specifically, shifts in financial companies' strategic priorities, having the protection of customer trust and loyalty as a key objective, together with considerations related to market positioning vis-a-vis competitors are important factors in determining the cost of cyber crime. Most of these costs are not driven by the number of cyber crime incidents experienced by financial companies but rather by the way financial companies choose to go about in protecting their business interests and market positioning in the presence of cyber crime. Financial companies' strategic behaviour as response to cyber crime, especially in regard to over-spending on defence measures and chronic under-reporting, has also an important consequence at overall sector and society levels, potentially driving the cost of cyber crime even further upwards. Unwanted consequences, such as weak policing, weak international frameworks for tackling cyber attacks and increases in the jurisdictional arbitrage opportunities for cyber criminals can all increase the cost of cyber crime, while inhibiting integrated and effective measures to address the problem.",45,,58,74,Competitor analysis; Business; Causal loop diagram; Economic impact analysis; Key (cryptography); Loyalty; Jurisdictional arbitrage; Computer security; Industrial organization; System dynamics; Value network,,,,,https://doi.org/10.1016/j.cose.2014.05.006 https://www.researchgate.net/profile/Mike_Cushman/publication/262806130_A_Multi-level_Approach_to_Understanding_the_Impact_of_Cyber_Crime_on_the_Financial_Sector/links/0a85e53be626929fab000000.pdf?disableCoverPage=true https://dblp.uni-trier.de/db/journals/compsec/compsec45.html#LagazioSC14 https://dl.acm.org/doi/10.1016/j.cose.2014.05.006 https://core.ac.uk/display/20543077 http://eprints.lse.ac.uk/57000/1/__lse.ac.uk_storage_LIBRARY_Secondary_libfile_shared_repository_Content_Cushman%2C%20M_Multi-level%20approach_Cushman_Multi-level%20approach_2014.pdf https://www.sciencedirect.com/science/article/pii/S016740481400087X http://eprints.lse.ac.uk/57000/ https://core.ac.uk/download/20543077.pdf,http://dx.doi.org/10.1016/j.cose.2014.05.006,,10.1016/j.cose.2014.05.006,2002640729,,0,001-276-594-181-156; 001-897-772-710-033; 005-442-116-978-255; 005-984-431-004-051; 008-290-691-798-92X; 010-917-353-136-075; 018-913-093-142-26X; 021-364-096-612-529; 037-468-064-980-56X; 037-540-208-250-499; 040-794-975-273-884; 052-203-105-291-198; 066-130-417-168-555; 066-660-706-410-262; 076-793-102-046-131; 083-722-944-767-934; 090-712-308-702-472; 095-610-302-996-830; 110-884-218-135-982; 123-682-552-096-989; 125-215-511-670-729; 131-631-912-763-280; 141-229-861-812-00X; 143-403-287-120-968; 147-454-181-506-681; 178-263-440-796-920; 192-726-479-136-108; 192-922-567-905-374,62,true,,green 089-660-877-319-791,Attitudes towards software piracy in South Africa: Knowledge of Intellectual Property Laws as a moderator,2012-06-06,2012,journal article,Behaviour & Information Technology,0144929x; 13623001,Informa UK Limited,United Kingdom,Bernadette King; Andrew Thatcher,"The aims of the study were to describe the relationship between all three of Kohlberg's levels of moral development and attitudes towards software piracy as well as to determine if an individual's Knowledge of Intellectual Property Laws moderated this relationship. The research exploring moral development and attitudes towards software piracy is limited in that the results are inconclusive and often do not assess higher levels of moral development. In this study, we explore some of the early antecedent relationships in the theory of reasoned action. An exploratory, non-experimental, cross-sectional survey design was used and a questionnaire containing three scales attitudes towards software piracy, levels of moral development and Knowledge of Intellectual Property Laws were obtained from a sample of 402 respondents from three medium-sized South African organisations and from an online survey on a prominent South African online information technology magazine. The results indicated that there is a significant positive relationship between the respondents’ attitudes to software piracy and levels of moral development. Additionally, there are significant relationships between attitudes towards software piracy and each of the levels of moral development. Level 2 moral development predicted the most amount of variance in attitudes towards software piracy. The moderated multiple linear regression revealed that the Knowledge of Intellectual Property Laws did not have a moderating effect on the relationship between attitudes towards software piracy and moral development. These findings provide a more in-depth analysis of the relationship between attitudes and levels of moral development with respect to software piracy.",33,3,210,224,Information technology; Theory of reasoned action; Computer ethics; Psychology; Variance (accounting); Intellectual property; Lawrence Kohlberg's stages of moral development; Moral development; Social psychology; Moderation,,,,,https://doi.org/10.1080/0144929X.2012.688870 https://www.tandfonline.com/doi/full/10.1080/0144929x.2012.688870 https://dblp.uni-trier.de/db/journals/behaviourIT/behaviourIT33.html#KingT14,http://dx.doi.org/10.1080/0144929x.2012.688870,,10.1080/0144929x.2012.688870,1993790019,,0,002-803-239-151-807; 004-832-917-329-164; 005-014-989-182-407; 005-805-453-463-041; 007-559-358-394-991; 008-896-495-853-748; 009-299-623-546-736; 009-819-013-936-725; 013-460-342-109-858; 013-665-801-969-638; 017-619-716-693-348; 020-862-797-519-306; 023-772-567-703-212; 024-178-065-161-008; 026-283-018-089-565; 026-842-238-915-783; 028-999-447-590-450; 029-657-970-664-094; 033-349-220-802-574; 033-464-668-729-022; 038-703-907-935-470; 040-133-691-179-820; 042-057-592-838-529; 042-143-102-272-982; 048-176-577-021-828; 048-332-346-603-259; 053-315-489-683-555; 059-997-434-457-453; 065-012-763-412-991; 071-957-614-519-648; 074-777-270-980-043; 075-256-058-597-621; 075-743-333-013-28X; 077-583-896-139-647; 086-241-451-968-617; 094-565-529-045-486; 104-322-499-205-075; 107-250-046-589-490; 115-469-182-036-053; 130-318-704-152-277; 135-800-520-334-495; 153-552-384-031-475; 165-726-703-203-24X; 167-706-147-274-876; 196-212-184-416-716,10,false,, 089-728-554-473-055,"International Maritime Piracy: An Old Profession That Is Capable of New Tricks, but Change Is Possible",,2014,journal article,Case Western Reserve Journal of International Law,00087254,,,Simon Barker,,46,1,387,,Political science; United Nations Convention on the Law of the Sea; Law; Maritime piracy; Freedom of navigation; Law of the sea,,,,,https://scholarlycommons.law.case.edu/jil/vol46/iss1/18/ https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1043&context=jil,https://scholarlycommons.law.case.edu/jil/vol46/iss1/18/,,,1834356976,,0,,1,false,, 089-765-474-762-431,Peer-to-Peer Combat: The Entertainment Industry's Arsenal in Its War on Digital Piracy,2003-12-31,2003,journal article,Villanova law review,00426229,,,Matthew C. Mousley,,48,2,667,,Internet privacy; Political science; Law; Copyright infringement; Entertainment industry; Digital piracy; Peer-to-peer,,,,,https://paperity.org/p/82602736/peer-to-peer-combat-the-entertainment-industrys-arsenal-in-its-war-on-digital-piracy https://digitalcommons.law.villanova.edu/cgi/viewcontent.cgi?article=1329&context=vlr https://digitalcommons.law.villanova.edu/vlr/vol48/iss2/5/,https://paperity.org/p/82602736/peer-to-peer-combat-the-entertainment-industrys-arsenal-in-its-war-on-digital-piracy,,,245820978,,0,,0,false,, 090-185-561-718-660,A Pirate And A refugee: Reservations And Repsonses In The Fight Against Piracy,,2010,journal article,ILSA Journal of International and Comparative Law,1082944x,,,Tom Syring,,17,2,437,457,Refugee; Political science; Criminology,,,,,https://nsuworks.nova.edu/ilsajournal/vol17/iss2/8/ https://nsuworks.nova.edu/cgi/viewcontent.cgi?article=1850&context=ilsajournal http://nsuworks.nova.edu/cgi/viewcontent.cgi?article=1850&context=ilsajournal,https://nsuworks.nova.edu/ilsajournal/vol17/iss2/8/,,,3122590952,,0,,1,false,, 090-254-783-987-934,Automated anti-piracy systems as copyright enforcement mechanism: a need to consider cultural diversity,2018-03-01,2018,journal article,European Intellectual Property Review,01420461,,,Sabine Jacques; Krzysztof Garstka; Morten Hviid; John Street,This article demonstrates current copyright enforcement policies often seek to fight piracy while promoting cultural diversity by pushing towards the introduction of automated anti-piracy systems as a copyright enforcement mechanism. This article aims at demonstrating why cultural diversity is likely to be hindered by the introduction of such algorithmic decision-making if the latter is not carefully regulated.,40,4,,,Cultural diversity; Business; Law and economics; Enforcement; Mechanism (sociology),,,,,https://research-portal.uea.ac.uk/en/publications/automated-anti-piracy-systems-as-copyright-enforcement-mechanism- https://ueaeprints.uea.ac.uk/id/eprint/65880/,https://research-portal.uea.ac.uk/en/publications/automated-anti-piracy-systems-as-copyright-enforcement-mechanism-,,,2795992636,,0,,2,false,, 090-474-015-228-075,The Law of Piracy: British Practice in the Nineteenth Century,,1988,journal article,International law studies,21546266,,,Alfred P. Rubin,,63,1,5,,International waters; Political science; Law; Eurocentrism; Neutrality,,,,,https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1769&context=ils https://digital-commons.usnwc.edu/ils/vol63/iss1/5/,https://digital-commons.usnwc.edu/ils/vol63/iss1/5/,,,2952670349,,0,,0,false,, 090-480-718-468-703,Confronting Digital Technology: The Motion Picture Industry's Battle with Online Piracy (1),2005-07-01,2005,journal article,Journal of High Technology Law,15367983,,,Rachel S. Leeds,,5,2,303,,Political science; Battle; Media studies; Film industry,,,,,,,,,2889895900,,0,,0,false,, 090-882-841-483-417,Piracy - A Modern Perspective,1998-10-30,1998,journal article,QUT Law Review,22017275; 22050507,Queensland University of Technology,,Donna Sinopoli,,14,0,,,,,,,,,http://dx.doi.org/10.5204/qutlr.v14i0.459,,10.5204/qutlr.v14i0.459,,,0,,0,true,cc-by,gold 090-936-613-922-802,Piracy & Social Change| Russian Media Piracy in the Context of Censoring Practices,2015-03-26,2015,journal article,International Journal of Communication,19328036,,,Ilya Kiriya; Elena Sherstoboeva,"This article suggests that media piracy in Russia is a cultural phenomenon caused largely by long-standing state ideological pressures. It also questions the common approach that considers the issue of piracy in economic or legal terms. In Russia, piracy historically concerned not only copyright issues but also censoring practices, and the sharing of pirated content is a socially acceptable remnant of Soviet times. This article uses an institutional approach to show how state anticopyright policy was used in the Soviet era to curtail freedom of speech. Analysis of the new antipiracy law reveals that current state policy intended to protect copyright may also be used to control content; moreover, this analysis concludes that the new policy is not likely to curb piracy.",9,,13,,Censoring (clinical trials); Ideology; Political science; Law and economics; Law; Social change; Control (management); State (polity); Context (language use); Institutional approach; Censorship,,,,,https://ijoc.org/index.php/ijoc/article/view/3743,https://ijoc.org/index.php/ijoc/article/view/3743,,,1817028288,,0,,2,true,cc-by-nc-nd,gold 091-061-534-386-914,Trade Restraints: Associations of Manufacturers to Combat Style Piracy: Illegal Restraints of Trade,,1941,journal article,Michigan Law Review,00262234; 19398557,JSTOR,United States,,,39,7,1249,1249,Style (visual arts); Business; International trade; Geography; Archaeology,,,,,,http://dx.doi.org/10.2307/1282991,,10.2307/1282991,,,0,,0,false,, 091-461-188-954-263,Protection of Computer Software Programs Under the 1994 Polish Copyright Law,,1994,journal article,Fordham International Law Journal,07479395,,,Tenley K. Adams,"This Comment provides a study of the 1994 Polish Copyright Law and examines whether the law will lead to increased investment in the Polish software market by U.S. software publishers. Part I discusses the U.S. and Polish computer software industries and the role of U.S. software companies in Poland. Part I also analyzes the 1952 Polish Copyright Law and the problems it precipitated, as well as the dilemma of software piracy as a function of copyright law. Finally, Part I discusses the forces of change that culminated in the enactment of the 1994 Polish Copyright Law. Part II provides an analysis of the provisions in the 1994 Polish Copyright Law that directly concern computer programs. Part III argues that U.S. software publishers should greet the new Polish Copyright Law enthusiastically because the law conforms with international, regional, and bilateral agreements and offers a genuine remedy for the problem of software piracy in Poland. This Comment concludes that the new Polish law will promote increased investment in the Polish computer software market by U.S. software companies.",18,3,1005,,Software deployment; Software engineering; Package development process; Business; Social software engineering; Law and economics; Personal software process; Software project management; Software development; Software security assurance; Software peer review,,,,,https://ir.lawnet.fordham.edu/ilj/vol18/iss3/11/ https://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=1427&context=ilj,https://ir.lawnet.fordham.edu/ilj/vol18/iss3/11/,,,1486092705,,0,,0,false,, 091-551-348-275-227,How Electronic Publishers are Protecting Against Piracy: Doubts About Technical Systems of Protection,,1998,journal article,The Information Society,01972243; 10876537,Informa UK Limited,United Kingdom,Puay Tang,"Technical systems of copyright protection are increasingly perceived as a supplement to the law against piracy of electronic publications. Legislative reforms have been introduced to prohibit tampering with these systems. This article analyzes the methods of protection employed by a sample of UK electronic publishers, and examines their views on technological protection and the increasing prospect of digital piracy. The study finds a divergent range of instruments of protection, and technological protection is not a preferred method. It also finds that the concern with piracy is of secondary importance when compared to the need to improve the 'time of market' of their products. In conclusion, the article concludes that the adoption of technological protection systems is just a business practice.",14,1,19,31,Advertising; Sociology; Electronic publishing; Law and economics; Electronic document; Technical systems; Digital piracy; Business practice; Intellectual property; Sample (statistics); Legislature,,,,,https://core.ac.uk/display/2716855 http://sro.sussex.ac.uk/id/eprint/17530/ https://dblp.uni-trier.de/db/journals/tis/tis14.html#Tang98 https://doi.org/10.1080/019722498128980 https://www.tandfonline.com/doi/abs/10.1080/019722498128980 http://srodev.sussex.ac.uk/17530/,http://dx.doi.org/10.1080/019722498128980,,10.1080/019722498128980,2085295220,,0,,14,false,, 091-554-654-459-722,Submission to the commission by the federation against software theft on chapter two of the green paper - piracy,,1989,journal article,Computer Law & Security Review,02673649; 2212473x; 22124748; 18736734,Elsevier BV,United Kingdom,,,5,1,11,13,Commission; Software; Computer security; Business; Law; Political science; Internet privacy; Computer science; Operating system,,,,,,http://dx.doi.org/10.1016/0267-3649(89)90165-9,,10.1016/0267-3649(89)90165-9,,,0,,0,false,, 092-086-556-121-754,YO HO HO AND A BUCKET OF CASH THE NEED TO ENCHANCE REGIONAL EFFORT TO COMBAT PIRACY AND ARMED ROBBERY AGAINST SHIPS IN SOUTHEAST ASIA,2014-10-31,2014,journal article,Indonesian Journal of International Law,23565527,Indonesian Journal of International Law,,Hersapta Mulyono,"The problem of piracy is that the world press nowadays often focuses on waters off the coast of Somalia and the Gulf of Aden. That is understandable given the recent phenomenal upsurge of piratical activities in that poverty stricken part of the world. Poverty, alongwith degradation of the rule of law, is often a catalyst for criminal acts, and if that situation occurred in maritime neighborhood, it usually takes form of piracy and armed robbery against ships. Southeast Asia is one of those places. The primary purpose of this essay is to examine the deficiencies of regional efforts to combat piracy and armed robbery against ships in Southeast Asia. To provide readers with an understanding of the legal difficulties involved with piracy and armed robbery in Southeast Asia",12,1,60,83,Economy; Poverty; Law; Geography; Rule of law; Cash; Southeast asia,,,,,http://ijil.ui.ac.id/index.php/home/article/view/592/pdf_461 http://ijil.ui.ac.id/index.php/home/article/download/592/pdf_461,http://dx.doi.org/10.17304/ijil.vol12.1.592,,10.17304/ijil.vol12.1.592,2266898735,,0,,0,true,cc-by,gold 092-563-691-940-727,International Legal Regime Concerning Piracy in the Gulf of Guinea,2017-05-14,2017,journal article,Journal of Advanced Research in Law and Economics,2068696x,,,Anyanova Yekaterina Sergeevna,"This paper focuses on the problem of piracy consideration in international law. The urgency of this problem can be attributed to the considerable damages it inflicts on the global economy. Despite the general decline in pirate attacks worldwide due to the effective curbing of the notorious Somalian piracy, the situation in the Gulf of Guinea remains critical. Irrespective of the fact that the successful solution of the long-standing Somali pirate crisis came from concerted efforts by various countries (in 2015 – 2016 no attacks in the region were reported), piracy situation in the Gulf of Guinea is not currently considered to be serious enough for international interference. Increased pirate activities in this area are allegedly associated with crude oil shipping through these waters, and also related to political and economic crises in coastal states. It has been repeatedly stressed that the Gulf of Guinea problem requires a comprehensive, all-inclusive approach to the issue of maritime security, and first and foremost this holds for the regional level where countries sharing the coastal line have to gear up their efforts to this effect.",7,8,2173,2179,Economics; Somali; Damages; Maritime security; Crude oil; Development economics; International law; Politics,,,,,https://journals.aserspublishing.eu/jarle/article/view/1025,https://journals.aserspublishing.eu/jarle/article/view/1025,,,2665406996,,0,,0,false,, 092-824-540-063-205,Is the Devil in the Data? A Literature Review of Piracy Around the World,2011-01-04,2011,journal article,The Journal of World Intellectual Property,14222213; 17471796,Wiley,United Kingdom,Nixon Kariithi,"This article examines the scholarly literature pertaining to music, film and software piracy around the world, with special attention to data sources, research scope and general findings. The article finds that the conspicuous absence of methodologies utilizing critical theory in this broad literature has constricted the world view of piracy, resulting in monolithic explanations of the causes and correlates of piracy. It further identifies systematic biases relating to the unjustified use of data published by the industry watchdog Business Software Alliance (BSA).",14,2,133,154,Advertising; Critical theory; Economics; Law and economics; Information good; Software; Alliance; World view; Scope (project management); Intellectual property; Business software,,,,,https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1747-1796.2010.00412.x https://onlinelibrary.wiley.com/doi/10.1111/j.1747-1796.2010.00412.x/full https://dialnet.unirioja.es/servlet/articulo?codigo=6227717,http://dx.doi.org/10.1111/j.1747-1796.2010.00412.x,,10.1111/j.1747-1796.2010.00412.x,1903470434,,0,002-744-548-301-621; 003-765-530-387-665; 003-982-789-982-915; 004-149-765-542-962; 004-671-777-137-026; 004-873-323-580-619; 005-444-494-708-307; 005-685-964-848-564; 005-852-410-079-885; 005-984-355-836-277; 008-267-624-980-62X; 009-294-953-134-547; 010-168-597-551-472; 010-786-716-839-603; 011-331-090-604-858; 012-007-534-943-482; 012-544-062-359-627; 012-558-297-950-849; 012-900-331-773-710; 015-573-286-153-582; 016-202-448-837-906; 016-825-469-452-256; 016-870-716-539-360; 017-177-691-923-366; 017-619-716-693-348; 017-761-886-494-031; 019-164-615-489-086; 021-149-198-778-931; 022-248-718-157-566; 022-255-645-917-135; 023-775-351-710-097; 024-188-758-352-770; 024-442-312-850-725; 025-394-856-531-856; 025-882-454-923-868; 026-161-995-943-665; 028-615-356-511-184; 028-999-447-590-450; 030-256-657-297-230; 030-823-075-021-486; 031-187-002-607-584; 033-349-220-802-574; 035-641-562-031-467; 036-092-772-615-548; 037-641-519-110-760; 037-732-315-459-227; 038-375-524-238-459; 038-994-826-948-272; 039-350-981-279-016; 039-883-767-744-759; 040-133-691-179-820; 041-597-384-077-076; 041-849-157-283-572; 041-893-696-570-720; 042-189-039-564-15X; 042-675-010-023-548; 042-740-939-869-735; 045-523-803-520-989; 046-989-664-357-368; 047-010-436-077-442; 047-257-927-356-213; 047-556-287-867-217; 049-698-234-112-01X; 050-727-113-788-879; 053-322-660-942-71X; 057-306-848-558-061; 058-569-982-838-719; 058-919-953-064-002; 062-180-644-489-615; 062-684-295-161-636; 062-759-008-820-920; 063-266-468-644-64X; 065-012-763-412-991; 066-174-220-915-486; 067-262-783-758-855; 068-150-895-888-726; 068-702-229-565-098; 068-779-792-347-220; 070-387-433-147-234; 071-034-927-372-768; 071-114-479-382-099; 072-307-449-982-322; 073-483-679-161-318; 077-583-896-139-647; 077-599-829-555-049; 077-600-432-270-42X; 078-260-552-434-589; 078-297-676-588-052; 079-077-635-535-028; 080-208-184-106-680; 084-121-171-274-427; 084-276-283-502-216; 084-502-083-697-859; 086-150-177-395-225; 087-010-768-796-663; 087-592-658-971-531; 088-621-279-167-179; 090-977-878-568-440; 091-147-006-347-417; 094-565-529-045-486; 094-835-101-367-609; 095-841-841-926-709; 095-927-290-187-555; 096-683-279-694-845; 097-637-794-608-082; 098-640-193-183-211; 099-637-531-434-175; 106-924-466-262-47X; 112-610-248-511-410; 112-649-157-487-898; 116-448-006-181-378; 122-923-690-414-445; 126-849-122-566-312; 126-996-752-002-343; 127-916-968-129-814; 129-154-209-747-00X; 132-566-138-801-214; 134-120-651-950-874; 136-197-942-619-274; 145-450-452-957-863; 152-072-008-242-683; 153-552-384-031-475; 154-139-372-928-477; 158-961-139-560-014; 160-358-377-281-104; 162-337-336-909-399; 163-882-919-320-981; 164-595-677-804-741; 167-706-147-274-876; 170-762-158-450-34X; 178-384-582-247-290; 189-733-239-554-244; 191-344-983-602-980,37,false,, 092-953-823-796-354,"Professional Video Gaming: Piracy That Pays, 49 J. Marshall L. Rev. 217 (2015)",2015-12-31,2015,journal article,The John Marshall law review,0270854x,,,Elizabeth Brusa,,49,1,8,,Sociology; Video gaming; Multimedia,,,,,https://repository.jmls.edu/lawreview/vol49/iss1/8/ https://repository.law.uic.edu/cgi/viewcontent.cgi?article=2441&context=lawreview https://repository.law.uic.edu/lawreview/vol49/iss1/8/ https://paperity.org/p/83905855/professional-video-gaming-piracy-that-pays-49-j-marshall-l-rev-217-2015,https://repository.jmls.edu/lawreview/vol49/iss1/8/,,,2416765839,,0,,0,false,, 093-051-976-955-882,MaCRA: a model-based framework for maritime cyber-risk assessment,2019-01-28,2019,journal article,WMU Journal of Maritime Affairs,1651436x; 16541642,Springer Science and Business Media LLC,Sweden,Kimberly Tam; Kevin D. Jones,"In the current economy, roughly 90% of all world trade is transported by the shipping industry, which is now accelerating its technological growth. While the demand on mariners, ship owners, and the encompassing maritime community for digital advances (particularly towards digitization and automation) has led to efficient shipping operations, maritime cyber-security is a pertinent issue of equal importance. As hackers are becoming increasingly aware of cyber-vulnerabilities within the maritime sector, and as existing risk assessment tools do not adequately represent the unique nature of maritime cyber-threats, this article introduces a model-based risk assessment framework which considers a combination of cyber and maritime factors. Confronted with a range of ship functionalities, configurations, users, and environmental factors, this framework aims to comprehensively present maritime cyber-risks and better inform those in the maritime community when making cyber-security decisions. By providing the needed maritime cyber-risk profiles, it becomes possible to support a range of parties, such as operators, regulators, insurers, and mariners, in increasing overall global maritime cyber-security.",18,1,129,163,Risk analysis (engineering); Automation; Risk assessment; Business; Risk management tools; Public international law; Digitization; World trade; Maritime safety; Hacker,,,,,https://pearl.plymouth.ac.uk/handle/10026.1/13138 https://trid.trb.org/view/1599339 https://link.springer.com/article/10.1007/s13437-019-00162-2 https://pearl.plymouth.ac.uk/bitstream/10026.1/13138/2/MaCRA%20-%20AM.pdf https://core.ac.uk/download/185245320.pdf,http://dx.doi.org/10.1007/s13437-019-00162-2,,10.1007/s13437-019-00162-2,2911123865,,1,002-053-405-588-204; 005-781-422-825-974; 013-081-802-929-137; 013-465-650-043-507; 014-180-523-570-707; 014-856-165-215-269; 015-969-752-004-594; 023-985-248-719-46X; 029-401-833-860-137; 037-637-384-617-393; 038-231-700-578-880; 038-695-117-326-737; 039-738-489-485-484; 042-573-666-855-729; 046-979-973-879-793; 050-662-869-217-019; 051-046-829-190-736; 051-225-577-366-179; 053-420-026-823-86X; 055-406-956-519-807; 056-615-977-448-363; 063-393-448-979-356; 063-975-991-741-534; 066-349-381-464-323; 069-639-942-622-999; 075-736-010-961-853; 084-772-780-261-778; 091-859-053-989-24X; 092-598-679-153-798; 114-182-373-554-14X; 115-759-731-916-535; 115-887-345-891-989; 118-529-235-823-263; 129-989-648-300-942; 131-715-220-121-752; 137-951-063-271-652; 153-053-690-663-941; 156-593-865-437-943; 188-181-795-136-079,38,true,,green 093-057-887-287-373,The Law of Piracy,,1990,journal article,Naval War College Review,00281484,,,M. E. Bowman,,43,3,43,,Political science; Law; First world war,,,,,https://digital-commons.usnwc.edu/nwc-review/vol43/iss3/43/ https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=3983&context=nwc-review,https://digital-commons.usnwc.edu/nwc-review/vol43/iss3/43/,,,3042474149,,0,,0,false,, 093-338-831-315-92X,"Copyright, censorship and privacy: Is cyberspace over crowded?",,2008,journal article,International Journal of Intellectual Property Management,14789647; 14789655,Inderscience Publishers,Switzerland,Guan Hong Tang,"Cyberspace raises new questions about the effectiveness of the Chinese legislation even as Chinese legislators and legal pundits are drafting and enacting various regulations to keep up with the rapid development of technology. Among the core issues problematised by internet technology concern copyright, censorship and piracy. This paper will introduce and examine the related issues and laws, in the People's Republic of China, and will demonstrate the developments, the differences and the prospects with the intention of perfecting the Chinese law in aspects of copyright, piracy and censorship.",2,2,201,,Internet privacy; The Internet; Chinese law; Political science; China; Legislation; Cyberspace; Intellectual property; Censorship,,,,,https://www.inderscienceonline.com/doi/abs/10.1504/IJIPM.2008.019342,http://dx.doi.org/10.1504/ijipm.2008.019342,,10.1504/ijipm.2008.019342,2097738620,,0,050-487-419-966-877; 058-885-679-242-394,0,false,, 093-904-257-295-904,Explorations in Cyber International Relations (ECIR) – Data Dashboard Report #1: CERT Data Sources and Prototype Dashboard System,,2009,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Stuart E. Madnick; Nazli Choucri; Steven Camina; Erik Fogg; Xitong Li; Fan Wei,"Disclaimer: This report relies on publicly available information, especially from the CERTs' pubic web sites. They have not yet been contacted to confirm our understanding of their data. That will be done in subsequent phases of this effort.",,,,,Engineering; World Wide Web; Disclaimer; Dashboard (business); International relations; Computer security,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1477618 http://web.mit.edu/smadnick/www/wp/2009-07.pdf https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID1477618_code285952.pdf?abstractid=1477618&mirid=5 http://core.ac.uk/display/22554202 https://ssrn.com/abstract=1477618 http://dspace.mit.edu/handle/1721.1/66541 https://core.ac.uk/download/4414777.pdf,http://dx.doi.org/10.2139/ssrn.1477618,,10.2139/ssrn.1477618,1511707388,,0,001-007-815-554-214; 011-041-070-431-712; 062-739-626-931-881; 066-778-323-868-210; 103-537-993-138-770; 117-032-192-844-151; 140-289-598-121-882; 162-577-615-865-301,5,true,cc-by-nc,green 094-112-403-810-291,Book Review: Piracy and Law in the Ottoman Mediterranean by Joshua M. White,2019-06-02,2019,journal article,Journal of Medieval Worlds,25743988,University of California Press,,Claire Norton,"Joshua M. White. Piracy and Law in the Ottoman Mediterranean . Stanford: Stanford University Press, 2018. ISBN 9781503602526. 376 pages. $65.00; ; This new study of maritime violence in the early modern Mediterranean provides a timely consideration of the personal, legal, and diplomatic repercussions of piracy from an Ottoman perspective. White’s innovative contribution to the scholarly literature on corsairing and piracy develops from his extensive use of Ottoman sources (court documentation, petitions, letters, reports, decrees, captivity narratives, travel accounts, etc.). His focus, not on the actions of the pirates themselves, but on the Ottoman judicial and administrative response to piracy, creates a narrative that is more nuanced than some earlier studies, which have tended to consider events refracted through an interpretative lens that emphasises a purported clash of civilisations meta-narrative and which sees the motivation of such violence located in holy warfare.1 Instead, White considers the Ottomans as much victims of this naval violence as other Mediterranean communities and peoples. However, he does not narrate the Ottomans as passive, impotent victims of circumstance. Through a study of the juridical ramifications of piracy, he provides a focus on the construction of the eastern Mediterranean as a unified Ottoman …",1,2,101,104,Narrative; Law; Eastern mediterranean; White (horse); Documentation; History,,,,,https://online.ucpress.edu/jmw/article/1/2/101/50952/Book-Review-Piracy-and-Law-in-the-Ottoman,http://dx.doi.org/10.1525/jmw.2019.120010,,10.1525/jmw.2019.120010,2952414432,,0,,0,true,,bronze 094-193-176-229-102,ОРГАНІЗАЦІЯ ПРОТИДІЇ КОМП’ЮТЕРНІЙ (ЦИФРОВІЙ) КОНТРАФАКТНІЙ ПРОДУКЦІЇ,2020-03-23,2020,journal article,Прикарпатський юридичний вісник,26646234; 23050314,National University - Odessa Law Academy,,В. С. Жогов,"According to the International Federation of the Phonographic Industry, one in three records is counterfeit and sales of pirated music products in the early 21st cen-tury exceed at least $ 25 billion in the legal market, in at least 25 countries.; The world song industry was $ 6.5 trillion, which is about 5 times the total sales of the military industry.; Experts estimate that world trade in counterfeit goods is estimated at $ 630 billion, or 6–7% of total trade. The market for counterfeit CDs and DVDs is about $ 5 billion.The International Intellectual Property Alliance ranked Ukraine first in the list of 58 countries with low intellectual property standards. According to the Razumkov Center for Economic and Political Studies, 70 percent of Ukraine’s population buys counterfeit audio and video products branded with well-known trademarks. Only a fifth of the population ever buys it.; According to the Association of Software Manufacturers, the level of cyber-piracy in Ukraine in 2017 was 80% in the annual report “Global Piracy Study for 2017”. At the same time, the price for unlicensed software reached $ 108 million.; The problem of counteracting the effects of the production, distribution and circulation of counterfeit copies of computer (digital) software and software (computer counterfeit) is quite complex and multifaceted.; The article deals with the protection of computer (digital) intellectual property in the context of legal and organizational counter-measures. Based on the analysis of scientific publications in the field of economics, computer technologies, copyright and related rights protection, legislative measures are proposed, a list of organizational measures that will strengthen the interaction of state authorities with the controlling and law enforcement agencies both at the national and regional level.",2,3(28),56,62,Business; Related rights; Counterfeit; Circulation (currency); Context (language use); Law enforcement; Population; Intellectual property; Commerce; Legislature,,,,,http://pyuv.onua.edu.ua/index.php/pyuv/article/view/358,http://dx.doi.org/10.32837/pyuv.v2i3(28).358,,10.32837/pyuv.v2i3(28).358,3030453682,,0,,0,true,,bronze 094-608-444-289-745,The Penalties for Piracy,2012-01-01,2012,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Eugene Kontorovich,,,,,,Business; Computer science,,,,,,http://dx.doi.org/10.2139/ssrn.2099631,,10.2139/ssrn.2099631,,,0,,3,false,, 094-811-734-020-270,"E-textbook piracy behavior: An integration of ethics theory, deterrence theory, and theory of planned behavior",2019-05-31,2019,journal article,"Journal of Information, Communication and Ethics in Society",1477996x; 17588871,Emerald,United Kingdom,Sri Rahayu Hijrah Hati; Rahma Fitriasih; Anya Safira,"The purpose of this paper is to examine the factors that influence the intention of students to pirate academic e-books by integrating three main theories: ethics theory, deterrence theory, and the theory of planned behavior. The study also examines the moderating role of past piracy behavior on the relationship between the factors in the previously mentioned theories and students’ piracy intention.,The data were collected using a convenience sample of 662 university students. Based on their past behaviors, the students were grouped into “no piracy” and “piracy” groups.,The result shows that the piracy intention of both the no-piracy and piracy groups has a similar influence based on the moral obligation in ethics theory. The factors in the deterrence theory, which includes fear of legal consequences and perceived likelihood of punishment, have no significant impact on the attitudes of the two groups toward piracy. While the intention of the no-piracy group is not influenced by other internal factors, such as self-efficacy, or by external factors, such as subjective norms and facilitating conditions, the behavioral intention of the piracy group is significantly influenced by these three factors.,This study only focuses on piracy attitude and behavior in the context of e-books.,In Indonesia, the insignificant impact of factors from deterrence theory (the fear of legal consequences and perceived punishment) indicates weak law enforcement to combat digital piracy. Thus, it is imperative that law enforcement, especially regarding piracy, should be enhanced.,The significant role of ethics in the attitudes toward piracy indicates that morality serves as a moral compass to fight piracy behavior. The strong impact of subjective norms, especially in the piracy group, suggests that families should raise children and educate youth with beliefs that align with the concepts of morality.,The study integrates three theories that are most often used in piracy behavior studies: ethics theory, deterrence theory, and theory of planned behavior. In addition, the study provides empirical evidence on the moderating role of past experience in piracy behavior.",18,1,105,123,Psychology; Empirical evidence; Morality; Punishment; Moral obligation; Context (language use); Law enforcement; Digital piracy; Social psychology; Theory of planned behavior,,,,,https://dblp.uni-trier.de/db/journals/jices/jices18.html#HatiFS20 https://doi.org/10.1108/JICES-11-2018-0081 https://www.emerald.com/insight/content/doi/10.1108/JICES-11-2018-0081/full/pdf?title=e-textbook-piracy-behavior-an-integration-of-ethics-theory-deterrence-theory-and-theory-of-planned-behavior https://www.emeraldinsight.com/doi/abs/10.1108/JICES-11-2018-0081?af=R https://scholar.ui.ac.id/en/publications/e-textbook-piracy-behavior-an-integration-of-ethics-theory-deterr https://www.emerald.com/insight/content/doi/10.1108/JICES-11-2018-0081/full/html,http://dx.doi.org/10.1108/jices-11-2018-0081,,10.1108/jices-11-2018-0081,2952265677,,0,002-803-239-151-807; 004-714-435-903-189; 006-243-961-429-928; 007-341-262-764-781; 009-299-623-546-736; 009-949-974-083-886; 013-336-723-566-78X; 015-185-879-401-807; 016-403-634-914-929; 018-098-418-507-039; 019-623-803-893-73X; 024-178-065-161-008; 024-402-429-133-467; 025-882-454-923-868; 026-015-767-230-545; 028-999-447-590-450; 032-019-925-293-863; 032-653-897-764-354; 033-349-220-802-574; 037-296-081-583-998; 039-299-505-400-283; 044-777-542-862-916; 045-936-498-526-756; 046-039-902-428-59X; 051-851-761-421-930; 054-205-310-182-865; 059-956-033-421-432; 059-997-434-457-453; 060-532-927-353-965; 062-111-909-593-153; 067-946-305-534-344; 072-084-774-976-983; 072-308-806-989-499; 073-725-072-478-764; 074-499-155-635-714; 075-707-061-211-283; 077-583-896-139-647; 078-013-570-878-601; 079-158-349-078-81X; 079-476-314-688-080; 086-204-925-368-435; 089-181-535-078-862; 091-870-420-142-380; 094-264-523-618-352; 099-167-496-298-409; 099-847-511-899-413; 102-558-568-411-680; 114-673-913-339-632; 115-975-952-668-05X; 122-135-148-364-022; 132-000-894-825-163; 135-800-520-334-495; 148-949-918-487-069; 153-883-919-781-659; 154-765-083-774-406; 182-776-111-027-483,9,false,, 094-907-203-570-712,Piracy on Records,,1953,journal article,Stanford Law Review,00389765; 19398581,JSTOR,United States,,,5,3,433,433,Geography; History,,,,,,http://dx.doi.org/10.2307/1226450,,10.2307/1226450,,,0,,2,false,, 094-963-426-068-558,"Software Piracy, Inequality and the Poor: Evidence from Africa",,2012,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Simplice A. Asongu,"Purpose – Poverty and inequality undoubtedly remain substantial challenges to economic and human developments amid growing emphasis on IPRs (with recent advances in ICTs) and good governance. In the first empirical study on the incidence of piracy on inequality in Africa, we examine how a plethora of factors (IPRs laws, education & ICTs and government quality) are instrumental in the piracy-inequality nexus. Design/methodology/approach – Two-Stage-Least Squares estimation approaches are applied in which piracy is instrumented with IPRs regimes (treaties), education & ICTs and government quality dynamics. Findings – The main finding suggests that, software piracy is good for the poor as it has a positive income-redistributive effect; consistent with economic and cultural considerations from recent literature. ICTs & education (dissemination of knowledge) are instrumental in this positive redistributive effect, while good governance mitigates inequality beyond the piracy channel. Practical implications – As a policy implication, in the adoption IPRs, sampled countries should take account of the role less stringent IPRs regimes play on income-redistribution through software piracy. Collateral benefits include among others, the cheap dissemination of knowledge through ICTs which African countries badly need in their quest to become ‘knowledge economies’. A caveat however is that, too much piracy may decrease incentives to innovate. Hence, the need to adopt tighter IPRs regimes in tandem with increasing income-equality. Originality/value – It is the first empirical assessment of the incidence of piracy on inequality in Africa: a continent with stubbornly high poverty and inequality rates.",,,,,Empirical research; Nexus (standard); Government; Economics; Poverty; Collateral; Good governance; Incentive; Inequality; Development economics,,,,,https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2493273_code2294135.pdf?abstractid=2493273&mirid=1 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2493273,http://dx.doi.org/10.2139/ssrn.2493273,,10.2139/ssrn.2493273,3126048242,,0,006-463-752-020-581; 008-896-495-853-748; 012-558-297-950-849; 015-808-798-057-897; 016-639-348-836-879; 017-153-449-730-092; 021-455-819-040-944; 028-630-596-457-020; 033-659-512-493-092; 039-883-767-744-759; 041-849-157-283-572; 041-893-696-570-720; 043-305-653-465-196; 047-010-436-077-442; 049-698-234-112-01X; 055-252-252-974-001; 058-682-219-560-287; 062-169-487-131-224; 063-085-822-993-592; 065-657-617-085-185; 066-237-973-648-031; 082-142-791-780-355; 084-276-283-502-216; 088-992-946-940-907; 089-840-672-381-047; 096-861-531-565-56X; 105-803-797-619-085; 107-007-285-779-662; 108-534-046-972-503; 110-231-183-577-925; 125-495-818-933-457; 133-339-104-238-036; 144-135-264-427-99X; 145-489-062-191-725; 145-811-348-738-768; 154-513-291-663-187; 169-041-921-929-413; 185-197-322-646-367; 191-344-983-602-980,10,true,,green 095-011-416-637-786,The Politics of Piracy: Intellectual Property in Contemporary China. By Andrew C. Mertha,,2006,journal article,Law & Society Review,00239216; 15405893,Wiley,United Kingdom,Debora Halbert,,40,4,981,983,Sociology; China; Law; Intellectual property; Politics,,,,,http://onlinelibrary.wiley.com/resolve/doi?DOI=10.1111/j.1540-5893.2006.00287_8.x http://doi.wiley.com/10.1111/j.1540-5893.2006.00287_8.x,http://dx.doi.org/10.1111/j.1540-5893.2006.00287_8.x,,10.1111/j.1540-5893.2006.00287_8.x,2115878383,,0,,0,false,, 095-096-474-492-955,Air Piracy: Germany (West),,1972,journal article,International and Comparative Law Quarterly,00205893; 14716895,Cambridge University Press (CUP),United Kingdom,N. March Hunnings,,21,2,375,376,,,,,,https://www.cambridge.org/core/journals/international-and-comparative-law-quarterly/article/air-piracy/772EB35DFEBD16A2D5E382D0A9CD469E,http://dx.doi.org/10.1093/iclqaj/21.2.375-a,,10.1093/iclqaj/21.2.375-a,2801438768,,0,,0,false,, 095-105-634-022-189,Industry battles over liability for piracy,,1997,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,1997,10,4,4,Liability; Business; Computer security; Internet privacy; Finance; Computer science,,,,,,http://dx.doi.org/10.1016/s1361-3723(97)90073-7,,10.1016/s1361-3723(97)90073-7,,,0,,0,false,, 095-599-557-548-12X,Cameron v. H.M. Advocate,,1980,journal article,International Law Reports,03090671; 2633707x,Cambridge University Press (CUP),,,"Jurisdiction — High Seas — Jurisdiction on the High Seas — Piracy — Definition of piracy — Tokyo Convention Act, 1967 — Whether definition of piracy — Merchant Shipping Act 1894, 686(1) — The law of Scotland",56,,243,256,Jurisdiction; Law; Convention; International waters; Political science; Exclusive jurisdiction; Business,,,,,,http://dx.doi.org/10.1017/cbo9781316151839.029,,10.1017/cbo9781316151839.029,,,0,,0,false,, 095-616-971-255-017,Preventing Software Piracy through Regional Trade Agreements: The Mexican Example,,1994,journal article,North Carolina Journal of International Law and Commercial Regulation,,,,Amy R. Edge,,20,1,175,,Business; International trade; Software; Regional trade,,,,,https://scholarship.law.unc.edu/cgi/viewcontent.cgi?article=1549&context=ncilj https://scholarship.law.unc.edu/ncilj/vol20/iss1/6/,https://scholarship.law.unc.edu/ncilj/vol20/iss1/6/,,,2740910129,,0,,0,false,, 095-643-494-582-528,Policing maritime piracy in Southern Africa,2006-01-01,2006,journal article,Acta Criminologica: Southern African Journal of Criminology,10128093,,,H. Fouche,"Piracy is still rife in most of the world's oceans. This paper explores the nature and extent of piracy. It provides an overview of the attacks on ships worldwide, focusing on Africa. Reported attacks on ships in South Africa's territorial waters are analysed and conclusions relating to these reported attacks are reached. Furthermore, the nature of policing in a maritime environment is discussed. International law and treaties or conventions pertinent to the policing of piracy and armed robbery against ships are also discussed and analysed.",19,3,180,194,Economy; Political science; Law; Maritime piracy; International law; Territorial waters,,,,,https://journals.co.za/content/crim/19/3/EJC28910,https://journals.co.za/content/crim/19/3/EJC28910,,,115069030,,0,,0,false,, 095-737-059-062-998,Combatting Software Piracy: Can Felony Penalties for Copyright Infringement Curtail the Copying of Computer Software?,,1994,journal article,Santa Clara High Technology Law Journal,08823383,,,Greg Short,,10,1,221,,Internet privacy; Business; Software; Copying; Copyright infringement; Computer software; Computer security,,,,,https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?article=1157&context=chtlj https://digitalcommons.law.scu.edu/chtlj/vol10/iss1/7/,https://digitalcommons.law.scu.edu/chtlj/vol10/iss1/7/,,,1541978955,,0,,2,false,, 095-986-360-327-841,Combating Maritime Piracy: Inter-Disciplinary Cooperation and Information Sharing,,2013,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Yaron Gottlieb,"In recent years, maritime piracy has reemerged as a serious threat to the international community, particularly following the significant increase in incidents of maritime piracy and armed robbery at sea that occurred off the coast of Somalia and in the Gulf of Guinea. As presented in this article, international cooperation is indispensable for combating piracy. To that end, the article argues that a duty to cooperate in the repression of piracy is moored in various international instruments — notably in article 100 of the U.N. Convention on the Law of the Sea (UNCLOS) — as well as in general principles of international law. It requires states to adhere to due diligence ‘best efforts’ standards, which, in the context of maritime piracy, entail exercising sincere, concerted, and proactive efforts. The duty to cooperate should serve as a guiding principle in identifying the specific obligations imposed on states. Among those specific obligations is the duty to share relevant information that can assist in preventing piracy attacks and in facilitating prosecution of suspected pirates. It is further submitted that successful undertakings to fight maritime piracy necessitate inter-disciplinary cooperation, namely cooperation among entities whose expertise generally lies in different fields. The article further discusses the main challenges for information sharing and proposes solutions to meet those challenges.",,,,,Political science; United Nations Convention on the Law of the Sea; Law; Information sharing; Duty; International community; Context (language use); Due diligence; International law; Discipline,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2325279 https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2417054_code2112762.pdf?abstractid=2325279&mirid=1&type=2,http://dx.doi.org/10.2139/ssrn.2325279,,10.2139/ssrn.2325279,1822946393,,0,024-043-853-632-466; 034-174-020-508-826; 036-020-398-348-204; 062-877-635-096-617; 194-303-916-535-536; 196-661-227-768-695,0,true,,green 096-333-882-471-451,"Tracking (Im)mobilities at Sea: Ships, Boats and Surveillance Strategies",2014-07-03,2014,journal article,Mobilities,17450101; 1745011x,Informa UK Limited,United Kingdom,Kimberley Peters,"This paper explores how national governments exercise regulatory power over spaces beyond their jurisdiction, when activities in those extra-territorial spaces have direct impacts within the boundaries of state concerned. Focusing explicitly on the control of shipping mobilities in the high seas and territorial sea zones, it is contended that apparatus of control, in particular, surveillance, are not only complex across spaces of alternate legal composition and between spaces of national and international law, but also across of the differing conditions and materialities of land, air and sea. Indeed, this paper argues that the immobilisation of the undesirable mobilities of ships and boats is inherently difficult at sea because of its very nature – its mobile legal boundaries, its liquidity compared to ‘landed’ fixity, and its scale and depth. Drawing on the case study of offshore radio pirates and the tender vessels which travelled ship to shore to supply them with necessary goods, it is reasoned that greater attention must be paid to mobilities at sea in view of forms of governance in this space. The sea is not like the land, or air, legally or materially, and mobilities cannot be governed, controlled and contained in the same ways therefore, as these connected spaces. Thinking seriously about the issues that arise when surveillance of mobilities is taken to sea, can help work towards better understandings for why security at sea proves so problematic and how those issues can be resolved, when the sea is the stage for contemporary geopolitical concerns in the twenty-first century.",9,3,414,431,Political economy; Sociology; Shore; International waters; Law; Geopolitics; Jurisdiction; Mobilities; Corporate governance; International law; Territorial waters,,,,,https://www.tandfonline.com/doi/full/10.1080/17450101.2014.946775 https://ideas.repec.org/a/taf/rmobxx/v9y2014i3p414-431.html https://trid.trb.org/view/1322411 https://livrepository.liverpool.ac.uk/3000932/ https://econpapers.repec.org/RePEc:taf:rmobxx:v:9:y:2014:i:3:p:414-431 https://core.ac.uk/download/80775842.pdf,http://dx.doi.org/10.1080/17450101.2014.946775,,10.1080/17450101.2014.946775,2050235274,,0,000-290-796-393-848; 000-461-905-175-983; 001-595-149-979-993; 012-808-034-137-732; 013-797-750-872-688; 020-242-383-046-88X; 020-949-098-758-457; 021-481-613-489-278; 022-023-869-968-342; 024-018-014-038-357; 024-606-769-173-339; 027-750-089-800-461; 036-096-647-140-967; 038-519-873-339-127; 039-347-075-683-589; 039-386-510-787-529; 039-664-504-717-265; 045-932-507-216-39X; 051-986-842-318-933; 055-301-049-496-276; 060-309-667-404-591; 066-052-620-315-169; 066-720-682-120-501; 067-501-326-759-84X; 069-316-536-938-799; 073-596-293-696-388; 075-217-584-644-780; 085-809-490-591-050; 086-633-355-958-227; 086-880-441-361-433; 088-047-016-109-782; 088-825-866-536-914; 099-749-288-900-354; 100-725-419-951-475; 102-740-232-804-238; 109-526-886-153-611; 122-992-501-942-070; 134-375-259-315-715; 135-476-566-289-51X; 136-487-286-559-992; 137-761-940-742-886; 144-435-165-780-477; 144-683-412-770-544; 149-163-131-004-82X; 152-812-962-511-182; 162-024-883-259-834; 173-181-267-194-190; 181-598-377-019-311,45,true,,green 097-002-355-501-006,"'God's Friend, the Whole World's Enemy': Reconsidering the Role of Piracy in the Development of Universal Jurisdiction",,2018,journal article,"Netherlands Journal of Legal Philosophy",22130713,Boom Uitgevers Den Haag,,Louis Sicking,"Piracy holds a special place within the field of international law because of the universal jurisdiction that applies. This article reconsiders the role of piracy in the development of universal jurisdiction. While usually a connection is established between Cicero’s ‘enemy of all’ and modern conceptions of pirates, it is argued that ‘enemy of the human species’ or ‘enemy of humanity’ is a medieval creation, used by Bartolus, which must be understood in the wake of the Renaissance of the twelfth century and the increased interest for the study of Roman Law. The criminalization of the pirate in the late Middle Ages must be understood not only as a consequence of royal power claiming a monopoly of violence at sea. Both the Italian city-states and the Hanse may have preceded royal power in criminalizing pirates. All the while, political motives in doing so were never absent.",47,2,176,186,Middle Ages; Political science; Law; Power (social and political); Universal jurisdiction; Cicero; Humanity; Criminalization; International law; Politics,,,,,https://www.bjutijdschriften.nl/tijdschrift/rechtsfilosofieentheorie/2018/2/NJLP_2213-0713_2018_047_002_006 http://www.njlp.nl/tijdschrift/rechtsfilosofieentheorie/2018/2/NJLP_2213-0713_2018_047_002_006 https://research.vu.nl/en/publications/gods-friend-the-whole-worlds-enemy-reconsidering-the-role-of-pira https://www.elevenjournals.com/tijdschrift/rechtsfilosofieentheorie/2018/2/NJLP_2213-0713_2018_047_002_006 https://www.narcis.nl/publication/RecordID/oai%3Aresearch.vu.nl%3Apublications%2Fe726c6bf-694c-4615-a9b1-83bc3ed3dfb1,http://dx.doi.org/10.5553/njlp/221307132018047002006,,10.5553/njlp/221307132018047002006,2975021507,,0,,0,true,cc-by,green 097-466-850-473-052,The Political Economy of Piracy in the South China Sea.,2009-05-31,2009,journal article,Naval War College Review,00281484,,,David Rosenberg,"Piracy is an ancient, persistent, and elusive phenomenon in the South China Sea. In the past two decades it has increased substantially, leading to a renewed interest in piracy and its possible nexus with maritime terrorism, especially after the 11 September 2001 attacks on the United States. Although it has been widely reported and investigated, piracy remains difficult to understand and to control. The oceans are “a domain increasingly beyond governmental control,” says William Langewiesche. They are “vast and wild, where laws of nations mean little and where the resilient pathogens of piracy and terrorism flourish.”1 In the Asia-Pacific region, “maritime disorder prevails,” observes Sam Bateman. “This includes unregulated pollution of the marine environment, over-fishing, marine environmental degradation and widespread illegal activities at sea.”2 This article attempts to analyze piracy through the perspective of political economy, with an emphasis on state and market stakeholders and on the economic, technological, and institutional factors affecting ocean governance of piracy. The major area of concern here is the South China Sea, where approximately half of the world’s reported incidents of piracy have taken place since the 1990s. Following the usage of the International Maritime Bureau (IMB), this estimate includes instances of both piracy as defined under international law—theft on the David Rosenberg is professor of political science, Middlebury College, Vermont, and visiting fellow in the Department of Political and Social Change in the Research School of Pacific and Asian Studies at the Australian National University, Canberra, Australia. He is also regional editor for the South China Sea in the WWW Virtual Library of Asian Studies. He is the author or coauthor of numerous articles and chapters of edited volumes.",62,3,5,,Economy; Political economy; Political science; China; Environmental degradation; Terrorism; Asian studies; Social change; State (polity); Corporate governance; Politics,,,,,https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1689&context=nwc-review https://openresearch-repository.anu.edu.au/handle/1885/39431 http://www.usnwc.edu/getattachment/cd4a4cfa-eaa0-4040-9d51-a4b90b7a83d5/The-Political-Economy-of-Piracy-in-the-South-China https://researchprofiles.anu.edu.au/en/publications/the-political-economy-of-piracy-in-the-south-china-sea https://www.usnwc.edu/getattachment/cd4a4cfa-eaa0-4040-9d51-a4b90b7a83d5/The-Political-Economy-of-Piracy-in-the-South-China https://digitalcollections.anu.edu.au/handle/1885/39431 https://www.hsdl.org/?abstract&did=36179 https://digital-commons.usnwc.edu/nwc-review/vol62/iss3/5/,https://openresearch-repository.anu.edu.au/handle/1885/39431,,,2230478754,,0,018-902-831-047-51X; 029-909-993-322-298; 070-405-395-361-745; 114-483-889-599-102; 145-573-177-484-298; 157-943-293-140-645; 185-104-823-389-543,19,false,, 097-507-095-668-064,Piracy and social norm of anti‐piracy,2012-10-12,2012,journal article,International Journal of Social Economics,03068293,Emerald,United Kingdom,Hsiao-Chien Tsui; Tzung‐Ming Wang,"Purpose – If a society does not identify with purchase of illegal goods, consumers will undertake more psychological burden when buying the goods. The purpose of this paper is to explore the effect of social norm of anti‐piracy on social welfare.Design/methodology/approach – This paper uses a theoretical model to consider that although consumers will select piracy goods for the concerns of net utility, due to pressure from social norms, consumers are not wiling to purchase piracy goods.Findings – The results show that enhancement of social norm of anti‐piracy will improve overall social welfare; however, the social norm of anti‐piracy must be limited to certain scope. Extreme social norm of anti‐piracy, in comparison to the situation without social norm of anti‐piracy, will lower overall social welfare.Originality/value – If complete laws and strict enforcement cannot curb piracy, we can boldly assume that mature and high degree of “rule of low” is the force to restrain purchase of piracy goods. The paper...",39,12,922,932,Public economics; Economics; Consumer behaviour; Value (ethics); Originality; Enforcement; Scope (project management); Social Welfare; Commerce,,,,,https://www.emerald.com/insight/content/doi/10.1108/03068291211269361/full/html https://EconPapers.repec.org/RePEc:eme:ijsepp:v:39:y:2012:i:12:p:922-932 https://ideas.repec.org/a/eme/ijsepp/v39y2012i12p922-932.html http://www.emeraldinsight.com/doi/10.1108/03068291211269361,http://dx.doi.org/10.1108/03068291211269361,,10.1108/03068291211269361,2099939250,,0,003-982-789-982-915; 007-199-093-187-201; 023-026-222-547-045; 026-283-018-089-565; 038-834-827-922-944; 044-508-083-940-309; 058-121-885-295-622; 072-307-449-982-322; 095-937-634-366-901; 100-441-079-810-718; 135-800-520-334-495,5,false,, 097-671-205-020-336,"Sanctioning value: The legal system, hyper-power and the legitimation of MP3",2016-12-05,2016,journal article,Marketing Theory,14705931; 1741301x,SAGE Publications,United Kingdom,Janice Denegri-Knott; Mark Tadajewski,This article offers an historical account of the contestation surrounding MP3 and its legitimation as a consumer choice option. We juxtapose our narrative against the service-dominant logic (SDL) l...,17,2,219,240,Sociology; Law and economics; Narrative; Law; Power (social and political); Consumer choice; Value (ethics); Legitimation; Service-dominant logic; Consumer culture theory,,,,,https://dro.dur.ac.uk/19627/ https://journals.sagepub.com/doi/pdf/10.1177/1470593116677766 http://eprints.bournemouth.ac.uk/24972/ http://journals.sagepub.com/doi/pdf/10.1177/1470593116677766 http://dro.dur.ac.uk/19627/ https://core.ac.uk/download/74204398.pdf,http://dx.doi.org/10.1177/1470593116677766,,10.1177/1470593116677766,2560412536,,0,000-420-259-424-20X; 003-972-499-840-83X; 005-590-991-432-327; 006-500-508-771-869; 006-743-323-207-512; 009-330-603-155-634; 010-322-130-502-207; 012-269-029-598-075; 012-270-767-861-662; 012-518-755-778-147; 016-463-907-814-056; 017-835-311-851-228; 018-026-898-084-107; 018-731-168-088-193; 022-147-377-045-431; 023-172-960-662-657; 023-211-769-568-944; 023-420-303-666-471; 026-100-150-126-197; 032-152-430-141-238; 047-881-315-792-478; 049-147-987-811-316; 052-399-899-552-544; 056-417-137-486-239; 058-668-647-221-619; 064-643-809-560-020; 068-165-244-006-074; 069-859-789-738-69X; 070-027-169-806-878; 075-436-220-798-455; 077-593-806-882-04X; 078-427-702-229-217; 078-691-273-250-802; 083-235-421-331-834; 089-016-573-173-28X; 089-308-626-824-678; 091-655-049-081-779; 092-697-737-514-031; 092-905-273-215-693; 095-192-663-875-998; 097-169-126-731-523; 102-667-892-011-104; 104-292-627-025-008; 113-346-149-208-017; 119-135-032-337-219; 126-804-686-154-672; 134-574-914-475-865; 138-390-336-540-459; 141-257-296-586-748; 145-103-981-656-453; 148-846-034-392-61X; 148-925-144-527-058; 154-356-551-264-857; 160-285-483-229-161; 168-909-068-738-261; 173-918-610-769-232; 187-637-813-910-82X,19,true,cc0,green 098-461-262-031-550,Air Piracy,,1971,journal article,International and Comparative Law Quarterly,00205893; 14716895,Cambridge University Press (CUP),United Kingdom,N. March Hunnings,,20,2,348,349,Business; Political science,,,,,,http://dx.doi.org/10.1093/iclqaj/20.2.348,,10.1093/iclqaj/20.2.348,,,0,,0,false,, 098-740-580-900-821,New Developments in the International Law of Piracy,2009-05-03,2009,journal article,Chinese Journal of International Law,15401650; 17469937,Oxford University Press (OUP),United States,Keyuan Zou,"The law of piracy can be regarded as the oldest branch of international law, particularly the law of the sea. While the basic legal stipulations in international law as embodied in the 1982 UN Convention on the Law of the Sea remained unchanged for a long time, there are some new developments relating to the change of the law of piracy associated with the resurgence of contemporary piracy in the 1990s and the so-called “anti-terror war” led by the United States after the September 11 event. This paper will address three aspects: the definition of piracy; new international legislation concerning piracy; and recent State practice, all contributing to the development of the international law of piracy.",8,2,323,345,Sources of law; Comparative law; Political science; Public law; United Nations Convention on the Law of the Sea; Public international law; Civil law (legal system); Law; Law of the sea; International law,,,,,https://core.ac.uk/display/1442500 http://chinesejil.oxfordjournals.org/content/8/2/323.short http://clok.uclan.ac.uk/4921/ http://academic.oup.com/chinesejil/article-abstract/8/2/323/310806 https://academic.oup.com/chinesejil/article-abstract/8/2/323/310806,http://dx.doi.org/10.1093/chinesejil/jmp006,,10.1093/chinesejil/jmp006,2133758880,,0,,15,false,, 098-819-412-952-35X,"Internet, Copyright and Digital Piracy",,2017,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Craig D'souza,,,,,,Internet privacy; The Internet; Business; International waters; Work (electrical); Telecommunications network; Enforcement; Digital piracy; Freedom of expression; Intellectual property,,,,,https://www.ssrn.com/abstract=3316761 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3316761,http://dx.doi.org/10.2139/ssrn.3316761,,10.2139/ssrn.3316761,2920066492,,0,000-583-719-092-573; 004-758-062-348-614; 015-439-375-047-530; 019-631-684-336-147; 020-698-166-831-705; 034-357-334-887-955; 054-018-336-624-015; 069-164-513-244-807; 079-808-806-311-579; 089-321-770-773-621; 098-585-361-096-960; 120-047-239-023-394; 125-035-922-410-915; 140-533-869-755-193; 144-660-592-094-026,0,false,, 098-842-980-455-840,ПЛАГІАТ І САМОПЛАГІАТ ЯК ПРАВОВІ ЯВИЩА,,2021,journal article,New Ukrainian Law,,Kyiv Regional Center of the National Academy of Legal Sciences of Ukraine,,Лариса Василівна Красицька,"The author of the article has analyzed the current legislation of Ukraine and legal literature on determining the concepts of “literary piracy”, “text recycling”. It has been proved that literary piracy as a legal phenomenon is a type of intellectual property infringement to objects that are protected as objects of intellectual property rights. It has been argued that literary piracy should not be considered as an abuse of the right to creativity by a person who commits literary piracy. Literary piracy is a generic term for academic literary piracy as a type of violation of academic honesty. It has been established that academic literary piracy and text recycling according to the current legislation of Ukraine are forms of fraudulent pretence as a type of academic honesty violation. The author has argued that if one establishes the fact of literary piracy as intellectual property infringement, the offender is subject to sanctions provided by the legislation on protection of intellectual property rights, such as compensation of damage (material damage), including lost profits, or recovery of proceeds received by an offender as a result of copyright infringement and (or) related rights. When the fact of academic literary piracy is established we apply sanctions, which are provided by the legislation on education and science, for example, cancellation of the decision of a one-time specialized scientific council on awarding a person with the PhD degree and issuing an appropriate diploma. It has been proved that text recycling is legal fiction in its essence, i.e. such a non-existent position, which is declared existing and becomes mandatory due to its enshrinement in the legal prescription. It has been substantiated that the legislation on the procedure of considering the issue of establishing academic literary piracy needs to be improved. It is also advisable to define different types of academic literary piracy at the legislative level. The author has offered to consider text recycling not as a legal category, but as a moral and ethical category in the context of ethical approaches to self-citing, academic honesty, etc.",,3,188,193,Political science; Law and economics; Honesty; Legislation; Legal fiction; Sanctions; Related rights; Copyright infringement; Context (language use); Intellectual property,,,,,http://newukrainianlaw.in.ua/index.php/journal/article/view/45 http://dspace.univd.edu.ua/xmlui/handle/123456789/10810,http://dx.doi.org/10.51989/nul.2021.3.27,,10.51989/nul.2021.3.27,3189562738,,0,,0,true,,green 099-234-196-613-195,Somali Pirates as Agents of Change in International Law-making and Organisation,,2012,journal article,Cambridge Journal of International and Comparative Law,20501706; 20501714,Edward Elgar Publishing,,Douglas Guilfoyle,"Somali piracy is a highly adaptive business activity that can only be understood in context. The present article aims to provide an analysis of the phenomenon and in particular its impact on international law-making and organisation. The relevant developments have moved fast enough that there is already a significant history of international co-operation in response to Somali piracy. The contention of this article is that the most important impact of Somali pirates as agents of change has not been on the substantive law of piracy but through generating new models of co-operation and soft-law. This has been evident in a range of shifts: the move from a military approach to law enforcement operations; from unilateral enforcement to international authorisation and then to transnational co-ordination; a shift from reliance on formal organisations to informal co-ordinating bodies; and from maritime operations in the Gulf of Aden to various land-based operations, most notably including law and prison reform. The use of soft-law in particular is most evident in the shipping industry's response to piracy. The present article thus proceeds by first offering an extended account of the history of Somali piracy and its context. This is vital for two reasons: first, one must appreciate that Somali piracy is not a static phenomenon; and second, understanding how Somali piracy is shaped by its context cautions us against concluding that Somali-style piracy may `spread' to other regions. The article then turns to the rise of international counter-piracy operations and counterpiracy co-operation. Here we see a rapid shift from a largely `military paradigm' response (unilateral actions and Security Council authorised missions) to a",1,3,81,106,Comparative law; Political science; Public international law; Law and economics; Law; Somali; Enforcement; Context (language use); Law enforcement; Substantive law; International law,,,,,https://www.elgaronline.com/view/journals/cilj/1-3/cilj.2012.03.06.xml https://research.monash.edu/en/publications/somali-pirates-as-agents-of-change-in-international-law-making-an https://discovery.ucl.ac.uk/id/eprint/1395690,http://dx.doi.org/10.7574/cjicl.01.03.58,,10.7574/cjicl.01.03.58,3121864591,,0,039-234-329-493-662; 044-645-874-240-748; 088-437-397-004-194; 106-619-699-607-570; 112-756-060-430-338,1,false,, 099-468-688-261-466,"Criminal entrepreneurship, white‐collar criminality, and neutralization theory",2011-10-18,2011,journal article,Journal of Enterprising Communities: People and Places in the Global Economy,17506204,Emerald,United Kingdom,Petter Gottschalk; Robert Smith,"This is the authors' final and acceptet version, post refereeing, of the article. Publisher's version is available at www.emeraldinsight.com/1750-6204.htm",5,4,300,308,Sociology; Theory of criminal justice; White-collar crime; Collar; White (horse); Criminology; Entrepreneurship,,,,,https://rgu-repository.worktribe.com/output/248151 https://www.emeraldinsight.com/doi/pdf/10.1108/17506201111177334 https://rgu-repository.worktribe.com/preview/295451/GOTTSCHALK%202011%20Criminal%20entrepreneurship%20white-collar.pdf https://openair.rgu.ac.uk/handle/10059/688 https://www.emeraldinsight.com/doi/abs/10.1108/17506201111177334 https://brage.bibsys.no/xmlui/handle/11250/93394 https://EconPapers.repec.org/RePEc:eme:jecpps:v:5:y:2011:i:4:p:300-308 https://www.emerald.com/insight/content/doi/10.1108/17506201111177334/full/html https://biopen.bi.no/bi-xmlui/handle/11250/93394 https://core.ac.uk/display/30866272 https://ideas.repec.org/a/eme/jecpps/v5y2011i4p300-308.html https://research-portal.uws.ac.uk/en/publications/criminal-entrepreneurship-whitecollar-criminality-and-neutralizat https://core.ac.uk/download/pdf/52040089.pdf,http://dx.doi.org/10.1108/17506201111177334,,10.1108/17506201111177334,2019937353,,0,012-568-702-605-512; 018-562-467-695-263; 022-542-961-632-272; 035-189-771-677-178; 039-835-173-667-534; 041-687-811-057-600; 044-133-847-375-103; 050-288-860-569-934; 050-982-806-923-947; 053-062-520-315-150; 054-523-675-834-313; 056-680-749-313-097; 066-696-466-314-267; 071-529-463-419-306; 072-231-183-979-063; 104-262-027-058-415; 107-010-129-731-146; 124-719-673-693-782; 129-691-672-675-216; 130-214-393-255-423; 134-936-898-078-397; 191-675-042-300-389,51,true,cc-by-nc-nd,green 099-904-338-187-401,Meeting new readers in the transition to digital newspapers: lessons from the entertainment industry,2015-03-11,2015,journal article,El Profesional de la Información,16992407; 13866710,Ediciones Profesionales de la Informacion SL,Netherlands,Loreto Corredoira; Sanjay Sood,"In this work, carried out at the University of California Los Angeles (UCLA) Center for Management of Enterprise Media, Entertainment,and Sports (Memes), we suggest that there is hope and reason for media companies to expect a recovery from the current crisis. As journalists and researchers in communication, we are concerned about newspapers’ sustainability, and we refuse to consider a future scenario without the press. According to this objective we focus on the entertainment industry with the goal of learning from it how to survive and even grow despite freely available content on the Web. We consider the unstoppable growth in users and revenue experienced by Netflix, Amazon and iTunes, and pull from it lessons learned that might help newspapers to navigate the digital landscape. Our hypothesis is that digital newspapers can find new readers in the segment of digital consumers who already “pay” for digital content including streaming movies and television shows. Sales, subscriptions, and online rentals experienced significant growth in 2013, bringing them closer to the sales figures of hardware such as DVDs and blu-ray discs. And, although piracy is an issue in the entertainment industry, there remains room for revenue growth.",24,2,138,148,Advertising; World Wide Web; Business; Work (electrical); Revenue; Newspaper; Digital content; Entertainment industry; Entertainment; Sustainability; Renting,,,,,https://recyt.fecyt.es/index.php/EPI/article/view/epi.2015.mar.07 http://recyt.fecyt.es/index.php/EPI/article/download/epi.2015.mar.07/18807 https://dialnet.unirioja.es/servlet/articulo?codigo=5000066 https://dialnet.unirioja.es/descarga/articulo/5000066.pdf https://eprints.ucm.es/33554/1/138-148_Corredoira-ultimo.pdf https://eprints.ucm.es/id/eprint/33554/ https://www.scipedia.com/public/Corredoira_Sood_2015a https://core.ac.uk/download/33106693.pdf,http://dx.doi.org/10.3145/epi.2015.mar.07,,10.3145/epi.2015.mar.07,1686936963,,0,055-810-730-634-663; 092-349-900-678-968; 132-185-033-699-883; 138-848-579-748-192; 147-613-646-961-445,3,true,cc-by-nc-sa,green 100-066-992-398-231,"Book Review: The Law and Practice of Piracy at Sea: European and International Perspectives, by Panos Koutrakos and Achilles Skordas. (Oxford: Hart Publishing, 2014)",2015-12-01,2015,journal article,Common Market Law Review,01650750,Kluwer Law International BV,,Roberto Virzo,,52,Issue 6,1717,1719,,,,,,,http://dx.doi.org/10.54648/cola2015151,,10.54648/cola2015151,,,0,,0,false,, 100-096-205-029-718,Can Computer Software 'Piracy' be Prevented?,1986-07-01,1986,journal article,Business Law Review,01436295; 2405433x,Kluwer Law International BV,,,,7,Issue 7,191,192,Software; Business; Computer science; Computer security; Operating system,,,,,,http://dx.doi.org/10.54648/bula1986070,,10.54648/bula1986070,,,0,,0,false,, 100-171-717-660-99X,"Singapore tops software piracy list, survey shows",,1997,journal article,Computers & Security,01674048,Elsevier BV,United Kingdom,Helen Meyer,,16,3,214,,TOPS; Software; Computer security; Computer science,,,,,https://www.sciencedirect.com/science/article/pii/S0167404897845439,http://dx.doi.org/10.1016/s0167-4048(97)84543-9,,10.1016/s0167-4048(97)84543-9,2004830066,,0,,0,false,, 101-042-099-708-065,Internet Piracy of Live Sports Telecasts,,2008,journal article,Marquette Sports Law Review,15336484,,,Michael J. Mellis,,18,2,259,,Internet privacy; Broadcasting (networking); The Internet; Advertising; Business,,,,,https://scholarship.law.marquette.edu/sportslaw/vol18/iss2/2/ https://scholarship.law.marquette.edu/cgi/viewcontent.cgi?article=1236&context=sportslaw,https://scholarship.law.marquette.edu/sportslaw/vol18/iss2/2/,,,1514604720,,0,,9,false,, 101-207-374-818-115,Law of the Intermediated Information Exchange,2012-02-15,2012,journal article,Florida Law Review,10454241,,,Jacqueline D. Lipton,"When Wikipedia, Google, and other online service providers staged a ―blackout protest‖ against the Stop Online Piracy Act (SOPA) in January 2012, their actions inadvertently emphasized a fundamental truth that is often missed about the nature of cyberlaw. In attempts to address what is unique about the field, commentators have failed to appreciate that the field could— and should—be reconceptualized as a law of the global intermediated information exchange. Such a conception would provide a set of organizing principles that are lacking in existing scholarship. Nothing happens online that does not involve one or more intermediaries—the service providers who facilitate all digital commerce and communication by providing the hardware and software through which all interactions take place. This Article advocates a fundamental shift in the nature of cyberspace scholarship towards a law of the ―intermediated information exchange,‖ and explains the benefits of such an approach in developing a more predictable and cohesive body of legal principles to govern cyberspace interactions. INTRODUCTION 1338 I. CURRENT CONCEPTIONS OF CYBERLAW 1339 II. INTERNET INTERMEDIARIES 1343 A. Defining Internet Intermediaries 1343 B. Direct Versus Indirect Liability for Internet Intermediaries 1345 C. Questions of Secondary Liability 1351 D. Benefits of a Renewed Focus on Intermediary 1355 Liability 1355 E. Responsibility to Unmask Wrongdoers 1359 * Baker Botts Professor of Law and Co-Director, Institute for Intellectual Property and Information Law, University of Houston Law Center (jdlipton@central.uh.edu). The author would like to thank Professor Joel Reidenberg, Ms. Jamela Debelak, and participants at the Law and Information Society Informational Workshop at Fordham Law School (hosted by the Center on Law and Information Policy) on September 16, 2011, for generous support in workshopping of an earlier draft of this paper. Particular thanks to Professor Derek Bambauer, Professor Steven Bellovin, Professor Gaia Bernstein, Professor Ira Bloom, Professor Margaret Chon, Professor James Grimmleman, Professor Leah Grinvald, Professor Sharona Hoffman, Professor Nancy Kim, Mr. Jordan Kovnot, Professor Ed Lee, Professor Jessica Litman, Professor Irina Manta, Dean Lawrence Mitchell, Professor David Post, Professor Cassandra Robertson, Professor Susan Scafidi, Professor Olivier Sylvain, and Professor Jane Yakowitz for comments on earlier drafts of this Article. Any mistakes and omissions are, of course, my own. 1 Lipton: Law of the Intermediated Information Exchange Published by UF Law Scholarship Repository, 2012 1338 FLORIDA LAW REVIEW [Vol. 64 III. JURISDICTION 1361 CONCLUSION 1367",64,5,1337,,Sociology; Law; Scholarship; Secondary liability; Information policy; Information society; Indirect liability; Cyberspace; Intellectual property; Legal aspects of computing,,,,,https://scholarship.law.ufl.edu/cgi/viewcontent.cgi?article=1028&context=flr https://ideaexchange.uakron.edu/cgi/viewcontent.cgi?article=1143&context=ua_law_publications https://works.bepress.com/jacqueline_lipton/13/ https://ideaexchange.uakron.edu/ua_law_publications/144/ https://works.bepress.com/jacqueline_lipton/13/download/ https://scholarship.law.ufl.edu/flr/vol64/iss5/5/,https://works.bepress.com/jacqueline_lipton/13/,,,80516858,,0,,1,false,, 101-322-297-165-408,Airwave piracy routed,2006-09-01,2006,journal article,Journal of Intellectual Property Law & Practice,17471532; 17471540,Oxford University Press (OUP),,Andrew Hobson,,1,11,699,700,,,,,,https://academic.oup.com/jiplp/article-abstract/1/11/699/854319/,http://dx.doi.org/10.1093/jiplp/jpl140,,10.1093/jiplp/jpl140,2070750703,,0,,0,false,, 101-341-156-127-639,Some Legal Problems in Fighting against Piracy cross the Border,,2009,journal article,Journal of Wuhan University of Technology,19930437,,,Zheng Lei,"Piracy remains a serious threat to the international community in modern times,especially in Somalia.Because of the damage that maritime piracy inflicts on international trade and general safety,it has long been treated as a universal crime whose perpetrators were subject to punishment by any country that caught them.But there are some gaps in the definition of piracy,the mechanism of universal jurisdiction can not apply to all the piracy crime.Besides,there are many controversies in patrolling the merchant ships in another country's water area.It is high time for us to reform the international law to fight against piracy.",,,,,Patrolling; Political science; Law and economics; Law; Universal jurisdiction; Punishment; International community; Maritime piracy; International law,,,,,https://en.cnki.com.cn/Article_en/CJFDTOTAL-WHJT200903016.htm,https://en.cnki.com.cn/Article_en/CJFDTOTAL-WHJT200903016.htm,,,2352272572,,0,,0,false,, 101-397-389-372-080,"Media policy in the context of global media flows, the internet, and piracy: an historical analysis of media regulation in Indonesia",2015-12-01,2015,journal article,"Jurnal Komunikasi, Malaysian Journal of Communication",22891528; 2289151x,Penerbit Universiti Kebangsaan Malaysia (UKM Press),Malaysia,Yearry Panji Setianto,"Television has been considered one of the most popular media in Indonesia with national television programs as the most dominant for local audiences. Even though imported programs also have been introduced from the early periods of national broadcasting, media regulations in this country tend to limit foreign contents so it does not exceed national contents. However, in recent years national television’s popularity is being challenged not only by global media contents but also by the presence newer media platforms like the Internet. In addition, global media contents are also becoming available through pirated media, such as via VCD, DVD, MP3, and P2P, which are easy to access in many Asian countries due to ineffective regulations against piracy. This study proposes a research question: what are the current media regulations in Indonesia in the discourse of global flows of media contents through the Internet and piracy media? The data gathered mainly from academic literatures, news articles, legislation documents, and online media obtained from Lexis Nexis Academic database The study found that since media regulations in Indonesia mainly focus only in print media and broadcasting, there are few regulations that discuss the threat of global media contents that are mainly accessed through newer media such as the Internet and pirate media outlets. Additionally, lack of socialization of intellectual property rights remains as one of the biggest factors that made any regulations ineffective to overcome media piracy.",31,2,371,388,Internet privacy; The Internet; Advertising; Digital media; Geography; Media regulation; Context (language use); Citizen media; News media; Media conglomerate; Media relations,,,,,https://ejournal.ukm.my/mjc/article/download/14951/7586 https://core.ac.uk/display/77967603 http://journalarticle.ukm.my/10022/ https://ejournals.ukm.my/mjc/article/view/14951 https://ejournal.ukm.my/mjc/article/view/14951 https://ejournals.ukm.my/mjc/article/download/14951/7586 https://core.ac.uk/download/77967603.pdf,http://dx.doi.org/10.17576/jkmjc-2015-3102-21,,10.17576/jkmjc-2015-3102-21,2599348798,,0,,1,true,, 101-573-280-951-919,Talking Foreign Policy: A Roundtable on Piracy,,2014,journal article,Case Western Reserve Journal of International Law,00087254,,,Michael P. Scharf,,46,1,411,,International trade; Political science; Law; Foreign relations; Foreign policy,,,,,https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1045&context=jil https://scholarlycommons.law.case.edu/jil/vol46/iss1/20/,https://scholarlycommons.law.case.edu/jil/vol46/iss1/20/,,,1873489636,,0,,0,false,, 101-582-161-672-196,KEBIJAKAN FORMULASI JUDI ONLINE DALAM HUKUM INDONESIA,2019-09-19,2019,journal article,VYAVAHARA DUTA,26145162; 19780982,Institut Hindu Dharma Negeri Denpasar,,Dewi Bunga,"Various electronic devices equipped with internet networks have opened up opportunities for emerging crimes in cyberspace. Online gambling is a form of traditional crime transformation that turns into a crime operating in cyberspace. In the formulation of legal policies in various countries, not all countries declare online gambling as a criminal act. There are countries that legalize online gambling, there are countries that are in the gray area, and some are banning online gambling. In this study there are two issues discussed, namely the application of jurisdiction in the criminal acts of online gambling and criminal law policies against online gambling. The application of jurisdiction in criminal acts of online gambling must pay attention to the rules of international law, where a country cannot enforce its rule of law in another country. Provisions regarding online gambling jurisdiction are regulated in Article 2 of Act Number 11 of 2008 concerning Electronic Information and Transactions. International cooperation in law enforcement on online gambling can be carried out as long as there are international agreements between countries and both countries alike establish online gambling as a crime. Criminal law policy on online gambling in Indonesia formulates online gambling as a criminal act as stipulated in Article 27 paragraph (2) of Act Number 11 of 2008 concerning Information and Electronic Transactions.",14,1,21,34,The Internet; Political science; Law; Criminal law; Rule of law; Jurisdiction; Law enforcement; Cyberspace; Legal policies; International law,,,,,http://ejournal.ihdn.ac.id/index.php/VD/article/download/1100/936 http://ejournal.ihdn.ac.id/index.php/VD/article/view/1100 https://core.ac.uk/download/pdf/291675153.pdf,http://dx.doi.org/10.25078/vd.v14i1.1100,,10.25078/vd.v14i1.1100,2981447165,,0,,0,true,cc-by-sa,gold 101-619-692-261-018,A Contemporary Approach to the Oldest International Crime,2017-04-12,2017,journal article,Utrecht Journal of International and European Law,20535341,"Ubiquity Press, Ltd.",,Michael P. Scharf; Mistale Taylor,"Maritime piracy began to re-emerge a decade ago, mostly off the coast of Somalia, thereby presenting major economic, security and humanitarian concerns. Prosecuting piracy raises many issues, not in the least because traditional maritime piracy from 200 years ago is so notably different from contemporary piracy. The present article describes the Public International Law and Policy Group’s formation of the High Level Piracy Working Group (HLPWG), which since 2011 has been producing memoranda on major issues in contemporary piracy prosecution. The issues span the legal foundations of piracy prosecution, including how to criminalise certain acts and how to exercise jurisdiction over such acts. Laws governing the use of force could apply to government or private actors when capturing and apprehending pirates. Once captured, there are questions of extraditing and transferring these pirates. Moreover, when such pirates are eventually brought to trial, there are pre-trial, evidentiary, substantive and post-prosecution issues to consider. The article also explores the merits and likelihood of creating an international piracy court. It shows how the HLPWG has influenced legal and policy developments today that draw on the distant past, and will undoubtedly have an enduring legacy in the future.",33,84,77,89,Sociology; Government; Public international law; Law; Use of force; Jurisdiction; Maritime security; Maritime piracy,,,,,http://utrechtjournal.org/articles/373/ http://dspace.library.uu.nl/handle/1874/358261 https://core.ac.uk/display/90804958 https://doaj.org/article/3826ef9681f04b96a62f1def4756d3c2 https://www.narcis.nl/publication/RecordID/oai%3Adspace.library.uu.nl%3A1874%2F358261 https://www.utrechtjournal.org/articles/10.5334/ujiel.373/ https://www.utrechtjournal.org/articles/10.5334/ujiel.373/galley/168/download/,http://dx.doi.org/10.5334/ujiel.373,,10.5334/ujiel.373,2605695853,,0,,4,true,cc-by,gold 101-667-299-911-690,"Endogenous IPR protection, commercial piracy, and welfare implications for anti-piracy laws",2021-03-08,2021,journal article,Applied Economics Letters,13504851; 14664291,Routledge,United Kingdom,Yang-Ming Chang; Manaf Sellak,"In the presence of commercial digital piracy, should the government provide costly protection for intellectual property rights (IPR)? Under what conditions will government protection and private pr...",,,1,5,Welfare; Business; Government; Law and economics; Digital piracy; Intellectual property,,,,,https://www.tandfonline.com/doi/full/10.1080/13504851.2021.1884832,https://www.tandfonline.com/doi/full/10.1080/13504851.2021.1884832,,,3133656694,,0,002-039-947-241-597; 003-982-789-982-915; 006-405-597-929-940; 016-870-716-539-360; 021-561-863-733-413; 030-552-311-543-904; 030-823-075-021-486; 039-350-981-279-016; 039-898-832-968-073; 047-010-436-077-442; 048-006-527-139-738; 049-437-351-989-704; 049-698-234-112-01X; 050-683-526-710-058; 071-049-038-387-881; 071-114-479-382-099; 078-663-464-379-133; 086-150-177-395-225; 140-131-325-230-370; 142-989-369-390-130; 153-552-384-031-475; 190-235-068-858-22X,2,false,, 101-711-050-847-377,Cons in the panopticon: Anti–globalization and cyber–piracy,2004-09-06,2004,journal article,First Monday,13960466,University of Illinois Libraries,United States,Indhu Rajagopal,"This paper examines the paradox of the digital telecommunications revolution that augured the transcendence of big business and big government (Toffler, 1980), but also extended to the World Wide Web the processes of privatization and commodification. Instead of facilitating individuals to design, through interactive technology, their own media and directly express their will (Pool, 1983), the Internet has come to embody a panopticon [1] that extends the reach of corporatists [2]. We discuss the panopticon in the context of the globalizing cyber–technology, and argue that piracy is an anti–globalization movement.",9,9,,,The Internet; Panopticon; Economics; Globalization; Transcendence (philosophy); Context (language use); Big business; Big government; Media studies; Public relations; Commodification,,,,,https://journals.uic.edu/ojs/index.php/fm/article/view/1174/1094 https://dblp.uni-trier.de/db/journals/firstmonday/firstmonday9.html#RajagopalB04a https://firstmonday.org/ojs/index.php/fm/article/view/1174/1094,http://dx.doi.org/10.5210/fm.v9i9.1174,,10.5210/fm.v9i9.1174,2142811100,,0,,0,false,, 101-803-234-012-305,Prosecuting Piracy at the High Seas: the Experience of Malaysia,2018-12-30,2018,journal article,IIUM Law Journal,22897852; 01282530,IIUM Press,,Muhammad Hameedullah Md Asri; Khalil Ruslan,"The development of the law on piracy under two major international treaties; the Geneva Convention, 1958 and the United Nations Convention on the Law of the Sea, 1982 has witnessed great acceptance and application of the law with many coastal states have crafted specific anti-piracy law as a manifestation of their commitments to the international treaties. However, up until today, Malaysia has yet to come out with a single and unified statute against piracy despite being a member to both treaties. The law is scattered in a different set of documents and carried out by various agencies that are responsible to each respective law. It is argued that given this is the position in Malaysia, the prosecution of piracy would be a critical problem for the law enforcement. In this paper, we address this concern by looking at both Malaysian legal framework as well as the experience of the country against international piracy, particularly the case of Bunga Laurel. The findings suggest that there are more than twenty Acts that might be used against piracy. As a sovereign state under the international law, Malaysia also has the right to resort to principles of international law for the apprehension and prosecution of high sea pirates. To this effect, the case of Bunga Laurel has really manifested the successful application of Malaysian law by the High Court of Malaya against international piracy. The paper concludes that the absence of a single anti-piracy law is not necessarily an obstacle, but instead an advantage with great choice of law available for the prosecution in this country.",26,2,307,307,International waters; Sovereign state; Statute; Political science; United Nations Convention on the Law of the Sea; Law; Choice of law; Law enforcement; Convention; International law,,,,,https://journals.iium.edu.my/iiumlj/index.php/iiumlj/article/download/378/236,http://dx.doi.org/10.31436/iiumlj.v26i2.378,,10.31436/iiumlj.v26i2.378,2908283262,,0,,1,true,,bronze 101-836-065-144-948,"Youth, Creativity, and Copyright in the digital age",,2009,journal article,International Journal of Learning and Media,19436068,Portico,,John Palfrey; Urs Gasser; Miriam Simun; Rosalie Fay Barnes,"New digital networked technologies enable users to participate in the consumption, distribution, and creation of content in ways that are revolutionary for both culture and industry. As a result, “Digital Natives”—young people growing up in the digital world with access to the technologies and the skills to use them in sophisticated ways—are now confronting copyright law on a regular basis. This article presents qualitative research conducted with students age 12-22 that explores youth understanding, attitudes, and discourse on the topic of digital creativity and copyright law. Our findings suggest that young people operate in the digital realm overwhelmingly ignorant of the rights, and to a lesser degree the restrictions, established in copyright law. They often engage in unlawful behavior, such as illegal peer-to-peer music downloading, yet they nevertheless demonstrate an interest in the rights and livelihoods of creators. Building upon our findings of the disconnect between technical, legal, and socia...",1,2,79,97,Creativity; Political science; Qualitative research; Digital native; Realm; Consumption (sociology); Public relations; Distribution (economics); Livelihood; Curriculum,,,,,"https://dash.harvard.edu/handle/1/3128762 https://cyberleninka.org/article/n/718496 https://dash.harvard.edu/bitstream/handle/1/3128762/Palfrey%20-%20Youth,%20Creativity,%20and%20Copyright%20in%20the%20Digital%20Age.pdf?sequence=2 https://dash.harvard.edu/bitstream/1/3128762/2/Palfrey%20-%20Youth%2c%20Creativity%2c%20and%20Copyright%20in%20the%20Digital%20Age.pdf https://cyberleninka.org/article/n/718496.pdf https://core.ac.uk/download/28931254.pdf",http://dx.doi.org/10.1162/ijlm.2009.0022,,10.1162/ijlm.2009.0022,3124199849,,0,016-310-163-937-282; 036-539-462-006-358; 040-931-724-050-019; 042-290-037-492-97X; 054-921-652-475-593; 056-764-568-668-129; 070-256-024-622-719; 071-194-789-974-623; 071-321-301-725-009; 078-953-319-252-801; 088-621-279-167-179; 099-230-060-126-496; 106-995-708-489-801; 107-373-536-660-819; 113-930-494-849-053; 114-205-811-041-74X; 127-254-760-129-567; 147-996-861-433-582; 158-837-997-854-205; 171-762-901-230-842; 179-209-319-984-806,54,true,cc-by-nc,green 101-882-859-747-676,Harvest of arrests but no prosecution: ideation toward strengthening the legal regime for prosecuting pirates in Nigeria,2020-07-13,2020,journal article,Commonwealth Law Bulletin,03050718; 17505976,Informa UK Limited,United Kingdom,Kalu Kingsley Anele,"Prosecuting pirates in local courts is one of the most effective ways to suppress piracy. Hence, appropriate legal regime is imperative for prosecuting pirates. Despite the spate of piracy off the ...",46,4,611,639,Ideation; Political science; Law,,,,,https://www.tandfonline.com/doi/full/10.1080/03050718.2020.1774402,http://dx.doi.org/10.1080/03050718.2020.1774402,,10.1080/03050718.2020.1774402,3042236986,,0,022-057-205-570-759; 038-038-185-399-284; 050-034-327-238-66X; 050-092-638-200-71X; 053-290-021-853-266; 058-946-863-061-709; 089-572-702-832-761; 094-608-444-289-745; 111-852-182-058-363; 111-986-736-467-518; 117-312-710-168-234; 118-972-653-872-494; 124-553-661-648-83X; 125-706-889-016-258; 138-773-595-732-197; 159-497-159-732-047; 164-152-095-988-357; 176-290-529-478-751; 176-431-351-812-973,0,false,, 101-997-729-609-005,Fighting software piracy: which IPRs laws (treaties) matter in Africa?,,2012,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Asongu Simplice A,"With the proliferation of technology used to prate software, this paper answers some key questions in policy decision making. Dynamic panel Generalized Methods of Moments and Two Stage Least Squares are employed. IPRs laws (treaties) are instrumented with government quality dynamics to assess their incidence on software piracy. The following findings are established. (1) Government institutions are crucial in enforcing IPRs laws (treaties) in the fight against software piracy. (2) Main IP laws enacted by the legislature and Multilateral IP laws are most effective in combating piracy. (3) IPRs laws, WIPO Treaties and Bilateral Treaties do not have significant negative incidences on software piracy. Policy implications are discussed.",,,,,Government; Political science; Law; Software; Policy decision; Intellectual property; Panel data; Legislature,,,,,https://core.ac.uk/display/12035055 https://mpra.ub.uni-muenchen.de/43590/ https://ssrn.com/abstract=2493254 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2493254,http://dx.doi.org/10.2139/ssrn.2493254,,10.2139/ssrn.2493254,2128864341,,0,003-120-061-431-142; 012-558-297-950-849; 015-808-798-057-897; 017-153-449-730-092; 019-311-622-107-557; 020-079-500-549-308; 022-264-398-959-067; 022-518-779-347-993; 027-989-705-549-237; 028-526-275-182-847; 028-630-596-457-020; 033-349-654-090-404; 039-883-767-744-759; 040-494-214-092-320; 041-385-438-010-463; 041-849-157-283-572; 041-893-696-570-720; 042-335-426-642-552; 043-305-653-465-196; 043-448-779-132-854; 046-127-440-118-73X; 046-669-922-850-444; 047-010-436-077-442; 049-698-234-112-01X; 054-663-257-958-510; 058-453-337-550-945; 059-077-318-219-51X; 060-029-094-849-473; 061-173-414-816-885; 062-169-487-131-224; 063-085-822-993-592; 064-893-720-411-223; 066-237-973-648-031; 068-809-693-165-274; 072-166-078-734-816; 081-895-720-913-94X; 083-798-097-606-101; 084-379-790-789-735; 084-864-570-554-378; 085-796-193-840-794; 087-959-536-613-70X; 088-242-617-862-394; 105-231-453-450-342; 105-803-797-619-085; 107-007-285-779-662; 110-231-183-577-925; 115-976-858-980-201; 125-495-818-933-457; 129-470-536-145-852; 132-558-492-977-554; 144-135-264-427-99X; 145-489-062-191-725; 145-811-348-738-768; 154-513-291-663-187; 168-778-518-719-694; 185-197-322-646-367; 191-344-983-602-980,3,true,cc0,green 102-155-822-558-981,Growth in piracy fastest in Singapore,,1997,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,1997,7,5,5,Business; Computer security; Computer science; Internet privacy,,,,,,http://dx.doi.org/10.1016/s1361-3723(97)89542-5,,10.1016/s1361-3723(97)89542-5,,,0,,0,false,, 102-901-243-758-067,Moving from Crisis Management to a Sustainable Solution for Somali Piracy: Selected Initiatives and the Role of International Law,,2014,journal article,Case Western Reserve Journal of International Law,00087254,,,Ved P. Nanda; Jonathan Bellish,,46,1,43,,Political economy; Political science; Poverty; Law; Somali; Rule of law; Crisis management; Public order; International law,,,,,https://paperity.org/p/82560449/moving-from-crisis-management-to-a-sustainable-solution-for-somali-piracy-selected https://scholarlycommons.law.case.edu/jil/vol46/iss1/5/ https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1030&context=jil,https://paperity.org/p/82560449/moving-from-crisis-management-to-a-sustainable-solution-for-somali-piracy-selected,,,1835396956,,0,,1,false,, 103-184-196-113-561,THE CHALLENGES FOR THE ENFORCEMENT AGAINST COPYRIGHT VIOLATIONS IN CHINA UNDER THE TRIPS AGREEMENT,2012-06-05,2012,journal article,Frontiers of Law in China,16733428,,,Difan Qu; Yahong Li,"While piracy is a serious problem in China, it is also a global concern. Within the domestic and the TRIPS context, this article discusses various forms of copyright violations in China, their impact on the enforcement of the Chinese Copyright Law, and their causes. In particular, this article discusses the unique aspects in China which make the enforcement of Copyright Law extremely difficult; it also analyzes how the Criminal Law should be used in the combat against piracy, and how China interprets the TRIPS Agreement as it is applicable to China. In addition, this article explores several means that are likely to become the future solutions of the problem of copyright violations in China.",7,2,244,268,TRIPS architecture; Political science; Law and economics; China; Criminal law; Enforcement; Context (language use); TRIPS Agreement; Copyright law,,,,,https://booksandjournals.brillonline.com/content/journals/10.3868/s050-001-012-0014-0 https://journal.hep.com.cn/flc/EN/10.3868/s050-001-012-0014-0,https://journal.hep.com.cn/flc/EN/10.3868/s050-001-012-0014-0,,,3124255495,,0,,0,false,, 103-547-038-508-648,The Modern International Law of Piracy: Content and Contemporary Relevance,,1983,journal article,International Relations,00471178; 17412862,SAGE Publications,United States,J.W. Boulton,,7,6,2493,2511,Comparative law; Relevance (law); Political science; Public international law; Law; Content (Freudian dream analysis); International law,,,,,https://journals.sagepub.com/doi/abs/10.1177/004711788300700607,http://dx.doi.org/10.1177/004711788300700607,,10.1177/004711788300700607,2087674290,,0,,1,false,, 103-731-295-000-044,Financial Analysis Of Information Security Breaches,2011-02-25,2011,journal article,International Business & Economics Research Journal (IBER),21579393; 15350754,Clute Institute,,Faramarz Damanpour; M. Hossain Heydari,"Each year, due to hacker attacks and virus infections billions of dollars are wasted. The impacts are globally felt and are not restricted to a single industry or agency, but it includes academia, individual, industry, and government agencies. In fact, hackers and viruses are becoming more and more sophisticated and are increasingly harder to detect. In this paper an attempt has been made to present Internet security and vulnerability, security policies, financial impacts, remedies, and a model to evaluate the opportunity costs of variables involve in security breaches.",2,6,,,Financial analysis; Business; Security policy; Cloud computing security; Internet security; Computer security; Information security; Asset (computer security); Hacker; Vulnerability (computing),,,,,https://www.cluteinstitute.com/ojs/index.php/IBER/article/view/3809/3853 https://core.ac.uk/download/pdf/268107224.pdf,http://dx.doi.org/10.19030/iber.v2i6.3809,,10.19030/iber.v2i6.3809,2189091837,,0,,1,true,,bronze 103-887-653-850-964,"Suing Organized Piracy: An Application of Maritime Torts to Pirate Attacks, and Subsequent Civil Actions Against the Supporters of Organized Piracy",,2011,journal article,Roger Williams university law review,10903968,,,Alistair Deans,,16,3,5,,Political science; Law,,,,,https://docs.rwu.edu/cgi/viewcontent.cgi?article=1466&context=rwu_LR https://docs.rwu.edu/rwu_LR/vol16/iss3/5,https://docs.rwu.edu/rwu_LR/vol16/iss3/5,,,236800454,,0,,0,false,, 104-374-726-078-26X,Do we need new rights in Cyberspace?. Discussing the case of how to define on-line privacy in an Internet Bill of Rights,2008-07-07,2008,journal article,Enrahonar. Quaderns de filosofia,2014881x; 0211402x,Universitat Autonoma de Barcelona,,David Casacuberta; Max Senges,"During the early days of Internet it was widely defended that being in an on-line environment clearly transformed some human rights; and might even create new ones. We argue for the consideration of an Internet Bill of Rights (IBR) however rather than inventing new rights, we propose that some rights have to be reconsidered within the emerging virtual context. Privacy, anonymity, freedom of expression, and so are not exactly the same rights we have in the realm of our physical being. What changes are some inarticulate contextual conditions, which make some people think that rights are actually changing. This has theoretical implications. We attempt to show that there is no need to re-think rights like privacy from the beginning, or even eliminate it, as some scholars propose. It also has implications for policy making, as it provides a general methodology to consider and adapt to virtual contexts in order to assure that basic human rights can be correctly applied and defended in cyberspace.",40,40,99,111,Internet privacy; The Internet; Sociology; Humanities; Human rights; Anonymity; Order (exchange); Realm; Context (language use); Bill of rights; Cyberspace,,,,,https://revistes.uab.cat/enrahonar/article/view/v40-casacuberta-senges https://dialnet.unirioja.es/servlet/articulo?codigo=2653395 https://core.ac.uk/display/13272381 https://revistes.uab.cat/enrahonar/article/download/v40-casacuberta-senges/270 https://ddd.uab.cat/record/24756 https://ddd.uab.cat/pub/enrahonar/0211402Xn40-41/0211402Xn40-41p99.pdf https://philpapers.org/rec/CASDWN https://core.ac.uk/download/13272381.pdf,http://dx.doi.org/10.5565/rev/enrahonar.306,,10.5565/rev/enrahonar.306,1529232921,,0,015-131-389-703-390; 070-664-474-757-138; 077-602-134-191-351; 113-346-149-208-017; 134-880-568-506-758; 136-248-080-870-47X; 150-384-374-696-327,2,true,cc-by-nc,gold 104-511-855-506-118,"Enter the Dragon: China's WTO Accession, Film Piracy and Prospects for Enforcement of Copyright Laws",2016-10-21,2016,journal article,"DePaul Journal of Art, Technology & Intellectual Property Law",10610553,,,Brent T. Yonehara,,12,1,63,,Political science; China; Law; Accession; Enforcement,,,,,https://via.library.depaul.edu/cgi/viewcontent.cgi?article=1244&context=jatip https://via.library.depaul.edu/jatip/vol12/iss1/8/,https://via.library.depaul.edu/jatip/vol12/iss1/8/,,,763231304,,0,,0,false,, 104-561-187-234-625,An Economic Analysis of Maritime Piracy and its Control,2013-08-04,2013,journal article,Scottish Journal of Political Economy,00369292; 14679485,Wiley,United Kingdom,Paul Hallwood; Thomas J. Miceli,"Modern-day piracy on the high seas poses a serious threat to international shipping. This paper develops an economic of model of piracy that emphasizes the strategic interaction between the efforts of pirates to locate potential targets, and shippers to avoid contact. Implementation of optimal enforcement policies is complicated by the need for international cooperation in the apprehension and prosecution of pirates. Free riding and other problems therefore impede the effectiveness of current international laws against piracy.",60,4,343,359,International trade; Economics; International waters; Control (management); Enforcement; Apprehension; Economic analysis; Maritime piracy; Commerce; International law; Free riding,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2306457 https://ideas.repec.org/a/bla/scotjp/v60y2013i4p343-359.html https://onlinelibrary.wiley.com/doi/abs/10.1111/sjpe.12014 https://EconPapers.repec.org/RePEc:bla:scotjp:v:60:y:2013:i:4:p:343-359,http://dx.doi.org/10.1111/sjpe.12014,,10.1111/sjpe.12014,2019509405,,0,000-177-389-345-860; 002-308-683-759-407; 009-505-394-812-715; 009-612-678-380-401; 011-181-799-838-992; 011-515-373-665-921; 017-259-580-053-539; 018-581-182-598-228; 019-631-506-499-787; 021-032-982-936-295; 021-056-589-522-463; 022-293-783-872-374; 022-721-547-926-498; 022-948-154-140-853; 024-609-845-110-641; 031-780-301-052-432; 034-735-332-881-117; 040-622-104-818-155; 065-396-198-364-16X; 066-129-920-486-616; 066-660-706-410-262; 067-382-267-490-211; 069-499-665-176-30X; 070-334-148-173-135; 070-472-720-107-215; 074-570-982-735-750; 075-368-607-958-255; 080-446-895-020-932; 089-572-702-832-761; 091-884-193-305-668; 104-535-028-281-257; 112-303-298-122-51X; 118-537-587-960-800; 120-489-511-046-762; 122-224-916-370-009; 127-503-106-497-36X; 137-556-273-483-59X; 147-454-181-506-681; 147-456-715-066-529; 160-191-785-655-900; 160-758-256-694-458; 187-219-485-121-212; 194-402-771-820-160; 195-071-409-493-059,12,false,, 104-832-213-216-271,Computer Security Breaches A Threat To Credit Sales,2008-10-01,2008,journal article,Review of Business Information Systems (RBIS),21579547; 1534665x,Clute Institute,,William C. Figg,"Business security has progressed from the wooden cash box to the cash register and now the nightmare of the computer. Control has progressively slipped from the control of the instrument operator to a little understood collection of networked instruments. This evolution of difficulty has created numerous protection problems for the business operator. Not only does the cash and other payment means need collection and protection, but now the payment instrument itself has fallen under the responsibility of the vendor. Business owners are as much at risk from cyber security as from physical security. Thieves don’t have to rush the store with guns blazing to steal money in fact they don’t have to steal money from the store at all. Information and data are the sources of new gold. The information collected from customers’ credit cards contains enough data to secure riches for any enterprising evil doer. In addition to normal data growth, regulatory compliance (Sarbanes/Oxley (SOX), SEC17a, HIPAA, Patriot Act, Freedom of Information etc.) is contributing exponentially to data growth, as more records are generated; more regulations are created in more industries. This creates a big fat target as much a target as any “old west” bank, and businesses are responsible for the protection and security of customers’ data.",12,4,,,Payment; Economics; Freedom of information; Control (management); Physical security; Vendor; Cash; Patriot Act; Computer security; Commerce,,,,,https://www.cluteinstitute.com/ojs/index.php/RBIS/article/view/4340/0 https://core.ac.uk/download/pdf/268105856.pdf,http://dx.doi.org/10.19030/rbis.v12i4.4340,,10.19030/rbis.v12i4.4340,2187146738,,0,104-879-809-153-505; 125-545-050-454-506; 172-445-830-093-496; 173-793-651-698-219,0,true,,bronze 104-947-051-448-466,Copyright Prosecution—The Fiji Experience,2013-04-01,2013,journal article,Pacific studies,02753596,,,Joseph Daurewa,"Since the introduction of the Copyright Act of Fiji in 1999 and its recent amendment, Fiji has seen a fluctuation in the respect afforded to intellectual property rights. This research looks at copyright infringement, in particular movie piracy and the laws that relate to it, including the Berne Convention, other relevant international instruments, and domestic laws. Research was undertaken in assessing a recent movie piracy case, which serves as a precedent for movie piracy cases in Fiji. This particular case shows that Fiji is ready to undertake efficient and effective prosecutions of movie piracy cases. However, it also shows a lack of commitment by enforcement agencies. The research concludes that Fiji needs holistic commitment to move forward in protecting and respecting intellectual property rights, in particular copyright.",36,1,105,112,Political science; Law; Berne Convention; Copyright Act; Copyright infringement; Enforcement; Intellectual property,,,,,https://ojs.lib.byu.edu/spc/index.php/PacificStudies/article/download/35210/33000,https://ojs.lib.byu.edu/spc/index.php/PacificStudies/article/download/35210/33000,,,2604501077,,0,,2,false,, 105-237-725-371-857,Fighting Software Piracy: Some Global Conditional Policy Instruments,,2016,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Simplice A. Asongu; Pritam Singh; Sara le Roux,"This study examines the efficiency of tools for fighting software piracy in the conditional distributions of software piracy. Our paper examines software piracy in 99 countries for the period 1994-2010, using contemporary and non-contemporary quantile regressions. The intuition for modelling distributions contingent on existing levels of software piracy is that the effectiveness of tools against piracy may consistently decrease or increase simultaneously with increasing levels of software piracy. Hence, blanket policies against software piracy are unlikely to succeed unless they are contingent on initial levels of software piracy and tailored differently across countries with low, medium and high levels of software piracy. Our findings indicate that GDP per capita, research and development expenditure, main intellectual property laws, multilateral treaties, bilateral treaties, World Intellectual Property Organisation treaties, money supply and respect of the rule of law have negative effects on software piracy. Equitably distributed wealth reduces software piracy, and the tendency not to indulge in software piracy because of equitably distributed wealth increases with increasing software piracy levels. Hence, the negative degree of responsiveness of software piracy to changes in income levels is an increasing function of software piracy. Moreover the relationships between policy instruments and software piracy display various patterns, namely: U-shape, Kuznets-shape, S-shape and negative thresholds. A negative threshold represents negative estimates with increasing negative magnitude throughout the conditional distributions of software piracy. We also discuss the policy implications of our study.",,,,,Public economics; Per capita; Business; Rule of law; Software; Money supply; Income level; Intellectual property; Panel data; Function (engineering),,,,,https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2745241_code2294135.pdf?abstractid=2745241 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2745241,http://dx.doi.org/10.2139/ssrn.2745241,,10.2139/ssrn.2745241,3123491106,,0,003-120-061-431-142; 007-559-358-394-991; 008-896-495-853-748; 012-203-539-243-07X; 013-125-830-390-142; 013-765-194-873-383; 015-808-798-057-897; 016-623-013-143-177; 017-153-449-730-092; 022-027-708-413-061; 023-508-800-329-819; 024-211-939-180-915; 026-621-534-864-651; 027-989-705-549-237; 028-526-275-182-847; 028-630-596-457-020; 029-945-161-770-934; 030-183-927-018-066; 037-316-716-448-665; 039-883-767-744-759; 041-849-157-283-572; 041-893-696-570-720; 042-311-106-479-104; 046-534-914-774-543; 047-010-436-077-442; 047-691-102-180-446; 047-736-711-284-984; 049-698-234-112-01X; 052-479-998-409-604; 053-956-378-667-86X; 054-549-558-630-210; 055-252-252-974-001; 058-453-337-550-945; 058-682-219-560-287; 060-029-094-849-473; 062-169-487-131-224; 063-085-822-993-592; 065-657-617-085-185; 066-237-973-648-031; 066-437-311-082-91X; 070-060-589-459-23X; 072-166-078-734-816; 075-592-604-998-688; 084-276-283-502-216; 085-651-973-518-870; 085-796-193-840-794; 086-241-451-968-617; 086-528-214-511-515; 088-697-167-555-207; 092-768-739-253-918; 097-637-794-608-082; 103-047-934-034-494; 107-007-285-779-662; 107-947-697-683-923; 108-534-046-972-503; 108-818-932-212-722; 111-577-891-448-969; 115-121-431-459-018; 118-179-693-472-854; 118-378-886-244-26X; 125-495-818-933-457; 129-470-536-145-852; 139-864-136-469-932; 144-135-264-427-99X; 145-811-348-738-768; 154-513-291-663-187; 155-807-491-187-736; 156-200-179-267-390; 159-771-177-761-457; 164-865-263-777-832; 168-778-518-719-694; 185-197-322-646-367,0,true,cc0,green 105-282-592-847-999,"Moving from data-constrained to data-enabled research: Experiences and challenges in collecting, validating and analyzing large-scale e-commerce data",2006-05-01,2006,journal article,Statistical Science,08834237,Institute of Mathematical Statistics,United States,Ravi Bapna; Paulo Goes; Ram Gopal; James R. Marsden,"Widespread e-commerce activity on the Internet has led to new opportunities to collect vast amounts of micro-level market and nonmarket data. In this paper we share our experiences in collecting, validating, storing and analyzing large Internet-based data sets in the area of online auctions, music file sharing and online retailer pricing. We demonstrate how such data can advance knowledge by facilitating sharper and more extensive tests of existing theories and by offering observational underpinnings for the development of new theories. Just as experimental economics pushed the frontiers of economic thought by enabling the testing of numerous theories of economic behavior in the environment of a controlled laboratory, we believe that observing, often over extended periods of time, real-world agents participating in market and nonmarket activity on the Internet can lead us to develop and test a variety of new theories. Internet data gathering is not controlled experimentation. We cannot randomly assign participants to treatments or determine event orderings. Internet data gathering does offer potentially large data sets with repeated observation of individual choices and action. In addition, the automated data collection holds promise for greatly reduced cost per observation. Our methods rely on technological advances in automated data collection agents. Significant challenges remain in developing appropriate sampling techniques integrating data from heterogeneous sources in a variety of formats, constructing generalizable processes and understanding legal constraints. Despite these challenges, the early evidence from those who have harvested and analyzed large amounts of e-commerce data points toward a significant leap in our ability to understand the functioning of electronic commerce.",21,2,116,130,The Internet; Nonmarket forces; Data collection; Variety (cybernetics); Common value auction; Experimental economics; Data science; Computer science; File sharing; E-commerce; Mathematics,,,,,https://arizona.pure.elsevier.com/en/publications/moving-from-data-constrained-to-data-enabled-research-experiences https://projecteuclid.org/download/pdfview_1/euclid.ss/1154979815 https://experts.umn.edu/en/publications/moving-from-data-constrained-to-data-enabled-research-experiences https://documat.unirioja.es/servlet/articulo?codigo=2084373 http://ui.adsabs.harvard.edu/abs/2006math......9136B/abstract https://dialnet.unirioja.es/servlet/articulo?codigo=2084373 https://projecteuclid.org/journals/statistical-science/volume-21/issue-2/Moving-from-Data-Constrained-to-Data-Enabled-Research--Experiences/10.1214/088342306000000231.full http://authors.library.caltech.edu/19012/ https://www.jstor.org/stable/info/27645743 https://core.ac.uk/download/4885243.pdf,http://dx.doi.org/10.1214/088342306000000231,,10.1214/088342306000000231,3122649561; 3098856870,,0,000-627-765-240-823; 005-527-414-966-466; 005-707-347-234-051; 008-888-172-446-793; 011-612-055-803-019; 012-256-023-504-784; 023-834-244-888-110; 027-708-476-314-624; 029-109-403-857-28X; 033-793-308-471-571; 038-884-091-438-484; 041-098-810-481-252; 041-470-778-328-140; 042-618-516-975-510; 043-038-971-307-448; 045-063-038-428-530; 045-714-055-800-900; 050-860-208-457-696; 054-230-012-294-29X; 061-684-398-202-203; 063-966-466-527-359; 065-464-957-757-100; 069-461-686-757-61X; 072-274-136-838-233; 076-499-819-723-42X; 076-544-468-726-02X; 076-659-320-153-325; 079-730-758-591-299; 080-259-816-108-562; 081-284-654-117-669; 081-325-345-777-717; 084-036-379-294-834; 087-608-373-241-096; 088-429-975-955-371; 089-802-824-324-07X; 090-153-656-412-430; 090-626-288-529-797; 101-047-436-170-511; 109-003-686-630-484; 113-005-209-525-116; 119-577-103-295-81X; 122-325-266-811-820; 124-479-493-937-014; 130-534-284-390-880; 136-408-217-563-834; 138-872-932-727-14X; 150-452-631-944-670; 159-414-666-411-575; 161-377-928-152-65X; 169-795-179-158-271; 171-816-221-579-099; 172-174-748-265-816; 182-941-570-585-552,23,true,implied-oa,hybrid 105-671-309-615-690,Taming the Tide of Maritime Piracy in Nigeria's Territorial Waters,2015-04-30,2015,journal article,Journal of Navigation and Port Research,15985725,Korean Institute of Navigation and Port Research,,Kalu Kingsley Anele,"The rising spate of piracy in Nigeria's territorial waters has become a burden on the economic development of the country. It has adversely affected the exportation of crude oil, which is the mainstay of the country's economy. Pirates target and hijack vessels carrying oil and gas, thus reducing the revenue accruable to the country from selling these resources. Piracy also affects the fishing industry which is another source of revenue to the country. Nigeria, as an import dependent country, relies on the importation of finished goods, and this is seriously affected by piracy. This study briefly examines the root causes of piracy in Nigeria. Further, the study interrogates the effects of piracy, identifies the challenges in the suppression of the crime and proffers suggestions toward suppressing the crime in the country. Against this backdrop, the study argues, among other things, that an expansive definition of piracy is key in the fight against this maritime crime in Nigeria, because the present legal regime is restrictive and limited in scope, thus, it does not reflect the modern piratical acts. More importantly, Nigeria must criminalise piracy in its domestic law in other to police its territorial waters, capture and prosecute pirates in its local courts.",39,2,89,97,Economy; International trade; Finished good; Economics; Revenue; Crude oil; Maritime piracy; Exportation; Fishing industry; Municipal law; Territorial waters,,,,,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=GHMHD9_2015_v39n2_89 http://scholar.dkyobobook.co.kr/searchDetail.laf?barcode=4010024197901,http://dx.doi.org/10.5394/kinpr.2015.39.2.89,,10.5394/kinpr.2015.39.2.89,2244146666,,0,,1,true,,bronze 105-894-507-687-175,International Law Issues for Curbing Somali Piracy,,2009,journal article,Modern Law Science,,,,Zhang Jian-jun,"In recent years rampant Somali piracy has caused international community considerable concern and it is held an international crime that seriously endangers international maritime transportation,peace,safety and human common interests.Under the authority of the UN's resolution,many countries have begun their anti-piracy mission on Somalia waters.Based on an analysis of international law issues such as anti-piracy reasons and purposes,general jurisdiction,impunity and exception to state sovereignty,this paper intends to clarify the nature,measures and legitimacy of fighting piracy.",,,,,Political science; Public international law; Sovereignty; Law; Somali; Jurisdiction; International community; Impunity; Legitimacy; International law,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-XDFX200904017.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-XDFX200904017.htm,,,2353875470,,0,,0,false,, 106-129-509-091-453,International Law on Piracy and Some Current Challenges Related to Its Definition from International Law Perspective,2012-01-21,2012,journal article,Polish Review of International and European Law,25447432; 22992170,Uniwersytet Kardynala Stefana Wyszynskiego,,Konrad Marciniak,,1,3-4,97,140,Current (fluid); Political science; Public international law; Law; Perspective (graphical); International law,,,,,https://czasopisma.uksw.edu.pl/index.php/priel/article/view/1146/1835,http://dx.doi.org/10.21697/priel.2012.1.3.04,,10.21697/priel.2012.1.3.04,2738321712,,0,,0,false,, 106-619-699-607-570,"Piracy, Law of the Sea, and Use of Force: Developments off the Coast of Somalia",2009-04-01,2009,journal article,European Journal of International Law,09385428; 14643596,Oxford University Press (OUP),United Kingdom,Tullio Treves,"Attacks against ships off the coast of Somalia have brought piracy to the forefront of inter- national attention, including that of the Security Council. SC Resolution 1816 of 2008 and others broaden the scope of the existing narrow international law rules on piracy, especially authorizing certain states to enter the Somali territorial waters in a manner consistent with action permitted on the high seas. SC resolutions are framed very cautiously and, in particu- lar, note that they 'shall not be considered as establishing customary law'. They are adopted on the basis of the Somali Transitional Government's (TFG) authorization. Although such authorization seems unnecessary for resolutions adopted under Chapter VII, there are vari- ous reasons for this, among which to avoid discussions concerning the width of the Somali territorial sea. Seizing states are reluctant to exercise the powers on captured pirates granted by UNCLOS and SC resolutions. Their main concern is the human rights of the captured indi- viduals. Agreements with Kenya by the USA, the UK, and the EC seek to ensure respect for the human rights of these individuals surrendered to Kenya for prosecution. Action against pirates in many cases involves the use of force. Practice shows that the navies involved limit such use to self-defence. Use of force against pirates off the coast of Somalia seems authorized as an exception to the exclusive rights of the fl ag state, with the limitation that it be reason- able and necessary and that the human rights of the persons involved are safeguarded.",20,2,399,414,Sociology; International waters; Human rights; United Nations Convention on the Law of the Sea; Law; Use of force; Somali; Law of the sea; International law; Territorial waters,,,,,https://academic.oup.com/ejil/article/20/2/399/500835 https://arcadia.sba.uniroma3.it/bitstream/2307/6144/1/21_Piracy_%20Law%20of%20the%20Sea_%20and%20Use%20of%20Force_Developments%20off%20the%20Coast%20of%20Somalia.pdf http://www.ejil.org/pdfs/20/2/1800.pdf https://www.uio.no/studier/emner/jus/humanrights/HUMR5503/h09/undervisningsmateriale/Treves_Piracy.pdf https://dialnet.unirioja.es/servlet/articulo?codigo=3026172 http://academic.oup.com/ejil/article-abstract/20/2/399/500835 https://arcadia.sba.uniroma3.it/handle/2307/6144 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1433971 http://ejil.oxfordjournals.org/content/20/2/399.full,http://dx.doi.org/10.1093/ejil/chp027,,10.1093/ejil/chp027,2168582894,,0,,86,true,,bronze 106-820-574-301-310,Empire Strikes Back: Piracy with Chinese Characteristics,,1996,journal article,Cornell Law Review,00108847,,,Glenn R. Butterton,,81,5,1129,1338,Civilization; Economy; Political science; International trade law; Empire; Economic history,,,,,https://scholarship.law.cornell.edu/cgi/viewcontent.cgi?article=2604&context=clr https://repository.law.miami.edu/fac_articles/906/ https://repository.law.miami.edu/cgi/viewcontent.cgi?article=1905&context=fac_articles https://scholarship.law.cornell.edu/clr/vol81/iss5/3/,https://repository.law.miami.edu/fac_articles/906/,,,309542101,,0,,3,false,, 106-911-099-233-323,US resolves to beat Chinese piracy,,1995,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1995,1,4,4,Beat (acoustics); Business; Computer science; Computer security; Acoustics; Physics,,,,,,http://dx.doi.org/10.1016/0142-0496(95)80010-7,,10.1016/0142-0496(95)80010-7,,,0,,0,false,, 107-111-935-049-734,Fighting Software Piracy: Which IPRs Laws Matter in Africa?,2014-07-07,2014,journal article,International Journal of Institutions and Economies,19857276,,,Simplice A. Asongu,"The proliferation of technology to produce pirated software has prompted key questions in policy decision making on how to tackle the situation. The paper will employ Dynamic panel Generalized Methods of Moments and Two Stage Least Squares to address this. IPRs (Intellectual Property Rights) laws are instrumented with government quality dynamics to assess their incidence on software piracy. In essence, government quality variables are used as instrumental variables in investigating the role of IPRs laws on software piracy. The following fndings are established. (1) Government institutions are crucial in enforcing IPRs laws in the fght against software piracy. (2) Main IP laws enacted by the legislature and Multilateral IP laws are most effective in combating piracy. (3) IPRs laws, WIPO Treaties and Bilateral Treaties do not have signifIcant negative incidences on software piracy. Policy implications are discussed.",6,2,1,26,Government; International trade; Instrumental variable; Economics; Law; Software; Quality (business); Policy decision; Intellectual property; Panel data; Legislature,,,,,https://mjs.um.edu.my/index.php/ijie/article/view/4926 https://mojes.um.edu.my/index.php/ijie/article/view/4926 http://mojem.um.edu.my/index.php/ijie/article/view/4926 https://sare.um.edu.my/index.php/ijie/article/view/4926 https://jupidi.um.edu.my/index.php/ijie/article/view/4926 https://jummec.um.edu.my/index.php/ijie/article/view/4926 https://ijie.um.edu.my/article/download/4926/2779 https://vmis.um.edu.my/index.php/ijie/article/view/4926 https://jpmm.um.edu.my/index.php/ijie/article/view/4926 https://samudera.um.edu.my/index.php/ijie/article/view/4926 https://ideas.repec.org/a/umk/journl/v6y2014i2p1-26.html https://mojc.um.edu.my/index.php/ijie/article/view/4926 https://www.researchgate.net/profile/Asongu_Simplice/publication/265380335_Fighting_Software_Piracy_Which_IPRs_Laws_Matter_in_Africa/links/540b20e70cf2f2b29a2d23c0.pdf https://adum.um.edu.my/index.php/ijie/article/view/4926 https://mjes.um.edu.my/index.php/ijie/article/view/4926 https://ijie.um.edu.my/index.php/ijie/article/view/4926 https://ajba.um.edu.my/index.php/ijie/article/view/4926 https://EconPapers.repec.org/RePEc:umk:journl:v:6:y:2014:i:2:p:1-26,https://mjs.um.edu.my/index.php/ijie/article/view/4926,,,639973994,,0,000-923-160-406-727; 002-002-118-291-029; 003-120-061-431-142; 008-510-057-350-468; 008-896-495-853-748; 012-558-297-950-849; 013-765-194-873-383; 015-808-798-057-897; 020-079-500-549-308; 021-774-419-542-089; 022-264-398-959-067; 025-336-013-036-43X; 027-989-705-549-237; 028-526-275-182-847; 028-630-596-457-020; 033-349-654-090-404; 039-883-767-744-759; 041-849-157-283-572; 043-305-653-465-196; 043-448-779-132-854; 046-127-203-871-082; 046-127-440-118-73X; 046-534-914-774-543; 046-669-922-850-444; 047-010-436-077-442; 049-698-234-112-01X; 050-271-313-947-720; 054-663-257-958-510; 058-682-219-560-287; 059-077-318-219-51X; 061-173-414-816-885; 062-169-487-131-224; 063-085-822-993-592; 064-893-720-411-223; 066-237-973-648-031; 072-971-242-544-566; 074-281-337-568-469; 081-895-720-913-94X; 084-864-570-554-378; 087-959-536-613-70X; 088-242-617-862-394; 097-165-496-887-789; 097-637-794-608-082; 105-231-453-450-342; 105-803-797-619-085; 107-007-285-779-662; 110-231-183-577-925; 111-307-103-771-686; 125-495-818-933-457; 129-798-330-692-606; 132-558-492-977-554; 145-489-062-191-725; 145-811-348-738-768; 152-323-892-837-971; 158-362-945-179-774; 174-619-591-874-948; 185-197-322-646-367; 191-344-983-602-980; 193-305-032-595-202,2,false,, 107-448-648-330-287,Four Common Misconceptions about Copyright Piracy,,2003,journal article,Loyola of Los Angeles international and comparative law review,15335860,,,Peter K. Yu,"Copyright piracy is one of the most difficult, yet important, transnational problems in the twenty-first century. Although legal literature has discussed copyright piracy extensively, commentators rarely offer a ""grand unified theory"" on this global problem. Rather, they give nuanced analyses, discussing the many aspects of the problem-political, social, economic, cultural, and historical. This nuanced discussion, however, is missing in the current public debate. To capture the readers' emotion and to generate support for proposed legislative and executive actions, the debate often oversimplifies the complicated picture by overexagerrating a particular aspect of the piracy problem or by offering an abbreviated, easy-to-understand, yet somewhat misleading version of the story. Such oversimplification is dangerous, for it creates misconceptions that not only confuse the public as to the cause and extent of the problem, but also mislead policymakers into finding solutions that fail to attack the crux of the piracy problem. In light of this shortcoming, this Article discusses four common misconceptions about copyright piracy: (1) Copyright piracy is merely a cultural problem; (2) copyright piracy is primarily a development issue; (3) copyright piracy is a past phenomenon for technologically-advanced countries; and (4) copyright piracy is a necessary byproduct of authoritarian rule. It then attempts to reconfigure the misguided public debate on copyright piracy by underscoring the need to focus on the copyright divide - the gap between those who have stakes in the copyright regime and those who do not. This Article concludes by warning that the United States might not be able to eradicate the piracy problem unless its legislators and policymakers are willing to change the lawmaking process by taking into account the interests of both the stakeholders and nonstakeholders.",26,1,127,150,Political science; Law and economics; Lawmaking; Public debate; Global problem; Phenomenon; Authoritarianism; Legislature,,,,,https://scholarship.law.tamu.edu/facscholar/506/ http://scholarship.law.tamu.edu/cgi/viewcontent.cgi?article=1505&context=facscholar https://works.bepress.com/peter_yu/78/ https://works.bepress.com/peter_yu/265/ https://digitalcommons.lmu.edu/ilr/vol26/iss1/7/ https://digitalcommons.lmu.edu/cgi/viewcontent.cgi?article=1563&context=ilr,https://scholarship.law.tamu.edu/facscholar/506/,,,3125311762,,0,121-637-611-492-717,13,false,, 107-483-751-387-234,On the Countermeasures to Reduce Piracy in Journalism,,2004,journal article,Journal of Zhejiang Wanli University,,,,Zhang Ye-an,"The paper analyzes the definition and manifestation of piracy in journalism based on the research in literature, interview and logical reasoning. It holds that to reduce the piracy in journalism, journalism itself has to be self-disciplined and strengthen the auditing of news material; While the objects of journalism should fully realize the particularity of journalism and strengthen the rational thinking over the piracy in journalism; Besides, the related system, regulations and laws concerning journalism should be made; And the social democratization ought to be quicken.",,,,,Journalism; Democratization; Political science; Audit; Rationality; Self-discipline; Public relations; Logical reasoning; Technical Journalism,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-ZJWL20040600F.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-ZJWL20040600F.htm,,,2353097924,,0,,0,false,, 107-639-905-927-618,Pelaksanaan Yurisdiksi Universal Terhadap Modern Piracy Jure Gentium,2020-05-19,2020,journal article,JURNAL BELO,26865920; 24606820,Universitas Pattimura,,Nadiyah Asfarosya,"This study aims to analyze the relevance of the approach of universal jurisdiction in law enforcement against the crime of modern pirates. This study looks at piracy itself which changes over time and the effectiveness of universal jurisdiction in minimizing back piracy that can affect the international community. This research is normative. Universal jurisdiction has long been in law enforcement against piracy. However, turning the numbers of countries implementing universal jurisdiction raises the question of what constitutes an obstacle to implementing universal jurisdiction over the crime of piracy. In addition, several solutions have emerged that are considered more effective in enforcing the law against modern piracy in order to prevent the culture of impunity.",5,2,86,96,Relevance (law); Political science; Order (exchange); Law and economics; Universal jurisdiction; Obstacle; International community; Impunity; Law enforcement; Normative,,,,,https://www.scilit.net/article/f208aa57abb99381cab3e245e98c0af1 https://ojs3.unpatti.ac.id/index.php/belo/article/download/1812/1508 https://core.ac.uk/download/328144078.pdf,http://dx.doi.org/10.30598/belovol5issue2page86-96,,10.30598/belovol5issue2page86-96,3032224434,,0,,0,true,cc-by-nc,gold 108-095-297-607-197,"Landlubbers as Pirates: the Lack of ""High Seas"" Requirement for the Incitement and Intentional Facilitation of Piracy",,2013,journal article,Emory International Law Review,10522840,,,George White,,27,2,705,,Facilitation; International waters; Political science; Incitement; Criminology,,,,,https://scholarlycommons.law.emory.edu/eilr/vol27/iss2/1/ https://scholarlycommons.law.emory.edu/cgi/viewcontent.cgi?article=1080&context=eilr,https://scholarlycommons.law.emory.edu/eilr/vol27/iss2/1/,,,3128011109,,0,,0,false,, 108-184-256-525-309,The Concept of Piracy (1937),,2011,journal article,"Humanity: An International Journal of Human Rights, Humanitarianism, and Development",21514372,Project Muse,,Carl Schmitt,,2,1,27,29,Philosophy,,,,,https://muse.jhu.edu/article/421343,http://dx.doi.org/10.1353/hum.2011.0002,,10.1353/hum.2011.0002,2086679123,,0,,5,false,, 108-410-451-484-779,Piracy off The Coast of Indonesia: Potential Implications on The Craft Industry,2020-04-30,2020,journal article,Brawijaya Law Journal,25030841; 23564512,Brawijaya University,,Kalu Kingsley Anele,"Piracy off Indonesia may implicate on craft, a significant non-oil foreign exchange earner in the country’s economic development. For instance, piracy may affect tourists’ use of cruise ships, the exportation of craft products, and the importation of raw materials and equipment for craft production in Indonesia. Consequently, it is imperative to repress piracy off the Indonesian coast. In determining the potential effects of piracy to craft, this paper addressed the linkages between piracy and craft with observed, that piracy may pose a threat to the Indonesian craft industry. Afterward, the causes and effects of piracy on Indonesia’s craft industry were interrogating. It was submitted that hijacking a cruise ship may have humanitarian and financial implications on the Indonesian craft industry.  The paper suggested measures to curb piracy off the Indonesian coast and argued, inter alia, that updated piracy legal regimes, strengthened institutional framework, and regional cooperation are central to combating piracy off the coast of Indonesia.",7,1,1,26,Business; International trade; Craft production; Cruise; Indonesian; Craft; Foreign exchange; Exportation,,,,,https://lawjournal.ub.ac.id/index.php/law/article/download/253/pdf https://lawjournal.ub.ac.id/index.php/law/article/view/253/pdf,http://dx.doi.org/10.21776/ub.blj.2020.007.01.01,,10.21776/ub.blj.2020.007.01.01,3023840530,,0,,1,true,cc-by-nc,gold 108-534-046-972-503,Fighting Software Piracy in Africa: How Do Legal Origins and IPRs Protection Channels Matter?,,2012,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Simplice A. Asongu,"In the current efforts towards harmonizing IPRs regimes in the African continent, this paper provides answers to four key questions relevant in the policy decision making processes. After empirically examining the questions, the following findings are established. (1) In comparison to common law countries, civil law countries inherently have a significant autonomous rate of software piracy; consistent with the ‘law and property rights’ theory. (2) But for IPRs laws, the other IP protection channels (WIPO treaties, Main IP law and multilateral treaties) reduce the incidence of software piracy. (3) In both short-run and long-term, IPRs protection channels in civil law countries appear to mitigate software piracy more than in common law countries. (4) Formal institutions are instrumental in the fight against software piracy through IPRs protection channels.",,,,,Business; International trade; Common law; Software; Policy decision; Intellectual property; Panel data; Property rights,,,,,https://www.ssrn.com/abstract=2493229 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2493229,http://dx.doi.org/10.2139/ssrn.2493229,,10.2139/ssrn.2493229,3122055949,,0,003-120-061-431-142; 003-812-755-378-582; 008-896-495-853-748; 011-582-120-011-399; 011-647-566-126-523; 015-808-798-057-897; 015-869-473-074-348; 016-637-372-475-47X; 017-153-449-730-092; 018-075-278-238-815; 019-311-622-107-557; 020-319-612-123-969; 021-404-432-486-431; 027-989-705-549-237; 028-526-275-182-847; 028-630-596-457-020; 037-316-716-448-665; 039-883-767-744-759; 040-494-214-092-320; 041-385-438-010-463; 041-849-157-283-572; 043-448-779-132-854; 047-010-436-077-442; 047-610-153-661-189; 049-698-234-112-01X; 055-252-252-974-001; 058-453-337-550-945; 062-169-487-131-224; 063-085-822-993-592; 065-657-617-085-185; 066-237-973-648-031; 069-187-883-880-837; 075-401-188-052-732; 076-033-619-539-914; 081-952-279-823-465; 084-864-570-554-378; 085-796-193-840-794; 086-241-451-968-617; 087-856-971-211-738; 088-848-868-512-205; 097-637-794-608-082; 099-872-608-734-257; 105-803-797-619-085; 107-007-285-779-662; 107-947-697-683-923; 110-231-183-577-925; 114-175-428-597-564; 122-388-177-167-963; 125-271-356-328-638; 125-495-818-933-457; 133-367-871-090-384; 142-614-722-389-800; 144-135-264-427-99X; 145-489-062-191-725; 145-811-348-738-768; 149-620-415-273-520; 154-513-291-663-187; 159-771-177-761-457; 176-497-205-578-260; 185-197-322-646-367,24,true,cc0,green 108-750-218-913-662,Book review of The Law and Practice of Piracy at Sea: European and International Perspectives,2014-01-01,2014,journal article,Australian and New Zealand Maritime Law Journal,18340881,,,Christopher Rahman,,28,2,,,Political science; Law,,,,,https://works.bepress.com/chris_rahman/28/download/ https://works.bepress.com/chris_rahman/28/,https://works.bepress.com/chris_rahman/28/,,,2233689911,,0,,0,false,, 109-027-440-901-498,Transfers of piracy suspects : a crucial element of the regional prosecution strategy in light of human rights law,,2014,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Anna Petrig,"Patrolling naval States only exceptionally prosecute piracy suspects they took captive in their domestic courts. The majority of suspects are instead put on trial in third States, mainly located in the region prone to piracy. Transfers are the prevalent means by which to put alleged pirates in the hands of the ultimately prosecuting State and thus to implement this regional prosecution strategy. This article explores - from a human rights perspective - the legality of transfers of piracy suspects as such and, in greater detail, the legality of the transfer procedure currently being pursued in counter-piracy operations off the coast of Somalia and the region. The conclusion is that human rights law does not offer an absolute right not to be transferred for prosecution, but that the principle of non-refoulement can bar the transfer of a specific suspect to a specific destination. It is further asserted that the current transfer procedure is not necessarily in line with the procedural requirements flowing from the principle of non-refoulement. Lastly, it discusses how respect for these procedural prescripts can be reconciled with the operational constraints and specificities of counter-piracy operations, most notably that piracy suspects are often detained on board law enforcement vessels and never enter the land territory of the transferring State.",,,,,Patrolling; Human rights; Political science; Law; Element (criminal law); Suspect; Non-refoulement; Law enforcement; Surrender; Principle of legality,,,,,https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2541248_code2123804.pdf?abstractid=2541248&mirid=2 https://core.ac.uk/display/33301150 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2541248 https://www.ssrn.com/abstract=2541248 https://edoc.unibas.ch/36948/ https://core.ac.uk/download/33301150.pdf,http://dx.doi.org/10.2139/ssrn.2541248,,10.2139/ssrn.2541248,148583709,,0,074-098-244-667-85X; 136-481-277-556-67X,0,true,,green 109-210-351-286-935,Antipiracy and Unusual Coalitions in the Indian Ocean Region: China’s Changing Role and Confidence Building with India,2016-12-01,2016,journal article,Journal of Current Chinese Affairs,18681026; 18684874,SAGE Publications,Germany,Olivia Gippner,"Piracy and threats from non-state actors in the Gulf of Aden have triggered states to cooperate in securing waterways and the sea lines of communication, a development that is fundamentally transforming the region’s maritime security environment. As a result, not only has this region’s strategic importance been reaffirmed, but it has also gained tremendous importance through the presence of several actors, especially China and India. Since 2008, these two countries have been involved in larger global actions against piracy, which has led to increasing contact between their navies and more exposure of their capabilities. Will the broader Indian Ocean region emerge as an area of cooperation or competition between China and India? Drawing on interviews carried out with Chinese and European experts from 2012 to 2015, this article explores the reasons for and instruments of cooperation in antipiracy and the degree to which China uses antipiracy efforts as confidence-building measures.",45,3,107,137,International trade; Political science; China; Law; Collective action; Maritime security; Competition (economics); Indian ocean; Confidence building; Line of communication,,,,,http://eprints.lse.ac.uk/67016/ https://journals.sagepub.com/doi/pdf/10.1177/186810261604500304 https://ideas.repec.org/a/gig/chaktu/v45y2016i3p107-137.html https://journals.sub.uni-hamburg.de/giga/jcca/article/view/998/1005.html https://journals.sagepub.com/doi/full/10.1177/186810261604500304 https://www.ssoar.info/ssoar/bitstream/document/54531/1/ssoar-jcca-2016-3-gippner-Antipiracy_and_Unusual_Coalitions_in.pdf,http://dx.doi.org/10.1177/186810261604500304,,10.1177/186810261604500304,2462864186,,0,042-889-952-786-577; 044-620-020-424-665; 049-690-389-743-645; 065-616-251-247-870; 081-117-321-467-953; 082-253-082-172-260; 083-961-930-733-571; 088-421-133-532-819; 089-326-096-722-744; 105-642-010-764-760; 113-741-307-551-153; 132-167-669-425-774; 144-308-800-652-828; 154-324-634-025-476; 178-064-823-658-419; 197-167-888-743-834,4,true,"CC BY, CC BY-NC, CC BY-NC-ND",gold 109-297-671-381-418,Research on Piracy Risk Management and Countermeasures in International Shipping,,2011,journal article,Journal of Wuhan University of Technology,19930437,,,Chu Li-cong,"Beginning from the current situation of recent piracy activities,the paper clarifies that piracy activities have rampant trend,which not only severely affects our international trade,but also our crew members.And now,the piracy activities increasingly take on a new look of network and industrialization,so that the escort vessels cannot fully restrain the piracy.In the case of that,the paper proposes several measures to ensure our international maritime status and promote international trade,such as developing domestic law against piracy,setting up joint anti-piracy command center,establishing joint fund to prevent piracy risk,developing contingency plans for dangerous waters' navigation,speeding up anti-piracy technology and equipment research,promoting international cooperation in fighting piracy,strengthening the intensity of naval escort,and establishing Viking insurance.",,,,,Engineering; Contingency plan; International trade; Crew; Command center; International shipping; Risk management; Commerce; Municipal law,,,,,https://en.cnki.com.cn/Article_en/CJFDTOTAL-WHJT201105004.htm,https://en.cnki.com.cn/Article_en/CJFDTOTAL-WHJT201105004.htm,,,2350804477,,0,,0,false,, 109-310-216-662-051,International Law. Nature and Extent of Sovereignty. Attempt to Rob as Piracy Jure Gentium,,1935,journal article,Harvard Law Review,0017811x; 2161976x,JSTOR,United States,,,48,5,853,853,Sovereignty; Political science; Law; International law; Law and economics; Philosophy; Sociology; Politics,,,,,,http://dx.doi.org/10.2307/1332514,,10.2307/1332514,,,0,,0,false,, 109-651-880-745-854,Maritime Piracy and Responses of International Law,,2013,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Sonam Jambhulkar,,,,,,International trade; International waters; Geography; Jurisdiction; Maritime piracy; International law,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2347500 https://papers.ssrn.com/sol3/Delivery.cfm?abstractid=2347500 https://www.ssrn.com/abstract=2347500,http://dx.doi.org/10.2139/ssrn.2347500,,10.2139/ssrn.2347500,2262722592,,0,104-283-813-005-655; 139-976-138-233-225; 151-380-964-061-485,0,false,, 109-749-785-168-070,Socioeconomic development and the risk of maritime piracy,2016-06-28,2016,journal article,Journal of Transportation Security,19387741; 1938775x,Springer Science and Business Media LLC,Germany,Charles C. Okeahalam; Kennedy Otwombe,"Maritime piracy is a phenomenon with implications for international trade. It is usually of two types: armed robbery and hijacking of vessels. This paper uses general estimating equations (GEE) modelling to assess factors that determine the risk of piracy attacks. We consider the impact which the level of economic and institutional development in a number of regions may have on the frequency and success and failure rates of piracy attacks. We find that the frequency of piracy attacks is higher in regions where the quality of institutions is low and that most attacks take place in close proximity to a port. We also find that successful attacks are most likely in regions that are poor and have low military capacity. The success rate of the hijacking version of piracy has no effect on the probability of the armed robbery form of piracy. In the horn of Africa and South–East Asia, the probability of piracy attacks decreases during the month of Ramadan. While in the short-term, military responses may have a role to play, long-term sustainable policy requires that this is combined with enhancement of economic opportunity, governance and human capital development.",9,3,125,160,Risk assessment; Economy; Business; Port (computer networking); Human factors and ergonomics; Human capital; Quality (business); Poison control; Corporate governance; Socioeconomic development; Development economics,,,,,https://rd.springer.com/article/10.1007/s12198-016-0171-4 https://www.safetylit.org/citations/index.php?fuseaction=citations.viewdetails&citationIds[]=citjournalarticle_557972_19 https://EconPapers.repec.org/RePEc:spr:jtrsec:v:9:y:2016:i:3:d:10.1007_s12198-016-0171-4 https://ideas.repec.org/a/spr/jtrsec/v9y2016i3d10.1007_s12198-016-0171-4.html https://trid.trb.org/view/1427407 https://link.springer.com/article/10.1007/s12198-016-0171-4,http://dx.doi.org/10.1007/s12198-016-0171-4,,10.1007/s12198-016-0171-4,2469618533,,0,003-733-176-005-129; 011-944-446-712-983; 016-225-329-252-130; 025-994-681-715-280; 038-429-789-443-678; 040-981-953-293-992; 045-902-804-811-315; 047-390-510-033-665; 053-108-277-474-469; 056-485-851-835-146; 056-693-346-958-512; 065-396-198-364-16X; 066-129-920-486-616; 070-184-893-916-25X; 071-983-026-060-606; 072-009-532-293-469; 074-220-368-770-505; 077-378-016-090-097; 094-818-667-152-362; 103-435-671-346-676; 104-708-305-961-254; 105-704-043-757-146; 112-605-446-383-492; 122-740-834-718-041; 128-686-506-698-620; 137-589-728-790-934; 142-151-023-358-433; 158-804-519-169-915; 160-650-934-403-441; 166-925-622-229-315,3,false,, 109-781-129-152-740,Terrorism and piracy: a legal view,,1979,journal article,Terrorism,01490389,Informa UK Limited,,Alfred P. Rubin,"Abstract Terrorist attacks on persons or property on the high seas or in the newly designated “exclusive economic zones” bear analogy closer to the traditional international law of “piracy” than most observers suspect. In traditional practice “private ends” in the usual sense was not an essential element of the offense; the label and its legal results were attached to unrecognized belligerents too. The latest codifications of the international law relating to piracy, principally those deriving from the 1958 Geneva Convention on the High Seas, are patently defective. A new formulation is proposed, with a commentary that, among other things, points out how international criminal law and universal jurisdiction can be coordinated with the generally accepted international law of armed conflict to clarify what is currently a chaotic legal situation.",3,1-2,117,130,Engineering; International waters; Law; Element (criminal law); Criminal law; Terrorism; Universal jurisdiction; Suspect; Convention on the High Seas; International law,,,,,https://www.tandfonline.com/doi/abs/10.1080/10576107908435448,http://dx.doi.org/10.1080/10576107908435448,,10.1080/10576107908435448,2072767187,,0,007-363-607-709-76X; 022-327-674-979-183; 048-130-114-536-645; 087-023-918-044-727; 111-462-842-103-358,2,false,, 109-806-485-293-628,"Revising the Law of ""Piracy""",,1990,journal article,California Western international law journal,08863210,,,Alfred P. Rubin,,21,1,7,,Political science; Law,,,,,https://scholarlycommons.law.cwsl.edu/cwilj/vol21/iss1/7/ https://scholarlycommons.law.cwsl.edu/cgi/viewcontent.cgi?article=1416&context=cwilj,https://scholarlycommons.law.cwsl.edu/cwilj/vol21/iss1/7/,,,2993869136,,0,,3,false,, 109-913-688-464-662,"Exploring Contemporary Sea Piracy in Nigeria, the Niger Delta and the Gulf of Guinea",2020-08-31,2020,journal article,Journal of Transportation Security,19387741; 1938775x,Springer Science and Business Media LLC,Germany,Chijioke J Nwalozie,"Piracy is a global crime which impedes the free movement of ships containing people and goods, with its attendant economic ramifications. The perpetrators are usually heavily armed, with sophisticated weapons to enable them to hijack a vessel or vessels and redirect them to their desired location for the payment of an expected ransom. This paper thematically explores contemporary piracy in the African state of Nigeria, the Niger Delta and the Gulf of Guinea. Nigeria is undeniably a rich country based on its economic, agricultural and population advantages, but criminal activities like piracy have been a significant disadvantage. Most of the piracy activities happening in Nigeria are mainly located in the Niger Delta region, the heart of Nigeria’s oil and gas exploration. Some of the unemployed youths of the region use piracy activities as a fightback against the so-called “resource control” embarked upon by the Federal Government of Nigeria, which disadvantages them.",13,3,159,178,Agriculture; Payment; Government; Resource (biology); Political science; State (polity); Disadvantage; Ransom; Population; Economic growth,,,,,https://link.springer.com/content/pdf/10.1007/s12198-020-00218-y.pdf https://trid.trb.org/view/1757656 https://dora.dmu.ac.uk/handle/2086/20211 https://ideas.repec.org/a/spr/jtrsec/v13y2020i3d10.1007_s12198-020-00218-y.html https://link.springer.com/article/10.1007/s12198-020-00218-y,http://dx.doi.org/10.1007/s12198-020-00218-y,,10.1007/s12198-020-00218-y,3081866429,,0,010-403-945-432-494; 011-854-328-089-925; 043-768-983-710-853; 053-914-517-018-945; 075-967-611-947-887; 098-360-959-017-174; 100-063-472-876-531; 101-661-151-578-708; 102-219-135-288-107; 119-772-183-308-257; 124-553-661-648-83X; 164-579-317-743-527,5,true,,bronze 110-111-742-933-548,Establishment Of A Special Anti-Piracy Tribunal: Prospective And Reality,,2013,journal article,ILSA Journal of International and Comparative Law,1082944x,,,Sandra L. Hodgkinson,,19,2,305,318,Political science; Law; Tribunal,,,,,https://nsuworks.nova.edu/cgi/viewcontent.cgi?article=1793&context=ilsajournal https://nsuworks.nova.edu/ilsajournal/vol19/iss2/5/,https://nsuworks.nova.edu/ilsajournal/vol19/iss2/5/,,,2620262056,,0,,0,false,, 110-162-512-070-871,Taiwanese piracy sweep,,1992,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1992,4,5,5,Business; Computer security; Computer science,,,,,,http://dx.doi.org/10.1016/0142-0496(92)90266-l,,10.1016/0142-0496(92)90266-l,,,0,,0,false,, 110-769-957-030-283,"Arrest, detention and transfer of piracy suspects: a critical appraisal of the German Courier case decision",2013-07-31,2013,journal article,Social Science Research Network,,,,Anna Petrig,"This paper discusses human rights issues arising when piracy suspects are arrested and detained at sea by patrolling naval States and later transferred to third States for their criminal prosecution. The analysis turns on the Courier case decided by a German first instance administrative court - one of the first domestic decisions measuring arrest and detention of alleged pirates at sea against the requirements flowing from the right to liberty and analyzing the compatibility of transfers of piracy suspects to third States for prosecution in light of the principle of non-refoulement. It is argued that the court’s reasoning regarding procedural safeguards applicable to piracy suspects deprived of their liberty, specifically the right to be brought promptly before a judge, is not necessarily in line with how the right to liberty stipulated in Article 5 ECHR and Article 9 ICCPR is - or should be - interpreted. Meanwhile, the court seemed ready to critically assess the transfer of the alleged suspect to Kenya for prosecution in terms of the prohibition of refoulement, despite the pressure arising from the catch-and-release practice and the lack of prosecution venues in the realm of counter-piracy operations.",,,,,Patrolling; Critical appraisal; German; Human rights; Political science; Law; Administrative court; Suspect; Realm; Law enforcement,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2539072 https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2539072_code2123804.pdf?abstractid=2539072&mirid=5 https://edoc.unibas.ch/29514/,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2539072,,,1756280868,,0,,2,false,, 110-853-012-976-688,The Responses And Challenges Of International Actors In Combating Somalia Sea Piracy By Edemealem Mekuriyaw,2016-08-13,2016,journal article,International journal for social studies,,,,Debre Markos,"The focus of this paper was to examine the responses and challenges of international actors in combating Somalia sea piracy. The paper employed qualitative research approach. The data were collected from secondary sources such as journal articles, books, and report papers. Various international actors such as international regional and universal organizations, trade organizations, and states tried to use different mechanisms to abolish Somalia sea piracy. They exert big efforts to abolish piracy from Horn of Africa. The efforts of international actors played some roles in diminishing the capacity of Somalia sea pirates. However, the international actors were not able to completely abolish Somalia sea pirates. This was due to the presence of various challenges. The international actors faced different challenges in combating Somalia sea piracy. The weak enforcement of international law; weak cooperation among international actors; logistical problems; and absence of strong central government in Somalia were the major challenges. These challenges highly restrained the activities of international actors in combating piracy in the Horn of Africa.",2,8,15,26,Political economy; French horn; Political science; Qualitative research; Enforcement; International law; Central government,,,,,,,,,2993816592,,0,,0,false,, 111-027-722-176-871,Law and technologyThe end of the generative internet,,2009,journal article,Communications of the ACM,00010782; 15577317,Association for Computing Machinery (ACM),United States,Jonathan L. Zittrain,Exploring the expectations and implications for version 2.0 of the Net's new gated communities.,52,1,18,20,The Internet; World Wide Web; E-learning (theory); Information and communication technologies for development; Generative grammar; Computer science; Information and Communications Technology,,,,,https://www.questia.com/library/journal/1G1-149656285/the-generative-internet https://dash.harvard.edu/bitstream/1/9385626/1/Zittrain_Generative%20Internet.pdf https://dialnet.unirioja.es/servlet/articulo?codigo=2733145 https://doi.org/10.1145/1435417.1435426 https://dash.harvard.edu/bitstream/handle/1/9385626/Zittrain_Generative%20Internet.pdf?sequence=1 https://dash.harvard.edu/handle/1/9385626 https://ictlogy.net/bibliography/reports/projects.php?idp=662 https://dl.acm.org/doi/pdf/10.1145/1435417.1435426 http://portal.acm.org/citation.cfm?id=1435417.1435426 http://doi.org/10.1145/1435417.1435426 https://dblp.uni-trier.de/db/journals/cacm/cacm52.html#Zittrain09 https://core.ac.uk/download/28934244.pdf,http://dx.doi.org/10.1145/1435417.1435426,,10.1145/1435417.1435426,3111046069,,0,073-054-838-090-727,27,true,,green 111-771-298-287-171,American Filibustering and the British Navy: A Caribbean Analogue of Mediterranean “Piracy”,,1938,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),United States,Richard W. Van Alstyne,,32,01,138,142,Ancient history; Navy; Mediterranean climate; History,,,,,https://www.cambridge.org/core/product/identifier/S0002930000083950/type/journal_article,http://dx.doi.org/10.1017/s0002930000083950,,10.1017/s0002930000083950,2607163411,,0,,2,false,, 111-986-736-467-518,Countering Piracy off Somalia: International Law and International Institutions,,2010,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),United States,J. Ashley Roach,Dealing with pirates off the coast of Somalia in the Gulf of Aden and the western Indian Ocean over the past two-plus years has highlighted the international law applicable to countering piracy at sea and the role of international institutions in that effort. This essay seeks to illuminate related issues with a view to improving counterpiracy action.,104,3,397,416,Political science; Law; Action (philosophy); Indian ocean; International law,,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=3295639 https://www.cambridge.org/core/journals/american-journal-of-international-law/article/countering-piracy-off-somalia-international-law-and-international-institutions/143AD097A068B783F78F2B5972CA6F09,http://dx.doi.org/10.5305/amerjintelaw.104.3.0397,,10.5305/amerjintelaw.104.3.0397,200536217,,0,024-605-383-749-636; 042-593-682-623-934; 045-025-433-553-211; 087-366-055-695-333; 089-572-702-832-761; 106-619-699-607-570,30,false,, 112-201-268-264-392,The Fight Against Piracy and the Law of the Sea,,2013,journal article,The Italian Yearbook of International Law Online,22116133,Brill,,Tullio Treves,"This article presents some reflections on the impact on the law of the sea of the Security Council resolutions on piracy off the coasts of Somalia. Although they extend the powers concerning the repression of piracy all States enjoy on the high seas under UNCLOS and customary international law to the territorial sea of Somalia, these resolutions explicitly exclude that such extension modifies the customary rule that limits piracy to the high seas. As such exclusion does not encompass other general rules of the law of the sea relevant for piracy, the resolutions may be read as relevant elements illuminating the meaning of these rules. The rules of UNCLOS on which the Security Council resolutions shed light include Article 3, setting 12 miles as the maximum width of the territorial sea, Article 77, which, read a contrario sensu, states the requirement of express proclamation for the exclusive economic zone, Article 105, second sentence, as regards the States that may establish judicial proceedings against pirates. The peculiar situation of ineffectiveness of governmental authority in Somalia and uncertainty about the maritime zones of this country explain many aspects of the Security Council’s attitude.",22,1,23,37,Exclusive economic zone; International waters; United Nations Convention on the Law of the Sea; Public international law; Law; Geography; Customary international law; Law of the sea; International law; Territorial waters,,,,,https://brill.com/view/journals/iyio/22/1/article-p23_3.xml?language=en https://booksandjournals.brillonline.com/content/journals/10.1163/22116133-02201003 https://dialnet.unirioja.es/servlet/articulo?codigo=4568799,http://dx.doi.org/10.1163/22116133-02201003,,10.1163/22116133-02201003,2068284405,,0,,0,false,, 112-303-298-122-51X,The Global Governance of Maritime Piracy,2012-10-06,2012,journal article,Journal of Global Policy and Governance,21947740; 21947759,Springer Science and Business Media LLC,,Otello Campanelli,"Within less than a decade piracy has been turned from a marginal economic problem into a global security problem. The effective governance of piracy represents a vital need for the international community. Two aspects of this governance are particularly important and are broadly highlighted in the present work: a prescriptive type of governance, or how piracy should be disciplined according to international law, and a descriptive kind of governance, concerning what is rather than what should be, which is closely linked to international relations dynamics. For an effective management—and solution—of the piracy problem, it is underlined how there are obstacles of both legal and practical natures, but that these, in conclusion, may be surmounted by the presence of a major State willingness to act. The governance of piracy is still more and more influenced by momentary interests and by geopolitical dynamics, than by the actual dimension and dangerousness of modern day pirates. International law evolves slowly in a rapidly changing world, and the overlapping regime covering piracy may represent a barrier to the solution of the issue because it does not comprise a coherent and comprehensive anti-piracy regime.",1,1,73,84,Economy; Political science; Law and economics; Economic problem; Geopolitics; Global governance; International community; International relations; Corporate governance; International security; International law,,,,,https://paperity.org/p/8889625/the-global-governance-of-maritime-piracy https://link.springer.com/article/10.1007/s40320-012-0006-z https://link.springer.com/content/pdf/10.1007%2Fs40320-012-0006-z.pdf,http://dx.doi.org/10.1007/s40320-012-0006-z,,10.1007/s40320-012-0006-z,2031790082,,0,005-255-464-276-950; 011-870-494-209-013; 018-581-182-598-228; 018-902-831-047-51X; 020-680-731-401-973; 021-880-250-105-260; 037-041-896-615-773; 051-393-025-360-687; 057-170-521-550-316; 060-650-914-051-762; 064-236-402-349-321; 067-621-268-267-72X; 070-025-348-836-811; 077-546-002-877-69X; 081-529-155-117-448; 083-675-908-175-780; 085-888-641-946-33X; 092-846-795-100-992; 093-129-616-022-808; 096-241-609-226-625; 098-154-952-353-653; 101-517-236-791-130; 112-883-561-816-230; 115-448-534-759-958; 118-989-683-141-669; 122-740-834-718-041; 123-196-714-843-286; 136-839-480-497-04X; 138-244-556-545-344; 142-798-520-339-548; 156-338-217-544-259; 160-186-006-041-525; 171-340-642-275-64X; 175-554-611-078-394; 179-245-562-746-996; 179-829-784-044-841; 181-665-516-440-120; 186-847-595-824-112; 189-484-813-376-223; 192-548-100-346-575; 196-350-296-966-072; 196-503-133-730-14X; 198-160-988-578-332; 198-365-526-040-377,5,true,,bronze 112-400-869-567-032,The liability to Pay the Ransom for Crewmen Hijacked by Piracy,,2010,journal article,Journal of Guangxi Administrative Cadre Institute of Politics and Law,,,,Hu Bin,"The international community has been taken more strict measures to combat piracy ,Since 2008,however ,many merchant ships still been hijacked by piracy,and most of these ships were rescued by pay the ransoms. There are different opinions about the nature of ransom ,one of the most argumentative is the pay for crews and the duty holders of this sacrifices. It is important for protection of the crews’ rights and interests by clear those mentioned above. It is a legal act to pay the ransom for crew according to related international treaty ,national law and jurisprudence,and the ransom should be part of the cost of crews repatriation,which should be undertaken by related shipping employers ,the flag State,the State of nationality of the seafarer or those countries where crew were repatriated should take some supervisory measures to make sure the fulfillment,and if necessary,these states shall undertake the cost of ransom for crew in advance.",,,,,Business; Law; Flag state; Liability; Duty; Repatriation; International community; Crew; Ransom; Jurisprudence,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-GZGG201005020.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-GZGG201005020.htm,,,2380515811,,0,,0,false,, 112-660-485-045-180,Software Piracy Forensics: Exploiting Nonautomated and Judiciary-Friendly Techniques,2009-09-09,2009,journal article,Journal of Digital Forensic Practice,15567281; 15567346,Informa UK Limited,United States,S. Santhosh Baboo; P. Vinod Bhattathiripad,"ABSTRACT Software piracy is widespread because it is simple and inexpensive to copy software programs. The arbitration of software piracy and the interpretation of copyright laws are often grey areas. When called upon to arbitrate in matters of piracy, the judicial system solicits the support of technical experts, who then are typically required to substantiate issues arising from patent and copyright infringements, trade secret misappropriation, and software piracy. Such experts have so far been largely relying on their own experiential and intuitive expertise. This article is an attempt to show how a dedicated expert can supplement such intuitive expertise with objective empirical evidence based on various elements that can be found in the “original” and the “pirated” source codes of the software, to a judicially convincing level. A few formats for presenting the source code comparison results are proposed here, which are convenient to technical experts as well as judicial officers. These formats would ...",2,4,175,182,Arbitration; Empirical evidence; Trade secret; Software; Copyright infringement; Misappropriation; Computer security; Computer science; Source code; Digital forensics,,,,,https://www.tandfonline.com/doi/full/10.1080/15567280903140938 https://dblp.uni-trier.de/db/journals/jdfp/jdfp2.html#BabooB08 http://dblp.uni-trier.de/db/journals/jdfp/jdfp2.html#BabooB08 https://doi.org/10.1080/15567280903140938,http://dx.doi.org/10.1080/15567280903140938,,10.1080/15567280903140938,1977889389,,0,018-780-253-164-948; 045-421-677-459-971; 065-452-675-566-99X; 117-083-434-422-489; 139-027-929-591-18X; 160-409-207-993-851; 199-299-581-298-817,9,false,, 112-756-060-430-338,II. Piracy off Somalia: UN Security Council Resolution 1816 and IMO regional counter-piracy efforts,2008-08-11,2008,journal article,International and Comparative Law Quarterly,00205893; 14716895,Cambridge University Press (CUP),United Kingdom,Douglas Guilfoyle,,57,3,690,699,International trade; International waters; Political science; Law; Security council; Resolution (electron density),,,,,https://www.cambridge.org/core/journals/international-and-comparative-law-quarterly/article/ii-piracy-off-somalia-un-security-council-resolution-1816-and-imo-regional-counterpiracy-efforts/A7C877DE295732AD8D439457F9AA4978 https://research.monash.edu/en/publications/ii-piracy-off-somalia-un-security-council-resolution-1816-and-imo https://www.cambridge.org/core/services/aop-cambridge-core/content/view/S0020589308000584,http://dx.doi.org/10.1017/s0020589308000584,,10.1017/s0020589308000584,2041404448,,0,,35,false,, 112-883-561-816-230,Applications and shortcomings of the law of the sea in combating piracy : a South East Asian perspective,,2009,journal article,Journal of Maritime Law and Commerce,00222410,,,Rosemary Collins; Daud Hassan,,,,89,113,Economy; Political science; United Nations Convention on the Law of the Sea; Perspective (graphical); South east asian; Development economics,,,,,https://researchdirect.westernsydney.edu.au/islandora/object/uws:9116,https://researchdirect.westernsydney.edu.au/islandora/object/uws:9116,,,2751116939,,0,,6,false,, 112-885-075-562-676,"The Law of Piracy. By Alfred P. Rubin. Newport, R.I.: Naval War College Press, 1988. Pp. xiv, 444. Indexes. $22.",,1990,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),United States,Georg Schwarzenberger,,84,2,620,622,Philosophy; Humanities,,,,,https://www.cambridge.org/core/services/aop-cambridge-core/content/view/S0002930000031602,http://dx.doi.org/10.2307/2203491,,10.2307/2203491,3048511120,,0,,0,false,, 112-944-143-496-63X,Current Trends in Global Piracy: Can Somalia's Successes Help Combat Piracy in the Gulf of Guinea and Elsewhere?,2014-12-31,2014,journal article,Case Western Reserve Journal of International Law,00087254,,,Sandra L. Hodgkinson,,46,1,145,,Current (fluid); International trade; Political science; Law,,,,,https://www.questia.com/library/journal/1G1-377861155/current-trends-in-global-piracy-can-somalia-s-successes https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1033&context=jil https://scholarlycommons.law.case.edu/jil/vol46/iss1/8/,https://www.questia.com/library/journal/1G1-377861155/current-trends-in-global-piracy-can-somalia-s-successes,,,1835684374,,0,,3,false,, 113-339-942-037-588,"A Lust for Treasure and a Love of Gold…or Desperation? Global Facilitation of Piracy, Neoliberal Policies and the Control of the Somali Pirate",2014-02-25,2014,journal article,Critical Criminology,12058629; 15729877; 08472971,Springer Science and Business Media LLC,United States,Victoria E. Collins,"The issue of piracy is most often framed as being the product of dangerous individuals plundering and murdering for personal gain. What is less often discussed are the state, political, economic, and corporate interests that intersect with piracy (i.e. the corporate interest demand for protection of global shipping routes that are instrumental for capital accumulation in the world market). Here I utilize the concept of crimes of globalization to demonstrate that the motivations that undergird policies aimed at controlling piracy today are not dissimilar to those promoted through international financial institutions in their effort to advance the economic interests of highly empowered countries at the expense of addressing localized needs.",22,3,433,450,Political economy; Sociology; Law; Globalization; Treasure; State (polity); Somali; Lust; Product (business); Capital accumulation; Politics,,,,,https://link.springer.com/10.1007/s10612-014-9239-2 https://link.springer.com/article/10.1007/s10612-014-9239-2/fulltext.html https://link.springer.com/article/10.1007/s10612-014-9239-2,http://dx.doi.org/10.1007/s10612-014-9239-2,,10.1007/s10612-014-9239-2,2121716939,,0,001-824-828-062-585; 003-530-161-964-554; 007-574-709-573-402; 008-645-846-413-714; 008-693-353-784-855; 012-432-290-325-625; 015-582-660-592-759; 017-694-189-698-517; 020-421-350-864-329; 021-712-528-471-415; 022-064-583-002-252; 022-158-379-612-19X; 023-308-050-415-403; 024-373-622-680-964; 024-515-815-913-577; 027-377-378-672-440; 027-487-829-462-184; 031-859-974-391-457; 032-935-462-008-280; 033-025-307-993-819; 035-879-007-260-607; 037-194-159-759-571; 038-925-301-811-178; 041-433-243-604-644; 041-830-093-318-333; 043-891-537-578-403; 048-533-178-322-976; 050-432-463-128-522; 055-489-068-296-947; 055-966-813-276-276; 056-386-888-346-334; 057-170-521-550-316; 064-250-494-196-393; 065-317-923-661-274; 066-129-920-486-616; 071-346-623-291-646; 073-726-219-747-514; 079-546-638-449-28X; 079-942-736-984-635; 080-064-689-475-502; 084-107-354-069-118; 085-933-591-820-64X; 087-846-370-011-328; 087-940-276-012-544; 088-437-397-004-194; 092-247-739-441-958; 092-767-431-095-138; 103-192-409-565-175; 105-161-522-936-135; 106-990-314-922-112; 110-360-467-167-275; 111-430-553-213-319; 114-502-653-888-726; 115-937-458-124-252; 117-878-192-802-09X; 119-773-956-559-803; 120-081-889-235-910; 121-320-732-131-066; 121-354-884-152-259; 122-740-834-718-041; 122-827-681-830-148; 124-763-184-129-433; 125-511-004-952-971; 130-199-664-208-387; 130-343-209-918-962; 132-448-358-300-756; 133-008-340-838-176; 133-274-773-957-308; 135-773-824-586-252; 142-798-520-339-548; 147-524-416-531-226; 149-197-393-969-029; 158-661-702-874-174; 163-516-395-136-162; 170-012-207-007-481; 184-057-369-216-566; 188-780-358-290-806; 192-548-100-346-575; 193-151-990-358-906; 198-365-526-040-377,5,false,, 113-506-170-057-161,"Maritime corporate terrorism and its consequences in the western Indian Ocean: illegal fishing, waste dumping and piracy in twenty-first-century Somalia",,2012,journal article,Journal of the Indian Ocean Region,19480881; 1948108x,Informa UK Limited,United States,Awet Tewelde Weldemichael,"Abstract This paper identifies the root causes and general typology of the widespread phenomena of piracy off the coast of Somalia. It shows that piracy in this region started as a direct response to illegal fishing, with widespread claims of hazardous waste dumping offering added moral justification. It argues that the two international crimes that are the root causes of Somali piracy constitute corporate terrorism at sea. The alacrity of the earliest illegal trawlers that were captured by the fishermen to pay ransom unleashed the scourge of criminal/ransom piracy that has overshadowed – in figures and discourse – ‘defensive’ piracy. Restoring the state and combating poverty can help minimise the favourable conditions that latter-day pirates exploited to launch their trade, but will not eradicate piracy without successfully containing the corporate terrorism that triggered it in the first place. Moreover, combating poverty among fishing coastal communities require the eradication of illegal fishing.",8,2,110,126,Economy; International trade; Political science; Poverty; Terrorism; State (polity); Somali; Dumping; Ransom; Illegal fishing; Fishing,,,,,https://www.tandfonline.com/doi/abs/10.1080/19480881.2012.730747,http://dx.doi.org/10.1080/19480881.2012.730747,,10.1080/19480881.2012.730747,2031120781,,0,001-405-344-922-802; 005-772-648-250-11X; 019-440-349-218-416; 024-013-108-178-470; 025-821-074-419-900; 033-212-782-624-872; 037-530-648-961-615; 042-936-581-228-857; 051-122-898-035-467; 056-230-560-032-664; 059-171-516-293-447; 060-210-031-928-402; 064-954-713-529-545; 069-127-958-728-238; 074-781-216-094-501; 113-589-375-707-427; 130-710-539-074-522; 132-886-511-869-587; 134-335-504-358-561; 137-983-597-179-814; 141-539-188-412-965,26,false,, 113-514-704-535-421,On the Forms of Internet Copyright Infringement,,2006,journal article,Journal of Liaoning Normal University,,,,Cong Li-xian,"Issues concerning protection of internet copyright,especially piracy in internet have aroused interests of all walks of life,including the law research circles.However,literature on piracy in internet mentions only such basic forms of infringement as the infringement on internet information communication,information of right management,technology safeguard,and the right to database,etc.this article is of the opinion that holders of internet copyright and neighboring right possess not only economic rights but also moral rights,and therefore infringement on moral right in internet has to be regulated by law.Based on this understanding,this article analyses ten forms of piracy in internet as well as its exceptions.",,,,,Internet privacy; The Internet; Business; Theory of Forms; Moral rights; Copyright infringement,,,,,https://en.cnki.com.cn/Article_en/CJFDTOTAL-LNSS200602008.htm,https://en.cnki.com.cn/Article_en/CJFDTOTAL-LNSS200602008.htm,,,2370342962,,0,,0,false,, 114-193-864-317-177,Piracy and counterfeiting — GATT TRIPS and developing countries,,1998,journal article,Computer Law & Security Review,02673649,Elsevier BV,,,,14,2,120,,,,,,,,http://dx.doi.org/10.1016/s0267-3649(97)82140-1,,10.1016/s0267-3649(97)82140-1,,,0,,0,false,, 114-451-206-749-321,Coming Attractions: Opportunities and Challenges in Thwarting Global Movie Piracy,,2008,journal article,American Business Law Journal,00027766; 17441714,Wiley,United Kingdom,Lucille M. Ponte,"This paper considers the main forms of global movie piracy and discusses some of the typical players and distribution channels for pirated films. In response to these forms of piracy, the industry's efforts to lobby for tougher criminal sanctions and greater protections for DRM in the U.S. and worldwide are considered as well as their negative impact on consumer fair use rights. The failure of national laws and DRM to stymie movie piracy illustrates the need for the industry to consider new strategies that involve competing with the ""business model"" of piracy. In view of the key lessons learned from an analysis of piracy, this article makes recommendations on self-help remedies that the film industry can implement to reshape its own business model in a manner that deters global movie piracy without alienating its customer base or straining already limited international law enforcement resources.",45,2,331,369,Internet privacy; Business; International business; Fair use; Customer base; Sanctions; Enforcement; Business model; Film industry; International law,,,,,https://onlinelibrary.wiley.com/doi/10.1111/j.1744-1714.2008.00057.x/abstract https://www.elgaronline.com/view/9781847203601.00014.xml http://onlinelibrary.wiley.com/doi/10.1111/j.1744-1714.2008.00057.x/abstract,http://dx.doi.org/10.1111/j.1744-1714.2008.00057.x,,10.1111/j.1744-1714.2008.00057.x,3123061840,,0,,12,false,, 114-700-202-163-379,Critical Review on the Penalties of Piracy and Suggestion for Revision of Criminal Code,,2011,journal article,Korean Journal of Comparative Criminal Law,1598091x,Korean Journal of Comparative Criminal Law,,null 백상진,,13,2,235,255,Psychology; Law; Criminal code; Criminology,,,,,http://www.kci.go.kr/kciportal/landing/article.kci?arti_id=ART001617056,http://dx.doi.org/10.23894/kjccl.2011.13.2.011,,10.23894/kjccl.2011.13.2.011,2609151270,,0,,0,true,cc-by-nc,hybrid 114-772-736-034-62X,Shipping Interdiction and the Law of the Sea. By D ouglas G uilfoyle . Maritime Security and the Law of the Sea . By N atalie K lein . Piracy and Armed Robbery at Sea: The Legal Framework for Counter-Piracy Operations in Somalia and the Gulf of Aden . By R obin G eiß and A nna P etrig .,2012-01-01,2012,journal article,British Yearbook of International Law,00682691; 20449437,Oxford University Press (OUP),,Cameron A. Miles,,82,1,520,525,Interdiction; Economy; United Nations Convention on the Law of the Sea; Law; Geography; Maritime security,,,,,https://academic.oup.com/bybil/article/82/1/520/276480,http://dx.doi.org/10.1093/bybil/brs024,,10.1093/bybil/brs024,1989383599,,0,,0,false,, 115-016-680-239-636,Somalia’s “Pirate Cycle”: The Three Phases of Somali Piracy,,2013,journal article,Journal of Strategic Security,19440464; 19440472,University of South Florida Libraries,United States,Edward R. Lucas,"This article provides a theoretical framework for examining Somali piracy from its origins in the 1990s to the present. This analysis provides both a detailed description of the changing nature of piracy, as well as explanations for why these changes have occurred. The increase in pirate activity off Somalia from 1991 to 2011 did not occur in a steady linear progression, but took place in three separate phases. These three phases can be viewed in terms of a “cycle of piracy,” based on a theory developed by the pirate historian Philip Gosse in 1932. By employing this framework, policy-makers in the U.S. and elsewhere would be better able to judge when counter-piracy intervention is necessary. By preventing piracy from developing into large-scale professionalized operations, as witnessed in Somalia since 2007, the international community will be able carryout more efficient and effective piracy suppression operations in future. This article is available in Journal of Strategic Security: http://scholarcommons.usf.edu/jss/vol6/iss1/8",6,1,8,63,Political science; Somali; International community; Intervention (law); Criminology,,,,,https://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1218&context=jss https://paperity.org/p/82224550/somalias-pirate-cycle-the-three-phases-of-somali-piracy https://scholarcommons.usf.edu/jss/vol6/iss1/8/ https://digitalcommons.usf.edu/jss/vol6/iss1/8/ https://doaj.org/article/b3218992c50c499984c49f4a07d31fc6 https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=1218&context=jss,http://dx.doi.org/10.5038/1944-0472.6.1.5,,10.5038/1944-0472.6.1.5,3126135043,,0,,8,true,cc-by-nc,gold 115-049-834-388-839,Continuing U.S. efforts to combat piracy; piracy now spreading to Gulf of Guinea,,2012,journal article,American Journal of International Law,00029300,,,John R. Crook,,106,1,160,164,,,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=3863584,https://dialnet.unirioja.es/servlet/articulo?codigo=3863584,,,6967841,,0,,0,false,, 115-135-772-850-282,SPA's higher education initiative on software piracy,1998-10-01,1998,journal article,Campus-Wide Information Systems,10650741; 20545576,Emerald,United States,Software Publishers' Association,"Describes steps that can be taken by all members of the campus community to prevent software piracy. Details the application of copyright law for works of software, then goes on to advocate the development and implementation of a software policy and software audits.",15,4,128,130,Political science; Software; Computer science; Operating system,,,,,,http://dx.doi.org/10.1108/10650749810370612,,10.1108/10650749810370612,,,0,,1,false,, 115-240-863-032-378,Current arrangements to combat piracy in the Gulf of Guinea region : an evaluation,2016-01-01,2016,journal article,Journal of Maritime Law and Commerce,00222410,,,Sayed M. Hasan; Daud Hassan,,47,2,171,217,Current (fluid); International trade; Political science,,,,,https://researchdirect.westernsydney.edu.au/islandora/object/uws:35900,https://researchdirect.westernsydney.edu.au/islandora/object/uws:35900,,,2746914355,,0,,2,false,, 115-872-600-448-035,Piracy in the Mediterranean,,1937,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),United States,George A. Finch,,31,4,659,665,Political science; Mediterranean climate; Fishery,,,,,https://www.cambridge.org/core/services/aop-cambridge-core/content/view/S0002930000082415,http://dx.doi.org/10.2307/2190675,,10.2307/2190675,2330410433,,0,,8,false,, 115-898-144-990-52X,Anti-Piracy Law In The Year Of The Ocean: Problems And Opportunity,,1999,journal article,ILSA Journal of International and Comparative Law,1082944x,,,Samuel Pyeatt Menefee,,5,2,309,318,Business; Law; Jurisdiction,,,,,https://nsuworks.nova.edu/ilsajournal/vol5/iss2/6/,https://nsuworks.nova.edu/ilsajournal/vol5/iss2/6/,,,2551839616,,0,,5,false,, 115-937-458-124-252,Piracy Cases in the Supreme Court,,1934,journal article,Journal of Criminal Law and Criminology (1931-1951),08852731,JSTOR,United States,James J. Lenoir,"In ancient times piracy was almost the only maritime undertaking of international scope; and, on occasion, even nations participated in acts of a piratical nature. With the development of maritime commerce, however, there was almost a complete reversal of the point of view with which the practice was regarded."" By the latter part of the fifteenth century it was an accepted rule that piracy in any form was contrary to all rules of seafaring trade and that the pirate was thus the common enemy of all nations.2 Practically all of the earlier writers accepted this viewpoint, which thereupon became an alleged rule of law which judges in most cases accepted and applied.3 In spite of the antiquity of the subject, however, there does not seem to be any acceptable or comprehensive work on piracy.4 This is all the more to be regretted since piracy as a crime is well worth attention today. It is by no means obsolete, yet its place in legal theory has never been stated and its actual definition in substantive law is still open to argument. There are some who deny the present importance of piracy and regard it as a matter of historical interest only. They claim that such piracy as is still to be found is chiefly piracy made such by special conventions, or by municipal law,5 and that it has little or no sig-",25,4,532,553,Engineering; Law; Rule of law; Supreme court; Substantive law; Fifteenth; Poison control; Computer security; Remand (court procedure); Municipal law; Original jurisdiction,,,,,https://www.jstor.org/stable/1136028 https://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article=2493&context=jclc https://scholarlycommons.law.northwestern.edu/jclc/vol25/iss4/2/,http://dx.doi.org/10.2307/1136028,,10.2307/1136028,159338178,,0,,5,true,,green 116-138-272-813-75X,Video Game Piracy in the Philippines: A Narrowly Tailored Analysis of the Video Game Industry & Subculture,2010-04-27,2010,journal article,The Pace International Law Review,10523448,,,Jennifer Kim Vitale,,22,1,297,,Business; Game mechanics; Video game; Game Developer; Video game design; Multimedia; Game design; Video game development; Video game culture; Game design document,,,,,https://digitalcommons.pace.edu/pilr/vol22/iss1/9/ https://digitalcommons.pace.edu/cgi/viewcontent.cgi?article=1032&context=pilr,https://digitalcommons.pace.edu/pilr/vol22/iss1/9/,,,1579354528,,0,,1,false,, 116-191-783-321-485,The Law of Piracy: INDEX,,1988,journal article,International law studies,21546266,,,Alfred P. Rubin,,63,1,10,,Political science; Law; Index (economics); Law of armed conflict; Naturalism; Conflict of laws,,,,,https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1774&context=ils https://digital-commons.usnwc.edu/ils/vol63/iss1/10/,https://digital-commons.usnwc.edu/ils/vol63/iss1/10/,,,3162758937,,0,,0,false,, 116-717-334-966-257,Challenges of the Knowledge Based Economy in East Asia,2016-06-07,2016,journal article,Information Management and Business Review,22203796,AMH International Conferences and Seminars Organizing LLC,,Virachai Vongbunsin; John Walsh,"The knowledge-based economy (KBE) is widely considered to be the foundation of the next stage of economic growth, following agriculture, manufacturing and services. Countries seeking to enter the KBE must take care to ensure that their resources ‘particularly human resources ‘ are willing and able to fulfil the roles requested of them. That in turn means that countries must be aware of what challenges and difficulties they will face in taking this next step in development. This paper attempts to outline at the macro-social level the issues involved in this process with a view to identifying an agenda of state-level developmental goals to be tackled.",8,2,36,49,Human resources; Agriculture; Economics; Knowledge economy; Marketing; Face (sociological concept); Process (engineering); East Asia,,,,,http://ifrnd.org/journal/index.php/imbr/article/view/1271 https://ojs.amhinternational.com/index.php/imbr/article/download/1271/1237 https://core.ac.uk/download/288022380.pdf,http://dx.doi.org/10.22610/imbr.v8i2.1271,,10.22610/imbr.v8i2.1271,2546624933,,0,019-591-947-639-307; 036-330-551-455-297; 052-044-833-323-922; 056-973-740-897-531; 077-957-815-298-026; 085-704-135-011-284; 086-573-775-695-708; 088-872-639-656-694; 100-095-090-598-595; 100-757-818-187-263; 125-166-672-847-988; 198-804-648-965-564,0,true,cc-by,hybrid 117-194-396-457-497,Database an invasion of piracy,,1994,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1994,10,3,3,Computer security; Business; Internet privacy; Computer science; Database,,,,,,http://dx.doi.org/10.1016/0142-0496(94)90244-5,,10.1016/0142-0496(94)90244-5,,,0,,0,false,, 117-380-834-278-114,Prevention of Piracy and Criminal Law,,2008,journal article,Korean Journal of Comparative Criminal Law,1598091x,Korean Journal of Comparative Criminal Law,,Seungeun Song,,10,2,171,192,Political science; United Nations Convention on the Law of the Sea; Law; Criminal law; Criminology,,,,,https://www.kci.go.kr/kciportal/landing/article.kci?arti_id=ART001304957,http://dx.doi.org/10.23894/kjccl.2008.10.2.008,,10.23894/kjccl.2008.10.2.008,2609721194,,0,,0,true,cc-by-nc,hybrid 117-397-582-124-522,Aircraft Piracy - Crime or Fun?,,1969,journal article,William and Mary law review,00435589,,,Seymour W. Wurfel,,10,4,820,,Political science; Law,,,,,https://paperity.org/p/83348667/aircraft-piracy-crime-or-fun https://scholarship.law.wm.edu/cgi/viewcontent.cgi?article=2912&context=wmlr https://scholarship.law.wm.edu/wmlr/vol10/iss4/4/,https://paperity.org/p/83348667/aircraft-piracy-crime-or-fun,,,1595227768,,0,103-192-409-565-175,0,false,, 117-472-359-822-050,$40 000 fine for software piracy,,1994,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1994,7,2,2,Computer science; Software; Computer security; Operating system,,,,,,http://dx.doi.org/10.1016/0142-0496(94)90073-6,,10.1016/0142-0496(94)90073-6,,,0,,0,false,, 117-561-810-263-877,Not Designed to Fit: Why the Innovative Design Protection and Piracy Prevention Act Should Not Be Made into Law,2012-11-13,2012,journal article,Pace law review,02722410,,,Alexis N. Stevens,,32,3,856,,Business; Law,,,,,https://digitalcommons.pace.edu/cgi/viewcontent.cgi?article=1816&context=plr https://digitalcommons.pace.edu/plr/vol32/iss3/6/,https://digitalcommons.pace.edu/plr/vol32/iss3/6/,,,197473925,,0,,1,false,, 117-591-123-606-898,FENOMENA PEMBAJAKAN HAK CIPTA KARYA MUSIK DALAM BENTUK VCD DAN DVD: SUATU KAJIAN SOSIOLOGIS DARI TIDAK MAKSIMALNYA SANKSI HUKUM,2015-07-19,2015,journal article,Jurnal Surya Kencana Dua : Dinamika Masalah Hukum dan Keadilan,2614333x; 23562013,Universitas Pamulang,,oksidelfa Yanto,"The number of piracy cases are popping up in the environment community indicates malfunctioning of the Act or law in mengujudkan legal protection of copyright musical works. It makes people increasingly do not trust the government officials there. Whereas cases of music copyright piracy is certainly not to be taken lightly. If left Indonesia will be increasingly threatened by the danger of a prolonged legal harassment, and it would threaten the creativity of the people of this country. Type commonly violated copyright piracy cassette production CD, VCD and DVD. Perederan proliferation of pirated goods in places such open indication can be seen from the market dominated by pirates. Keywords: Piracy, copyright, Sanctions Law",3,1,,,Government; Political science; Law; Sanctions; Harassment; Legal protection; Musical,,,,,http://openjournal.unpam.ac.id/index.php/SKD/article/download/115/79 http://openjournal.unpam.ac.id/index.php/SKD/article/view/115/79 https://core.ac.uk/download/337609066.pdf,http://dx.doi.org/10.32493/skd.v3i1.y2016.115,,10.32493/skd.v3i1.y2016.115,3040433889,,0,,0,true,cc-by,gold 117-732-707-160-347,Can We Stop Talking about Somali Piracy Now? A Personal Review of Somali Piracy Studies,2015-01-01,2015,journal article,"Peace Economics, Peace Science and Public Policy",15548597; 10792457,Walter de Gruyter GmbH,Germany,Anja Shortland,,21,4,419,431,Political science; Law; Somali; Corporate governance; Criminology,,,,,https://EconPapers.repec.org/RePEc:bpj:pepspp:v:21:y:2015:i:4:p:419-431:n:4 https://ideas.repec.org/a/bpj/pepspp/v21y2015i4p419-431n4.html https://www.degruyter.com/view/journals/peps/21/4/article-p419.xml?language=en https://core.ac.uk/download/45314892.pdf,http://dx.doi.org/10.1515/peps-2015-0018,,10.1515/peps-2015-0018,2305608486,,0,009-044-648-878-388; 012-703-976-561-544; 012-782-551-491-569; 020-663-212-398-691; 022-721-547-926-498; 043-164-385-854-497; 045-107-709-389-002; 052-627-226-126-905; 066-660-706-410-262; 068-519-901-718-510; 079-590-039-904-007; 080-037-407-330-337; 084-933-170-945-288; 088-108-333-966-709; 088-437-397-004-194; 096-322-529-846-052; 097-941-376-873-082; 098-002-978-019-239; 100-278-005-216-081; 105-161-522-936-135; 111-965-420-681-996; 112-756-060-430-338; 121-997-342-917-105; 122-740-834-718-041; 132-519-001-970-162; 144-074-714-917-325; 147-454-181-506-681; 162-168-085-127-864,6,true,,green 117-934-189-844-858,Motion Picture Piracy: Controlling the Seemingly Endless Supply of Counterfeit Optical Discs in Taiwan,2006-03-01,2006,journal article,Vanderbilt Journal of Transnational Law,00902594,,,Stephen K. Shiu,,39,2,607,,Optical disc; Counterfeit; Motion picture; Computer security; Computer science,,,,,,,,,2886848994,,0,,0,false,, 118-147-547-720-817,Toward Negotiating a Remedy to Copyright Piracy in Singapore,,1986,journal article,Northwestern journal of international law and business,01963228,,,James W. Peters,,7,3,561,,International trade; Political science; Negotiation; Intellectual property,,,,,https://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article=1207&context=njilb https://scholarlycommons.law.northwestern.edu/njilb/vol7/iss3/26/,https://scholarlycommons.law.northwestern.edu/njilb/vol7/iss3/26/,,,572154216,,0,,1,false,, 118-476-830-505-458,"Piracy and Empire: The Campaign against Piracy, the Development of International Law and the British Imperial Mission",2017-02-16,2017,journal article,Journal of the History of International Law,1388199x; 15718050,Brill,Netherlands,Michael Mulligan,"This article will examine the issue of piracy and how the prohibition of piracy developed in international law from the 19th century onwards. The campaigns against piracy in the 19th century influenced the development of international law into the 21st century with the prohibition on piracy achieving the status of peremptory norm ‘ jus cogens ’ under international law. The anti-piracy campaign of the British led to the signing of treaties which, although ostensibly designed to prohibit the trade, had the effect of consolidating British power and influence over the Gulf States and furthered imperial interests there. The campaign also further contributed to the notion of the ‘civilising mission’. The legacy of the campaigns reverberate in the contemporary debates about piracy, particularly in relation to the so-called pirates who operate off the west coast of Africa.",19,1,70,92,Political science; Public international law; Imperial unit system; Law; Power (social and political); Empire; Peremptory norm; West coast; Legal history; International law,,,,,https://brill.com/view/journals/jhil/19/1/article-p70_3.xml?language=en https://brill.com/content/journals/10.1163/15718050-12340079,http://dx.doi.org/10.1163/15718050-12340079,,10.1163/15718050-12340079,2596723105,,0,000-291-427-814-461; 015-730-950-764-741; 019-693-458-562-887; 046-080-440-146-436; 049-247-366-460-70X; 058-317-264-351-454; 112-756-060-430-338; 127-853-008-284-993; 193-793-308-388-155,0,false,, 118-514-483-616-413,Photocopying and Record Piracy: Of Dred Scott and Alice in Wonderland.,,1975,journal article,UCLA Law Review,00415650,,,Melville B. Nimmer,,,,,,Law; Alice (programming language); Legal responsibility; Reprography; History,,,,,https://eric.ed.gov/?id=EJ160640,https://eric.ed.gov/?id=EJ160640,,,335686248,,0,,2,false,, 118-868-813-161-510,The use of private maritime guards as an innovative means to fulfil states duty to cooperate in the repression of maritime piracy. Part 1,2020-09-15,2020,journal article,International Journal of Maritime Crime and Security,26313855; 26313863,Centre for Business and Economic Research,,katinka svanberg,"This article discusses the use of PCASPs as an alternative or additional layer of protection on board ships in the fight against maritime piracy and armed robbery at sea from an international law perspective based on legal positivism. A concern is that clear-cut, international legal rules are missing on PCASPs. A particular concern is the use of force by PCASPs. The IMO, the shipping- and PMSC industry have had to resort to soft law instruments and self-regulations. The perceived lack of legal rules concerning PCASPs and PMSCs has resulted in a lot of criticism. But does international law on maritime piracy need to develop binding international legal rules’ that are directly applicable to PCASPs? My findings are that the existing legal framework, in the Law of the Sea, SOLAS Convention, customary international law on self-defence together with the non-binding IMO guidelines and the shipping industry’s and PMSC’s self-regulations, as implemented by national laws, gives the necessary framework to adequately address the issue of PCASPs as protection against maritime piracy. The article describes maritime piracy, piracy hotspots and how intervention against piracy differs according to regions. It analyses the current legal framework on maritime piracy and armed robbery at sea in UNCLOS and the SUA Convention, flag-state jurisdiction and national laws. It defines “soft law” and goes through regulations on PCASPs from the Montreux Document and ICoC to regulations that directly address the use of PCASPs on board ships, as the IMO Guidelines, ISO Standards, the industries standard agreements and Guidance on the use of force.",01,02,,,Business; International trade; Psychological repression; Duty; Maritime piracy,,,,,https://jbrmr.com/details&cid=23 http://www.ijmcs.co.uk/details&cid=23,http://dx.doi.org/10.24052/ijmcs/v01is02/art-2,,10.24052/ijmcs/v01is02/art-2,3105241370,,0,,0,false,, 119-124-789-716-583,Why were millions of people not obeying the law? Motivational influences on non-compliance with the law in the case of music piracy,,2011,journal article,"Psychology, Crime & Law",1068316x; 14772744,Informa UK Limited,United States,Twila Wingrove; Angela L. Korpas; Victoria Weisz,"Despite highly publicized efforts by the music industry to curb music piracy, millions of Americans continued to illegally download and share music. This study obtained college student responses to...",17,3,261,276,Psychology; Music industry; Law; Legislation; Music piracy; Download; Deterrence (psychology); Legal compliance; Non compliance; Criminology,,,,,https://cogentoa.tandfonline.com/doi/full/10.1080/10683160903179526 https://www.tandfonline.com/doi/abs/10.1080/10683160903179526 https://experts.nebraska.edu/en/publications/why-were-millions-of-people-not-obeying-the-law-motivational-infl https://nebraska.pure.elsevier.com/en/publications/why-were-millions-of-people-not-obeying-the-law-motivational-infl,http://dx.doi.org/10.1080/10683160903179526,,10.1080/10683160903179526,1989657406,,0,006-541-216-332-339; 009-299-623-546-736; 017-070-063-278-562; 021-497-683-814-239; 024-850-329-245-487; 028-873-129-324-161; 028-999-447-590-450; 037-221-667-735-34X; 044-557-610-853-006; 046-989-664-357-368; 054-042-814-528-459; 056-157-179-063-156; 058-806-863-894-52X; 077-912-678-481-051; 080-208-184-106-680; 091-957-015-709-218; 102-796-104-235-723; 118-354-305-653-457; 119-437-756-489-502; 122-285-331-503-303; 124-073-365-175-57X; 145-587-477-273-481; 146-116-469-575-960; 154-247-701-466-495,49,false,, 119-129-603-470-056,THE INTERNATIONAL LEGAL DEFINITION OF PIRACY AND ITS MOTIVES,2014-12-31,2014,journal article,Journal of Southeast Asian Studies,18234127,Univ. of Malaya,,Ahmad Almaududy Amri,Piratical acts have evolved from time to time. The motives and intention of the pirates varies ranging from petty theft to collecting ransoms. Some piracies are more dangerous than the others as the equipment used to conduct the act also differs from one act to another based on the seriousness of the case. Measures have been taken to eradicate the problem of piracy. One of the measures taken was to define the problem and criminalize the act. The definition of piracy has gone through different stages. The legal definition of piracy started from the Harvard Draft Convention on Piracy which was designed in 1930s. Then it was adopted by the International Law Commission which drafted the Convention on the High Seas. The latest work involving the definition by the United Nations was the UNCLOS where it defined piracy in Article 101. The purpose of this article is to understand the motives of piracy and to explain the different legal definitions of piracy that has been adopted by the international community today.,19,1,25,34,Work (electrical); Political science; United Nations Convention on the Law of the Sea; Law; Commission; Seriousness; International community; Convention on the High Seas; Legal definition; International law,,,,,https://juku.um.edu.my/index.php/jati/article/view/5579 https://mojem.um.edu.my/index.php/jati/article/view/5579 https://jice.um.edu.my/index.php/jati/article/view/5579 https://vmis.um.edu.my/index.php/jati/article/view/5579 https://jupidi.um.edu.my/index.php/jati/article/view/5579 http://jati.um.edu.my/index.php/jati/article/view/5579 http://jati.um.edu.my/index.php/jati/article/download/5579/3331 https://ijie.um.edu.my/index.php/jati/article/view/5579 https://borneojournal.um.edu.my/index.php/jati/article/view/5579 https://ijie.um.edu.my/index.php/jati/article/download/5579/3331,http://dx.doi.org/10.22452/jati.vol19no1.2,,10.22452/jati.vol19no1.2,2343007237,,0,040-814-353-181-980; 072-004-940-958-842; 083-783-525-257-592; 083-849-148-083-011; 106-006-292-853-815; 124-934-280-752-974; 132-448-358-300-756; 159-090-497-353-352; 185-179-737-287-387; 198-160-988-578-332,0,true,cc-by,gold 119-314-111-807-77X,Operational Responses to Piracy -- A First Principles Approach,,2014,journal article,Case Western Reserve Journal of International Law,00087254,,,Mark Sloan,,46,1,375,,Political science; United Nations Convention on the Law of the Sea; Law; Maritime piracy; Law of the sea,,,,,https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1042&context=jil https://scholarlycommons.law.case.edu/jil/vol46/iss1/17/,https://scholarlycommons.law.case.edu/jil/vol46/iss1/17/,,,1835020241,,0,,0,false,, 119-806-295-181-310,Regional dimensions of somali piracy and militant islamism: Anthropological and econometric evidence,2013-01-01,2013,journal article,"Peace Economics, Peace Science and Public Policy",15548597; 10792457,Walter de Gruyter GmbH,Germany,Currun Singh; Arjun S. Bedi,"This paper argues for a sub-regional approach to Somali piracy and militant Islamism, departing from prevailing state-centric mindsets and practices. The first section presents an anthropology that explains why piracy and Islamism emerged where they did when they did. It elaborates the geographically distinct cultures of law and livelihood that enabled each phenomenon to emerge only in particular sub-regions. Drawing on diverse factors including xeer (clan-based law), sharia (Islamic law), and practices of nomadic pastoralism (e.g., livestock raiding), the paper proposes a regional lens for the analysis of Somali crime and governance. The next section takes up this regional lens and specifies a statistical model for the incidence of piracy by sub-state region from 1993 to 2011, identifying the effect of Islamist rule on piracy. In all, the paper contends (a) that Somali political and criminal phenomena be disaggregated by region; and (b) that pirates and Islamists, contrary to mainstream discourse, are antagonists.",19,3,369,380,Political economy; Sociology; Sharia; Terrorism; Somali; Mainstream; Nomadic pastoralism; Militant; Development economics; Clan; Politics,,,,,https://repub.eur.nl/pub/60836 https://EconPapers.repec.org/RePEc:bpj:pepspp:v:19:y:2013:i:3:p:369-380:n:7 https://ideas.repec.org/a/bpj/pepspp/v19y2013i3p369-380n7.html,http://dx.doi.org/10.1515/peps-2013-0037,,10.1515/peps-2013-0037,1521713066,,0,012-703-976-561-544; 192-732-739-546-412,0,true,,green 120-214-317-513-889,Globalization and software piracy within and across 103 countries,2018-11-19,2018,journal article,"Crime, Law and Social Change",09254994; 15730751,Springer Science and Business Media LLC,Netherlands,Margaret Schmuhl; Chongmin Na,"Globalization has been linked with many social problems, though little research has examined its relationship with software piracy. The ramifications of software piracy may vary across countries leading to varied criminal justice responses. More developed countries, which produce the most software and stand to gain the most from its protection, use diplomatic leverage to strengthen piracy laws in less developed countries. Consequently, lesser-developed countries are forced to adopt rigorous policies for IP protection. As such, we hypothesize that globalization will decrease software piracy rates over time. Using a modified random effect model, the current study examines the within and between countries effects of globalization on software piracy rates over time in 103 countries across a period of 14 years. Results indicate that globalization is significantly associated with a decrease in software piracy within and between countries over time while controlling for important time-varying and time invariant predictors. Interaction effects suggest that the relationship between globalization and software piracy is less pronounced in Asian countries and more pronounced in Latin American countries. In sum, some crimes, like software piracy, may be deterred if there are strong enough incentives and international pressures to regulate such crime through legislative and policy reforms.",72,3,249,267,Criminal justice; Latin Americans; Globalization; Incentive; Development economics; Social issues; Leverage (finance); Legislature; Developing country,,,,,https://link.springer.com/article/10.1007/s10611-018-9805-8,http://dx.doi.org/10.1007/s10611-018-9805-8,,10.1007/s10611-018-9805-8,2900651547,,0,002-961-337-439-146; 005-848-590-256-030; 009-386-501-467-832; 011-970-832-954-189; 012-303-149-089-116; 012-558-297-950-849; 013-589-273-901-40X; 015-218-408-908-52X; 016-714-829-732-410; 019-311-756-455-91X; 023-083-516-260-606; 023-779-301-769-566; 024-941-424-034-032; 025-303-996-144-35X; 026-621-534-864-651; 026-755-467-053-093; 027-475-395-959-514; 029-180-615-119-336; 033-485-482-315-713; 034-486-829-428-727; 036-608-538-188-909; 039-883-767-744-759; 040-028-785-764-647; 041-893-696-570-720; 047-502-066-511-459; 049-098-013-059-500; 049-144-726-492-915; 053-088-654-972-792; 053-956-378-667-86X; 055-119-394-832-671; 055-897-923-463-084; 058-682-219-560-287; 060-787-361-268-933; 064-552-527-333-889; 065-464-957-757-100; 075-816-322-373-41X; 079-004-174-053-220; 084-827-816-328-459; 088-190-559-416-027; 097-637-794-608-082; 102-155-755-324-631; 103-047-934-034-494; 104-576-823-897-844; 105-596-757-141-356; 107-947-697-683-923; 111-538-496-609-353; 124-565-559-109-395; 124-655-841-474-707; 129-297-193-923-07X; 133-180-344-495-726; 141-997-096-450-524; 148-910-865-242-149; 150-372-244-980-17X; 152-181-748-409-517; 155-670-819-340-868; 156-249-677-674-21X; 159-698-127-423-70X; 164-108-841-714-094; 167-706-147-274-876; 167-728-186-463-845; 175-905-268-229-256; 177-478-714-335-235; 178-645-600-891-69X; 185-885-712-357-906; 188-418-414-891-55X; 189-350-593-744-480; 197-978-354-816-006,2,false,, 120-374-981-141-14X,Piracy and its burden on copyright in Nigeria: Challenges and solutions,2020-07-15,2020,journal article,The Journal of World Intellectual Property,14222213; 17471796,Wiley,United Kingdom,Omotayo F. Awomolo‐Enujiugha,,23,3,413,429,Business,,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=7550633 https://onlinelibrary.wiley.com/doi/abs/10.1111/jwip.12158,http://dx.doi.org/10.1111/jwip.12158,,10.1111/jwip.12158,3042628696,,0,008-789-758-984-851; 017-424-815-587-081; 018-829-577-918-317; 051-346-551-428-205; 091-852-672-389-217; 191-093-955-848-904,1,false,, 120-826-009-497-175,Policing Possession of Child Pornography Online: Investigating the Training and Resources Dedicated to the Investigation of Cyber Crime,2010-12-01,2010,journal article,International Journal of Police Science & Management,14613557; 14781603,SAGE Publications,,Catherine D. Marcum; George E. Higgins; Tina L. Freiburger; Melissa L. Ricketts,"The internet is not a single network, limited to; one specific type of information or restrictive of the types of users who can access its information.; Conversely, the internet is an intercontinental; information highway that has enabled people of; all ages to communicate with family and friends; with lightning-fast speed, share and collect; information, and connect with people and companies; thousands of miles from their computer; (Roberts, Foehr, Rideout, & Brodie, 1999;; Rosenbaum et al., 2000; Smith & Rupp,; 2002). However, this growth of information; technology has introduced a new form of criminality; to the criminal justice system: cyber crime; (Denning, 1998). The purpose of this research; study is to investigate the prevalence of cyber; criminality, specifically possession of child pornography,; in law enforcement jurisdictions and the; types of training which local and State law; enforcement agencies currently offer to effectively; combat these technological crimes.",12,4,516,525,Criminal justice; Internet privacy; Possession (law); The Internet; Information technology; Sociology; Child pornography; Enforcement; Law enforcement; Cyber crime; Criminology,,,,,http://journals.sagepub.com/doi/10.1350/ijps.2010.12.4.201 http://psm.sagepub.com/content/12/4/516.full.pdf http://journals.sagepub.com/doi/pdf/10.1350/ijps.2010.12.4.201 https://libres.uncg.edu/ir/unca/listing.aspx?id=9189 https://core.ac.uk/display/149240717 https://journals.sagepub.com/doi/abs/10.1350/ijps.2010.12.4.201 http://psm.sagepub.com/content/12/4/516.abstract http://libres.uncg.edu/ir/asu/f/Marcum_CD_2010_Policing_Possession.pdf https://core.ac.uk/download/149240717.pdf,http://dx.doi.org/10.1350/ijps.2010.12.4.201,,10.1350/ijps.2010.12.4.201,2075230345,,0,007-617-364-254-496; 031-165-391-298-051; 035-848-535-996-317; 051-737-246-582-191; 061-908-629-117-242; 087-863-311-455-505; 092-759-914-505-912; 092-945-483-843-213; 096-867-891-629-069; 100-226-723-443-17X; 119-531-502-608-218; 128-811-038-738-475; 150-043-594-348-126; 164-392-910-801-88X,33,true,,green 121-287-458-446-556,INTERNATIONAL LAW OF SEA PIRACY,2019-09-22,2019,journal article,International Journal of Law Reconstruction,25809245,Program Doktor Ilmu Hukum Unissula,,Muhammet Ebuzer Ersoy,"Sea piracy, or piracy, is robbery conducted in sea , or sometimes in beach . It could be said that history of piracy occurs simultaneously with history of navigation . Where there are ships transporting merchandise, appears pirates are ready to have it forcibly. It has been known since the time of the occurrence of piracy Greece ancient. Included in the era Roman republic experienced piracy by the sea robbers. Since then they plow all the ships that are currently floating in the ocean near Borneo and Sumatra . However, the best in its long history written on 16 th- 17 th century and it called as the golden age of pirates. But, the piracy not only in the past era, in the modern era as today, the piracy still exist as the criminal case in Somalia in 1990-2011, Philipine in 2016-2017, Dhobo accident in 2019 etc. The piracy is also can be called as Hostis Humani Generis it is mean the piracy is the enemy of all humans. The piracy ruled in UNCLOS articles 101-110 and in Indonesia is ruled in Criminal Law article 439-440. This article explains the international law of sea piracy, hostage release procedure and court procedure in International Criminal Court (ICC) and international punishment for pirate.",3,2,86,95,Political science; United Nations Convention on the Law of the Sea; Law; Criminal law; Punishment; Hostis humani generis; Accident (philosophy); Criminal court; Adversary; International law,,,,,http://jurnal.unissula.ac.id/index.php/lawreconstruction/article/view/7791 http://jurnal.unissula.ac.id/index.php/lawreconstruction/article/viewFile/7791/3574 https://core.ac.uk/download/287333013.pdf,http://dx.doi.org/10.26532/ijlr.v3i2.7791,,10.26532/ijlr.v3i2.7791,3000785089,,0,,0,true,cc-by,gold 121-337-255-786-721,The Dilemma of Piratical Ransoms: Should They be Paid or Not? On the Human Rights of Kidnapped Seamen and Their Families,,2013,journal article,The Barry Law Review,,,,Barry Dubner; Kimberly L. Chavers,"Are seamen worth as much as the cargo on a ship? By not paying ransom, will piracy cease to exist? In order to answer these questions the author discusses the scope of the piracy situation today and offers some solutions.He argues that in piracy situations, seafarers languish in miserable conditions while governments, insurance companies, and others decide whether or not to allow monies to flow through to pirates in order to pay off ransoms. As piracy off the coast of Somalia continues and seafarers languish in prisons in that country, the author argues that ransom monies should be paid.",18,2,4,,Human rights; Political science; Law and economics; Criminal law; Order (business); Dilemma; Scope (project management); Ransom; International law,,,,,https://lawpublications.barry.edu/facultyscholarship/154/ https://paperity.org/p/81604651/the-dilemma-of-piratical-ransoms-should-they-be-paid-or-not-on-the-human-rights-of https://lawpublications.barry.edu/cgi/viewcontent.cgi?article=1157&context=facultyscholarship,https://lawpublications.barry.edu/facultyscholarship/154/,,,3121450879,,0,,0,false,, 121-862-352-546-565,European Design Rights: A Model for the Protection of All Designers from Piracy,2011-02-17,2011,journal article,American Business Law Journal,00027766,Wiley,United Kingdom,Susanna Monseau,,48,1,27,76,Advertising; Political science,,,,,https://onlinelibrary.wiley.com/doi/full/10.1111/j.1744-1714.2010.01111.x https://onlinelibrary.wiley.com/doi/pdf/10.1111/j.1744-1714.2010.01111.x,http://dx.doi.org/10.1111/j.1744-1714.2010.01111.x,,10.1111/j.1744-1714.2010.01111.x,1485090971,,0,,14,true,,bronze 121-997-342-917-105,THE WELFARE COST OF LAWLESSNESS: EVIDENCE FROM SOMALI PIRACY,2014-10-31,2014,journal article,Journal of the European Economic Association,15424766; 15424774,Oxford University Press (OUP),United States,Timothy Besley; Thiemo Fetzer; Hannes Mueller,"In spite of general agreement that establishing the rule of law is central to properly functioning economies, little is known about the cost of law and order breakdowns. This paper studies a specific context of this by estimating the effect of Somali piracy attacks on shipping costs using data on shipping contracts in the dry bulk market. To estimate the effect of piracy, we look at shipping routes whose shortest path exposes them to piracy and find that the increase in attacks in 2008 led to around an 8% to 12% increase in costs. From this we calculate the welfare loss imposed by piracy. We estimate that generating around 120 USD million of revenue for Somali pirates led to a welfare loss in excess of 630 USD million, making piracy an expensive way of making transfers.",13,2,203,239,Public economics; Welfare; International trade; Economics; Deadweight loss; Order (exchange); Revenue; Somali; Rule of law; Context (language use); Lawlessness,,,,Ramon y Cajal Programme; Spanish Ministry of Economy and Competitiveness; Spanish Ministry of Science and Innovation,http://thred.devecon.org/papers/2012/2012-027_Besley_The_Welfare_Costs.pdf http://academic.oup.com/jeea/article-abstract/13/2/203/2319757 http://www.lse.ac.uk/economics/people/facultyPersonalPages/facultyFiles/TimBesley/TheWelfareCostofLawlessness.pdf http://eprints.lse.ac.uk/66041/ http://digital.csic.es/handle/10261/125513 https://econpapers.repec.org/article/blajeurec/v_3a13_3ay_3a2015_3ai_3a2_3ap_3a203-239.htm https://ideas.repec.org/a/bla/jeurec/v13y2015i2p203-239.html http://econ.lse.ac.uk/staff/tbesley/papers/BFMJuly2012.pdf https://academic.oup.com/jeea/article/13/2/203/2319757 https://www.onlinelibrary.wiley.com/doi/abs/10.1111/jeea.12114 http://www.trfetzer.com/wp-content/uploads/lawlessness.pdf https://econ.lse.ac.uk/staff/tbesley/papers/BFMJuly2012.pdf http://wrap.warwick.ac.uk/83245/,http://dx.doi.org/10.1111/jeea.12114,,10.1111/jeea.12114,1936101682,,0,001-008-158-248-798; 001-196-846-976-917; 001-303-790-776-801; 002-505-918-671-112; 004-789-845-882-145; 011-383-255-246-53X; 012-768-734-104-719; 019-492-614-324-004; 019-780-329-601-291; 027-575-075-514-805; 027-709-443-260-089; 027-963-719-607-674; 040-959-632-131-561; 041-528-508-470-576; 043-709-660-453-83X; 046-090-243-624-186; 046-185-611-659-078; 047-324-551-970-166; 047-375-540-017-898; 047-759-856-198-931; 047-905-530-827-761; 057-400-977-475-781; 057-804-566-665-311; 058-166-639-330-524; 065-396-198-364-16X; 066-146-815-728-657; 067-738-356-645-398; 068-519-901-718-510; 073-510-498-154-494; 077-323-789-013-992; 078-232-377-793-948; 091-697-140-316-685; 091-869-906-417-403; 099-383-823-372-757; 105-338-393-365-145; 113-181-117-052-537; 113-257-555-624-556; 113-589-375-707-427; 117-674-049-111-590; 120-489-511-046-762; 121-200-988-942-034; 122-740-834-718-041; 122-898-300-015-149; 130-810-290-011-582; 131-844-851-940-819; 132-979-312-793-260; 138-235-476-601-209; 147-700-084-147-155; 153-631-356-158-810; 165-550-805-369-017; 170-355-177-412-228; 183-228-921-021-20X; 195-069-031-319-59X; 197-333-159-131-468,48,true,,green 123-051-713-160-793,Effectiveness of the Current Regimes to Combat Piracy in the Gulf of Guinea: An Evaluation,2017-08-18,2017,journal article,African Journal of Legal Studies,22109730; 17087384,Brill,Netherlands,Daud Hassan; Sayed M. Hasan,"In recent years, piracy has emerged as a growing problem in the gulf of guinea region (the region). The gulf has, in the past years, witnessed a sharp rise in pirate attacks. The aim of this paper is to assess the application and shortcomings of the current arrangements in addressing the problem of piracy in the region. In doing so, the paper presents the possible means of combating piracy in the region and provides an analysis of counter-piracy responses that have been employed in the region. Analysis includes an evaluation of the steps taken by the governments of the region and the effectiveness of the implemented strategies to counter the threat posed by piracy in the region. Identifying the barriers and challenges to combat piracy, a comprehensive arrangement based effective cooperation is proposed in the paper.",10,1,35,65,International trade; Current (stream); Political science; Sharp rise; International law,,,,,https://brill.com/downloadpdf/journals/ajls/10/1/article-p35_2.pdf https://brill.com/view/journals/ajls/10/1/article-p35_2.xml?language=en,http://dx.doi.org/10.1163/17087384-12340014,,10.1163/17087384-12340014,2752474090,,0,,2,true,cc-by-nc,hybrid 123-516-880-194-453,"Hostis humani generis : piracy, terrorism and a new international law",,,journal article,University of Miami International and Comparative Law Review,,,,Douglas Richard Burgess,,13,2,293,,Political science; Law; Terrorism; Hostis humani generis; International law,,,,,https://repository.law.miami.edu/umiclr/vol13/iss2/2/ https://open.library.ubc.ca/handle/bitstream/52790/1/SAUP54.pdf https://commons.allard.ubc.ca/theses/245/ https://open.library.ubc.ca/cIRcle/collections/ubctheses/831/items/1.0077587 https://repository.law.miami.edu/cgi/viewcontent.cgi?article=1069&context=umiclr https://open.library.ubc.ca/media/download/pdf/831/1.0077587/1,http://dx.doi.org/10.14288/1.0077587,,10.14288/1.0077587,1800661964,,0,,12,false,, 123-538-500-409-553,Digital Piracy: An Examination of Three Measurements of Self-Control,2008-06-13,2008,journal article,Deviant Behavior,01639625; 15210456,Informa UK Limited,United Kingdom,George E. Higgins; Scott E. Wolfe; Catherine D. Marcum,"Research has shown a link between digital piracy and self-control. However, the research focuses on only one version of self-control theory. The purpose of the present study is to examine the link between self-control and digital piracy. Using data from 358 college students, this study shows that all 3 measures of self-control help us understand the link between self-control and digital piracy. The results indicate that illuminating the factors that could be inhibitions and developing strong social bonds can reduce the likelihood of digital piracy.",29,5,440,460,Engineering; Digital piracy; Self-control; Computer security,,,,,https://libres.uncg.edu/ir/uncg/listing.aspx?id=9162 https://www.tandfonline.com/doi/full/10.1080/01639620701598023 https://core.ac.uk/display/149240665 https://libres.uncg.edu/ir/asu/f/Marcum_CD_2008_Digital_Piracy.pdf https://core.ac.uk/download/149240665.pdf,http://dx.doi.org/10.1080/01639620701598023,,10.1080/01639620701598023,2115052812,,0,005-491-274-782-38X; 005-745-685-547-074; 006-317-517-652-647; 010-124-089-161-975; 011-970-832-954-189; 012-558-297-950-849; 014-082-506-216-299; 022-634-145-782-991; 026-283-018-089-565; 040-531-608-756-329; 041-756-193-271-330; 046-989-664-357-368; 054-009-033-869-379; 055-277-965-963-485; 066-124-129-788-062; 067-339-005-241-596; 072-084-774-976-983; 096-401-039-718-213; 098-570-250-639-553; 116-760-844-878-63X; 126-772-810-967-037; 132-074-983-506-465; 175-905-268-229-256; 175-940-530-591-247,138,true,,green 123-665-206-010-658,Defining Fashion: Interpreting the Scope of the Design Piracy Prohibition Act,,2008,journal article,Brooklyn law review,00072362,,,Elizabeth F. Johnson,,73,2,6,,Business; Law; Scope (project management),,,,,http://brooklynworks.brooklaw.edu/blr/vol73/iss2/6/ https://brooklynworks.brooklaw.edu/cgi/viewcontent.cgi?article=1329&context=blr https://paperity.org/p/83511025/defining-fashion-interpreting-the-scope-of-the-design-piracy-prohibition-act,http://brooklynworks.brooklaw.edu/blr/vol73/iss2/6/,,,2428274016,,0,,1,false,, 123-776-458-206-261,Prosecution of maritime piracy cases in Kenya: testing the SUA Convention model on piracy prosecution,2014-01-01,2014,journal article,Acta Criminologica: Southern African Journal of Criminology,10128093,,,Paul Musili Wambua,"Since 2008 Kenya has distinguished itself in the global war against piracy by undertaking prosecutions in the national courts of suspected pirates, arrested on the High Seas and handed over by navies of leading maritime nations under bilateral agreements (MOUs) between Kenya and these leading maritime nations. As of June 2013 Kenya had 64 piracy suspects on remand, 74 convicted pirates, 17 acquitted and returned to Somalia and 10 completed their sentences and repatriated to Somalia. To achieve this, Kenya had to effect far reaching changes in the law. In the initial stages, suspected pirates were charged under section 69 of the Penal Code (Cap 63 Laws of Kenya). In September 2009 Kenya passed a new law (the Merchant Shipping Act 2009), which not only defined more comprehensively and extensively the offence of piracy, but also extended the jurisdiction of Kenyan courts to try piracy committed by non-nationals. Though the law gives Kenya a very broad jurisdiction to try suspected pirates, the process is still fraught with challenges, due to lack of financial and human resources. Kenya's new law domesticates the model spelt out in the Convention on the Suppression of Unlawful Acts against the Safety of Maritime Navigation (the SUA Convention) which calls on member states to criminalise, in their national legislation, the maritime offences listed in Article 3. The article discusses Kenya's new model legislation and the emergent Kenyan jurisprudence and argues that while the model faces challenges in its application by the domestic courts, it should be replicated by all state parties to the United Nations Convention on the Law of the Sea (the UNCLOS) and member states of the International Maritime Organization (IMO). The model law not only grants extra-territorial jurisdiction to national courts, but also domesticates comprehensively the relevant key provisions in the fight against piracy found in the UNCLOS, the SUA Convention, the Convention on the Safety of Life at sea (the SOLAS Convention,) the Djibouti Code of Conduct and the International Ship and Port Security Code (the ISPS Code).",2014,,76,91,Engineering; International waters; United Nations Convention on the Law of the Sea; Kenya; Law; SOLAS Convention; Jurisdiction; Convention; Freedom of navigation; Law of the sea,,,,,http://erepository.uonbi.ac.ke/handle/11295/81073,http://erepository.uonbi.ac.ke/handle/11295/81073,,,1819499659,,0,,0,false,, 123-928-275-349-649,"Enter the Dragon: China's WTO Accession, Film Piracy and Prospects for the Enforcement of Copyright Laws",,2002,journal article,UCLA Entertainment Law Review,19395523; 10732896,California Digital Library (CDL),,Brent T. Yonehara,,9,2,,,Political science; China; Law; Accession; Enforcement,,,,,https://escholarship.org/uc/item/1wd518rq.pdf https://escholarship.org/uc/item/1wd518rq,http://dx.doi.org/10.5070/lr892027038,,10.5070/lr892027038,2765302568,,0,,2,true,,green 124-352-108-007-294,Universal Jurisdiction over Piracy and East Asian Practice,2012-11-15,2012,journal article,Chinese Journal of International Law,15401650; 17469937,Oxford University Press (OUP),United States,Yao Huang,"In recent years, the UN Security Council and General Assembly resolutions on piracy repeatedly reiterated the use of universal jurisdiction to combat piracy. This article expounds the conceptual and application limitations of universal jurisdiction over piracy, and, from the three dimensions of universal jurisdiction (prescription, enforcement and adjudication), examines the relevant practice in East Asia. The author finds that universal jurisdiction is an indispensable tool in deterring, preventing and responding to pirate attacks, and that the implementation of universal jurisdiction in East Asia should be strengthened in the future by, among others, reforming domestic law to criminalize piracy and establish universal jurisdiction and by enhancing co-operation in prosecuting pirates, as well as by further advancing comprehensive and in-depth co-operation in law enforcement. 1. Piracy is a substantial problem in East Asia. Over the last five years, piracy in this region has been on the rise. The table at the end of this article reflects the number of acts of piracy and armed robbery committed against ships, as reported between 2007 and 2011 in East Asia and around the globe. Piracy attacks and armed robberies against ships have been a serious problem in East Asia.",11,4,623,655,Political science; Law; Adjudication; Globe; Universal jurisdiction; General assembly; Enforcement; Law enforcement; East Asia; Municipal law,,,,,http://chinesejil.oxfordjournals.org/content/11/4/623.short https://academic.oup.com/chinesejil/article-abstract/11/4/623/464866,http://dx.doi.org/10.1093/chinesejil/jms051,,10.1093/chinesejil/jms051,2329901375,,0,,2,false,, 124-870-953-344-239,"Southeast Asia's maritime piracy: Challenges, legal instruments and a way forward",2014-06-18,2014,journal article,Australian Journal of Maritime & Ocean Affairs,18366503; 23336498,Informa UK Limited,,Ahmad Almaududy Amri,"Piracy is considered a critical maritime security threat in Southeast Asia. Whilst piracy has always been a perennial problem in the region, this threat has received increasing attention over the past few years. Reports published by the International Maritime Organization as well as the International Maritime Bureau show an alarming increase in acts of piracy on Southeast Asian waters over the past decade. In ancient times, the main drivers of piracy were raiding for plunder and capture of slaves; however, in modern times, developments in politics, economics and even military technology have drastically altered the universal crime of piracy. There are a variety of motives behind modern day piracy including economic gains from receiving ransoms from governments or shipping companies, political and even terrorist reasons. However, it cannot be denied that piratical attacks persist and continue. Efforts are being taken by States at the international as well as regional level to combat piracy. At the internat...",6,3,154,169,Economy; Political science; Terrorism; Maritime security; Maritime piracy; Southeast asia; Southeast asian; Military technology; Politics,,,,,https://www.tandfonline.com/doi/abs/10.1080/18366503.2014.915492 https://ro.uow.edu.au/lhapapers/1657/ https://ro.uow.edu.au/cgi/viewcontent.cgi?article=2662&context=lhapapers,http://dx.doi.org/10.1080/18366503.2014.915492,,10.1080/18366503.2014.915492,2076915924,,0,040-814-353-181-980; 072-004-940-958-842; 080-512-295-402-059; 083-849-148-083-011; 106-006-292-853-815; 111-464-013-036-10X; 141-998-274-140-989; 155-546-090-672-412; 156-338-217-544-259; 198-160-988-578-332,1,true,,green 125-543-273-899-132,The ASEAN Way towards Piracy Challenge,2012-04-30,2012,journal article,Indonesian Journal of International Law,23565527,Indonesian Journal of International Law,,Ikaningtyas and Patricia Audrey Ruslijan,"Piracy is a universal crime that needs to be combated by all nations. International efforts have been done for many years in order to suppress growth of piracy for international maritime security, which resulted in provisions concerning piracy within United Nations Convention on the Law of the Sea. It refers piracy as a crime taking place on high seas. In addition, International Maritime Organization also attempts to widen the definition of piracy. Even so, tackling piracy requires more than just a commitment of international community to define the term. Efforts; must also be conducted by regional community to make them more effective, especially with their national legal instrument. Association of Southeast Asian Nations (ASEAN) as the regional organization in Southeast Asia region has sought to better cooperation among the members bringing the six behavioral principles laid in Treaty of Amity and Cooperation 1976 and also ASEAN Charter 2007 for the purpose of eliminating piracy within their region. Unfortunately, piracy is manifestly; not easy to be eradicated in reality. This paper tries to identify and analyze the challenges that underlie ASEAN efforts to solve the piracy problem within the region",9,3,66932,,International trade; International waters; Political science; United Nations Convention on the Law of the Sea; Legal instrument; Maritime security; Treaty; International community; Regional organization; Southeast asian,,,,,http://ijil.ui.ac.id/index.php/home/article/download/355/pdf_239 https://scholarhub.ui.ac.id/cgi/viewcontent.cgi?article=1281&context=ijil https://scholarhub.ui.ac.id/ijil/vol9/iss3/5/ http://lib.law.ugm.ac.id/ojs/index.php/jhi/article/view/3904 http://ijil.ui.ac.id/index.php/home/article/view/355 https://www.neliti.com/publications/66932/the-asean-way-towards-piracy-challenge,http://dx.doi.org/10.17304/ijil.vol9.3.355,,10.17304/ijil.vol9.3.355,1522668409,,0,,0,true,cc-by,gold 125-568-649-652-99X,The Case of The SARAH: A Testing Ground for the Regulation of Radio Piracy in the United States,,1988,journal article,Fordham International Law Journal,07479395,,,Howard A. Bender,,12,1,67,,Political science; Law,,,,,https://ir.lawnet.fordham.edu/ilj/vol12/iss1/4/ https://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=1205&context=ilj,https://ir.lawnet.fordham.edu/ilj/vol12/iss1/4/,,,1536442976,,0,,2,false,, 126-538-640-824-23X,Europe has biggest piracy losses,,1994,journal article,Computer Fraud & Security Bulletin,01420496,Mark Allen Group,United Kingdom,Silvano Ongetta,,1994,8,2,,,,,,,http://www.sciencedirect.com/science/article/pii/S0142049608800021 http://linkinghub.elsevier.com/retrieve/pii/S0142049608800021 https://api.elsevier.com/content/article/PII:S0142049608800021?httpAccept=text/xml,http://dx.doi.org/10.1016/s0142-0496(08)80002-1,,10.1016/s0142-0496(08)80002-1,2059702198,,0,,0,false,, 126-923-340-113-808,Microsoft fights software piracy,,1994,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1994,4,1,2,Computer science; Software; Computer security; Operating system; Business,,,,,,http://dx.doi.org/10.1016/0142-0496(94)90201-1,,10.1016/0142-0496(94)90201-1,,,0,,0,false,, 126-944-870-283-321,Sonopress and Ç-Dilla cooperate to fight piracy,,1998,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,1998,8,3,3,Computer security; Business; Communication; Computer science; Internet privacy; Psychology,,,,,,http://dx.doi.org/10.1016/s1361-3723(98)90169-5,,10.1016/s1361-3723(98)90169-5,,,0,,0,false,, 127-034-682-778-830,United States Participation in International Efforts to Combat Piracy,,2009,journal article,American Journal of International Law,00029300,,,John R. Crook,,103,4,750,755,,,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=3139798,https://dialnet.unirioja.es/servlet/articulo?codigo=3139798,,,994440721,,0,,1,false,, 127-137-776-547-04X,"Price Discrimination, Personal Use and Piracy: Copyright Protection of Digital Works",,1997,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Michael Meurer,"The growth of digital information transmission worries copyright holders who fear the new technology threatens their profits because of greater piracy and widespread sharing of digital works. They have responded with proposals for expanded protection of digital works. Specifically, they seek restrictions on personal use rights regarding digital works provided by the fair use and first sale doctrines. The proposed changes in the allocation of property rights to digital information significantly affect the ability of copyright holders to practice price discrimination. Broader user rights make discrimination more difficult; broader producer rights make discrimination easier. I argue that more price discrimination not less piracy or sharing would be the really significant effect of the proposed changes. The problem of digital piracy can probably be handled by technical means with modest changes in copyright law. The so-called problem of sharing is not really much of a problem except for price discriminators. On the other hand, copyright expansion could significantly expand opportunities for price discrimination. Curtailing personal use rights would make it easier for a price discriminator to measure buyer valuations and stop buyers from arbitraging away price differences.",,,,,Price discrimination; Advertising; Economics; Law and economics; Fair use; Information transmission; Digital piracy; Copyright law; Property rights,,,,,https://papers.ssrn.com/sol3/Delivery.cfm/9712181.pdf?abstractid=49097&mirid=1 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=49097,http://dx.doi.org/10.2139/ssrn.49097,,10.2139/ssrn.49097,144704147,,0,004-242-753-141-797; 020-446-665-975-948; 031-234-952-561-355; 053-293-520-749-66X; 053-615-595-463-630; 198-503-424-813-722,24,true,cc0,green 127-853-008-284-993,The Marshall Court and International Law: The Piracy Cases,,1989,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),United States,G. Edward White,"One of the features of the Marshall Court’s business that emphasizes the contrast between that Court and its modern counterpart is the attention given to piracy cases. Piracy, defined as the unauthorized deprivation of property on the high seas, has disappeared from the present Court’s docket, and virtually disappeared as a crime; but from 1815 to 1823, piracy cases were among the most numerous and controversial of those decided by the Court.",83,4,727,735,Court of equity; Precedent; Political science; Public international law; Law; Marshall Court; International law,,,,,https://www.law.virginia.edu/scholarship/publication/g-edward-white/813686,http://dx.doi.org/10.2307/2203360,,10.2307/2203360,2315052841,,0,,24,false,, 127-895-266-282-275,Plagiat dan Pembajakan sebagai Pelanggaran Hukum Hak Cipta,2006-01-31,2006,journal article,Indonesian Journal of International Law,23565527,Indonesian Journal of International Law,,Eddy Damian,"For the last two decades, Indonesia has been participating in several international conventions, in the field of intellectual property protection. Two of the intellectual property infringements are plagiarism and piracy of protected works. A person doing an act of offering or presenting as one€™s own the work of another, wholly or partly, in a more or less altered form or context is called plagiarsm. Plagiarism is an infringement in the case of works protected by copyright law. Plagiarism is not the only infringement of copyright law, as piracy in the fields of copyright and neighboring rights, but also considered as unlawful and against the law of copyright.",3,2,39112,,Work (electrical); Political science; Law and economics; Context (language use); Field (Bourdieu); Copyright law; Intellectual property,,,,,https://www.neliti.com/id/publications/39112/plagiat-dan-pembajakan-sebagai-pelanggaran-hukum-hak-cipta https://scholarhub.ui.ac.id/cgi/viewcontent.cgi?article=1499&context=ijil https://scholarhub.ui.ac.id/ijil/vol3/iss2/4/,http://dx.doi.org/10.17304/ijil.vol3.2.397,,10.17304/ijil.vol3.2.397,1799751405,,0,,0,true,cc-by,gold 127-984-094-480-05X,Comparative Analysis of the Protection to Foreign Movie Works Copyright,,2012,journal article,Journal of Heilongjiang Administrative Cadre College of Politics and Law,,,,Qian Qin,"The movie industry is an important component of economy in the world.In the United States and the European Union countries,the film works copyright protection has been formed a unique and perfect law system and management system,although there are some parallels,but also have their own characteristics.Especially for film piracy behavior,most of the countries have joined the international convention to confront the piracy problem,which is also showing their own characteristics in its protective model.",,,,,International trade; Political science; Management system; Law; Parallels; Convention; European union; Component (UML); Film industry,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-LGLX201205022.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-LGLX201205022.htm,,,2378646557,,0,,0,false,, 128-161-682-314-006,Commitment to combating software piracy drops 10%,,2000,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,2000,7,1,2,Software; Computer security; Computer science; Business; Operating system,,,,,,http://dx.doi.org/10.1016/s1361-3723(00)07001-9,,10.1016/s1361-3723(00)07001-9,,,0,,0,false,, 128-245-755-950-846,Report on the Protection Afforded Computer Software in the Face of Computer Software Piracy.,,1996,journal article,"Journal of Information, Law and Technology",13614169,,,Philip A. Redding,,1996,,,,Face (sociological concept); Computer software; Computer security; Computer science,,,,,https://dblp.uni-trier.de/db/journals/jilt/jilt1996.html#Redding96,https://dblp.uni-trier.de/db/journals/jilt/jilt1996.html#Redding96,,,99884669,,0,,1,false,, 128-404-354-456-420,Internet Piracy of Sports Broadcasts: Finding the Solution in the United Kingdom and the United States,2015-07-23,2015,journal article,Marquette Sports Law Review,15336484,,,Antwayne Robertson,,25,2,469,,Internet privacy; The Internet; Advertising; Kingdom; Business,,,,,https://paperity.org/p/83286705/internet-piracy-of-sports-broadcasts-finding-the-solution-in-the-united-kingdom-and-the http://scholarship.law.marquette.edu/cgi/viewcontent.cgi?article=1647&context=sportslaw https://scholarship.law.marquette.edu/cgi/viewcontent.cgi?article=1647&context=sportslaw,https://paperity.org/p/83286705/internet-piracy-of-sports-broadcasts-finding-the-solution-in-the-united-kingdom-and-the,,,1028551986,,0,,2,false,, 129-083-323-591-242,Comparisons of the Awareness of Domestic and Foreign Users for Illegal Downloading of Movie Content,,2012,journal article,Journal of Digital Convergence,17381916,,,Hae-kyung Rhee; Hee Wan Kim,"The MPAA(Motion Picture Association of America) warned about serious problems of piracy due to nearly a quarter of all Internet traffic around the globe was related to Internet piracy. Thus, strong legal action is enforced for piracy over nationally through strengthen the copyright law. We in this paper conducted a survey to see whether netizens prefer to download just for the matter of their convenience. Our study becomes a motivation to consider about seriousness of piracy by comparing between Korea and foreign cases. To our surprise, the survey reveals that Korean netizens conspicuously aware of their downloading behaviors outpaces Canadian netizens. Canada lacks the basic protections for the digital environment and is a safe haven for Internet pirates.",10,9,297,309,Internet privacy; The Internet; Advertising; Engineering; Quarter (United States coin); Globe; Seriousness; Download; Surprise; Internet traffic; Upload,,,,,https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001711174 http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=DJTJBT_2012_v10n9_297,http://www.koreascience.or.kr/article/ArticleFullRecord.jsp?cn=DJTJBT_2012_v10n9_297,,,2391785950,,0,,0,false,, 129-086-148-209-74X,Book Review of Crime Online1,,2008,journal article,International Journal of Cyber Criminology,09742891,,,Travis Morris,"Book Review of Crime Online1 Yvonne Jewkes (Ed.,), Crime Online Portland, Oregon: Willan Publishing, 2007. ISBN: 978-1-84392-197-4Yvonne Jewkes', Crime Online, attempts to increase understanding of the nature of ""cyber crime"" and to elevate study of relevant phenomena to a position of prominence within the field of criminology. Deviating from Jewkes' earlier focus on gender, sexuality, and sexual deviance (Jewkes, 2003), Crime Online offers a mixed bag of chapters addressing specific topical areas related to cyber crime, including on-line victimization, the social construction and policy implications of Internet crime, the dichotomous nature of cyberspace, the impenetrable anonymity and pseudonymity of the virtual universe, and the challenges of regulation and control. Although at first glance the chapters of the book appear to be somewhat discontinuous, they are in the end held together by recognition of the sheer diversity of activities encompassed within the term ""cyber crime"" and by the editor's intent to appeal to a general audience. The presentation is aimed explicitly at providing readers with a broad and introductory overview of the emerging field rather than with technical and specialized treatises of greater interest and relevance to those with a high level of expertise.The term ""cyber crime"" generally denotes the use of a computer to engage in illegal activity. When committed online, crimes such as theft, vandalism, fraud, extortion, forgery, harassment and stalking extend beyond the usual confines of physical and social space. In the absence of ordinary constraints, the negative impact of cyber crime and those who perpetrate them may well surpass that of their ""real world"" counterparts. On-line predators, for example, potentially can commit hundreds of crimes against numerous victims quickly, anonymously, and with relative ease. Their risk of detection and punishment also tends to be quite low. As Brenner (Chapter 2) and Moore (Chapter 6) note, law enforcement efforts to control various forms of cyber crime often have been stymied by legislative and definitional confusion, jurisdictional issues, inadequate computer forensics and law enforcement integration, and problems associated with the admissibility of computer forensic evidence in court.With cyber terrorism,"" ""cyber stalking,"" and some of the other emergent forms of crimes discussed by the authors of the book transcending both cyberspace and the ""terra firma"" universe, the distinction traditionally drawn between virtual crime and real crime no longer seems tenable. Jewkes' chapter, for example, brings to light the Internet's role in cases of suicide, governmental imprisonment, and manslaughter. Individual chapters by Yar, Fafiinski, Wykes, and Cere tackle the social construction of ""new"" crimes via the Internet through analysis of topics as diverse and ""real"" as hooliganism, piracy, moral panics, and the orchestration of individual and group violence. …",2,1,320,,Sociology; Moral panic; Relevance (law); Anonymity; Law; Terrorism; Cultural criminology; Extortion; Law enforcement; Cyberspace,,,,,,,,,2753816830,,0,103-370-411-539-813,0,true,cc-by-nc-sa,gold 129-329-389-353-631,The European Security Continuum and the EU as an International Security Provider,2015-03-09,2015,journal article,Global Society,13600826; 1469798x,Informa UK Limited,United Kingdom,Alistair J.K. Shepherd,"The European Union has long been seen as a distinctive or sui generis actor in international politics, epitomised by the notions of civilian or normative power, or more recently by the “Comprehensive Approach”. However, these conceptualisations of the EU as a distinctive international security provider are being challenged by the blurring of the traditional internal-external security divide. The threats and challenges identified in the various EU security strategies increasingly transcend geographic and bureaucratic boundaries, creating a European security continuum, which complicates the conceptualisation and operationalisation of the EU as a security provider. Significant friction continues to exist in the formulation and implementation of security policy as EU institutions and capabilities struggle to overcome the traditional architecture separating internal and external security. In parallel, the cross-fertilisation of internal and external security norms and practices undermines understandings of the...",29,2,156,174,Political economy; Sociology; Security policy; Corporate security; Law; European union; International relations; Critical security studies; International security; Bureaucracy; Security studies,,,,,https://pure.aber.ac.uk/portal/files/5735871/Shepherd_Security_Continuum_EU_as_Security_Provider_Global_Society_Final.pdf https://www.tandfonline.com/doi/citedby/10.1080/13600826.2015.1018146 https://pure.aber.ac.uk/portal/en/publications/the-european-security-continuum-and-the-eu-as-an-international-security-provider(44bc6287-302f-4472-8c0f-23a467bf7c64).html https://www.tandfonline.com/doi/full/10.1080/13600826.2015.1018146 https://core.ac.uk/download/pdf/326666201.pdf,http://dx.doi.org/10.1080/13600826.2015.1018146,,10.1080/13600826.2015.1018146,2017833782,,0,,6,true,,green 129-533-927-119-550,Professional and trade associations in a nascent and formative sector of a developing economy: A case study of the NASSCOM effect on the Indian offshoring industry,,2009,journal article,Journal of International Management,10754253,Elsevier BV,Netherlands,Nir Kshetri; Nikhilesh Dholakia,"As important sources that shape institutional structures in an economy, professional and trade associations play significant roles in bringing and legitimating institutional changes. This paper examines the roles of professional and trade associations' impacts on institutions associated with a nascent and formative sector of a developing economy. In empirical terms, the paper offers an in-depth case study of India's National Association of Software and Services Companies (NASSCOM) on institutional changes related to the offshoring industry. The NASSCOM case shows that under appropriate conditions, professional and trade associations represent an alternative to the state in shaping the industry landscape.",15,2,225,239,Business; Economic geography; State (polity); Institutional structure; Offshoring; Formative assessment; Economic growth; Developing country,,,,,https://libres.uncg.edu/ir/uncg/listing.aspx?id=7314 https://core.ac.uk/display/56700576 https://www.researchgate.net/profile/Nir_Kshetri/publication/222549591_Professional_and_trade_associations_in_a_nascent_and_formative_sector_of_a_developing_economy_A_case_study_of_the_NASSCOM_effect_on_the_Indian_offshoring_industry/links/09e41510a5f12af3b5000000.pdf?disableCoverPage=true https://works.bepress.com/nikhilesh_dholakia/17/download/ https://works.bepress.com/nikhilesh_dholakia/17/ https://digitalcommons.uri.edu/cgi/viewcontent.cgi?article=1008&context=cba_facpubs http://digitalcommons.uri.edu/cba_facpubs/9/ https://ideas.repec.org/a/eee/intman/v15y2009i2p225-239.html https://www.sciencedirect.com/science/article/abs/pii/S107542530900026X https://core.ac.uk/download/56700576.pdf,http://dx.doi.org/10.1016/j.intman.2008.09.003,,10.1016/j.intman.2008.09.003,2079858418,,0,000-507-359-081-111; 002-342-495-551-237; 003-913-373-315-060; 004-508-276-155-007; 007-145-588-896-153; 007-992-334-266-167; 008-938-082-590-110; 009-785-022-903-375; 010-772-724-854-689; 011-199-394-462-531; 011-576-458-909-314; 012-383-929-560-063; 013-339-160-983-128; 014-909-456-356-076; 015-047-857-866-19X; 016-323-277-794-200; 017-993-173-427-042; 020-307-437-093-353; 022-512-643-506-628; 022-774-738-500-720; 023-109-128-514-873; 023-575-433-788-940; 025-910-771-778-305; 027-172-905-389-489; 027-649-850-533-070; 027-827-119-143-849; 028-070-754-536-777; 029-165-881-721-658; 033-852-662-613-736; 033-963-150-231-373; 034-093-799-294-766; 034-674-667-986-678; 034-822-658-588-530; 035-708-589-006-492; 036-159-702-886-637; 036-741-769-184-422; 036-786-852-198-445; 038-498-522-091-617; 039-030-569-444-398; 039-361-492-832-443; 039-628-517-180-032; 044-620-020-424-665; 044-789-458-554-636; 045-391-548-174-30X; 045-683-602-068-343; 047-077-329-783-399; 048-567-735-560-332; 049-219-615-824-319; 053-160-409-871-772; 053-853-705-457-869; 054-921-652-475-593; 055-418-037-301-848; 055-498-815-134-39X; 057-973-712-127-747; 058-262-300-546-123; 059-291-789-600-381; 060-500-752-419-718; 062-922-156-288-97X; 063-902-776-591-679; 066-189-128-236-626; 066-717-797-848-298; 066-785-639-302-016; 067-903-187-540-806; 069-051-050-641-003; 070-134-652-827-517; 070-562-568-622-405; 071-590-693-645-651; 072-919-620-823-987; 075-500-382-830-853; 077-543-037-491-945; 077-822-334-416-396; 079-606-359-143-79X; 083-158-282-679-163; 083-590-458-238-816; 084-335-226-191-017; 085-075-900-858-855; 090-738-182-988-49X; 090-862-177-214-754; 091-018-477-137-191; 091-207-778-514-854; 094-415-583-386-309; 095-545-409-473-011; 101-695-601-031-044; 104-210-437-504-380; 104-810-215-995-777; 106-186-618-439-464; 106-926-824-598-432; 109-554-935-361-651; 115-482-499-323-938; 117-187-711-028-09X; 117-295-565-102-383; 119-216-171-936-259; 127-650-863-825-164; 130-634-263-660-413; 131-005-597-897-618; 131-739-267-987-509; 133-723-604-243-217; 134-919-042-171-952; 137-146-025-648-445; 138-849-874-069-592; 140-152-638-698-68X; 140-835-992-634-518; 145-198-055-760-213; 160-223-758-897-676; 161-285-460-916-23X; 164-877-006-742-549; 171-468-421-790-608; 172-999-637-082-271; 188-352-746-757-382; 192-714-719-252-987,58,true,cc0,green 129-667-345-298-37X,Prevention of Piracy and Criminal Law,,2010,journal article,Journal of Criminal Law,15980979,The Korean Criminal Law Association,,Sukyoon Choi,,22,4,211,230,Political science; Law; Criminal law; Criminology,,,,,https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001509434,http://dx.doi.org/10.21795/kcla.2010.22.4.211,,10.21795/kcla.2010.22.4.211,2564877055,,0,,0,true,cc-by-nc,hybrid 129-676-772-827-445,Copyright piracy trade war averted,,1995,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1995,4,4,4,International trade; Business; Computer security; Law and economics; Economics; Computer science,,,,,,http://dx.doi.org/10.1016/0142-0496(95)80141-3,,10.1016/0142-0496(95)80141-3,,,0,,0,false,, 129-991-433-699-952,Combatting Piracy and Armed Robbery Against Ships in Southeast Asia: The Way Forward,,2002,journal article,Ocean Development & International Law,00908320; 15210642,Informa UK Limited,United Kingdom,Robert Beckman,"According to the Annual Reports of the International Maritime Bureau on Piracy and Armed Robbery Against Ships for calendar years 1998, 1999, and 2000, there has been a dramatic increase in the number of reported incidents of piracy and armed robbery against ships in waters in Southeast Asia, especially in the Malacca Strait and in Indonesian waters. Very few of the incidents in Southeast Asia are ""piracy"" as defined in international law because they took place in waters under the sovereignty of a coastal state. Nevertheless, many of the incidents posed serious threats to the safety of international maritime navigation. Some were offences under the 1988 Convention for the Suppression of Acts Against the Safety of International Maritime Navigation. Some were also major criminal hijacks involving international organized crime. There has been considerable action at both the global and regional levels to attempt to deal with this threat to the safety of international navigation. This article analyzes the repo...",33,3-4,317,341,International trade; Political science; Sovereignty; Law; Organised crime; State (polity); Indonesian; Convention; Maritime navigation; Southeast asia; International law,,,,,https://www.tandfonline.com/doi/abs/10.1080/00908320290054800,http://dx.doi.org/10.1080/00908320290054800,,10.1080/00908320290054800,2009987699,,0,063-876-972-277-55X,36,false,, 130-225-430-617-686,"Confusing The Captain With The Cabin Boy: The Dangers Posed To Reform Of Cyber Piracy Regulation By The Misrepresented Interface Between Society, Policy Makers & The Entertainment Industries",2009-06-29,2009,journal article,Journal of International Commercial Law and Technology,19018401,,,Michael Filby,"Although commentaries regarding intellectual property regulation frequently point out the complexities inherent in its subsistence and reform, the subject is still often discussed in overly simplistic terms of black and white. This paper examines the problems such a view poses, and questions whether a blanket of misunderstanding, or even misdirection, has been used to influence the progression of the regulation in the digital age. The primary hypothesis is that public perception of the law relating to cyber piracy is out of step with the contemporary de facto legal position. The definition of cyber piracy is summarised, and the issues relating to confusion surrounding the boundaries or simply considering the myriad categories of piracy as a single topic are discussed. The current law as per the Copyright, Designs and Patents Act 1988 as amended is also outlined for the purpose of evaluating the hypothesis, and the border of cyber piracy in relation to the entertainment industries (concerning film, television and software) is set for the rationale of the analysis. Further exploration takes place through two case studies which concentrate on DVD piracy. The first regards a marketing campaign which has been mounted by the entertainment industries purporting to, inter alia, raise consumer awareness of cyber piracy law in order to adjust public attitude to the practice toward the negative, and to lobby for tougher IP regulation. It is argued that the campaign falls foul of the dangers of failing to fully identify piracy, and fails to communicate an accurate interpretation of the legal position to the intended audience. The second case study examines an editorial concerning film piracy in an influential consumer movie magazine. It is submitted that the summation of piracy law and representation of the regulation in general is heavily flawed, and it is questioned whether the bias behind this journalistic failure could be as a result of the influence of lobbies such as those found in the first case study. The findings of an exploratory study carried out in December 2006 are then presented. In addition to uncovering opportunities for further research, the results indicate that the public are, in many situations, under the impression that criminal sanctions regulating piracy are wider reaching than the current legislation presently provides. It is submitted that the results of the study lend credibility to the notion that influences such as those recognised in the case studies have effectively misrepresented the law to consumers. The danger posed by the possibility that policy makers may be as vulnerable as consumers and perhaps even the press to well-funded and wide-ranging lobbying is considered. It is concluded that the representation of intellectual property regulation with regards to piracy must be counterbalanced if a truly objective middle-ground can be maintained when considering approaches to reform.",2,3,154,184,Political science; Order (exchange); Law and economics; Legislation; Sanctions; Credibility; Intellectual property; Entertainment; Interpretation (philosophy); Exploratory research,,,,,https://doaj.org/article/21739090e824463fa8a0b6c80622f74d,https://doaj.org/article/21739090e824463fa8a0b6c80622f74d,,,3124705760,,0,,1,false,, 130-426-333-901-694,"Piracy, Creativity and Infrastructure: Rethinking Access to Culture",,2009,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Lawrence Liang,,,,,,Creativity; Public good; Political science; Law and economics; Narrative; Subjectivity; Social science; Normative; Public domain; Commodification; Capital (economics),,,,,https://www.ssrn.com/abstract=1436229 https://autopapers.ssrn.com/sol3/papers.cfm?abstract_id=1436229 https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID1436229_code595245.pdf?abstractid=1436229&mirid=1 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1436229,http://dx.doi.org/10.2139/ssrn.1436229,,10.2139/ssrn.1436229,2235379546,,0,023-614-805-605-391,20,false,, 130-775-474-057-250,The Paths Not Taken?,2022-07-01,2022,journal article,Journal of International Criminal Justice,14781387; 14781395,Oxford University Press (OUP),United Kingdom,Ignacio de la Rasilla,"Abstract; The introductory section examines the similarities between the prosecution dilemmas posed by the successive piracy crises off the coasts of Somalia and the Gulf of Guinea. Section 1 analyses how the prosecution-related shortcomings of universal jurisdiction and of the international treaty regime currently applicable to the crime of piracy have been compounded by domestic legal and structural factors affecting littoral states in the east and west Africa coasts. Section 2 follows by examining the role of crises as tipping points for international adjudication and introducing central concepts of the analytical tradition of ‘historical institutionalism’ such as ‘critical juncture’ or ‘path-dependence’. Section 3 then applies these analytical tools as it reviews the pros and cons of the main international, hybrid and nationally assisted adjudicative alternatives for the prosecution of the crime of piracy, which it divides into the categories of ‘ad hoc’ and ‘permanent’ solutions, and examines their potential applicability to the escalating piracy crisis in the Gulf of Guinea. The conclusion recaps the main findings of the article and highlights how the elusive quest for international adjudication of the crime of piracy in Africa illustrates the veiled, yet pervasive, influence of path-dependence on international adjudicative-setting processes.",20,3,571,596,Adjudication; Jurisdiction; Law; Section (typography); Treaty; International law; Political science; Sociology; Law and economics,,,,,,http://dx.doi.org/10.1093/jicj/mqac036,,10.1093/jicj/mqac036,,,0,,0,false,, 131-269-073-725-654,Somali piracy prisoners and biopolitical penal aid in East Africa,2016-08-01,2016,journal article,Punishment & Society,14624745; 17413095,SAGE Publications,United States,Brittany Gilmer,"Piracy off the coast of Somalia has elicited a growing body of interdisciplinary research. Much of this research focuses on identifying the root causes of piracy, analyzing onshore and offshore responses, or evaluating various rule-of-law approaches; no study has yet to examine how Somali piracy has impacted prisons. Drawing upon ethnographic research, this article explores how UNODC counter piracy funding is reshaping the carceral spaces of East Africa. I examine how the need to secure and develop Somali piracy prisoners in regional prisons has created a bodies-for-aid penal market in East Africa. Large aid packages are awarded to prisons that agree to accept suspected Somali pirates and ensure the support, maintenance, and enhancement of the lives of Somali piracy prisoners. I theorize a new form of penal aid—biopolitical penal aid—linking prison development funding to the containment of specific prisoner populations. Using the Montagne Posee Prison in the Seychelles as a case study, I explore how biopo...",19,1,1462474516654730,131,Political science; Ethnography; Law; Somali; Prison; East africa; Criminology; Biopower,,,,,https://journals.sagepub.com/doi/abs/10.1177/1462474516654730 http://journals.sagepub.com/doi/abs/10.1177/1462474516654730,http://dx.doi.org/10.1177/1462474516654730,,10.1177/1462474516654730,2442915438,,0,007-678-568-684-884; 016-597-065-739-996; 017-639-373-177-330; 019-440-349-218-416; 021-153-774-297-813; 022-862-250-648-641; 022-876-965-145-068; 023-723-515-674-252; 026-266-551-680-164; 031-102-238-317-676; 032-935-462-008-280; 043-250-284-249-862; 060-019-245-714-965; 063-869-348-539-696; 065-342-601-152-383; 068-021-876-336-634; 099-671-647-575-761; 100-698-641-013-016; 106-005-041-239-744; 145-777-430-196-21X; 150-209-211-683-822; 152-355-679-065-825; 190-827-764-305-767,5,false,, 131-281-225-972-411,Issues in respect of ransom demanded by piracy from the perspective of maritime law,,2009,journal article,Annual of China Maritime Law,,,,Xu Xin,"In recent years,the seizure of ships and crews has become an eminent factor which threatens the safety of international shipping industry.Most of the cases were solved by means of paying the ransom to the piracies by ship-owners whose ships have been seized.Though the act of piracy should be attributed to the research area of international criminal law,the outcomes for paying the ransom to piracies is closely connected with questions in respect of shearing the risks and distribution of the losses.Therefore,it is necessary to make a study on this issue from the perspective of maritime law.Ransom can be classified according to the object which the piracies are aiming at when they demand the ransom,into three categories,which are,for ships and goods,for crews and for passengers,and the bearer of loss should be determined in the light of nature of ransom.",,,,,Business; Law; Criminal law; Perspective (graphical); Ransom; International shipping; Object (philosophy); Distribution (economics),,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-ZGHS2009Z1012.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-ZGHS2009Z1012.htm,,,2357280457,,0,,0,false,, 131-311-885-225-459,Global Dynamic Timelines for IPRs Harmonization Against Software Piracy,,2013,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Simplice A. Asongu; Antonio Rodríguez Andrés,"This paper employs a recent methodological innovation on intellectual property rights (IPRs) harmonization to project global timelines for common policies against software piracy. The findings on 99 countries are premised on 15 fundamental characteristics of software piracy based on income-levels (high-income, lower-middle-income, upper-middle-income and low-income), legal-origins (English common-law, French civil-law, German civil-law and, Scandinavian civil-law) and, regional proximity (South Asia, Europe & Central Asia, East Asia & the Pacific, Middle East & North Africa, Latin America & the Caribbean and, Sub-Saharan Africa). The results broadly show that a feasible horizon for the harmonization of blanket policies ranges from 4 to 10 years.",,,,,Economy; German; International trade; Latin Americans; Economics; Convergence (economics); Harmonization; Intellectual property; Middle East; Timeline; East Asia,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2493333,http://dx.doi.org/10.2139/ssrn.2493333,,10.2139/ssrn.2493333,2161376553,,0,003-120-061-431-142; 012-558-297-950-849; 016-202-448-837-906; 018-075-278-238-815; 039-883-767-744-759; 041-893-696-570-720; 047-010-436-077-442; 058-593-953-269-924; 058-682-219-560-287; 063-085-822-993-592; 064-893-720-411-223; 075-401-188-052-732; 085-796-193-840-794; 107-947-697-683-923; 108-534-046-972-503; 110-231-183-577-925; 133-793-936-162-353; 140-177-608-473-755; 161-784-952-964-349; 163-395-334-414-976; 191-344-983-602-980,18,true,,green 131-324-745-745-420,INTERNATIONAL LEGAL MECHANISMS IN THE FIELD OF COUNTERING THE MANIFESTATIONS OF MARITIME PIRACY AS A GUARANTEE OF SAFETY OF MARITIME TRANSPORT,,2021,journal article,Scientific Journal of Public and Private Law,26181258,Private Institution Scientific Institute of Public Law,,I.V. SPIVAK,,,1,160,167,Maritime safety; Field (mathematics); Business; Law and economics; International trade; Computer security; Political science; Law,,,,,,http://dx.doi.org/10.32844/2618-1258.2021.1.27,,10.32844/2618-1258.2021.1.27,,,0,,0,true,,gold 131-482-740-963-799,Author’s rights in the digital age: how Internet and peer-to-peer file sharing technology shape the perception of copyrights and copywrongs,2016-03-17,2016,journal article,Libellarium: časopis za istraživanja u području informacijskih i srodnih znanosti,18469213; 18468527,University of Zadar,,Milijana Mičunović; Luka Balković,"Author's rights and copyright law have gone through quite a few changes in the 'post-print' culture of binary systems, digital formations and techno-practices. Technological development supports new concept of author's rights by promoting free internet and digital market, as well as new contemporary experience of culture that is being rooted in digital technology, mass communication and the world of multimedia and virtuality. Though computer and digital technology have served both authors and users in various ways, they have also served as a very fertile ground for sharing copyrighted content thus leading to numerous copyright infringements and conflicts with the copyright law. The aim of this paper is to identify and analyze the ways in which computer and digital technology have given rise to new trends in the production (e.g. remix culture) and consumption (e.g. peer-to-peer file sharing technology) of culture, but also to determine how new forms of distribution, use and sharing of digital content changed and shaped the perception of authorship in the 21st century. In order to analyze the dynamic, nature and structure by which new digital and networking technologies are affecting the concept of authorship and author's rights and to test the consistency of previously established hypotheses, we conducted a survey amongst general public. Altogether 535 questionnaires were completed. Data was analyzed using SPSS tool and quantitative method of analysis. In the analysis special attention was given to both, the concept of authorship in the digital environment and the concept of peer-to-peer file sharing technology as not so new, but still very popular networked architecture for distributing, using and sharing digital content.; Results have shown that most of the respondents use peer-to-peer file sharing technology to access, consume and/or share different cultural content (e.g. movies, music, books, etc.) while violating the rights of copyright holders. That is one of the main reasons why copyright holders and creative industry constantly find new ways to fight peer-to-peer networking technology, especially commercial file sharing, thus sometimes restraining cultural production and even technological development. This leads to conclusion that this new dynamic, decentralized and distributed networked environment grounded in digital democracy and participating culture of prosumers asks for new legal initiatives and solutions. The research shows that the basic understanding of authorship and the right's of authors and other creative workers in the context of Internet culture and digital media hasn't changed a lot, but, by reason of new available digital means of production and tools of consumption, users attitudes, habits and practices towards them have. To resolve this conflict, law needs to find new mechanisms",8,2,27,64,Internet privacy; The Internet; Digital transformation; World Wide Web; Sociology; Cyberculture; Digital media; Digital content; Context (language use); Virtuality (gaming); File sharing,,,,,https://hrcak.srce.hr/index.php?show=clanak&id_clanak_jezik=248757 https://www.bib.irb.hr/816202 https://repozitorij.ffos.hr/islandora/object/ffos:3251 http://www.libellarium.org/index.php/libellarium/article/view/232/337 https://core.ac.uk/display/89519994 https://repozitorij.ffos.hr/islandora/object/ffos:3251/datastream/FILE0/download http://www.libellarium.org/index.php/libellarium/article/download/232/345 https://hrcak.srce.hr/file/248758 https://doaj.org/article/dd04600cc3dd4522880820c5e953362c https://core.ac.uk/download/pdf/197552488.pdf,http://dx.doi.org/10.15291/libellarium.v0i0.232,,10.15291/libellarium.v0i0.232,2331603385,,0,001-242-622-814-809; 007-271-537-820-252; 020-335-214-145-679; 020-583-266-300-354; 020-626-456-928-238; 023-022-101-904-087; 027-221-233-973-188; 027-989-705-549-237; 041-728-035-798-366; 044-223-695-881-953; 047-712-580-702-632; 050-015-091-479-040; 050-828-773-689-107; 051-327-496-733-915; 055-347-657-773-816; 055-690-424-934-672; 062-006-118-220-890; 065-732-116-197-354; 067-770-425-873-31X; 072-376-143-734-923; 072-430-524-235-858; 074-004-462-165-305; 075-531-212-802-181; 075-743-333-013-28X; 076-949-709-018-776; 078-232-081-780-849; 078-953-319-252-801; 087-121-936-543-828; 098-574-118-003-29X; 100-250-438-701-889; 112-418-393-199-611; 116-792-220-261-312; 120-022-674-689-51X; 126-102-357-064-696; 133-538-558-053-409; 153-516-313-692-85X; 153-556-090-709-189; 156-745-031-460-610; 160-578-231-873-638; 166-059-163-463-605; 167-758-424-199-056; 168-448-728-382-880; 169-272-279-857-640; 174-538-666-542-573; 176-886-989-278-600; 183-151-979-775-618; 193-023-397-772-093; 195-576-656-508-741,3,true,cc-by,gold 131-605-060-106-643,A 'Sound' Policy? The RIAA and The Copyright Act,2009-04-01,2009,journal article,Pittsburgh Journal of Technology Law and Policy,2164800x,"University Library System, University of Pittsburgh",,Chadwick Schnee,"The Recording Industry of America (RIAA) has made headlines 1 and garnered a fair amount of criticism in recent years, both for the first jury trial against an individual copyright infringer 2 and for its litigation tactics. 3 In the midst of the RIAA‘s aggressive litigation, issues related to proof have come to the forefront, particularly regarding the use of Internet Protocol (IP) addresses 4 to determine the identity of alleged copyright infringers. 5 Additionally, the RIAA and other organizations have sought to hold individuals owning unsecured wireless routers 6 liable for any illegal file-sharing that takes place through the individual‘s router. 7 The RIAA, in their vigilant defense of copyrighted material, has gone too far and legislative action is needed to provide protection for unwary consumers from the aggressive tactics of the RIAA.",9,,,,Sociology; Music industry; Law; Jury trial; Action (philosophy); Copyright Act; Criticism; Legislature,,,,,https://tlp.law.pitt.edu/ojs/tlp/article/download/44/44 https://core.ac.uk/display/12214671 http://d-scholarship.pitt.edu/id/eprint/17815 http://tlp.law.pitt.edu/ojs/index.php/tlp/article/view/44 https://core.ac.uk/download/12214671.pdf,http://dx.doi.org/10.5195/tlp.2009.44,,10.5195/tlp.2009.44,2068404655,,0,,1,true,cc-by-nc-nd,hybrid 132-011-266-067-676,"Coercion, Conviction, Conversion: Sovereign Selves and Interior States in Colonial Piracy Trials and Narratives",2012-06-01,2012,journal article,Law & Literature,1535685x; 15412601,Informa UK Limited,United Kingdom,Erica Burleigh,,24,2,151,173,Conviction; Coercion (linguistics); Epistemology; Philosophy; Law; Political science; Criminology; Sociology; Linguistics,,,,,,http://dx.doi.org/10.1525/lal.2012.24.2.151,,10.1525/lal.2012.24.2.151,,,0,,0,false,, 132-071-833-526-520,Run Gauntlets or Pay Pirates? Regulating Vessel Speeds in High-Risk Waters,2021-05-21,2021,journal article,American Journal of Trade and Policy,23134755; 23134747,ABC Journals,,Ryan W. McDowell,"Maritime commerce in world commerce. Each year, vessels carry more cargo at higher costs and faster speeds. Insurance is an integral part of shipping, as it protects cargoes and crews against the perils of the sea. This article focuses on the peril of piracy, a criminal practice that has evolved significantly throughout history. Pirates today, as pirates of the past, prey upon the unprotected. Yet, modern piracy, unlike historical piracy, is essentially non-violent. The modern pirate profits from ransom, not theft. Today, piracy is a monetary risk with compu­­­table consequences: an insurable threat. Anti-piracy methods, including insurance, impose steep costs to world trade. In the past decade, pirate activity has declined while piracy insurance has grown more expensive. This phenomenon is problematic, but an industry-wide solution is a challenging construct. To handle the costly risks of piracy is to balance the distinct and competing interests of ship-owners, insurers, operators, and governments. As this Article argues, insurance can more efficiently mitigate piracy’s puzzling risk. After discussing maritime piracy and maritime insurance, this Article outlines the legal and regulatory schema for a system to mandate the speeds of vessels that transit pirate-prone waters. The proposed regulation is mechanically sound, logistically feasible, cost-effective, and enforceable. To diminish the costly risk of piracy, this Article proposes revising a treaty to afford the International Maritime Organization (IMO) jurisdiction to regulate vessel speeds on the high seas.",8,2,155,170,Business; International trade; International waters; Mandate; Balance (accounting); Jurisdiction; Slow steaming; Treaty; Ransom; International law,,,,,https://abc.us.org/ojs/index.php/ajtp/article/download/540/1042 https://abc.us.org/ojs/index.php/ajtp/article/view/540,http://dx.doi.org/10.18034/ajtp.v8i2.540,,10.18034/ajtp.v8i2.540,3165674323,,0,,0,true,cc-by-nc,gold 132-097-406-269-545,Raids target piracy suspects,,1995,journal article,Computers & Security,01674048,Elsevier BV,United Kingdom,Helen Collinson,,14,7,612,,,,,,,http://www.sciencedirect.com/science/article/pii/0167404896816890 http://linkinghub.elsevier.com/retrieve/pii/0167404896816890,http://dx.doi.org/10.1016/0167-4048(96)81689-0,,10.1016/0167-4048(96)81689-0,2075321902,,0,,0,false,, 132-205-922-908-783,Foreign Naval Intervention in Cases of Piracy: Problems and Strategies,1999-08-01,1999,journal article,The International Journal of Marine and Coastal Law,15718085; 09273522,Brill,Netherlands,S.P. Menefee,,14,3,353,370,International law; Law of the sea; Intervention (counseling); Law; Political science; Public international law; Psychology; Psychiatry,,,,,,http://dx.doi.org/10.1163/15718089920492465,,10.1163/15718089920492465,,,0,,1,false,, 132-249-161-642-603,Assessing Maritime Piracy in American Law: A Century-old Punishment for an Evolving Crime,2019-11-04,2019,journal article,The International Journal of Marine and Coastal Law,09273522; 15718085,Brill,Netherlands,M. Bob Kao,"Abstract; The rise of Somali piracy in the beginning of the 21st century led to a swift response by the international community. Suspects were arrested by naval forces in the high seas exercising universal jurisdiction. As there is no international tribunal for maritime piracy, the suspects were prosecuted in national courts using domestic laws. The United States prosecuted a handful of cases using its piracy statute passed in 1909, which incorporates international law but prescribes mandatory life imprisonment for those convicted. Although the definition of the crime of piracy in the United States evolves along with developments in international law, the punishment is an outlier that deviates from global norms. This article argues that the punishment for piracy in the United States must also evolve with international practice because a changing definition of a crime coupled with a fixed punishment may lead to rule of law violations and other undesirable results.",34,4,755,777,Political science; Law; Punishment; Maritime piracy; Law of the sea; International law,,,,,https://brill.com/view/journals/estu/34/4/article-p755_9.xml?language=en,http://dx.doi.org/10.1163/15718085-23441084,,10.1163/15718085-23441084,2956646455,,0,,0,false,, 132-365-969-615-905,BSA cracks down on piracy in NZ,,1995,journal article,Computers & Security,01674048,Elsevier BV,United Kingdom,Helen Collinson,,14,1,37,,,,,,,https://www.sciencedirect.com/science/article/pii/0167404895900853,http://dx.doi.org/10.1016/0167-4048(95)90085-3,,10.1016/0167-4048(95)90085-3,2090429493,,0,,1,false,, 132-519-001-970-162,"Governance, naval intervention and piracy in Somalia",2013-01-01,2013,journal article,"Peace Economics, Peace Science and Public Policy",15548597; 10792457,Walter de Gruyter GmbH,Germany,Anja Shortland; Sarah Percy,"Might criminals in weak states benefit from better governance? We test the relationship between Somali piracy and local business conditions as well as (naval) law enforcement. Anarchy on land is not helpful to pirates, but corruptible governance is. Increasingly effective naval measures in the Gulf of Aden displaced piracy into the Indian Ocean.",19,2,275,283,Economy; Political science; Somali; Test (assessment); Law enforcement; Indian ocean; Public administration; Corporate governance; Intervention (law),,,,,https://econpapers.repec.org/article/bpjpepspp/v_3a19_3ay_3a2013_3ai_3a2_3ap_3a275-283_3an_3a4.htm https://www.degruyter.com/view/j/peps.2013.19.issue-2/peps-2013-0005/peps-2013-0005.xml?lang=en https://research-repository.uwa.edu.au/en/publications/governance-naval-intervention-and-piracy-in-somalia https://espace.library.uq.edu.au/view/UQ:380626 https://ideas.repec.org/a/bpj/pepspp/v19y2013i2p275-283n4.html,http://dx.doi.org/10.1515/peps-2013-0005,,10.1515/peps-2013-0005,2082771424,,0,008-267-624-980-62X; 070-334-148-173-135; 071-872-706-989-134; 093-626-227-665-911; 102-347-760-507-121,9,false,, 132-931-731-365-065,The Malevolent Side of Revenge Porn Proclivity: Dark Personality Traits and Sexist Ideology,,2017,journal article,International Journal of Technoethics,19473451; 1947346x,IGI Global,United States,Afroditi Pina; James Holland; Mark James,"This paper presents a novel study, exploring a form of technology facilitated sexual violence TFSV known as revenge porn. Despite its emerging prevalence, little is known about the characteristics of revenge porn perpetrators. In the current study, a revenge porn proclivity scale was devised to examine participants' behavioural propensity to engage in revenge porn. One hundred adults, aged 18-54, were recruited online from a community sample. The correlational relationship between revenge porn proclivity and the self-reported endorsement of the Dark Triad, sadism, and ambivalent sexism was examined. Additional proclivity subscales of revenge porn enjoyment and revenge porn approval were also created. The study's main findings revealed a positive correlation between a greater behavioural propensity to engage in revenge porn and higher levels of the Dark Triad and ambivalent sexism. Moreover, endorsement of psychopathy was found to be the only Dark Triad trait that independently predicted revenge porn proclivity. The results suggest that perpetrators of revenge porn may have distinct personality profiles. Limitations and directions for future research are discussed.",8,1,30,43,Psychology; Ideology; Personality; Sexual violence; Revenge porn; Ambivalent sexism; Big Five personality traits; Psychopathy; Dark triad; Criminology; Social psychology,,,,,https://kar.kent.ac.uk/60613/ https://repository.canterbury.ac.uk/item/88wxq/the-malevolent-side-of-revenge-porn-proclivity-dark-personality-traits-and-sexist-ideology https://doi.org/10.4018/IJT.2017010103 https://dl.acm.org/doi/10.4018/IJT.2017010103 https://www.igi-global.com/article/the-malevolent-side-of-revenge-porn-proclivity/178531 http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJT.2017010103 http://create.canterbury.ac.uk/17658/ https://dl.acm.org/citation.cfm?id=3078244 https://dblp.uni-trier.de/db/journals/ijt/ijt8.html#PinaHJ17 https://core.ac.uk/download/287635579.pdf,http://dx.doi.org/10.4018/ijt.2017010103,,10.4018/ijt.2017010103,2591552207,,0,003-897-071-435-713; 005-853-056-581-702; 007-004-847-761-511; 007-852-930-833-338; 008-496-078-093-108; 010-195-076-318-29X; 012-146-772-489-772; 012-452-455-694-102; 017-221-681-055-388; 017-501-828-497-575; 017-689-748-643-509; 022-888-401-041-915; 027-949-867-779-899; 028-288-708-188-021; 028-703-146-056-363; 031-837-436-878-21X; 031-989-978-996-336; 035-626-799-309-740; 040-128-401-942-677; 041-731-475-255-303; 042-362-000-365-758; 043-793-305-654-578; 044-016-721-512-341; 045-587-785-816-294; 048-877-796-051-359; 051-303-861-703-380; 058-924-310-493-15X; 058-942-066-392-056; 061-986-615-443-18X; 062-193-277-234-217; 062-957-405-395-443; 064-047-987-192-311; 064-319-144-653-278; 065-552-662-875-230; 065-670-262-141-42X; 075-922-049-469-697; 083-099-359-100-942; 083-324-271-244-43X; 088-528-794-167-660; 090-847-177-681-234; 094-618-877-892-362; 102-631-943-330-953; 112-820-805-864-805; 113-014-134-907-957; 115-891-977-840-866; 130-439-807-632-290; 152-719-497-156-341; 155-644-543-683-456; 167-523-709-198-413; 168-613-862-261-349; 174-766-588-538-134; 194-047-035-383-78X,34,true,,green 132-934-760-172-08X,"Network exceptionalism: online action, discourse and the opposition to SOPA and ACTA",2015-07-31,2015,journal article,"Information, Communication & Society",1369118x; 14684462,Informa UK Limited,United Kingdom,Alison Powell,"Advocacy campaigns opposing the Stop Online Piracy Act and the Anti-counterfeiting Trade Agreement (ACTA) illustrate that the dynamics of networked activism have symbolic as well as structural aspects, with implications for scholars and activists who have focused on the coordination possibilities of networks. This paper analyses the creation and movement of discourses of ‘network exceptionalism’ between advocates, online culture and news media. Networks operate functionally to disseminate ideas and link together people participating in social action (e.g. by embedding aspects of discourse in memes, which then propagate ideas swiftly), but also symbolically, inflecting discourses towards a focus on the exceptional – and essential – qualities of the internet. These discourses embed fears about the fragility and indispensability of the internet, as well as thrilling and threatening elements like Anonymous. They are carried by memes that link the structural dynamics of networked activism to the discourses of illness, threat and utility, and gain different inflections through the European campaigns to oppose ACTA. These discourses not only create spaces for discussing and expanding upon the value of the internet to communication rights, but also leave room for interpretations that may undermine these advocacy projects.",19,2,249,263,The Internet; Social movement; Sociology; Cyberculture; Law; Exceptionalism; Communication rights; Media studies; Social media; News media; Hacker,,,,"Directorate-General for Communications Networks, Content and Technology",https://www.tandfonline.com/doi/full/10.1080/1369118X.2015.1061572 http://eprints.lse.ac.uk/63826/ https://core.ac.uk/download/35436975.pdf,http://dx.doi.org/10.1080/1369118x.2015.1061572,,10.1080/1369118x.2015.1061572,2141933822,,0,002-961-543-008-152; 003-012-603-298-22X; 006-275-637-102-647; 008-275-254-751-888; 010-604-338-792-392; 010-672-243-674-929; 011-044-678-355-723; 011-433-636-400-089; 012-023-321-430-034; 018-085-581-098-834; 019-263-282-687-036; 021-663-446-778-562; 031-698-858-205-480; 034-589-530-589-608; 035-558-776-976-426; 037-914-219-586-91X; 043-235-584-032-74X; 056-918-690-287-118; 058-329-389-700-740; 065-891-512-547-481; 070-937-693-897-246; 081-069-471-541-887; 085-133-841-831-128; 085-763-284-765-688; 097-228-730-086-628; 105-521-401-483-965; 109-430-963-710-703; 116-935-230-600-096; 130-416-355-289-708; 133-380-944-747-92X; 134-838-595-779-488; 139-755-669-553-122; 146-949-587-465-945; 180-806-857-167-142; 189-359-134-339-735,2,true,,green 133-252-650-353-603,Typhoid Mario: Video Game Piracy as Viral Vector and National Security Threat,,2018,journal article,Indiana Law Journal,00196665,,,Andrew Moshirnia,,93,4,975,1032,Botnet; Copyright infringement; Video game; Computer security; Computer science; Typhoid fever; National security; Malware; File sharing,,,,,https://www.repository.law.indiana.edu/cgi/viewcontent.cgi?article=11304&context=ilj https://www.repository.law.indiana.edu/ilj/vol93/iss4/2/ https://research.monash.edu/en/publications/typhoid-mario-video-game-piracy-as-viral-vector-and-national-secu,https://www.repository.law.indiana.edu/ilj/vol93/iss4/2/,,,2954934406,,0,,1,false,, 133-408-288-806-275,Style Piracy Revisited,,2002,journal article,Journal of law and policy,10740635,,,Safia A. Nurghai,,10,2,5,,Positive economics; Economics; Law; Style (sociolinguistics),,,,,https://brooklynworks.brooklaw.edu/jlp/vol10/iss2/5/ https://brooklynworks.brooklaw.edu/cgi/viewcontent.cgi?article=1319&context=jlp,https://brooklynworks.brooklaw.edu/jlp/vol10/iss2/5/,,,2546036175,,0,,0,false,, 133-503-523-079-529,Intellectual property piracy: The narrative construction of deviance,,1997,journal article,International Journal for the Semiotics of Law,09528059; 15728722,Springer Science and Business Media LLC,Netherlands,Debora Halbert,,10,1,55,78,Epistemology; Philosophy of law; Applied linguistics; Political science; Narrative; Law; Intellectual property; Deviance (sociology),,,,,https://link.springer.com/content/pdf/10.1007/BF01099260.pdf https://link.springer.com/article/10.1007%2FBF01099260,http://dx.doi.org/10.1007/bf01099260,,10.1007/bf01099260,2074180104,,0,,5,false,, 133-687-869-827-562,Spain: INTERSECTIONALITY FACES THE STRONG GENDER NORM,,2009,journal article,International Feminist Journal of Politics,14616742; 14684470,Informa UK Limited,United Kingdom,María Bustelo,"The changes generated in Europe by the growing concern with multiple inequality strands have reached Spain after some delay. Whereas comprehensive gender equality machineries and policy instruments have been developed both at the national and regional levels since the late 1980s, these have shown limited concern for multiple discrimination as respective strands of inequality were being tackled by specific institutions and policy mechanisms. Neither the strong institutionalization of gender equality policies nor the ‘legislative turn’ which saw Spain increasingly legislating on gender equality from the early 2000s have been sufficient to engage with the fact that gender discrimination is also shaped by other inequalities. Spain still can be characterized as pursuing a ‘unitary’ approach, in which inequalities are tackled by separate institutions and gender has primacy. There has been no trace of a truly intersectional approach through which intersections between multiple equality strands are analysed. Inst...",11,4,530,546,Gender studies; Norm (social); Political economy; Sociology; Institutionalisation; Intersectionality; Gender equality; Gender discrimination; Inequality; Unitary state; Legislature,,,,,https://core.ac.uk/display/41763123,http://dx.doi.org/10.1080/14616740903237491,,10.1080/14616740903237491,2317632440,,0,000-204-720-004-929; 016-174-354-448-031; 026-038-241-315-984; 029-643-596-345-917; 040-260-676-655-851; 041-290-709-596-899; 051-091-943-924-257; 078-118-343-381-436; 083-240-032-075-44X; 110-816-194-130-196; 113-200-051-878-889; 198-200-306-286-919,25,true,, 133-826-493-080-129,Digital Architecture as Crime Control,,2003,journal article,The Yale Law Journal,00440094,JSTOR,United States,Neal Kumar Katyal,"The first generation of cyberlaw was about what regulates cyberspace. Led by Larry Lessig's path-breaking scholarship isolating architecture as a constraint on behavior online,' a wide body of work has flourished. In a recent article, I took those insights and reverse-engineered them to show how attention to architecture in realspace (such as our city streets, parks, houses, and other buildings) constrains crime.2 It is time to begin a new generation of work, one that applies the lessons of realspace study back to the cybernetic realm. The question will not be what regulates cyberspace, but how to do so given the panoply of architectural, legal, economic, and social constraints.",112,8,2261,2289,Architecture; Sociology; Law; Crime control; Digital architecture; Scholarship; Realm; Cyberspace; Media studies; Constraint (mathematics); Legal aspects of computing,,,,,https://www.questia.com/library/journal/1G1-105916027/digital-architecture-as-crime-control http://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=4859&context=ylj https://scholarship.law.georgetown.edu/facpub/1885/ https://scholarship.law.georgetown.edu/cgi/viewcontent.cgi?article=2894&context=facpub https://dialnet.unirioja.es/servlet/articulo?codigo=659568 https://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=4859&context=ylj https://core.ac.uk/download/74539296.pdf,http://dx.doi.org/10.2307/3657476,,10.2307/3657476,277455385,,0,,55,true,,green 134-240-904-445-70X,"Cyberethics: Identifying The Moral, Legal And Social Issues Of Cybertechnology In K-12 Classrooms",2011-08-03,2011,journal article,College Teaching Methods & Styles Journal (CTMS),2157880x; 15489566,Clute Institute,,David S. Brown; Tao Wang,"Two computer viruses that have caused hundreds of millions of dollars in damage over the past four years are the Melissa and the Sasser virus. In March of 1999, the Melissa virus first appeared on the Internet and spread rapidly throughout computer systems in the United States and Europe. The virus made its way through 1.2 million computers in the United States alone. On December 9, 1999, David Smith pleaded guilty to state and federal charges associated with his creation of the Melissa virus (Vamosi, 2003). Reasons for writing the viruses; “boredom”, “the challenge”, and “that’s what I’m good at, what I like to do. In May, 2004, the Sasser virus was released by an 18 year old in Germany (Williams, 2004). The arrest made on this “script kiddie” was the first which used Microsoft’s $5,000,000 fund, even though millions has been offered for information on other viruses. Unfortunately, young virus creators are unwilling to turn one another in, claiming they write viruses because they have nothing else to do or because they just want to see what happens. The purpose of this paper is threefold. First, this paper will describe the extent of Internet/cyber use by American students. Second, this paper will present data from a resent research project showing the large amount of cyber crimes are secondary students are aware of and are participating in. Finally, this paper will present scenarios which might help the reader understand why ethical choices of today’s script kiddies are not as black and white as the reader might think.",4,2,29,36,Cyberethics; Computer-mediated communication; The Internet; Sociology; Computer virus; Law; State (polity); Boredom; Script kiddie; Media studies; Social issues,,,,,https://eric.ed.gov/?id=EJ967383 https://core.ac.uk/download/pdf/268109683.pdf,http://dx.doi.org/10.19030/ctms.v4i2.5523,,10.19030/ctms.v4i2.5523,1646382780,,0,011-916-878-464-970; 035-475-255-716-211; 042-886-692-749-054; 063-823-146-541-890; 129-309-562-941-851; 143-155-440-447-95X,1,true,,bronze 134-936-898-078-397,Neutralizations and Rationalizations of Digital Piracy: A Qualitative Analysis of University Students,,2009,journal article,International Journal of Cyber Criminology,09742891,,,Robert Moore; Elizabeth C. McMullan,"IntroductionThe issue of digital piracy has become a topic of immense concern, such that it has attracted the attention of both legislators and academics. As a result there has been a steady growth in academic literature on the topic over the last several years (Higgins, Wilson & Fell, 2005; Higgins, Fell, & Wilson, 2006; Higgins & Wilson, 2006; Hohn, Muftic & Wolf, 2006; Al-Rafee & Cronan, 2006; Hinduja, 2007). Defining digital piracy has been difficult as the term ""piracy"" may invoke images of those who steal for monetary gain. In reaching a definition, Hill (2007) has defined digital piracy to include ""the purchase of counterfeit products at a discount to the price of the copyrighted product, and illegal file sharing of copyright material over peer-to-peer computer networks."" (p. 9). This definition removes the financial gain aspect of digital file sharing in its attempts to provide a simpler definition of digital piracy. However, while attempts to define digital file sharing and digital piracy have become more simplified, the topic is still one of immense complexity. Digital file sharing, sometimes referred to as digital piracy and sometimes referred to as peer-to-peer file sharing - occasionally abbreviated as P2P file sharing - continues to intrigue both researchers and practitioners in the fields of criminology, economics and computer science. The reasons for this interest are varied, but it is likely that such increased interest can be tied to the fact that the technology has evolved rapidly creating conflicts between users and traditional intellectual property laws. Additionally, there is the fact that many individuals in the music and film industry have blamed the technology for lagging sales of compact disks (CDs) and digital video disks (DVDS) (Pomerantz, 2005).From a commonsense perspective this issue of financial harm would seem to make sense. If individuals are downloading and copying music and movie files from P2P networks then they are more than likely not paying for these materials. Or are they? There is considerable debate among economic academics about the financial impact P2P file sharing has on the music and film industry. Pomerantz (2005) reported that as much as $21 billion could be lost on DVD sales and $12 billion could be lost on CD sales each year because of P2P file sharing. These estimates of loss are believed to be associated with the fact that at any given time there are approximately 1 billion music and movie files available online (Ouellet, 2007). However, some economic experts have countered this argument claiming that P2P file sharing only minimally, if at all, affects the purchase of DVDs and CDs (Oberholzer & Strumpf, 2005; Rochelander & Le Guel, 2005).The music industry initially responded to file sharing through the use of legal pressure against the software manufacturers who produced file sharing software. However, more recently the music and movie industries have resorted to the use of civil lawsuits against users, focusing more on consumers than on software manufacturers (Rupley, 2004). The viability of these lawsuits has been questioned, as studies have indicated that there has been very little, if any, decrease in the use of P2P file sharing activities as a result of civil litigation against users (Green & Sager, 2004). It is for these reasons that it becomes important to gain a better understanding of what influences a person's decision to engage in digital piracy. Understanding why a person engages in P2P file sharing may allow for the development of better responses to the problem - responses that do not involve costly litigation.Initial research on demographic factors associated with P2P file sharing have found that file sharers were most often male and of lower educational levels (Rochelander & Le Guel, 2005). However, Hinduja (2008) found that less than half of the individuals in his study who engaged in digital piracy were male but that overwhelmingly the individuals were of Caucasian descent. …",3,1,441,,Internet privacy; Music industry; Copying; Counterfeit; Intellectual property; Computer security; Computer science; Product (business); Film industry; File sharing; Upload,,,,,http://www.cybercrimejournal.com/mooreijcc2009.pdf https://www.questia.com/library/journal/1P3-1988429621/neutralizations-and-rationalizations-of-digital-piracy,https://www.questia.com/library/journal/1P3-1988429621/neutralizations-and-rationalizations-of-digital-piracy,,,2338252957,,0,002-329-721-696-826; 008-755-832-975-481; 013-425-010-292-015; 013-841-206-895-021; 029-253-343-590-961; 030-437-185-681-738; 031-497-635-068-916; 034-947-793-516-352; 036-206-197-513-432; 036-240-687-056-085; 055-450-998-184-302; 058-447-615-193-829; 058-919-953-064-002; 070-387-433-147-234; 071-535-679-259-648; 072-084-774-976-983; 073-946-130-028-294; 078-221-917-889-593; 080-313-560-140-028; 081-789-425-815-563; 099-671-418-984-182; 099-947-198-817-554; 112-069-455-754-850; 126-772-810-967-037; 138-916-414-224-499; 139-936-448-007-85X; 150-527-549-363-854; 161-446-165-980-313; 165-651-170-191-915; 183-984-406-822-671,44,true,cc-by-nc-sa,gold 135-104-212-544-985,The far East's fight against piracy continues,,1997,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,1997,5,3,3,Computer security; Far East; Computer science; Political science; Law,,,,,,http://dx.doi.org/10.1016/s1361-3723(97)83525-7,,10.1016/s1361-3723(97)83525-7,,,0,,0,false,, 135-321-724-937-775,UK software piracy offenders rounded up,,2003,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,2003,4,2,3,Computer security; Software; Computer science; Business; Internet privacy; Operating system,,,,,,http://dx.doi.org/10.1016/s1361-3723(03)04004-1,,10.1016/s1361-3723(03)04004-1,,,0,,0,false,, 135-402-386-090-894,…And piracy in the UK,,1982,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,4,9,3,3,Business; Computer security; Internet privacy; Computer science,,,,,,http://dx.doi.org/10.1016/0142-0496(82)90004-2,,10.1016/0142-0496(82)90004-2,,,0,,0,false,, 135-710-485-019-588,The Asian piracy problem,,1995,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1995,3,4,4,Computer security; Business; Computer science,,,,,,http://dx.doi.org/10.1016/0142-0496(95)80124-3,,10.1016/0142-0496(95)80124-3,,,0,,0,false,, 135-717-624-040-275,A Collection of Piracy Laws of Various Countries,,1932,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),United States,,,26,S1,888,1013,Law; Political science; Business,,,,,,http://dx.doi.org/10.2307/2213754,,10.2307/2213754,,,0,,1,false,, 135-785-405-727-223,Toward An International Law of Piracy Sui Generis: How the Dual Nature of Maritime Piracy Law Enables Piracy to Flourish Berkeley Journal of International Law,,2011,journal article,Berkeley Journal of International Law,10855718,,,Lucas Bento,,2,,,,Dual (category theory); Political science; Law; Maritime piracy; International law,,,,,,,,,2256033427,,0,,0,false,, 135-838-073-124-392,State-Sponsored Ransomware Through the Lens of Maritime Piracy,,2019,journal article,The Georgia Journal of International and Comparative Law,,,,Evans F. Horsley,,47,3,669,,Cyberwarfare; Political science; State (polity); Ransomware; Maritime piracy; Computer security; Through-the-lens metering,,,,,https://digitalcommons.law.uga.edu/cgi/viewcontent.cgi?article=2460&context=gjicl,https://digitalcommons.law.uga.edu/cgi/viewcontent.cgi?article=2460&context=gjicl,,,2998935376,,0,,0,false,, 135-980-275-659-464,On the Issues of International Law in Use of Force against the Somali Pirates,,2012,journal article,Journal of Xiangtan University,,,,LI Bo-jun,"Since 2008,because of the incidents of piracy and aimed robbery against vessels in the territorial waters of Somalia and the high seas off the coast of Somalia exacerbate the situation in Somalia which continues to constitute a threat to international peace and security in the region,the UN Security Council has adopted the Resolution 1816(2008) and so on.That is,each member may enter the territorial waters of Somalia for the purpose of repressing acts of piracy and armed robbery at sea,in a manner consistent with such action permitted on the high seas with respect to piracy under relevant international law.However,during the use of force against the Somali Pirates,there are many questions of international law,which includes the legality of use of force against the Somali pirates,the validity of use of force against the Somali pirates and the universal jurisdiction after the Somali Pirates being arrested. These questions will prompt the transformation of the UN Collective security system from the existing traditional security concept to pay atlentiont to the non-traditional security concept.",,,,,International waters; Political science; Law; Universal jurisdiction; Use of force; Somali; Principle of legality; International law; Collective security; Territorial waters,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-XTDX201204010.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-XTDX201204010.htm,,,2377391503,,0,,0,false,, 136-008-602-808-831,Efforts to Reduce Piracy of U.S. Intellectual Property in China,,1995,journal article,Business Law Review,01436295,,,Manny Jd; Carter H,,,,,,International trade; Political science; China; Intellectual property,,,,,https://digitalcommons.usm.maine.edu/business-faculty/52/,https://digitalcommons.usm.maine.edu/business-faculty/52/,,,3120026392,,0,,0,false,, 136-033-726-680-192,Study of Perceptions of Social Media Users Regarding Digital Ethics,2022-06-08,2022,journal article,International Journal of Human Resource Studies,21623058,"Macrothink Institute, Inc.",,Desak Putu Eka Nilakusmawati; Dewa Made Alit Adinugraha; I Gusti Ayu Made Srinadi; Gede Ganesh Adi Bharata,"This study aims to determine: 1) an overview of the social demographic characteristics of social media users, 2) knowledge of social media users regarding digital ethics, and 3) perceptions of social media users regarding digital ethics from the social media they use. The method of collecting data in the field is a survey using a questionnaire distributed to respondents online with the help of google forms and sampling is done by purposive sampling, with a total sample of 250 respondents. The variables used in this study include: demographic and social characteristics, user knowledge of ethics in the use of social media, and user perceptions of ethics in the use of social media. The data analysis technique used descriptive analysis. The description of the knowledge of social media users regarding digital ethics includes the Law on Information and Electronic Transactions (UU ITE) and the regulations and sanctions contained in the ITE Law, it was found that most respondents stated they knew, while there was a large percentage of respondents answered that expressed Doubtful and didn't know, as well as a small percentage of answers: knew very well and didn't really know. Respondents' perceptions of digital ethics include privacy and security, ethics in posting on social media, cyber bullying, Hoax, plagiarism, End-User piracy, Software Piracy, Unauthorized Use, Hackers, Terms of use, Personnel security, Fair Use, it was obtained that the outline has a positive perception and only a small percentage of respondents have a negative perception.",12,3,1,1,Social media; Perception; Internet privacy; Sanctions; Psychology; Nonprobability sampling; Hacker; Public relations; Sociology; Political science; Law; Computer science; Computer security; Population; Demography; Neuroscience,,,,,,http://dx.doi.org/10.5296/ijhrs.v12i3.19947,,10.5296/ijhrs.v12i3.19947,,,0,,0,true,,hybrid 136-205-412-024-991,"The Full Story of United States v. Smith, America's Most Important Piracy Case",2012-11-27,2012,journal article,Penn State Journal of Law and International Affairs,,,,Joel H. Samuels,"This article explores the seminal United States Supreme Court decision of United States v. Smith (1820). Smith, an early piracy case, has influenced developments in both domestic and international law on piracy, universal jurisdiction, and a range of broader themes. This article is the first to explore the context within which the case arose, as well as the circumstances of the case itself. In addition to the details of the case, the story of the men prosecuted for their cruise aboard the vessel known as the Irresistible in the late spring and early summer of 1819 also offers a window into important issues of the day, including growing federal assertions of power over the states, the roles of Congress and the courts in defining and punishing piracy under the Constitution, theories of punishment, and the power of the press.",1,2,320,,Political science; Law; Power (social and political); Constitution; Universal jurisdiction; Punishment; Supreme court; Cruise; Context (language use); International law,,,,,https://elibrary.law.psu.edu/jlia/vol1/iss2/7/ https://scholarcommons.sc.edu/law_facpub/138/ https://elibrary.law.psu.edu/cgi/viewcontent.cgi?article=1016&context=jlia,https://elibrary.law.psu.edu/jlia/vol1/iss2/7/,,,3125491668,,0,,2,false,, 136-244-666-147-010,Comment : reconsidering the pirate nation,,2006,journal article,South African Journal of Information and Communication,,"Wits School of Literature, Language and Media (SLLM)",,Lawrence Liang; Achal Prabhala,"Locating piracyWhat is piracy? According to industry lobbies, it is intellectual property theft, and a revenue loss to their constituents. The Business Software Alliance (BSA) tells us that annual losses to software manufacturers due to piracy are apparently at US$34 billion, and the US Patent and Trademark Office (USPTO) pegs the worldwide figure for losses due to copyright piracy, taken across industry as a whole, at US$250 billion per year. 2",2006,7,108,114,Business; Law and economics; Law; Software; Alliance; Trademark; Patent law; Computer software; Revenue loss; Intellectual property; Business software,,,,,https://mobile.wiredspace.wits.ac.za/handle/10539/19801 https://wiredspace.wits.ac.za/xmlui/handle/10539/19801 https://wiredspace.wits.ac.za/bitstream/10539/19801/1/SAJIC-Issue-7-2006-Liang-Prabhala.pdf https://core.ac.uk/download/188769852.pdf,http://dx.doi.org/10.23962/10539/19801,,10.23962/10539/19801,787157700,,0,,0,true,cc-by-nc-nd,hybrid 136-284-206-827-951,"Piracy Of Some Copyrighted Information Materials Among Students Of Olabisi Onabanjo University, Ago Iwoye, Ogun State, Nigeria",2010-10-04,2010,journal article,Information Technologist (The),15974316,African Journals Online (AJOL),,OM Bankole,"Purpose: This study investigates the practices of students of Olabisi Onabanjo University, Ago Iwoye, Nigeria as it relates to th e piracy of information products in textbooks/journals, magazines/ newspapers, cassettes and CDs/DVDs, and their awareness of copyright laws. The data for the research was gathered through the use of questionnaire and focus group discussions. Three hundre d and sixty six out of five hundred copies of the questionnaire distributed were completed and returned giving a response rate of 73.2%. The study showed that 85.3% of the students had engaged in piracy of copyright protected copies of the information mate rials studied. The reported level of piracy was highest with books/ journals ( 84.2%) and lowest with magazines/ newspapers ( 45.6%). Those respondents that claimed awareness of the laws prohibiting distribution/sale of copyrighted materials were 80.9%, and th e major sources of knowledge were through broadcast channels, newspapers and schools in descending order of importance. The reasons identified for the infringements of copyright laws include the prohibitive cost of original copies; the unavailability of o riginal copies, easy accessibility to pirated copies in markets, and the inability to distinguish between pirated and original copies. The respondents that could mention at least one benefit of copyright protection was 232(63.4%) with an average correct re sponse of 1.4, while 36.6% respondents could not mention one correct answer. The paper concludes by making recommendations on how piracy could be curbed in Nigerian tertiary institutions by making information materials available at affordable prices and by the provision of adequate copies of most needed texts in the libraries. It also recommends public enlightenment campaign on the benefits of copyright protection to the promotion of creativity and socio economic development of the nation. Key Words: piracy, books/journals, magazines/newspapers, cassettes, CDROMs/DVDs, copyright, laws.",7,1,,,Advertising; Engineering; Library science; Newspaper; Order (business); Broadcast channels; Ogun state; Socioeconomic development; Focus group; Promotion (rank),,,,,https://www.ajol.info/index.php/ict/article/download/60443/48671 https://www.ajol.info/index.php/ict/article/view/60443,http://dx.doi.org/10.4314/ict.v7i1.60443,,10.4314/ict.v7i1.60443,2026236534,,0,,0,false,, 136-756-999-280-150,Article 9. Universality—Piracy,,1935,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),United States,,,29,S1,563,572,Universality (dynamical systems); Political science; Computer security; Business; Law and economics; Computer science; Sociology; Physics; Quantum mechanics,,,,,,http://dx.doi.org/10.2307/2213645,,10.2307/2213645,,,0,,0,false,, 137-321-735-544-865,Pembajakan Karya di Bidang Hak Cipta: Telaah Integratif Hukum Islam dan Undang-Undang R.I. Nomor 28 Tahun 2014 tentang Hak Cipta,2019-06-25,2019,journal article,Al-Manahij: Jurnal Kajian Hukum Islam,25794167; 19786670,UIN Prof. K.H. Saifuddin Zuhri,,Syufa'at Syufa'at,"Copyright is one part of intellectual property that has the widest scope of protected objects. The rapid development of information and communication technology requires rules that support copyright, especially with the rampant piracies. Therefore, copyright must have a legal protection as other rights. This paper is dedicated to outlining the concept of piracy of works in the field of copyright using an integrated review of Islamic law and the Indonesian Law No. 28 of 2014 concerning Copyright. By using a deductive framework and normative approach, this paper formulates one finding that copyright piracy even though there are no clear and standard rules in Islamic law, by using analogy (qiyAs) method, the copyright rule is in accordance with the law against the perpetrator of theft (saraqah). However, because a pirator of copyrights is not the same as a theft, its rule enters ta’zA«r domain where all provisions for sanctions are determined by the government. In Indonesia, the actualization of sanctions is regulated in Law No. 28 of 2014, which essentially strives to create justice and guarantee of every individual right that leads to widespread benefit. Islamic law (in this case saraqah rules) becomes the theological basis for Law No. 28 of 2014 in a normativity context, where the integration points of Islamic law and Indonesian law can be established.",13,1,49,63,Economic Justice; Government; Sharia; Political science; Law and economics; Sanctions; Context (language use); Intellectual property; Normative; Analogy,,,,,http://ejournal.uinsaizu.ac.id/index.php/almanahij/article/view/2215 http://ejournal.iainpurwokerto.ac.id/index.php/almanahij/article/view/2215,http://dx.doi.org/10.24090/mnh.v0i1.2215,,10.24090/mnh.v0i1.2215,2955378063,,0,,0,true,cc-by-sa,gold 137-769-352-454-091,MARITIME VIOLENCE : IMPLICATIONS TO MALAYSIA,2012-04-01,2012,journal article,Arena Hukum,01260235; 25274406,Brawijaya University,,Nurulizwan Ahmad Zubir,"Abstract Maritime Piracy has been a serious threat to the international community especially in the SoutheastAsia region. This threat has caused tremendous implications towards the world economy, environment,political stability of the nations involved because 45% of the shipping company passes through theSoutheast Asia. The worrying fact is that these attacks were committed by terrorists as well as traditionalmaritime pirates. This paper examines on the implications of maritime crime in Malaysia and discusseswhether the definition of piracy under the International Law could be applied to these attacks. Thispaper concludes that cooperation between the region’s states and the enhancement of a good securitysystem of one state are needed to combat maritime violence. Thus it is imperative that the internationallaw need to be changed in order to enhance the meaning of piracy and also to include sea terrorism. Key words: piracy, maritime, terrorist",5,1,48,53,Economy; International trade; Political science; Order (exchange); Terrorism; State (polity); World economy; International community; Meaning (existential); Political stability; International law,,,,,https://arenahukum.ub.ac.id/index.php/arena/article/view/121 https://arenahukum.ub.ac.id/index.php/arena/article/download/121/124,http://dx.doi.org/10.21776/ub.arenahukum.2012.00501.6,,10.21776/ub.arenahukum.2012.00501.6,1777188231,,0,,1,true,cc-by-nc,gold 138-123-872-317-422,The Tape Piracy Cases: Judicial Creations of a Federal Copyright Interest in Sound Recordings,,1976,journal article,Boston College Law Review,01616587,,,John P Messina,,17,2,169,,Advertising; Sound (geography); History,,,,,https://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=1509&context=bclr https://lawdigitalcommons.bc.edu/bclr/vol17/iss2/2/,https://lawdigitalcommons.bc.edu/bclr/vol17/iss2/2/,,,1532093525,,0,,0,false,, 138-388-042-274-113,"Global Software Piracy, Technology and Property Rights Institutions",,2020,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Simplice A. Asongu,"This study extends the literature on fighting software piracy by investigating how Intellectual Property Rights (IPRs) regimes interact with technology to mitigate software piracy when existing levels of piracy are considered. Two technology metrics (internet penetration rate and number of PC users) and six IPRs mechanisms (constitution, IPR law, main IP laws, WIPO Treaties, bilateral treaties and multilateral treaties) are used in the empirical analysis. The statistical evidence is based on: ; ; (i) a panel of 99 countries for the period 1994-2010 and ; ; (ii) interactive contemporary and non-contemporary Quantile regressions.; ; The findings show that the relevance of IPR channels in the fight against software piracy is noticeably contingent on the existing levels of technology embodied in the pirated software. There is a twofold policy interest for involving modern estimation techniques such as interactive Quantile regressions. First, it uncovers that the impact of IPR systems on software piracy may differ depending on the nature of technologies used. Second, the success of initiatives to combat software piracy is contingent on existing levels of the piracy problem. Therefore, policies should be designed differently across nations with high-, intermediate- and low-levels of software piracy.",,,,,Business; Relevance (law); Constitution; Software; Internet penetration; Global software; Intellectual property; Industrial organization; Business software; Property rights,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3562718,http://dx.doi.org/10.2139/ssrn.3562718,,10.2139/ssrn.3562718,3198507713,,0,001-516-315-009-055; 003-120-061-431-142; 005-531-513-056-742; 006-913-640-297-530; 007-559-358-394-991; 011-854-259-515-280; 012-203-539-243-07X; 013-765-194-873-383; 015-808-798-057-897; 016-623-013-143-177; 017-185-878-435-039; 018-931-875-920-651; 022-027-708-413-061; 026-621-534-864-651; 028-630-596-457-020; 029-945-161-770-934; 032-190-043-969-454; 037-712-830-063-915; 039-883-767-744-759; 041-849-157-283-572; 041-893-696-570-720; 046-534-914-774-543; 047-010-436-077-442; 047-691-102-180-446; 049-698-234-112-01X; 053-260-194-352-227; 053-956-378-667-86X; 054-549-558-630-210; 054-575-891-386-310; 058-682-219-560-287; 062-169-487-131-224; 081-895-720-913-94X; 084-276-283-502-216; 086-528-214-511-515; 097-165-496-887-789; 107-007-285-779-662; 115-121-431-459-018; 118-179-693-472-854; 125-495-818-933-457; 133-793-936-162-353; 139-864-136-469-932; 144-135-264-427-99X; 145-811-348-738-768; 152-338-109-829-358; 156-200-179-267-390; 164-865-263-777-832; 185-197-322-646-367,0,true,,green 138-572-787-374-194,The Internet and Copyright Protection: Are We Producing a Global Generation of Copyright Criminals,,2011,journal article,Jeffrey S. Moorad Sports Law Journal,10749187,,,F. D. O. Oduor,"The advent of the Internet poses fundamental changes in social norms, politics and economics in society. The belief in cyber anarchy; ""do not touch the Internet"" mantra, has fundamentally altered the understanding of copyright laws amongst the present generation. Subsequently an aversion for property rights, as understood by well established copyright laws has, developed manifesting itself mainly through piracy. The evolution of technology in tandem with the Internet has further exacerbated the situation as a whole, generations that enjoy entertainment find it much easier to infringe on a litany of copyright laws. Taking into account the established norms of property or copyright protection, is it not clear, with growing copyright malcontents and malfeasance, that we are simply producing a global generation of copyright criminals. This discourse explores the veracity of this statement by taking into account the nature of the Internet, the emergence of digital copying and sharing, alongside the fluid perceptions of copyright",18,2,501,,Technological evolution; The Internet; Business; Property (philosophy); Law and economics; Mantra; Copying; Entertainment; Property rights; Politics,,,,,https://digitalcommons.law.villanova.edu/mslj/vol18/iss2/6/ https://digitalcommons.law.villanova.edu/cgi/viewcontent.cgi?article=1025&context=mslj,https://digitalcommons.law.villanova.edu/mslj/vol18/iss2/6/,,,3121476150,,0,,0,false,, 138-588-100-835-289,"Deliberate, Principled, Self-Interested Law Breaking: The Ethics of Digital ‘Piracy’",2018-08-29,2018,journal article,Oxford Journal of Legal Studies,01436503; 14643820,Oxford University Press (OUP),United Kingdom,Hugh Breakey,"Is digital piracy—understood as illegally accessing or using copyrighted works, such as through a file-sharing platform—morally wrong? Such piracy typically falls into the intriguing category of self-interested law breaking, performed deliberately and in the context of a principled disagreement with the law. Existing treatments of the ethics of piracy fail to consider the full sweep of moral considerations implicated by such law breaking, collapsing the question into deceptively narrow enquiries. I argue that there are many reasons, some stemming from quite surprising sources, for respecting copyright law, even for those who think the law is unjust, are sceptical of the law’s democratic legitimacy, and are frustrated at the immoral behaviour of large corporate content providers.",38,4,676,705,Political science; Skepticism; Law; Context (language use); Digital piracy; Copyright law; Democratic legitimacy,,,,,https://research-repository.griffith.edu.au/handle/10072/384213 https://philpapers.org/rec/BREDPS https://academic.oup.com/ojls/article-abstract/38/4/676/5086415,http://dx.doi.org/10.1093/ojls/gqy020,,10.1093/ojls/gqy020,2889479488,,0,,1,true,,green 138-589-981-425-160,The Utilization of Digital Platforms for Marketing in the Nigerian Entertainment and Media (E&M) Industry: Prospects and Challenges,2018-06-02,2018,journal article,Case Studies in Business and Management,23333324,"Macrothink Institute, Inc.",,Nelson Obinna Omenugha,"The National Bureau of Statistics recently announced that the entertainment and media (EM contributing N54bn to the country’s GDP. The industry’s revenue is projected to reach an estimated $8.5bn in 2018, from $4bn in 2013, with internet as one of the key drivers (PwC report, 2016, p.14). This comes at a time when Nigeria’s economy has shrunk by 2.24% since 2015 and receded by 0.18% from the previous quarter. Therefore, this study unpacks the possibilities and challenges of the impact of e-marketing tools on the growth of the Nigerian EM ultimately impacting the marketing realms. The internet enables these electronic/digital platforms; which marketers (EM poor power supply and unreliable network infrastructure in the country. There is also an increased customer expectation, security, content copyright and privacy issues as well as the challenge of compliance demand in the industry as influenced by ever dynamic digital boundaries. There is a huge economic need for the Nigerian government to live up to its obligation and enhance power supply and boost network infrastructure. The Nigerian E&M industry needs to continually integrate different digital platforms to reach targets and attract more content consumers. Both the government and industry should increasingly learn and bring a global perspective that can help the nation adapt to the constantly changing digital environment.",5,1,60,,The Internet; Business; Government; Marketing; Quarter (United States coin); Revenue; Key (cryptography); Power (social and political); Obligation; Entertainment,,,,,https://www.macrothink.org/journal/index.php/csbm/article/view/13240 https://macrothink.org/journal/index.php/csbm/article/download/13240/10464 https://core.ac.uk/download/189233874.pdf,http://dx.doi.org/10.5296/csbm.v5i1.13240,,10.5296/csbm.v5i1.13240,2807218191,,0,,2,true,,bronze 138-677-629-351-211,Eco-Terrorism and Piracy on the High Seas: Japanese Whaling and the Rights of Private Groups to Enforce International Conservation Law in Neutral Waters,,2009,journal article,Villanova Environmental Law Journal,10492631,,,Joseph Elliott Roeschke,,20,1,99,,International waters; Political science; Law and economics; Law; Terrorism; Watson; Conservation law; Whaling,,,,,https://digitalcommons.law.villanova.edu/elj/vol20/iss1/6/ https://digitalcommons.law.villanova.edu/cgi/viewcontent.cgi?article=1043&context=elj,https://digitalcommons.law.villanova.edu/elj/vol20/iss1/6/,,,2276881995,,0,,13,false,, 138-807-170-379-407,Cyberpiracy and morality: Some utilitarian and deontological challenges,,2010,journal article,Filozofija i drustvo,03535738; 23348577,National Library of Serbia,,Zeljko Mancic,"This paper analyses one of the main problems of our time in the world of; Internet – cyber piracy. It is often said that it is illegal, since pirates; who practice it violate certain domestic and international laws. When we ask; for justification of this laws and their enforcement, philosophers and; legalists usually apply to one of the two sorts of philosophical arguments -; deontology and utilitarianism. The former think that piracy is immoral in; itself, while the others argue it should be prevented, otherwise it will; produce very bad consequences for society sooner or later, and thus diminish; the overall happiness of the society. It will be shown, howe­ver, that both; of these arguments, when closely considered, fail with their intention, and,; if we decide to follow them, we actually arrive to the very opposite; conclusion - piracy is justified.",21,3,103,117,The Internet; Sociology; Law; Morality; Happiness; Enforcement; Intellectual property; Utilitarianism; Deontological ethics; International law,,,,,http://www.doiserbia.nb.rs/Article.aspx?ID=0353-57381003103M https://doaj.org/article/7430bc0a4ca542719092db18a15e6c12 http://www.doiserbia.nb.rs/ft.aspx?id=0353-57381003103M,http://dx.doi.org/10.2298/fid1003103m,,10.2298/fid1003103m,2032208184,,0,124-755-158-715-48X,1,true,cc-by-nc-nd,gold 138-817-853-250-492,Cultivating Cyber-Phronesis: a new educational approach to tackle cyberbullying,,2016,journal article,Pastoral Care in Education,02643944; 14680122,Informa UK Limited,United States,Tom Harrison,"AbstractCyberbullying is a pervasive and troubling moral concern for teachers, schools, parents and pupils. As children and young people in England are now more likely to be bullied online than face-to-face, this article explores if there is a need to rethink traditional educational approaches to dealing with the issue. The article starts with a critique of the current dominant approaches to tackling cyberbullying in schools, which draw predominantly on deontological and utilitarian moral philosophies. It then details what an Aristotelian character education approach to cyberbullying would consist of. At its heart is a requirement to enable children and young people to become digitally virtuous citizens, through the development of cyber-phronesis. The article concludes with a description of moral educational interventions that would increase the likelihood of children and young people making both ‘good’ and ‘wise’ choices when online.",34,4,232,244,Computer-mediated communication; Sociology; Pedagogy; Virtue; Character education; Virtue ethics; Phronesis; Values education; Intervention (counseling); Moral development,,,,,https://research.birmingham.ac.uk/portal/files/30649724/Harrison_Cultivating_Cyber_Phronesis_Pastoral_Care_Education.pdf https://research.birmingham.ac.uk/portal/en/publications/cultivating-cyberphronesis(11943d72-da44-4063-9ca1-7bd90cca3147)/export.html https://eric.ed.gov/?id=EJ1120010 https://www.tandfonline.com/doi/full/10.1080/02643944.2016.1202307 https://core.ac.uk/download/pdf/267293921.pdf,http://dx.doi.org/10.1080/02643944.2016.1202307,,10.1080/02643944.2016.1202307,2461312464,,0,001-051-599-934-578; 001-650-835-010-727; 002-488-252-834-55X; 002-595-185-939-426; 008-367-715-795-153; 008-677-861-821-253; 008-995-697-267-134; 009-492-524-024-910; 010-825-393-310-025; 011-402-512-940-68X; 013-304-192-521-630; 014-085-206-895-73X; 017-420-210-120-990; 018-041-941-857-976; 029-274-486-631-583; 032-348-912-348-922; 033-524-232-619-932; 034-421-216-486-193; 035-217-131-211-885; 036-872-071-993-199; 038-006-389-328-342; 038-526-915-172-747; 041-787-960-603-044; 044-241-926-873-889; 046-091-041-778-27X; 048-967-026-075-185; 051-295-390-457-656; 052-507-406-274-407; 053-887-605-009-220; 054-465-043-618-548; 061-329-838-516-665; 062-402-196-996-277; 065-860-256-736-619; 065-924-835-422-518; 066-110-841-468-110; 070-178-345-736-644; 078-221-917-889-593; 079-454-232-877-411; 081-906-728-085-449; 082-067-286-082-495; 082-203-735-607-968; 084-502-083-697-859; 085-234-454-370-790; 085-462-201-453-963; 085-858-950-398-51X; 088-248-367-009-426; 090-503-785-071-350; 094-665-657-485-310; 100-735-413-339-073; 105-032-455-954-163; 107-268-866-924-464; 107-348-417-993-384; 107-673-288-355-739; 113-534-863-847-391; 116-459-427-083-462; 128-991-649-925-166; 129-886-646-052-12X; 131-436-169-936-662; 131-457-991-553-407; 133-402-151-156-833; 135-323-542-145-661; 137-082-465-165-236; 140-469-055-509-379; 141-683-041-187-288; 147-884-444-170-412; 155-708-000-025-713; 170-645-253-108-830; 172-074-501-754-521; 172-162-406-273-738; 176-853-608-437-372; 182-447-663-553-759; 187-423-311-928-321; 188-111-322-392-415; 191-195-607-502-808; 193-555-099-399-46X; 198-482-607-127-848,33,true,,green 138-974-130-321-161,"Piracy, a Crime of Universal Jurisdiction: A Perspective into the History of United States Piracy Jurisprudence, its English Common Law Roots, and Relationship with the Law of Nations",,2019,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Evan Gruetter,,,,,,Common law; Political science; United Nations Convention on the Law of the Sea; Law; Criminal law; Universal jurisdiction; Jurisdiction; Criminal code; Law of the sea; International law,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3818633 https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID3818633_code4652094.pdf?abstractid=3818633&mirid=1,http://dx.doi.org/10.2139/ssrn.3818633,,10.2139/ssrn.3818633,3186973118,,0,,0,false,, 138-992-993-941-058,Prosecuting privateers for piracy: How piracy law transitioned from treason to a crime against property,2016-11-25,2016,journal article,International Journal of Maritime History,08438714; 20527756,SAGE Publications,United States,Sarah Craze,"In the late seventeenth century, the battle for the English throne between the anointed King James II and his usurper and son-in-law William precipitated a shift in the legal interpretation of piracy. The trial in 1694 of eight of King James’ privateers, and specifically the position of their advocate, William Oldish, significantly influenced this shift. Oldish claimed that allegiance to a sovereign was a choice, not an obligation, and this shaped the development of the law relating to piracy, which became a crime of property rather than a crime of treason. This transition was embodied in the Piracy Act of 1698. But as this legislation expired after only seven years, the passing of the 1708 Prize Act occurred in a legislative environment at odds with the precedents being set in courts at the time. The aim of this article is to set the legislation of the 1690s in a long-term context to offer a clearer understanding of the evolution of the law pertaining to private prize-taking activity at sea.",28,4,654,670,Sovereignty; Law; Allegiance; Legislation; Obligation; Battle; Throne; Context (language use); Interpretation (philosophy); History,,,,,https://minerva-access.unimelb.edu.au/handle/11343/123932 http://journals.sagepub.com/doi/full/10.1177/0843871416663987 https://dialnet.unirioja.es/servlet/articulo?codigo=5783192 https://journals.sagepub.com/doi/full/10.1177/0843871416663987,http://dx.doi.org/10.1177/0843871416663987,,10.1177/0843871416663987,2550279077,,0,,0,false,, 139-021-614-626-504,Piracy by Memorization,,1875,journal article,The American Law Register (1852-1891),15583813,JSTOR,,James Appleton Morgan,,23,4,207,,Psychology; Cognitive science; Memorization,,,,,https://scholarship.law.upenn.edu/cgi/viewcontent.cgi?article=2699&context=penn_law_review https://core.ac.uk/display/151685577 https://scholarship.law.upenn.edu/penn_law_review/vol23/iss4/2/ https://core.ac.uk/download/151685577.pdf,http://dx.doi.org/10.2307/3304504,,10.2307/3304504,766488136,,0,,0,true,, 139-041-303-026-120,Deterrence and Digital Piracy,2007-12-03,2007,journal article,Social Science Computer Review,08944393; 15528286,SAGE Publications,United States,Scott E. Wolfe; George E. Higgins; Catherine D. Marcum,"Digital piracy has been shown to be an emerging societal problem. However, research has demonstrated limited techniques that effectively combat digital piracy. The purpose of the present study is to examine the utility of computer viruses in deterring digital piracy. The findings from responses to a survey of college students revealed that fear of computer viruses may influence respondents' intentions to engage in digital piracy. The policy implications of this finding are discussed.",26,3,317,333,Criminal justice; Internet privacy; Advertising; Computer virus; Deterrence (psychology); Virtual space; Digital piracy,,,,,http://ssc.sagepub.com/content/26/3/317.short https://dl.acm.org/doi/10.1177/0894439307309465 http://journals.sagepub.com/doi/pdf/10.1177/0894439307309465 https://libres.uncg.edu/ir/listing.aspx?id=9287 https://works.bepress.com/catherine-marcum/62/ https://libres.uncg.edu/ir/asu/f/Marcum_CD_2008_Deterrence_and_Digital_Piracy.pdf https://journals.sagepub.com/doi/10.1177/0894439307309465,http://dx.doi.org/10.1177/0894439307309465,,10.1177/0894439307309465,2148381258,,0,003-621-909-349-361; 005-136-753-965-857; 005-745-685-547-074; 006-317-517-652-647; 008-669-373-663-807; 010-124-089-161-975; 011-970-832-954-189; 012-379-692-154-152; 012-558-297-950-849; 013-953-633-484-813; 014-082-506-216-299; 020-973-534-331-792; 023-817-734-477-547; 024-178-065-161-008; 025-882-454-923-868; 026-283-018-089-565; 026-410-926-652-770; 031-251-033-679-947; 032-653-897-764-354; 037-721-905-792-43X; 038-703-907-935-470; 039-694-917-895-93X; 041-756-193-271-330; 046-989-664-357-368; 047-114-700-212-575; 050-606-251-919-709; 053-117-697-091-733; 054-205-933-336-306; 055-408-413-936-398; 059-165-179-123-111; 062-510-474-576-968; 064-354-379-549-444; 067-339-005-241-596; 071-188-859-738-263; 072-084-774-976-983; 074-777-270-980-043; 078-291-918-186-797; 084-682-497-820-061; 085-432-210-322-220; 092-122-423-208-798; 092-123-502-721-527; 092-945-483-843-213; 095-396-521-604-871; 096-401-039-718-213; 098-570-250-639-553; 099-342-173-833-089; 103-013-463-998-215; 108-737-313-212-075; 115-315-697-698-96X; 128-354-106-684-501; 139-480-929-517-938; 145-510-833-132-330; 146-116-469-575-960; 159-111-160-252-978; 160-358-377-281-104; 168-253-262-507-724; 169-182-126-370-509; 170-923-251-762-481; 171-227-733-317-177; 175-009-499-869-095; 175-905-268-229-256; 193-423-519-073-147; 198-741-956-517-151,61,false,, 139-051-619-347-069,PENEGAKAN HUKUM TERHADAP PELANGGARAN HAK CIPTA PEMBAJAKAN SOFTWARE DI INDONESIA,2012-01-02,2012,journal article,QISTIE,2621718x; 19790678,Universitas Wahid Hasyim Semerang,,Nuzulia Kumala Sari,"Most of the software circulating in Indonesia is piracy. Software piracy on the market of course is much cheaper price. But this violates Copyright. In 2007, the commercial  value  of  unlicensed  software  installed  on  personal  computers  in Indonesia account for about 7 times greater than the loss in 2003 is $ 157 million. While in 2009 the losses reached $ 886 million. In Year 2010, Based on annual data reported by International Data Corporation (IDC) Indonesia ranks 11th of 31 countries with piracy  rates of 87 percent  in 2010, while  the commercial value of pirated software amounting to $ 1.322 billion. Data from year to year increasing demands for software piracy in Indonesia, the Business Software Alliance (BSA) released the latest statistical data back to the year 2012 on the countries of the world's  largest software piracy, and Indonesia are  in  the order of  the seven  largest pirate nation. Pirated software on the market of course much cheaper . But this violates Copyright. Law enforcement against  the perpetrators of piracy should be a priority at  this  time.Keywords  : Rule of Law, Copyright  Infringement, Software Piracy.",6,1,,,,,,,,,http://dx.doi.org/10.31942/jqi.v6i1.551,,10.31942/jqi.v6i1.551,,,0,,0,false,, 139-116-248-272-276,Maritime piracy operations: Some legal issues,2020-07-02,2020,journal article,"Journal of International Maritime Safety, Environmental Affairs, and Shipping",25725084,Informa UK Limited,,Mazyar Ahmad,"The international legal regime pertaining to maritime piracy has developed and grown over the years. These changes were prompted due to lacunas in the legal system, which surfaced when the codified...",4,3,62,69,Political science; United Nations Convention on the Law of the Sea; Public international law; Law; Maritime piracy,,,,,https://www.tandfonline.com/doi/pdf/10.1080/25725084.2020.1788200 https://www.tandfonline.com/doi/full/10.1080/25725084.2020.1788200,http://dx.doi.org/10.1080/25725084.2020.1788200,,10.1080/25725084.2020.1788200,3039364480,,0,005-166-417-199-767; 009-149-887-226-417; 010-504-537-795-651; 010-706-374-296-342; 013-819-248-255-259; 015-272-798-961-71X; 015-284-299-131-912; 017-454-773-010-504; 018-656-999-902-160; 018-657-495-755-544; 020-482-566-227-31X; 025-361-986-429-808; 025-784-266-343-445; 030-203-355-031-657; 032-660-778-850-116; 032-840-316-028-169; 033-490-454-378-473; 035-031-511-531-578; 039-036-972-553-110; 042-156-996-724-548; 044-453-689-489-238; 045-672-009-838-323; 048-269-181-213-148; 048-948-096-294-742; 051-387-810-880-935; 051-393-025-360-687; 056-479-365-948-849; 061-410-471-880-732; 061-453-006-799-349; 063-203-515-670-958; 072-747-650-767-009; 089-572-702-832-761; 092-254-105-432-975; 095-996-521-527-481; 101-619-692-261-018; 101-963-007-498-854; 103-708-258-610-200; 104-812-118-043-052; 106-619-699-607-570; 112-756-060-430-338; 114-218-856-966-220; 124-352-108-007-294; 124-870-953-344-239; 126-314-114-958-470; 132-674-615-470-357; 134-663-284-553-092; 138-279-818-134-52X; 140-885-202-314-567; 142-654-097-542-318; 166-991-318-248-349; 167-575-945-647-844; 168-404-940-361-871; 172-040-164-920-06X; 177-477-904-466-864; 179-245-562-746-996,4,true,"CC BY, CC BY-NC",gold 139-461-031-996-254,What to Do About Digital Piracy,,2015,journal article,Chicago Daily Law Bulletin,,,,Doris E Long,,161,,,,Digital piracy; Computer security,,,,,http://works.bepress.com/doris_long/79/,http://works.bepress.com/doris_long/79/,,,2296845262,,0,,0,false,, 139-464-232-474-798,The Mauritian Piracy Act: A Comment on the Director of Public Prosecutions v Ali Abeoulkader Mohamed Decision,2017-01-02,2017,journal article,Ocean Development & International Law,00908320; 15210642,Informa UK Limited,United Kingdom,Jamil Ddamulira Mujuzi,"ABSTRACTIn 2011 Mauritius adopted the Piracy and Maritime Violence Act (the Act). The Act does not expressly state that Mauritian Courts have jurisdiction over offenses committed outside of Mauritius. In Director of Public Prosecutions v Ali Abeoulkader Mohamed & Ors, the Mauritian Supreme Court dealt with the issue of whether the Act applied to non-Mauritius citizens where the alleged piracy acts had been committed outside of Mauritius on the high seas. This article assesses the Supreme Court's decision and suggest ways that the Act can be strengthened.",48,1,69,78,International waters; Political science; Law; State (polity); Jurisdiction; Supreme court,,,,,https://www.tandfonline.com/doi/full/10.1080/00908320.2017.1265366,http://dx.doi.org/10.1080/00908320.2017.1265366,,10.1080/00908320.2017.1265366,2583186163,,0,,0,false,, 139-552-084-078-426,On UNCLOS and combating of piracy,,2009,journal article,Journal of Dalian Maritime University,,,,YU Jian-li,"On the basis of introduction of the definition of piracy,universal jurisdiction,right of visit and hot pursuit stipulated by UNCLOS,the paper analyzed deficiencies of those stipulations and put forward methods on how to improve these issues.",,,,,Political science; United Nations Convention on the Law of the Sea; Law; Universal jurisdiction; Hot pursuit,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-DLHX200904002.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-DLHX200904002.htm,,,2347953773,,0,,0,false,, 139-864-136-469-932,Software Piracy in Research: A Moral Analysis,2014-07-09,2014,journal article,Science and engineering ethics,14715546; 13533452,Springer Netherlands,United Kingdom,Gary Santillanes; Ryan Marshall Felder,"Researchers in virtually every discipline rely on sophisticated proprietary software for their work. However, some researchers are unable to afford the licenses and instead procure the software illegally. We discuss the prohibition of software piracy by intellectual property laws, and argue that the moral basis for the copyright law offers the possibility of cases where software piracy may be morally justified. The ethics codes that scientific institutions abide by are informed by a rule-consequentialist logic: by preserving personal rights to authored works, people able to do so will be incentivized to create. By showing that the law has this rule-consequentialist grounding, we suggest that scientists who blindly adopt their institutional ethics codes will commit themselves to accepting that software piracy could be morally justified, in some cases. We hope that this conclusion will spark debate over important tensions between ethics codes, copyright law, and the underlying moral basis for these regulations. We conclude by offering practical solutions (other than piracy) for researchers.",21,4,967,977,Philosophy of science; Ethical code; Commit; Economics; Human rights; Law and economics; Law; Fair use; Personal rights; SPARK (programming language); Intellectual property,,"Authorship; Codes of Ethics; Copyright/ethics; Ethical Analysis; Ethics, Research; Human Rights; Humans; Morals; Research Personnel/ethics; Science/ethics; Software; Theft",,,https://pubmed.ncbi.nlm.nih.gov/25005342/ https://www.ncbi.nlm.nih.gov/pubmed/25005342 http://ethics.iit.edu/eelibrary/node/14115 https://doi.org/10.1007/s11948-014-9573-5 https://ethics-t.iit.edu/eelibrary/node/14115 http://dx.doi.org/10.1007/s11948-014-9573-5 https://philpapers.org/rec/SANSPI-5 https://dblp.uni-trier.de/db/journals/see/see21.html#SantillanesF15 https://link.springer.com/article/10.1007/s11948-014-9573-5/fulltext.html https://dx.doi.org/10.1007/s11948-014-9573-5 https://link.springer.com/article/10.1007/s11948-014-9573-5,http://dx.doi.org/10.1007/s11948-014-9573-5,25005342,10.1007/s11948-014-9573-5,2130220180,,0,005-512-762-618-706; 007-199-561-474-907; 011-110-920-385-887; 018-985-303-553-618; 020-913-699-069-433; 041-776-776-266-566; 045-236-610-023-378; 045-447-709-371-663; 052-861-169-338-340; 055-952-859-789-15X; 078-729-836-382-763; 085-674-572-532-921; 099-901-401-567-789; 144-297-748-217-034; 148-513-182-841-557; 188-213-907-072-123; 193-023-397-772-093,9,false,, 140-014-840-564-225,Children and Marine Piracy,,2014,journal article,Case Western Reserve Journal of International Law,00087254,,,Shelly L. Whitman,,46,1,217,,Political science; Law; Maritime piracy,,,,,https://scholarlycommons.law.case.edu/jil/vol46/iss1/11/ https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1036&context=jil,https://scholarlycommons.law.case.edu/jil/vol46/iss1/11/,,,1833530334,,0,,0,false,, 140-065-253-734-242,Piracy - A Modern Perspective,1998-10-30,1998,journal article,QUT Law Review,22017275,,,Donna Sinopoli,"This article considers the various definitions of piracy and how they inter-relate or complement each other. It also critically analyses the international law definition, particularly in its modern context. Finally, this article focuses on piracy in South East Asia, measures taken to control piracy in the region and suggests further action which can be taken to reduce the incidents of piracy in South East Asia and in other regions throughout the world where piracy is endemic.",14,1998,159,175,Advertising; Economy; Publishing; Project commissioning; Political science; Law; Perspective (graphical); Context (language use); South east asia; International law,,,,,https://paperity.org/p/78508010/piracy-a-modern-perspective https://lr.law.qut.edu.au/article/download/459/446,https://paperity.org/p/78508010/piracy-a-modern-perspective,,,2193616280,,0,,0,true,cc-by,gold 140-105-733-141-028,Piracy on the decline in Taiwan,,1994,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1994,6,5,5,Business,,,,,,http://dx.doi.org/10.1016/0142-0496(94)90117-1,,10.1016/0142-0496(94)90117-1,,,0,,0,false,, 140-563-051-833-586,Piracy in West part of the Malacca Strait is subject to General Jurisdiction,,2011,journal article,Southeast Asian Affairs,17939135,,,Xue Li,"In the long term,navigational security for the Straits of Malacca has been manipulated by those littoral countries which exclude direct involvement of non-littoral countries for piracy in the strait.Based on attentive analysis on relevant statistical data and international laws such as UNCLOS,the paper argues that most of piracy happened in the west part of the strait and is subject to general jurisdiction,and that the exclusive claim from littoral countries is lack of foundation of international laws,though current anti-piracy institution mainly enforced by them has almost eliminated piracy in the strait for good.",,,,,Political science; United Nations Convention on the Law of the Sea; Law; Jurisdiction; General jurisdiction; Subject (philosophy); Institution; International law,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-LYWT201104005.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-LYWT201104005.htm,,,2378000186,,0,,0,false,, 140-707-124-571-151,As if for an Act of Piracy,,1922,journal article,American Journal of International Law,00029300; 21617953,Cambridge University Press (CUP),United States,Chandler P. Anderson,,16,2,260,261,,,,,,http://www.jstor.org/stable/2187719?origin=crossref,http://dx.doi.org/10.2307/2187719,,10.2307/2187719,2320551317,,0,,0,false,, 141-205-699-469-787,Asian software piracy,,1991,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1991,8,3,4,Computer security; Computer science; Software; Business; Operating system,,,,,,http://dx.doi.org/10.1016/0142-0496(91)90267-9,,10.1016/0142-0496(91)90267-9,,,0,,0,false,, 141-267-789-196-042,CSDP and the open method of coordination: Developing the EU's comprehensive approach to security,,2017,journal article,Journal of Regional Security,2217995x; 24060364,Centre for Evaluation in Education and Science (CEON/CEES),,Simon Sweeney; Neil Winn,"How can we best describe the operation of the Common Security and Defence Policy (CSDP), and how can we improve policy-making in CSDP? The Open Method of Coordination (OMC) is predicated on the conviction that there are clear limits to the extent that European Union (EU) foreign and security policy can be strengthened through the restricting tendencies of intergovernmental cooperation between EU member states. Permanent Structured Cooperation (PESCO) – agreed by the European Council and 25 EU member states in 2017 – offers practical instruments towards delivering value-added capacity to the process of crisis management beyond intergovernmentalism. As a process, PESCO is analogous to the logic of OMC, including more appropriate levels of coordination at the national organisational level in order to effectively facilitate the EU’s comprehensive approach to conflict prevention and crisis management. The requirement for new and “open” types of EU foreign and security policy coordination is underlined by the immense differences between EU member states in external policy, both concerning national crisis management structures and the resulting inefficient segmentation of policy at the EU level.",12,2,95,122,Security policy; International trade; Political science; Order (exchange); Intergovernmentalism; Conviction; Common Security and Defence Policy; Open method of coordination; Crisis management; European union,,,,,https://scindeks.ceon.rs/article.aspx?artid=2217-995X1702095S https://core.ac.uk/display/151211617 https://doaj.org/article/3469bfe7f28349af8e79579d1a14382d https://scindeks-clanci.ceon.rs/data/pdf/2217-995X/2017/2217-995X1702095S.pdf https://eprints.whiterose.ac.uk/128138/ https://core.ac.uk/download/151211617.pdf,http://dx.doi.org/10.11643/issn.2217-995x172sps82,,10.11643/issn.2217-995x172sps82,2801082214,,0,002-108-480-224-190; 002-606-093-401-259; 011-806-174-828-900; 094-467-835-490-853; 148-773-299-961-959; 159-073-663-867-427; 167-189-317-670-095; 168-785-763-435-340,3,true,cc-by-nc-sa,gold 141-416-840-682-879,Global Online Piracy Study,,2018,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,João Pedro Quintais; Joost Poort,"The percentage of Internet users in Europe that occasionally download or stream music, films, series, books or games illegally has decreased between 2014 and 2017. The decrease is greatest for music, films and series. Meanwhile, expenditure on legal content has increased since 2014. This follows from the Global Online Piracy Study that the Institute for Information Law (IViR) of the University of Amsterdam published today.",,,,,Advertising; Political science; Download; Internet users,,,,,https://www.narcis.nl/publication/RecordID/oai%3Adare.uva.nl%3Apublications%2F2b683b47-51b1-400d-9be2-38d7bdaf3682 https://www.ssrn.com/abstract=3224323 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3224323 https://pure.uva.nl/ws/files/28965065/Global_Online_Piracy_Study_Kluwer_Copyright_Blog.pdf https://dare.uva.nl/search?identifier=2b683b47-51b1-400d-9be2-38d7bdaf3682,http://dx.doi.org/10.2139/ssrn.3224323,,10.2139/ssrn.3224323,2899481113,,0,006-088-445-143-408; 007-011-066-832-810; 007-483-988-718-032; 012-663-784-807-999; 023-129-665-288-128; 028-583-457-648-098; 030-437-185-681-738; 033-515-397-981-935; 036-530-721-470-219; 039-886-464-807-920; 040-346-947-542-291; 046-123-927-851-054; 046-232-044-563-596; 055-149-380-207-450; 055-264-899-347-306; 057-333-560-358-777; 075-439-907-756-802; 076-438-835-821-389; 077-884-090-484-950; 088-529-327-154-179; 093-158-826-763-05X; 136-039-565-798-356; 141-013-526-650-848; 141-416-840-682-879; 142-855-343-459-968; 173-259-717-688-022,10,true,cc-by-nd,green 142-000-089-361-16X,Assessing Current Trends and Efforts to Combat Piracy: A Case Study on Kenya,,2014,journal article,Case Western Reserve Journal of International Law,00087254,,,Rosemelle Mutoka Hon.,,46,1,125,,Current (fluid); Political science; Law; Development economics,,,,,https://scholarlycommons.law.case.edu/jil/vol46/iss1/7/ https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1032&context=jil,https://scholarlycommons.law.case.edu/jil/vol46/iss1/7/,,,1871155716,,0,,1,false,, 142-288-894-703-826,TRIPS and intellectual property law reform in Indonesia: Why injuctions aren't stopping piracy,,2005,journal article,Harvard Asia Pacific Review,15221113,,,T Lindsey; S Butt,,8,2,,,Business; TRIPS architecture; Law and economics; Intellectual property,,,,,,,,,3121636616,,0,,0,false,, 142-622-998-349-885,Piracy in the Courtroom: How to Salvage $500 Million in Sunken Treasure Without Making a Cent,,2013,journal article,University of Miami law review,00419818,,,Dave Werner,,67,4,105,,Law; Treasure; History,,,,,https://repository.law.miami.edu/cgi/viewcontent.cgi?article=1051&context=umlr https://repository.law.miami.edu/umlr/vol67/iss4/11/,https://repository.law.miami.edu/umlr/vol67/iss4/11/,,,41925353,,0,,0,false,, 142-654-097-542-318,"""Yo Heave Ho!"": Updating America's Piracy Laws",,1990,journal article,California Western international law journal,08863210,,,Samuel Pyeatt Menefee,,21,1,9,,Political science; Law,,,,,https://scholarlycommons.law.cwsl.edu/cgi/viewcontent.cgi?article=1418&context=cwilj https://scholarlycommons.law.cwsl.edu/cwilj/vol21/iss1/9/,https://scholarlycommons.law.cwsl.edu/cwilj/vol21/iss1/9/,,,1044873373,,0,,1,false,, 142-955-211-800-253,Motion Picture Piracy in China: Rated ARRRGH!,,2006,journal article,Brooklyn journal of international law,07404824,,,Jessica Haber,,32,1,5,,Advertising; Political science; China; Motion picture,,,,,https://brooklynworks.brooklaw.edu/cgi/viewcontent.cgi?article=1259&context=bjil http://brooklynworks.brooklaw.edu/bjil/vol32/iss1/5/,http://brooklynworks.brooklaw.edu/bjil/vol32/iss1/5/,,,2993966031,,0,,1,false,, 143-252-571-698-569,The Battle of Piracy versus Privacy: How the Recording Industry Association of America (RIAA) Is Using the Digital Millennium Copyright Act (DMCA) As Its Weapon Against Internet Users' Privacy Rights,,2004,journal article,California western law review,00081639,,,Jordana Boag,,41,1,5,,Internet privacy; Business; Music industry; Digital Millennium Copyright Act; Battle; Privacy rights; Internet users; Association (object-oriented programming),,,,,https://scholarlycommons.law.cwsl.edu/cwlr/vol41/iss1/5/ https://scholarlycommons.law.cwsl.edu/cgi/viewcontent.cgi?article=1137&context=cwlr,https://scholarlycommons.law.cwsl.edu/cwlr/vol41/iss1/5/,,,2992341801,,0,,3,false,, 143-305-326-137-342,Finding out the ‘Achilles’ Heels’,2012-03-01,2012,journal article,Journal of East Asia and international law,19769229,,,Manjiao Chi,"Piracy poses a great danger to international security and peace. It is necessary for the international community and individual States to take actions to suppress piracy. Despite international cooperation and existing international antipiracy laws, the international community lacks an effective legal regime to suppress piracy. China has fundamental interests in fighting against piracy and has actively cooperated in accordance with the relevant UNSC resolutions. However, China’s domestic antipiracy laws are defective in their substantive and procedural aspects. Further efforts should be made at both the national and international levels in order to effectively suppress global piracy.",5,1,7,36,Political science; United Nations Convention on the Law of the Sea; Law and economics; China; Law; Order (business); International community; International security,,,,,http://www.dbpia.co.kr/Article/NODE02169465,http://www.dbpia.co.kr/Article/NODE02169465,,,2204709287,,0,,0,false,, 143-351-308-732-209,"Spotlight on China: Piracy, Enforcement, and the Balance Dilemma in Intellectual Property Law",2009-01-01,2009,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Andrea Wechsler,,,,,,Dilemma; Intellectual property; Balance (ability); China; Law and economics; Law enforcement; Business; Enforcement; Property (philosophy); Law; Political science; Economics; Psychology; Philosophy; Epistemology; Neuroscience,,,,,,http://dx.doi.org/10.2139/ssrn.1354487,,10.2139/ssrn.1354487,,,0,000-455-185-234-488; 000-603-664-604-951; 003-368-523-265-361; 004-583-616-859-589; 005-324-105-730-986; 006-703-959-269-691; 007-178-312-289-783; 007-824-908-544-005; 008-896-495-853-748; 010-065-124-199-665; 012-377-277-377-034; 012-558-297-950-849; 013-672-657-560-840; 014-804-790-624-119; 014-807-528-318-355; 014-986-628-770-29X; 015-898-141-489-152; 015-966-189-786-406; 016-975-036-175-736; 019-562-943-840-115; 021-593-186-705-226; 023-026-222-547-045; 024-767-587-787-767; 024-825-697-126-268; 024-898-886-503-891; 025-964-206-526-731; 026-161-995-943-665; 027-097-899-433-30X; 027-730-359-102-99X; 030-324-674-860-736; 030-799-196-330-464; 032-268-654-041-521; 033-578-088-264-068; 033-884-226-022-231; 035-534-044-684-819; 037-202-532-704-251; 039-348-765-556-194; 040-624-382-861-515; 041-849-157-283-572; 041-893-696-570-720; 042-355-850-164-682; 043-228-179-137-606; 047-010-436-077-442; 047-459-081-367-167; 049-640-677-423-456; 049-813-154-354-036; 052-219-451-304-242; 053-088-654-972-792; 053-176-146-028-906; 053-176-445-484-311; 054-084-319-020-266; 054-894-491-177-446; 055-122-606-000-832; 059-077-318-219-51X; 060-150-698-455-226; 061-315-817-922-384; 061-652-540-399-339; 062-259-131-372-835; 063-327-391-019-550; 063-921-081-738-746; 064-475-755-894-921; 065-142-439-485-393; 065-657-617-085-185; 066-211-185-312-785; 066-237-973-648-031; 067-614-315-765-276; 070-051-909-647-949; 071-611-549-496-620; 071-874-161-853-649; 072-166-078-734-816; 072-849-114-408-683; 073-948-478-252-368; 074-814-777-733-99X; 075-544-455-853-752; 076-655-291-665-218; 077-174-208-827-888; 077-421-186-660-102; 077-902-271-849-425; 081-648-761-791-549; 082-361-467-044-145; 083-167-847-199-664; 085-088-750-585-056; 088-488-672-506-157; 090-001-709-942-310; 094-907-203-570-712; 096-089-875-782-145; 096-977-975-759-335; 099-154-751-943-661; 101-874-873-388-77X; 103-651-190-387-780; 103-876-297-371-727; 105-863-040-206-187; 106-508-221-330-267; 106-542-817-133-749; 106-669-720-893-811; 107-605-926-265-849; 111-622-105-510-826; 112-162-659-738-533; 113-336-817-074-87X; 115-304-838-515-01X; 117-316-021-511-226; 117-886-968-868-038; 118-675-220-855-858; 120-827-895-248-740; 125-033-211-284-343; 125-495-818-933-457; 127-993-476-752-30X; 128-076-088-312-693; 129-118-838-231-462; 129-154-209-747-00X; 137-429-017-447-192; 139-035-506-306-404; 143-574-680-284-498; 144-696-792-964-30X; 145-333-354-423-427; 146-662-793-305-936; 148-290-926-365-00X; 150-550-517-345-235; 155-534-328-419-698; 155-891-961-759-562; 162-569-143-343-758; 162-753-619-799-33X; 163-882-919-320-981; 166-455-684-528-560; 167-706-147-274-876; 169-034-234-050-444; 176-337-362-484-468; 191-743-161-257-653; 193-405-585-775-359; 194-166-540-493-770; 196-041-711-732-734,2,false,, 143-508-633-197-29X,Other information relevant to the law of the sea,2013-05-01,2013,journal article,Law of the Sea Bulletin,22186018; 10151885,United Nations Publications,,,"By paragraph 11 of Security Council resolution 2015 (2011) of 24 October 2011, I was requested to compile and circulate information received from Member States on measures they have taken to criminalize piracy under their domestic law and to prosecute and support the prosecution of individuals suspected of piracy off the coast of Somalia and the imprisonment of convicted pirates.",2012,79,67,132,Paragraph; Law; Imprisonment; Political science; United Nations Convention on the Law of the Sea; International law,,,,,,http://dx.doi.org/10.18356/fd7d8300-en,,10.18356/fd7d8300-en,,,0,,0,false,, 143-641-434-813-54X,A Review of the Intellectual Property Laws in Taiwan: Proposals to Curb Piracy and Counterfeiting in a Developing Country,,1988,journal article,BYU Law Review,0360151x,,,Paul C.B. Liu,,1988,3,619,642,Political science; Law; Intellectual property; Developing country,,,,,https://digitalcommons.law.byu.edu/cgi/viewcontent.cgi?article=1573&context=lawreview https://digitalcommons.law.byu.edu/lawreview/vol1988/iss3/8/,https://digitalcommons.law.byu.edu/lawreview/vol1988/iss3/8/,,,802285412,,0,,4,false,, 143-666-972-853-750,Fast lobbies MPs to fight piracy,,1994,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1994,7,1,2,Computer security; Business; Internet privacy; Computer science,,,,,,http://dx.doi.org/10.1016/0142-0496(94)90072-8,,10.1016/0142-0496(94)90072-8,,,0,,2,false,, 143-935-573-414-809,Efficiency of Law Enforcement Measures against the Act of Piracy under International Law: Focusing on Piracy in Waters off the Coast of Somalia,,2012,journal article,SungKyunKwan Law Review,1229943x,"Institute of Legal Studies, Sungkyunkwan University",,null 이세련,,24,2,673,696,Political science; Law; Law enforcement; International law,,,,,http://www.kci.go.kr/kciportal/landing/article.kci?arti_id=ART001671114,http://dx.doi.org/10.17008/skklr.2012.24.2.026,,10.17008/skklr.2012.24.2.026,2313393304,,0,,0,true,cc-by-nc,hybrid 144-082-018-493-071,Investigating Piracy and Terrorism in the International Legal System,2017-08-30,2017,journal article,Journal of Politics and Law,19139055; 19139047,Canadian Center of Science and Education,,Bagher Shamloo; Seyed Ahmad Sajadi,"Laws governing piracy has been evolving during historical periods. Pirates as human enemies have been undisputed theme of common international laws and most of the international treaties. The reason why piracy could be the most continuous historical phenomena in more than two thousand years is that it is in link with the other factor which is, in turn, in continuity during the history and it is nothing but violence. During the centuries, piracy has faced tolerance and even in some cases circumstantial satisfaction of political societies and in the next step the governments. Even in some cases it was used to set the relations of power. At the time of the rule of Elizabeth I in England piracy faced a lot of tolerance because this crime was the means of making a living for English pirates. It seems that one of the reasons making England facilitate free sailing in its bodies of water by seventeenth century was making the opportunity for pirates by English sailors for getting by. In this study we are going to discuss marine crimes in international laws.",10,4,125,,Nothing; Sociology; Law; Terrorism; Power (social and political); Theme (narrative); International legal system; International law; Circumstantial evidence; Politics,,,,,https://www.ccsenet.org/journal/index.php/jpl/article/download/70318/38344 https://www.ccsenet.org/journal/index.php/jpl/article/view/70318,http://dx.doi.org/10.5539/jpl.v10n4p125,,10.5539/jpl.v10n4p125,2753523973,,0,,0,true,cc-by,gold 145-275-781-468-133,"Piracy Off the Coast of Somalia: The Argument for Pirate Prosecutions in the National Courts of Kenya, The Seychelles, and Mauritius",2012-03-01,2012,journal article,Amsterdam Law Forum,18768156,Vrije Universiteit Amsterdam Faculty of Law,,Milena Sterio,"This Article will argue that, in order to combat the rise of Somali piracy, major maritime nations should rely on national prosecutions of Somali pirates in the courts of stable regional partners, such as Kenya, the Seychelles, and Mauritius.  A systematic transfer program and prosecutions in the national courts of several regional partners would preclude the possibility of pirate catch-and-release, and could ultimately provide enough deterrence to seriously dissuade young Somali men from engaging in piracy.  The Somali pirates, enemies of all mankind, may find potent foes in the form of Kenyan, Seychellois, and Mauritian prosecutors, who will subject pirates to prosecutions on behalf of all mankind.",4,2,104,123,Political science; Kenya; Law; Somali; Argument; Deterrence theory,,,,,https://engagedscholarship.csuohio.edu/cgi/viewcontent.cgi?article=1631&context=fac_articles https://engagedscholarship.csuohio.edu/fac_articles/623/ http://amsterdamlawforum.org/article/view/264,http://dx.doi.org/10.37974/alf.224,,10.37974/alf.224,3123882392,,0,,6,true,cc-by,gold 145-452-614-353-480,Bio Piracy of Medicinal Plants & Practices: Sacrilege of Aboriginal Indian Traditional Knowledge,,2011,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Mitali Srivastava,,,,,,Engineering; TRIPS architecture; Statute; Order (exchange); Law; Sacrilege; Country of origin; TRIPS Agreement; Traditional knowledge; Developing country,,,,,https://papers.ssrn.com/sol3/Delivery.cfm?abstractid=2149878 https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2149878_code1899964.pdf?abstractid=2149878&mirid=1 https://ssrn.com/abstract=2149878 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2149878,http://dx.doi.org/10.2139/ssrn.2149878,,10.2139/ssrn.2149878,2260677119,,0,,1,false,, 145-774-289-503-490,Air Piracy: The Role of the International Federation of Airline Pilots Associations,,1970,journal article,Cornell International Law Journal,00108812,,,Ira M. Shepard,,3,1,79,92,Advertising; Business,,,,,https://scholarship.law.cornell.edu/cgi/viewcontent.cgi?article=1014&context=cilj https://scholarship.law.cornell.edu/cilj/vol3/iss1/6/,https://scholarship.law.cornell.edu/cilj/vol3/iss1/6/,,,242049996,,0,,0,false,, 145-784-846-523-275,Curtailing Copycat Couture: The Merits of the Innovative Design Protection and Piracy Prevention Act and a Licensing Scheme for the Fashion Industry,,2011,journal article,Cornell Law Review,00108847,,,Aya Eguchi,,97,1,131,,Advertising; Copycat; Business; Scheme (programming language); Fashion industry,,,,,https://scholarship.law.cornell.edu/cgi/viewcontent.cgi?article=3228&context=clr https://scholarship.law.cornell.edu/clr/vol97/iss1/4/,https://scholarship.law.cornell.edu/clr/vol97/iss1/4/,,,219927860,,0,,5,false,, 146-681-584-824-506,International action against piracy and armed robbery at sea off the coast of Somalia,2014-11-17,2014,journal article,The Italian Yearbook of International Law Online,22116133,Brill,,Alessandra Annoni,"In recent years the international community has engaged in an unprecedented joint naval effort to combat piracy and armed robbery off the coast of Somalia. This paper examines the legal basis of the multinational police missions deployed in Somali territorial and internal waters and the law applicable to their operations. Subsequently it discusses the scope of domestic criminal jurisdiction to try Somali pirates and armed robbers and the mechanisms for transferring suspects to the authorities of the prosecuting State. The responsibility of States and international organizations for wrongful acts allegedly perpetrated in the course of these counterpiracy operations is also assessed. Stressing the peculiarity of the Somali case and highlighting both the achievements and shortcomings of the missions authorised by the UN Security Council, it is argued that the “Somali strategy” is unlikely to be replicated elsewhere and is particularly unsuitable for the new hotbeds of piracy and armed robbery: the Gulf of Guinea and Indonesia.",23,1,173,198,Public international law; Law; Internal waters; Geography; State (polity); Somali; International community; Criminal jurisdiction; International Action; International law,,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=4970058 https://brill.com/view/journals/iyio/23/1/article-p173_10.xml?language=en https://core.ac.uk/display/54712641 https://booksandjournals.brillonline.com/content/journals/10.1163/22116133-90230043,http://dx.doi.org/10.1163/22116133-90230043,,10.1163/22116133-90230043,1995738395,,0,,2,false,, 147-018-620-539-258,The definition of piracy under article 101 of the 1982 United Nations Convention on the Law of the Sea – an attempted legal analysis,,2011,journal article,Białostockie Studia Prawnicze,16897404,University of Bialystok,,Bartosz Fieducik,"The definition of piracy introduced in Article 101 of the United Nations Convention on the Law of the Sea signed on 10 December 1982 in Montego Bay (known as the Jamaica Convention) is an almost direct quotation of Article 15 of the 1958 Territorial Sea Convention (known as the Geneva Convention). In their work on piracy regulations for the Geneva Convention, the International Law Commission relied heavily on the results of a private project developed in 1932 under the supervision of Professor Joseph Bingham from the Harvard University, known as the Harvard Draft Convention on Piracy (hereinafter the Harvard Draft).1 The current definition of piracy introduced in Article 101 of the Jamaica Convention is:",10,,67,79,Comparative law; Political science; United Nations Convention on the Law of the Sea; Law; Terrorism; Convention; Freedom of navigation; Law of the sea; International law; Territorial waters,,,,,http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.desklight-cf47f424-a27f-4f6b-b674-42e3caacdbda https://repozytorium.uwb.edu.pl/jspui/handle/11320/2009,http://dx.doi.org/10.15290/bsp.2011.10.02,,10.15290/bsp.2011.10.02,2022296552,,0,,1,true,cc-by-nc-nd,gold 147-033-792-409-05X,Piracy settlements pass $35 million mark,,1999,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,1999,3,3,3,Human settlement; Business; Computer security; Computer science; Geography; Archaeology,,,,,,http://dx.doi.org/10.1016/s1361-3723(99)90002-7,,10.1016/s1361-3723(99)90002-7,,,0,,0,false,, 147-105-743-671-019,Criminal Sanctions for Copyright Infringement: the Half of a Yellow Sun Copyright Piracy,,2014,journal article,"Journal of Law, Policy and Globalization",22243240,,,Mobolaji Johnson Agboola,"This article examines the provisions of the Nigerian Copyright Act stipulating sanctions for copyright infringement. Copyright is said to be infringed when a person exercises one or the entire array of rights exclusively owned by the author of a work without permission. This article argues that irrespective of the jurisprudence of copyright, the unwholesome act of piracy remains largely undefeated sequel to the massive illegal reproduction of the most expensive indigenous film ever made in Nigeria ‘Half of a Yellow Sun’ on the streets of Lagos which are being sold on wheelbarrows. This article applies the principles of law and economics to determine whether the Nigerian Copyright Act is economically efficient to deter pirates from engaging in their appalling activity. The monetary sanctions put in place by the principal statute governing copyright in Nigeria as well as the Criminal Code is in no way strict to deter intellectual pirates and abate piracy. This article concludes that the need for a reform is eminent. Stricter sanctions and public enlightenment on copyright infringement must be put in place to stamp out piracy and increase the value of intellectual creations. Keywords: Copyright Infringement, Nigerian Copyright Act, Piracy, Half of a Yellow Sun, Criminal Sanctions.",31,,49,54,Common law copyright; Statute; Political science; Law; Sanctions; Copyright Act; Copyright infringement; Principal (commercial law); Criminal code; Jurisprudence,,,,,https://www.iiste.org/Journals/index.php/JLPG/article/view/17489/0 https://www.iiste.org/Journals/index.php/JLPG/article/download/17489/17542,https://www.iiste.org/Journals/index.php/JLPG/article/view/17489/0,,,1677134922,,0,,0,false,, 147-157-885-598-990,Somali Piracy and International Law: Some Aspects,2010-10-29,2010,journal article,Australian and New Zealand Maritime Law Journal,18340881,,,Omer Elagab,"Piracy is a crime under international law and some municipal laws. Although it prominently features as a crime under existing Law of the Sea instruments, the advent of Somali piracy has demonstrated that some aspects of it are not properly addressed. The Security Council (SC), the EU and indeed the major powers are actively engaged in stamping out the phenomenon of piracy by various means such as naval patrols, freezing of pirates’ assets, and perhaps imposing sanctions on ransom payers. Prosecution of suspected pirates has come with its own bundle of difficulties which need to be ironed out through various means, such as Memoranda of Understanding (MoU). Above all, a comprehensive rather than incremental approach to the roots of the problem in Somalia is most needed.",24,2,59,75,Political science; United Nations Convention on the Law of the Sea; Law; Somali; Sanctions; Ransom; Phenomenon; Law of the sea; International law; Municipal law,,,,,https://ssl.law.uq.edu.au/journals/index.php/maritimejournal/article/view/133/181 https://ssl.law.uq.edu.au/journals/index.php/maritimejournal/article/download/133/181,https://ssl.law.uq.edu.au/journals/index.php/maritimejournal/article/view/133/181,,,1538160784,,0,,1,false,, 147-419-579-157-377,THE LAW OF PIRACY IN POPULAR CULTURE,2000-10-01,2000,journal article,Journal of Maritime Law and Commerce,00222410,,,Jonathan M Gutoff,,,,,,Advertising; Political science; Law; Publicity; Popular culture,,,,,https://trid.trb.org/view/622026,https://trid.trb.org/view/622026,,,1881047125,,0,,0,false,, 147-627-392-303-772,Refusing to Negotiate: Analyzing the Legality and Practicality of a Piracy Ransom Ban,,2014,journal article,Cornell International Law Journal,00108812,,,Yvonne M. Dutton; Jon Bellish,"Concerns that ransom payments play a large role in encouraging and sustaining maritime piracy have prompted some commentators, including British Prime Minister David Cameron, to suggest that banning ransom payments may be necessary to end piracy. The benefit of taking away the possibility of the ransom should take away the incentive to engage in piracy and remove the funds to finance future illegal activities. The drawback of a ban is that in the short run it would put innocent lives at risk, a contrasting point that ship owners and their industry representatives have noted. This Article is sympathetic to both the arguments in favor of and against a piracy ransom ban. At the same time, we suggest that additional analysis is warranted before anyone concludes that a piracy ransom ban offers a promising tool for solving the problem of maritime piracy. This Article undertakes that additional analysis by examining (1) the legality of a ban from a criminal law standpoint on retributive theories about punishment and (2) the practicality of a ban given the international context in which the potential ban would have to apply. We conclude that a piracy ransom ban would likely be inconsistent with the retributive principles of criminal law, since it would punish innocent victims who pay ransoms under duress. We further suggest that even if there are good reasons, in theory, to criminalize ransom payments, banning piracy ransoms would be impractical from an international law standpoint since any such ban would pose collective action problems. Absent the unlikely universal ban, a piracy ransom ban supported only by select countries probably will not prove an effective deterrent to maritime piracy.",47,2,299,,Retributive justice; Political science; Law and economics; Criminal law; Collective action; Context (language use); Ransom; Drawback; Principle of legality; International law,,,,,https://scholarship.law.cornell.edu/cilj/vol47/iss2/2/ https://scholarworks.iupui.edu/handle/1805/5415 https://scholarship.law.cornell.edu/cgi/viewcontent.cgi?article=1842&context=cilj,https://scholarship.law.cornell.edu/cilj/vol47/iss2/2/,,,3122478918,,0,,7,false,, 147-638-276-189-785,Obstacles in the International Law of Anti-Piracy,,2012,journal article,Journal of Harbin University,10045856,,,Shu Meng,"There are a lot of international treaties regarding anti-piracy,regarding definition and rules.They are various and incomplete with different focus and members.The No.1816 UN resolution gives a wide scope of definition for piracy solving many problems about authorization in the outer region of the international waters but it has been questioned,as well,for the controversial parts against the sovereignty doctrine.So the obstacles include co common definition,special treaty and the parts against sovereignty doctrine.These are great hindrances for the international cooperation against piracy.",,,,,Authorization; International waters; Political science; Sovereignty; Law; Treaty; Scope (project management); International law,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-HEBS201205014.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-HEBS201205014.htm,,,2379844799,,0,,0,false,, 147-753-892-940-599,Federal Criminal Jurisdiction and Prosecutors’ Discretion,,1948,journal article,Law and Contemporary Problems,00239186,JSTOR,United States,L. B. Schwartz,"offenses, occupying approximately one quarter of the federal judges' time,1 had its meager beginnings before the birth of constitutional federal government itself. The Articles of Confederation provided that ""the United States in Congress assembled, shall have the sole and exclusive right and power of . . . appointing courts for the trial of piracies and felonies committed on the high seas. . . .""2 The Constitution defined treason and expressly authorized Congress to punish the counterfeiting of United States securities and coins, as well as piracies and felonies on the high seas and offenses against the law of nations.3 But the great bulk of federal criminal activity rests upon the constitutional power of Congress to enact laws ""necessary and proper"" to the execution of specifically conferred powers, for there are no commonlaw crimes in federal jurisprudence.4 The first federal criminal legislation, antedating",13,1,64,87,Subject-matter jurisdiction; Common law; Judicial discretion; Political science; Law; Constitution; Legislation; Discretion; Criminal jurisdiction; Intervention (law),,,,,https://core.ac.uk/display/62557624 https://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=2339&context=lcp https://scholarship.law.duke.edu/lcp/vol13/iss1/3/ https://core.ac.uk/download/62557624.pdf,http://dx.doi.org/10.2307/1190103,,10.2307/1190103,1555786690,,0,,2,true,,green 148-840-308-178-366,"Insurance. Marine Insurance. Meaning of ""Piracy"" in Policy",,1909,journal article,Harvard Law Review,0017811x; 2161976x,JSTOR,United States,,,22,6,454,454,Meaning (existential); Business; Insurance policy; Law and economics,,,,,,http://dx.doi.org/10.2307/1324540,,10.2307/1324540,,,0,,0,false,, 149-005-803-584-510,Chinese Copyright Piracy: Analysis of the Problem and Suggestions for Protection of U.S. Copyrights,,1995,journal article,Penn State international law review,15463435,,,Kristie M. Kachuriak,,13,3,599,622,Business; Law,,,,,https://elibrary.law.psu.edu/psilr/vol13/iss3/10/ https://elibrary.law.psu.edu/cgi/viewcontent.cgi?article=1366&context=psilr https://paperity.org/p/202382630/chinese-copyright-piracy-analysis-of-the-problem-and-suggestions-for-protection-of-u-s,https://elibrary.law.psu.edu/psilr/vol13/iss3/10/,,,2767023762,,0,,0,false,, 149-072-927-883-619,A La Carte Television: A Solution to Online Piracy?,,2012,journal article,CommLaw Conspectus: Journal of Communications Law and Technology Policy,,,,Carson S. Walker,,20,2,471,494,Internet privacy; Advertising; Business,,,,,https://scholarship.law.edu/cgi/viewcontent.cgi?article=1496&context=commlaw https://scholarship.law.edu/commlaw/vol20/iss2/10/,https://scholarship.law.edu/commlaw/vol20/iss2/10/,,,203108308,,0,,4,false,, 149-280-826-678-591,Evolutionary Trends in Maritime Piracy: A Possible Assessment of Eco-Activists' Conduct,,2014,journal article,Australian international law journal,13255029,,,Stefano Dominelli,"Abstract Ever since its 'birth', the conduct of piracy has shown a natural tendency to evolve, to change, and--under a legal perspective--to test and challenge traditional legal frameworks. Currently, one of the main issues is the correct legal qualification of 'eco-protesters', who oppose research or exploitation activities to protect the marine environment. Part of the case law has started to assess protesters' violent conducts on the high seas, showing tendencies of piratical qualification. In the present work, it is argued that--as international law stands nowadays--eco-activists cannot be qualified as pirates. Violent actions on the high seas should rather fall within the scope of application of the SUA Convention. This option would respect eco-activists' human rights without impairing states from the possibility to prosecute violent actions on the high seas. However, this emerging trend draws the attention on possible future developments in the field of maritime piracy. I Introduction At first, pirates were considered enemies of the state to be defeated on the battlefield, (1) and even before the adoption of the 1958 Geneva Convention on the High Seas (2), state practice defined the conduct of piracy, from which privateers (3) and rebels (4) were excluded. Before defining piracy, it must be noted that the conduct seems intrinsically and ontologically destined to change over time. (5) As it will be argued below, (6) ever since its 'birth', the conduct of piracy has shown a natural tendency to evolve, to change, and--under a legal perspective--to test and challenge traditional legal frameworks. Consequently, states have re-defined in time the original notion of piracy, and of the states' powers (7) (and limits) (8) to repress such a conduct, which has been classified as a crimina juris gentium. Even if maritime piracy has been the subject of legal studies at least ever since Hugo Grotius, (9) nowadays there are still tendencies to re-define the elements of crime, to possibly subsume under such category conducts that have little in common with the original image of pirates. Currently, one of the main challenges testing the definition of piracy is the correct legal qualification of 'environment protesters', or 'eco-activists'. As known, eco-activists seek to protect marine environment from activities they assume to be contrary to its preservation. In some circumstances, to pursue their goals, environment protesters have used force on the high seas. Part of the case law has started to assess protesters' violent conducts, ultimately arguing that these should be subsumed under the definition of piracy. The aim of the present work is i) to outline protesters' modus operandi (Part 2); ii) to reconstruct the elements of the crime of piracy and determine the existence of the private end requirement in protesters' conducts (Part 3); iii) to argue that--as international law stands nowadays--the qualification of protesters as pirates might infringe protesters' human rights (Part 4); iv) to identify a possible legal framework to ensure safety at sea (Part 5), and v) to reflect on possible evolutions in the interpretation of the private end requirement (conclusion). II Eco-activism and Maritime Piracy: Contemporary Tendencies In the last years, eco-activism has acquired the interest of the legal scholarship, (10) that has explored whether violent actions on the high seas can be qualified as piratical. However, such an investigation requires an analysis of the eco-activists' modus operandi. In the first place, the Sea Shepherd Conservation Society (SSCS) and its campaigns devoted to protect the marine environment, also by way of attacking and ramming ships (most often, Japanese and Norwegian ones), can be taken as an example. To save whales, SSCS ships attack vessels allegedly carrying out research and unauthorized exploitation activities, trying to stop or even sinking them, if necessary. …",21,,41,54,Sociology; International waters; Human rights; Common law; Law; Convention; Convention on the High Seas; Law of the sea; International law; Jurisprudence,,,,,https://iris.unige.it/handle/11567/835222 https://www.questia.com/library/journal/1G1-455989180/evolutionary-trends-in-maritime-piracy-a-possible https://air.unimi.it/handle/2434/545525,https://iris.unige.it/handle/11567/835222,,,2409737515,,0,,0,false,, 149-306-504-619-92X,Contemporary Maritime Piracy in Southeast Asia,,2007,journal article,The International Journal of Marine and Coastal Law,09273522; 15718085,Brill,Netherlands,David M. Ong,,22,4,633,635,Economy; Political science; Maritime piracy; Southeast asia; Southeast Asian studies; Pulp and paper industry; Law of the sea; International law; Far East,,,,,https://brill.com/content/journals/10.1163/157180807782512242 https://booksandjournals.brillonline.com/content/journals/10.1163/157180807782512242,http://dx.doi.org/10.1163/157180807782512242,,10.1163/157180807782512242,1973401763,,0,,3,false,, 149-761-332-359-416,"Is IP Law Modernization Possible? Assessing Approaches in ACTA, SOPA, and Bill C-11",2014-11-05,2014,journal article,The Georgia Journal of International and Comparative Law,,,,Lauren Gray Farrar,"""What kind of legislation could produce such strong responses? In an increasingly digital age, countries face the difficult and nuanced task of regulating evolving information-sharing platforms. New technologies pose challenges for lawmakers, who must hold varying interests in balance: the need for national protection and security; the prevention of piracy and copyright violations; and maintaining a respect for freedoms of speech and; information exchange. Although many countries have laws in place to regulate and combat piracy, these regulations vary. The variance affects many in industries affected by piracy, as they cannot be sure how or to what extent their investments and products will be protected internationally. As technological capacities expand and consumers’ use of both legitimate and pirated content increases, so do concerns for dealing with the piracy problem on an international level. Some consensus has been reached in recent years, laying foundations for future agreements. However, the nature of these agreements have been the subject of intense debate.""",42,2,3591,,Variance (land use); Business; Information exchange; Law and economics; Emerging technologies; Balance (accounting); Legislation; Face (sociological concept); Intellectual property; Modernization theory,,,,,https://digitalcommons.law.uga.edu/gjicl/vol42/iss2/6/ https://digitalcommons.law.uga.edu/cgi/viewcontent.cgi?article=1572&context=gjicl,https://digitalcommons.law.uga.edu/gjicl/vol42/iss2/6/,,,186781819,,0,,0,false,, 150-019-751-992-354,A triple strike against piracy as the music industry secures three more blocking injunctions,2013-06-13,2013,journal article,Journal of Intellectual Property Law & Practice,17471532; 17471540,Oxford University Press (OUP),,Darren Meale,,8,8,591,594,Advertising; Business; Music industry; Blocking (radio); Computer security,,,,,https://academic.oup.com/jiplp/article/8/8/591/981693 http://academic.oup.com/jiplp/article-abstract/8/8/591/981693 https://academic.oup.com/jiplp/article-lookup/doi/10.1093/jiplp/jpt097,http://dx.doi.org/10.1093/jiplp/jpt097,,10.1093/jiplp/jpt097,2156574935,,0,,0,false,, 150-041-341-667-576,Implementation of Mutual Legal Assistance in Law Enforcement of the Crime of Piracy by the Indonesian Navy (Study. MT. Orkim Harmony),2021-06-01,2021,journal article,Kontigensi : Jurnal Ilmiah Manajemen,25280139; 20884877,Pascasarjana Universitas Pasundan,,Handy Kurniawan; Agung Pramono; Mangisi Simanjuntak,"The crime of piracy is transnational; handling it requires bilateral or multilateral cooperation; according to Article 9 (2) of the Republic of Indonesia Law, Number 1 of 2006, only the National Police Chief and the Attorney General can request Mutual Legal Assistance. Still, the Indonesian Navy has applied for Mutual Legal Assistance against the MT Orkim Harmony piracy case. With these facts, this paper tries to see how the efforts of the Central Authority (Polri and Prosecutors) in assisting law enforcement by the Navy and how the implementation of the Mutual Legal Assistance agreement. The research method uses normative law or library research with a statute approach and analyzes the data in this study using qualitative normative analysis. From the results of the study",9,1,266,274,Indonesian; Statute; Law; Legal research; Navy; Law enforcement; Normative; Harmony (color); Political science; Enforcement; The Republic; Sociology,,,,,,http://dx.doi.org/10.56457/jimk.v9i1.157,,10.56457/jimk.v9i1.157,,,0,,0,true,cc-by-nc,gold 150-502-770-988-73X,Online Software Piracy and Its Related Laws,,2020,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Faria Rahman; Payal Pandey,,,,,,The Internet; Information technology; Emerging markets; Boom; Business; Law; Globe; Software; Reproduction (economics); Copyright Act,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3648512,http://dx.doi.org/10.2139/ssrn.3648512,,10.2139/ssrn.3648512,3182036535,,0,,0,false,, 151-435-759-077-790,"Internet Piracy: a Wake uo Wall for copyright law makers- is the ""graduated response"" the good reply?",,2009,journal article,The WIPO Journal,20412029,,,Alain Strowel,,,1,75,86,Form of the Good; The Internet; Political science; Law; Graduated response; Copyright law; Wake,,,,,https://dial.uclouvain.be/downloader/downloader.php?pid=boreal:137172&datastream=PDF_01,https://dial.uclouvain.be/downloader/downloader.php?pid=boreal:137172&datastream=PDF_01,,,1778412524,,0,,8,false,, 151-616-233-942-447,A Critical Appraisal of The Anti-Piracy Law of Nigeria,,2021,journal article,"Journal of Law, Policy and Globalization",,"International Institute for Science, Technology and Education",,,"Nigeria’s June 2019 law on piracy and other maritime offences is an important step in securing the country’s coastline and seas. The Ant-Piracy law on Suppression of Piracy and Other Maritime Offences Act, [1] 2019 (POMO Act) aims to ‘prevent and suppress piracy, armed robbery and any other unlawful act against a ship, aircraft and any other maritime craft, including fixed and floating platforms.’ It also observed that this law gives effect to the United Nations Convention on the Law of the Sea, 1982 (UNCLOS) and the Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation, 1988 (SUA). Despite the enactment of this huge law and policies targeted at ameliorating the numerous problems at Nigeria’s coastline and seas, the situation in Nigeria seems degenerating owing to the fact that there are no adequate compliance of the laws as well as the ineffective implementation or enforcement of the law. This paper seeks to critically evaluate the impacts of the Act and also its weaknesses. It also discusses Nigeria’s capacity to implement its new law and detect and prosecute crimes. Analysis includes an evaluation of the steps taken by the governments of the region and the effectiveness of the implemented strategies to counter the threat posed by piracy in the region. In identifying the barriers and challenges to combat piracy, a comprehensive arrangement based effective cooperation is proposed in the paper. Keywords : PIRACY LAW, NIGERIA DOI: 10.7176/JLPG/113-06 Publication date: September 30 th 2021 * PhD & LLM (Coventry), BL (Nigeria), LLB (London Met), Lecturer, Department of Public Law, Faculty of Law, Rivers State University. Email: victor.enebeli@yahoo.co.uk , Phone: 09020176657 ** LL.M (RSU) in view; BL (Abuja); LL.B (UK); Dip-in-Law (UK). Senior Associate Tuduru Ede, SAN & Co. Port Harcourt, Rivers State, Nigeria. Email: david.chibuike22@yahoo.com/ikemefula20@yahoo.com . 08065357894, 08052339985 [1] https://lawnigeria.com/2019/12/suppression-of-piracy-and-other-maritime-offences-act-2019/ accessed 04/08/2021",,,,,Law; United Nations Convention on the Law of the Sea; Law enforcement; Enforcement; Political science; Convention; Business; Law of the sea,,,,,,http://dx.doi.org/10.7176/jlpg/113-06,,10.7176/jlpg/113-06,,,0,,0,true,cc-by,hybrid 152-150-079-194-35X,China's Accession to the Berne Convention: Bandaging theWounds of Intellectual Property Piracy in China,,1992,journal article,"Fordham Intellectual Property, Media & Entertainment Law Journal",10799699,,,Stephanie L. Sgambati,,3,1,139,,Political science; China; Law; Accession; Berne Convention; Intellectual property,,,,,https://ir.lawnet.fordham.edu/iplj/vol3/iss1/10/ https://ir.lawnet.fordham.edu/cgi/viewcontent.cgi?article=1033&context=iplj,https://ir.lawnet.fordham.edu/iplj/vol3/iss1/10/,,,1503276298,,0,,1,false,, 153-158-253-660-698,In the Realm of Intellectual Property: Cyber Fraud as a Major Challenge to the Copyright Protection in Nigeria,,2018,journal article,"Journal of Law, Policy and Globalization",22243240,,,Alaba Ibironke Kekere; Akin Olawale Oluwadayisi,"Copyright, the importance of copyright to Nation’s economy, the efforts of the Nigeria copyright laws and Copyright Commission to combat breach of Copyright is a crucial issue, all over the world and it is even more a crucial subject in Nigeria. For years now, Nigeria has depended majorly on physical natural resources as the mainstay of the nation’s economy which is no more reliable as it used to be the case. It is high time for copyright work to be properly managed for maximum economic benefit in Nigeria. As the World is growing in terms of technology, and with the advent of internet a lot of fraud are been perpetrated at the internet that is frustrating authors and creators of a work, copyright infringement abound on the internet. This work will therefore examine copyright and piracy in Nigeria and more importantly the threat posed to copyright owners at the internet and concludes with suggestions and recommendations on the ways to combat the menace. Keywords: intellectual property, copyright, cyber fraud and piracy",70,,24,31,The Internet; Business; Work (electrical); Law and economics; Commission; Realm; Copyright infringement; Natural resource; Intellectual property,,,,,https://www.iiste.org/Journals/index.php/JLPG/article/view/41204,https://www.iiste.org/Journals/index.php/JLPG/article/view/41204,,,2790276811,,0,,0,false,, 153-589-993-044-81X,Record Piracy and Modern Problems of Innocent Infringement: A Comparative Analysis of United States and British Copyright Laws,,1981,journal article,Loyola of Los Angeles Entertainment Law Review,15365751,,,Frank L. Fine,,1,1,113,,Common law copyright; Political science; Law,,,,,https://digitalcommons.lmu.edu/cgi/viewcontent.cgi?article=1029&context=elr https://digitalcommons.lmu.edu/elr/vol1/iss1/8/,https://digitalcommons.lmu.edu/elr/vol1/iss1/8/,,,1521940935,,0,,0,false,, 154-341-854-009-325,"Cottage Piracy, 3D Printing, and Secondary Trademark Liability: Counterfeit Luxury Trademarks and DIY",,2014,journal article,University of San Francisco law review,00420018,,,Elif Sonmez,,48,4,5,,Business; Liability; Trademark; Counterfeit; 3D printing; Commerce,,,,,https://repository.usfca.edu/usflawreview/vol48/iss4/5/ https://repository.usfca.edu/cgi/viewcontent.cgi?article=1413&context=usflawreview,https://repository.usfca.edu/usflawreview/vol48/iss4/5/,,,2801166928,,0,,2,false,, 154-450-370-020-109,Reality Bites: How the Biting Reality of Piracy in China Is Working to Strengthen Its Copyright Laws,,2003,journal article,Duke law and technology review,,,,Graham J. Chynoweth,,2,1,1,10,Business; China; Law; Biting,,,,,https://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1072&context=dltr https://scholarship.law.duke.edu/dltr/vol2/iss1/1/,https://scholarship.law.duke.edu/dltr/vol2/iss1/1/,,,1587390381,,0,,5,false,, 154-738-857-581-664,History and current situation of pirate and draft Guidelines for the National Legislation on Maritime Criminal Acts,,2009,journal article,Annual of China Maritime Law,,,,Meng Yu-qun,"The paper analyzed the legal concept of piracy,its origin and characteristics,introduced the joint measures and results taken by the international community to combat piracy,and detailed on draft Guidelines for the National Legislation on Maritime Criminal Acts drawn up by International Maritime Organization(IMO) for the criminal acts of piracy and maritime.",,,,,Political science; Joint (building); Law; Legislation; International community,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-ZGHS2009Z1011.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-ZGHS2009Z1011.htm,,,2386750841,,0,,0,false,, 154-874-814-802-566,Britannia Shipping Corporation v. Globe and Rutgers Fire Insurance Company.,,1947,journal article,Annual Digest and Reports of Public International Law Cases,26337088; 26337096,Cambridge University Press (CUP),,,Piracy — Conception of — Whether may be Committed in Territorial Waters.High Seas — Conception of — Territorial Waters — Limits Of — Piracy — Definition of High Seas by the Law of the United States.,11,,174,175,Globe; Corporation; International waters; Business; Political science; Law; Medicine; Ophthalmology,,,,,,http://dx.doi.org/10.1017/cbo9781316151389.104,,10.1017/cbo9781316151389.104,,,0,,0,false,, 155-528-510-387-046,Piracy charges denied by disc maker,,1997,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,1997,10,4,4,Business; Computer security; Internet privacy; Computer science,,,,,,http://dx.doi.org/10.1016/s1361-3723(97)90072-5,,10.1016/s1361-3723(97)90072-5,,,0,,1,false,, 156-338-217-544-259,ENFORCING THE LAW OF PIRACY IN THE SOUTH CHINA SEA,,2000,journal article,Journal of Maritime Law and Commerce,00222410,,,Keyuan Zou,,,,,,Political science; Law; China sea; South china,,,,,https://trid.trb.org/view/616227,https://trid.trb.org/view/616227,,,198554829,,0,,11,false,, 156-876-260-154-342,Global Cooperation in Combating Sea Piracy: The Factors behind Global Piracy Trends,2016-08-30,2016,journal article,Hasanuddin Law Review,24429899; 24429880,"Hasanuddin University, Faculty of Law",,Radillah Khaerany; Maskun Maskun,"The rising number of sea travel is followed by the emerging number of sea crimes such as sea piracy and maritime terrorism. In recent two decades, the number of crimes on the sea have shown an alarming figure, where areas with a dense traffic of vessels such as the Gulf of Aden and Malacca Strait becomes the hot spots for piracy crime. The main reason behind the emerging of modern piracy is the increasing number of sea transported goods which create a significant opportunity to be a huge target of crime considering the drives behind piracy is financial reason. Some area of sea piracy took place commonly in Africa and Southeast Asia.",1,2,213,224,International trade; Political science; Law; Terrorism; Sea Travel; Southeast asia,,,,,http://pasca.unhas.ac.id/ojs/index.php/halrev/article/view/305/172 https://core.ac.uk/display/91122637 http://pasca.unhas.ac.id/ojs/index.php/halrev/article/download/305/172 https://core.ac.uk/download/pdf/234113308.pdf,http://dx.doi.org/10.20956/halrev.v1i2.305,,10.20956/halrev.v1i2.305,2509101090,,0,007-649-524-640-780; 053-092-184-335-247; 060-089-932-112-994; 111-965-420-681-996; 112-944-143-496-63X; 136-217-422-929-83X; 137-983-597-179-814; 152-151-629-838-733,0,true,cc-by,gold 157-014-875-981-392,Fall in multibillion dollar piracy problem,,1993,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1993,7,1,2,Liberian dollar; Business; Computer security; Computer science; Finance,,,,,,http://dx.doi.org/10.1016/0142-0496(93)90174-u,,10.1016/0142-0496(93)90174-u,,,0,,0,false,, 157-308-278-762-021,Fraud risk and the visibility of carbon,2013-09-11,2013,journal article,"International Journal for Crime, Justice and Social Democracy",22028005; 22027998,Queensland University of Technology,Australia,Peter Martin; Reece Walters,"In recent years, carbon has been increasingly rendered ‘visible’ both discursively and through political processes that have imbued it with economic value. Greenhouse gas emissions have been constructed as social and environmental costs and their reduction or avoidance as social and economic gain. The ‘marketisation’ of carbon, which has been facilitated through various compliance schemes such as the European Union Emissions Trading Scheme, the Kyoto Protocol, the proposed Australian Emissions Reduction Scheme and through the voluntary carbon credit market, have attempted to bring carbon into the ‘foreground’ as an economic liability and/or opportunity. Accompanying the increasing economic visibility of carbon are reports of frauds and scams – the ‘gaming of carbon markets’(Chan 2010). As Lohmann (2010: 21) points out, ‘what are conventionally classed as scams or frauds are an inevitable feature of carbon offset markets, not something that could be eliminated by regulation targeting the specific businesses or state agencies involved’. This paper critiques the disparate discourses of fraud risk in carbon markets and examines cases of fraud within emerging landscapes of green criminology.",2,2,27,42,Public economics; Emissions trading; Economics; Liability; European union; Market economy; Carbon credit; Greenhouse gas; Green criminology; Carbon offset; Kyoto Protocol,,,,,https://core.ac.uk/display/146950060 http://dro.deakin.edu.au/view/DU:30118155 https://www.crimejusticejournal.com/article/viewFile/95/102 https://www.crimejusticejournal.com/article/view/95 http://eprints.qut.edu.au/62420/ https://core.ac.uk/download/230569663.pdf,http://dx.doi.org/10.5204/ijcjsd.v2i2.95,,10.5204/ijcjsd.v2i2.95,2069010452,,0,007-665-137-225-122; 012-180-988-903-855; 018-941-993-649-283; 033-180-880-056-545; 047-173-765-826-068; 049-667-234-722-772; 051-286-499-033-051; 053-951-863-370-59X; 056-111-404-981-081; 085-603-957-651-253; 085-920-244-089-204; 096-579-171-194-240; 107-142-651-427-942; 116-537-828-350-972; 125-221-388-815-312; 130-151-467-081-441; 133-258-656-047-639; 170-013-397-876-26X; 179-635-839-798-38X; 196-358-907-760-126,10,true,cc-by,gold 157-753-694-434-073,SOFTWARD PIRACY: EXPLORING AWARENESS OF THE LAW AS A DETERMINANT OF SOFTLIFTING ATTITUDE AND INTENTION,,2010,journal article,Issues In Information Systems,15297314; 23313838,International Association for Computer Information,,,,,,,,Law; Psychology; Social psychology; Political science; Business,,,,,,http://dx.doi.org/10.48009/1_iis_2010_17-22,,10.48009/1_iis_2010_17-22,,,0,,0,true,cc-by-nc-nd,gold 158-196-023-154-959,Cyber-Extortion: Duties and Liabilities Related to the Elephant in the Server Room,,2007,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Adam J. Sulkowski,"This is a comprehensive analysis of the legal frameworks related to cyber-extortion - the practice of demanding money in exchange for not carrying out threats to commit harm that would involve a victim's information systems. The author hopes it will catalyze an urgently needed discussion of relevant public policy concerns. Cyber-extortion has, by all accounts, become a common, professionalized and profit-driven criminal pursuit targeting businesses. 17% of respondents in a recent survey indicated having received a cyber-extortion demand. An additional 13% of respondents were not sure if their business had received such a demand. Awareness of the risks of cybercrime has spread. Advancements have been made in the field of cyber-security. Furthermore, statutes, regulations and recent FTC settlements have begun to articulate a minimum standard of care that businesses should maintain with regard to the security of information systems. Yet not all businesses have taken readily available precautions. To complicate matters, cyber-extortions often involve a threat to commit a harm using hijacked networks of computers owned by other businesses. Thus, an analysis specifically dedicated to cyber-extortion is required because of the unique web of liabilities that may arise from a typical cyber-extortion scenario. This article first reviews the available means for prosecuting or recovering damages from a cyber-extortionist. The article then considers the duties and potential liabilities of businesses that are victims of cyber-extortion. For example, an extortionist may follow-through on a threat to disclose or sell private customer data, resulting in the targeted enterprise being liable to its customers. However, a victimized business could conceivably be able to recover damages against a business that failed to take adequate steps to secure its information systems, such that its systems became the tools of the crime. This article reviews current trends and possible theories for recovering damages in such a scenario. This article has a companion piece - Cyber-Extortion: The Elephant in the Server Room - which was co-authored with Dr. Timothy Shea, Associate Professor of Management Information Systems at the Charlton College of Business at UMass Dartmouth. The companion piece is currently under review but is also available on www.ssrn.com. That article describes in greater detail the phenomenon of cyber-extortion, explores why attorneys are apparently the last to know when their clients are the victims of cyber-crime and recommends proactive steps that attorneys may take to prevent or mitigate the impacts of cyber-extortion.",,,,,Internet privacy; Engineering; Commit; Information system; Harm; Damages; Liability; Extortion; Cybercrime; Management information systems; Computer security,,,,,https://www.ssrn.com/abstract=955962 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=955962 https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID1697387_code482263.pdf?abstractid=955962&mirid=1 https://core.ac.uk/download/76622178.pdf,http://dx.doi.org/10.2139/ssrn.955962,,10.2139/ssrn.955962,1481449633,,0,044-026-298-759-134; 078-165-411-706-397; 082-281-936-632-282; 124-788-478-939-539; 129-013-809-311-569; 179-135-095-246-708,1,true,,green 158-824-325-030-665,Eleven from Somalia to Be Tried for Piracy in Federal Court in Virginia; Maersk Alabama Pirate Pleads Guilty; United States Supports Russian Piracy Resolution,,2010,journal article,American Journal of International Law,00029300,,,John R. Crook,,104,3,500,502,Resolution (logic); Political science; Law; Federal court,,,,,https://dialnet.unirioja.es/servlet/articulo?codigo=3295679,https://dialnet.unirioja.es/servlet/articulo?codigo=3295679,,,72621488,,0,,1,false,, 159-265-739-578-696,On The Problem of Utilizing Unilateral Action To Prevent Acts Of Sea Piracy and Terrorism: A Proactive Approach To The Evolution Of International Law,,2004,journal article,Syracuse Journal of International Law and Commerce,00930709,,,Leticia M. Diaz; Barry Dubner,"Piracy and terrorist attacks have many similarities but the goals of pirates and terrorists are different. The international community simply wanted the definition of piracy to mean piracy on the high seas by one private vessel against another. Under international law, UNCLOS, these acts of piracy occur on the high seas, not in the territorial/internal waters of a coastal state. On the high seas, or in any other place outside the jurisdiction of any state, every state may seize a pirate ship or aircraft, or a ship taken by piracy and under the control of pirates, and arrest the persons and seize the property on board. With the adoption of national legislation, along with the training of seafarers, port staff and enforcement personnel, and provisions of enforcement vessels and equipment to guard against fraudulent ship registration, states would be better able to prevent and combat piracy and armed robbery. A terroristic or piracy attack leading to oil or chemical spills could lead to disastrous consequences traveling up the entire food chain.",32,1,2,,Business; International trade; International waters; United Nations Convention on the Law of the Sea; Internal waters; Terrorism; Jurisdiction; Legislation; Enforcement; International law,,,,,https://surface.syr.edu/jilc/vol32/iss1/2/,https://surface.syr.edu/jilc/vol32/iss1/2/,,,3123315511,,0,,1,false,, 159-497-149-550-59X,Postmodern Piracy: How Copyright Law Constrains Contemporary Art,,1994,journal article,Loyola of Los Angeles Entertainment Law Review,15365751,,,Steven Shonack,,14,2,281,,Sociology; Law; Copyright law; Postmodernism; Contemporary art,,,,,https://digitalcommons.lmu.edu/elr/vol14/iss2/3/ https://digitalcommons.lmu.edu/cgi/viewcontent.cgi?article=1278&context=elr,https://digitalcommons.lmu.edu/elr/vol14/iss2/3/,,,1483948820,,0,,1,false,, 160-173-422-908-578,BSA focuses efforts on internet piracy,,1996,journal article,Computer Fraud & Security,13613723,Mark Allen Group,United Kingdom,Michael McCormack,,1996,12,19,,The Internet; Business; Computer security,,,,,http://linkinghub.elsevier.com/retrieve/pii/S1361372397825717 http://www.sciencedirect.com/science/article/pii/S1361372397825717 https://api.elsevier.com/content/article/PII:S1361372397825717?httpAccept=text/xml,http://dx.doi.org/10.1016/s1361-3723(97)82571-7,,10.1016/s1361-3723(97)82571-7,2012047998,,0,,0,false,, 160-399-919-074-961,Piracy today: robbery and violence at sea since 1980,,1986,journal article,Marine Policy,0308597x,Elsevier BV,United Kingdom,Giulio Pontecorvo,,10,3,232,233,Political science; Law,,,,,https://www.sciencedirect.com/science/article/pii/0308597X86900576 https://www.sciencedirect.com/science/article/pii/0308597X86900576#! https://ideas.repec.org/a/eee/marpol/v10y1986i3p232-233.html https://econpapers.repec.org/RePEc:eee:marpol:v:10:y:1986:i:3:p:232-233,http://dx.doi.org/10.1016/0308-597x(86)90057-6,,10.1016/0308-597x(86)90057-6,1482923628,,0,,0,false,, 161-446-165-980-313,"Digital Piracy, Self-Control Theory, and Rational Choice: An Examination of the Role of Value",,,journal article,International Journal of Cyber Criminology,09742891,K. Jaishankar,India,George E. Higgins,"To date, several researchers have shown that attitudes, low self-control, social learning theory and deterrence theory to explain digital piracy. However, no study examined whether rational choice theory mediated the link between low self-control and digital piracy. Further, no study in digital piracy or criminological literature had considered the role of value in such an examination. Therefore, the purpose of the present study was to contribute to the literature by examining the links between low self-control, rational choice, value, and digital piracy. This study built on the mediating model presented by Piquero and Tibbetts (1996). That is, this study assumed that rational choice theory mediated the link between low self-control and digital piracy. Further, this study assumed that some situational factors would mediate the effect of other situational factors",1,,33,55,Rational choice theory; Social learning theory; Psychology; Value (ethics); Digital piracy; Self-control; Social psychology; Situational ethics,,,,,https://sandbox.zenodo.org/record/18277 https://zenodo.org/record/18277 https://www.cybercrimejournal.com/georgeijcc.pdf http://www.cybercrimejournal.com/georgeijcc.pdf,http://dx.doi.org/10.5281/zenodo.18277,,10.5281/zenodo.18277,2137535988,,0,003-621-909-349-361; 004-478-315-822-569; 005-136-753-965-857; 006-317-517-652-647; 008-669-373-663-807; 008-847-414-702-913; 009-294-953-134-547; 011-970-832-954-189; 012-379-692-154-152; 012-558-297-950-849; 014-082-506-216-299; 020-973-534-331-792; 022-117-357-401-788; 022-634-145-782-991; 024-178-065-161-008; 026-410-926-652-770; 030-095-040-565-413; 030-408-576-856-133; 039-694-917-895-93X; 040-531-608-756-329; 041-756-193-271-330; 042-143-102-272-982; 046-989-664-357-368; 047-114-700-212-575; 049-813-154-354-036; 053-117-697-091-733; 054-205-933-336-306; 055-408-413-936-398; 057-372-064-186-277; 061-737-782-890-350; 062-850-626-837-137; 067-339-005-241-596; 078-449-241-037-227; 080-108-745-777-284; 092-122-423-208-798; 092-123-502-721-527; 096-401-039-718-213; 098-495-729-202-102; 098-570-250-639-553; 099-342-173-833-089; 102-635-628-220-584; 103-013-463-998-215; 105-592-988-429-842; 108-737-313-212-075; 116-760-844-878-63X; 116-953-447-460-185; 125-894-267-538-829; 128-354-106-684-501; 128-971-945-257-889; 140-846-529-317-602; 145-510-833-132-330; 164-283-046-147-287; 170-862-671-156-203; 171-227-733-317-177; 175-905-268-229-256; 186-096-091-042-876; 198-741-956-517-151,36,true,cc-by-nc-sa,gold 161-760-928-596-711,BSA to fight piracy in Japan,,1993,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1993,12,5,5,Computer security; Business; Internet privacy; Computer science,,,,,,http://dx.doi.org/10.1016/0142-0496(93)90258-x,,10.1016/0142-0496(93)90258-x,,,0,,0,false,, 161-901-919-992-452,Book Piracy,,1981,journal article,International Journal of Law Libraries,0340045x; 26261316,Cambridge University Press (CUP),,,,9,2,72,72,Business,,,,,,http://dx.doi.org/10.1017/s0340045x00002094,,10.1017/s0340045x00002094,,,0,,0,true,,bronze 161-935-804-652-533,Piracy in a Failed State: How State-Building Can Stabilize the Situation off the Somali Coast?,2012-05-30,2012,journal article,Journal of East Asia and International Law,19769229; 22879218,Yijun Institute of International Law,South Korea,Akiko Sugiki,,5,1,3,3,,,,,,,http://dx.doi.org/10.14330/jeail.2012.5.1.03,,10.14330/jeail.2012.5.1.03,,,0,,1,true,cc-by-nc,hybrid 162-116-979-210-814,The Gulf of Guinea Piracy: Impact and Effectiveness of Control Measures,,2016,journal article,"Journal of Law, Policy and Globalization",22243240,,,Devotha Edward Mandanda; Guo Ping,"Maritime piracy is an old concept, the history of which can be traced far way back since the time when the human being started using sea as a means of transport. Its criminality was firstly been considered by the customary international law even before codification of the same in 1958 Geneva Convention on the High Seas and later the 1982 United Nations Convention on the Law of the Sea. Somali piracy emerged in the 1990s, its narrative root causes, and impact brought by it and how it is combated have moved the author to write this paper. The International law perception of what constitutes acts of piracy lead the governments of Gulf of Guinea coastal states to be solely responsible for maritime security of their countries as well as eliminating piracy acts happening in their area. Different from piracy off the coast of Somalia, a stateless country, Gulf of Guinea countries have stable governments and thus the principle of sovereignty applies. The combat of piracy in the Gulf of Guinea is vested to the Economic Community of West African States (ECOWAS), Economic Community of Central African States (ECCAS) and the Gulf of Guinea Commission (GGC) with the aid from partner States.This paper focused on impact of Gulf of Guinea piracy to the maritime industry and to the countries, effectiveness of the control measures placed to combat piracy and challenges facing the combat of piracy in the area. Moreover, the definition of maritime piracy, narrative root causes of piracy off the coast of Gulf of Guinea, and lastly, conclusion and recommendations are the areas covered by this paper. Keywords: Piracy, Armed Robbery, Violence, Gulf of Guinea",55,,105,130,Economy; Political science; United Nations Convention on the Law of the Sea; Sovereignty; Commission; Somali; Maritime security; Customary international law; Convention on the High Seas; International law,,,,,https://www.iiste.org/Journals/index.php/JLPG/article/view/34242 https://www.iiste.org/Journals/index.php/JLPG/article/download/34242/35214,https://www.iiste.org/Journals/index.php/JLPG/article/view/34242,,,2567841129,,0,029-909-993-322-298,1,false,, 162-207-328-186-535,Situational Awareness: Examining Factors that Affect Cyber-Risks in the Maritime Sector,2019-12-02,2019,journal article,International Journal on Cyber Situational Awareness,20572182; 2633495x,"Centre for Multidisciplinary Research, Innovation and Collaboration (C-MRiC)",,Kimberly Tam; Kevin D. Jones,,4,1,40,68,Internet privacy; Information technology; Situation awareness; Cyber-physical system; Affect (psychology); Computer science; Autonomy; Internet of Things,,,,,https://pearl.plymouth.ac.uk/handle/10026.1/14948 https://pearl.plymouth.ac.uk/bitstream/10026.1/14948/1/Situational%20Awareness%20Examining%20Factors%20that%20Affect%20Cyber-Risks%20in%20the%20Maritime%20Sector%20-%20AM.pdf https://dspace.plymouth.ac.uk/handle/10026.1/14948 https://dblp.uni-trier.de/db/journals/ijcysa/ijcysa4.html#TamJ19 https://core.ac.uk/download/370078085.pdf,http://dx.doi.org/10.22619/ijcsa.2019.100125,,10.22619/ijcsa.2019.100125,2989406214,,0,,1,true,,green 162-337-336-909-399,The Future of Music and Film Piracy in China,,,journal article,Berkeley Technology Law Journal,10863818,,,Eric Priesf,,21,2,795,,Economy; Political science; China,,,,,https://paperity.org/p/81546018/the-future-of-music-and-film-piracy-in-china http://apo.org.au/node/15458 http://scholarship.law.berkeley.edu/btlj/vol21/iss2/4/ https://scholarship.law.berkeley.edu/btlj/vol21/iss2/4/,http://dx.doi.org/10.15779/z38dx27,,10.15779/z38dx27,3122060638,,0,,30,false,, 162-769-967-756-092,The Scope of Serious Crime and Preventive Justice,2016-10-20,2016,journal article,Criminal Justice Ethics,0731129x; 19375948,Informa UK Limited,United Kingdom,Tom Sorell,"I first offer an account of serious crime that goes beyond victimizing crimes committed by individuals against other individuals. This approach extends the well-known framework offered by von Hirsch and Jareborg to include crimes undermining welfare-producing institutions. I then consider how the seriousness of crime justifies preventive measures, including the criminalization of acts preparatory to the commission of serious crime. I shall defend preventive measures, including highly intrusive ones, for the most serious crimes, such as terrorism in the form of mass killing, but I shall take issue with very expansive conceptions of serious crime that include what are intuitively much less serious offenses than terrorism or murder. In England and Wales, the Serious Crime Act (2007) lists relevant types of serious crime in its Schedule 1. This and other pieces of serious crime legislation in the UK are discussed critically.",35,3,163,182,Economic Justice; Political science; Law; Terrorism; Commission; Seriousness; Legislation; Harm; Culpability; Criminalization; Criminology,,,,Economic and Social Research Council,https://research.monash.edu/en/publications/the-scope-of-serious-crime-and-preventive-justice https://www.tandfonline.com/doi/full/10.1080/0731129X.2016.1239461 http://ethics.iit.edu/eelibrary/node/19170 http://wrap.warwick.ac.uk/81792/ https://core.ac.uk/download/46522145.pdf,http://dx.doi.org/10.1080/0731129x.2016.1239461,,10.1080/0731129x.2016.1239461,2535806340,,0,005-033-195-886-06X; 015-840-690-802-090; 026-447-373-825-30X; 055-414-784-026-52X; 058-084-770-233-421; 071-563-859-581-309; 071-644-705-091-192; 074-219-834-968-204; 086-100-045-870-172; 088-707-436-703-025; 092-116-979-479-592; 130-929-901-699-549; 142-792-689-441-663,4,true,,green 163-518-641-330-550,Examining Uganda's legal and institutional framework in curbing book piracy,2022-09-12,2022,journal article,Ghana Library Journal,08553033,African Journals Online (AJOL),,Sarah Kaddu; Jospert Chelangat; Eric Nelson Haumba,"This paper examines the legal framework for curbing book piracy in Uganda. The paper sought to address the following objectives: to establish the forms of book piracy practiced; to establish the existing legal frameworks and efforts to curb book piracy; investigate the level of awareness of the legal framework among book printers and its implications on book piracy; to examine the scope of counter-piracy enforcement powers and the law; to identify the setbacks in the enforcement of the legal framework on book piracy. A case study research design and qualitative research paradigm were adopted. Focus Group Discussions (FGDs), unstructured interviews and Document reviews were the data collection methods. The study findings reveal that: duplication, circumventing e-Books and plagiarism are the common forms of book piracy practiced; the legal and institutional frameworks are in place putting in efforts such as awareness and sensitization, engagement with universities, and promotion of the use of holograms; book printers were found to be moderately aware of the legal framework, but they were not deeply knowledgeable of many provisions of the laws; the laws as they are, are ineffective. The setbacks in the enforceability included: the high cost of registration, difficulty in differentiating between genuine and pirated books. The study concludes that different forms of book piracy are practiced in Uganda and that efforts are being undertaken to avert the practice. The study recommends the revision of the existing legal framework; adoption and promotion of security features and restructuring of the copyright registration process among others. ",27,1,23,43,Promotion (chess); Enforcement; Restructuring; Scope (computer science); Legal research; Political science; Public relations; Law; Business; Politics; Computer science; Programming language,,,,,,http://dx.doi.org/10.4314/glj.v27i1.3,,10.4314/glj.v27i1.3,,,0,,0,false,, 163-662-030-260-430,Piracy Suspected in Carrying out the System of Borrower Overdue Penalty,,2004,journal article,Journal of Library and Information Sciences in Agriculture,,,,Gan Qing-ying,"According to the related laws and regulations in China, the authors point out that the implementation of the system of borrower overdue penalty is a piracy behavior in the library, which has no legal gist and surpasses related stipulations. The authors have discussed their own views on reader's service work as well as propaganda and education on library regulations and rules.",,,,,Business; Discount points; Work (electrical); Law; Service (business),,,,,https://en.cnki.com.cn/Article_en/CJFDTOTAL-LYTS200404028.htm,https://en.cnki.com.cn/Article_en/CJFDTOTAL-LYTS200404028.htm,,,2363798136,,0,,0,false,, 164-081-984-686-396,KOREA'S ROAD TOWARD RESPECTING INTELLECTUAL PROPERTY RIGHTS,1999-06-22,1999,journal article,Rutgers Computer and Technology Law Journal,07358938,,,Amy Choe,"I. INTRODUCTION The Republic of Korea is at a crossroad in recognizing the intellectual property rights of software manufacturers. Once a rampant software pirate, Korea is beginning to alter its approach to intellectual property protection. Korea's transition from software piracy to protector began in 1985 when the United States used the threat of trade sanctions under ""Section 301""(1) to force Korea to amend its intellectual property laws.(2) The Korean National Assembly responded to U.S. trade pressure by overhauling its intellectual property laws.(3) On December 31, 1986, the Korean National Assembly passed amendments to its Patent Act,(4) Trademark Act(5) and Copyright Act.(6) On the same day, the Korean Assembly also passed the Computer Program Protection Act(7) (""CPPA""), which recognizes the need for computer program software protection. U.S. trade pressures and threats resulting from Special 301 were the catalysts that forced Korea to reform its laws and improve enforcement of intellectual property rights.(8) However, as demonstrated by continuing acts of software piracy, enforcement has been a persistent problem.(9) According to one author, who is a critic of current U.S. policy, formal changes in a country's laws that are brought about by external pressure, will not transform traditional attitudes or practices of intellectual property violations.(10) Passing legislation is only the first step toward protecting intellectual property rights, and without widespread understanding, enforcement cannot be achieved.(11) First, domestic economic factors must be considered to understand the continued problem of enforcement in Korea. Korea's economic policy of rapid development through establishing a close government-business relationship, has worked to inhibit enforcement of the CPPA.(12) This economic policy, that has allowed piracy to persist, has been working in opposition to U.S. pressure to improve intellectual property rights in Korea. Recently, however, through the development of a domestic software industry, Korea has begun to appreciate the negative effects of piracy. Moreover, the structural economic reforms, resulting from the 1997 financial crisis, will sever the past economic policy that promoted economic development over everything else, including property rights. Although external pressure may lead to some improvement in protecting intellectual property rights, significant long-term change will occur only when the Korean government understands the impact of piracy on its own economy. Part II of this Note will examine the impact of software piracy on the U.S. software industry. Part III will scrutinize the role of international pressure, particularly U.S. Special 301 policy plays on compelling Korea to improve its protection of intellectual property rights. Part IV will explore Korea's economic policy as a means of understanding the underlying problems of enforcement. Lastly, Part V will explain how the development of Korea's software industry and its current financial crisis may produce significant long term changes in software protection. II. IMPACT OF PIRACY ON THE U.S. SOFTWARE INDUSTRY Software piracy is generally considered ""the unauthorized use or illegal copying of a software product.""(13) Although software piracy occurs throughout the world, including the United States, it is rampant in certain countries, such as Korea.(14) According to the president of Business Software Alliance, Robert Holleyman, ""software piracy is the greatest single threat to the advancement of the software industry.""(15) The U.S. software industry lost approximately $2.8 billion in 1997 as a result of piracy.(16) Because the U.S. software industry employs more than 2 million people annually, large revenue losses translated into approximately 130,000 lost jobs and $1 billion in lost tax revenue in 1996.(17) Piracy in Asian countries constitutes 29% of the worldwide losses. …",25,2,341,374,Engineering; International trade; Revenue; Law; Legislation; Trademark; Enforcement; Computer program/software; Intellectual property; Business software; Property rights,,,,,https://www.questia.com/library/journal/1G1-55721901/korea-s-road-toward-respecting-intellectual-property,https://www.questia.com/library/journal/1G1-55721901/korea-s-road-toward-respecting-intellectual-property,,,289344497,,0,,1,false,, 164-284-929-950-238,Salvage Awards on the Somali Coast: Who Pays for Public and Private Rescue Efforts in Piracy Crises?,,2010,journal article,The American University law review,00031453,,,Geoffrey Christopher Rapp,"This paper, a contribution to the ""Troubled Waters: Combating Modern Piracy with the Rule of Law"" symposium, explores the question of who pays for rescue efforts associated with maritime piracy. The paper explores the availability of admiralty law's salvage awards to governmental and non-governmental actors who intervene to rescue vessels and crew from pirates. Such awards provide an unusual incentive to rescue, traditionally unavailable for land-based rescue, but may raise complicated questions of policy and international law. The paper concludes by comparing salvage awards to a recent trend in American states to adopt ""Search and Rescue"" expense statutes allowing governments to charge those rescued from land-based wilderness perils for the costs associated with intervention.",59,5,6,,Statute; Political science; Law; Search and rescue; Somali; Rule of law; Wilderness; Incentive; International law; Intervention (law),,,,,https://digitalcommons.wcl.american.edu/aulr/vol59/iss5/6/ https://digitalcommons.wcl.american.edu/cgi/viewcontent.cgi?article=1254&context=aulr,https://digitalcommons.wcl.american.edu/aulr/vol59/iss5/6/,,,3124088222,,0,,1,false,, 164-337-330-242-813,Torts. Privacy. Trade-Piracy. Unpermitted Broadcast of Horse Race,,1938,journal article,The University of Chicago Law Review,00419494,JSTOR,United States,,,5,2,320,320,Race (biology); Computer security; Internet privacy; Business; Computer science; Sociology; Gender studies,,,,,,http://dx.doi.org/10.2307/1596989,,10.2307/1596989,,,0,,0,false,, 164-865-867-961-85X,Piractwo i terroryzm morski,2021-12-31,2021,journal article,Studia Prawnicze / The Legal Studies,27194302; 00393312,Instytut Nauk Prawnych Polskiej Akademii Nauk,,Aneta Ratkowska,"The piracy possesses very long history and for some time has been recognized as a crime of the past. The renewed of its occurrence threatened to the international commerce, to the international safety, where through has become a phenomenon of the present world. Reasons of the development of the present piracy one can seek in the poverty coastal states, greed, weakness of some states and lack of their police-functions Even, as the case of Somalia shows, the lack of the efficient government and the economic break down, as well as lack of the efficient legal mechanisms and efficient activities pursuing of the fight with the occurrence of the piracy. Illegal activities at sea can be divided in two groups: piratical activities and armed robbery at sea and acts of terrorism of sea. International law has not one unified definition of the piracy. General frames helpful in defining are established in the United Nations Convention on the Law of the Sea (UNCLOS) which however by instituting conditions „for private ends” and „on the high seas”, considerably restricts its use. Illegal acts of violence with relation to the ship, outside the high sea are defined by the International Maritime Organization, as armed robbery at sea to which the universal jurisdiction, instituted in the UNCLOS convention, is not in force. The key element that allows differentiating the piracy and the terrorism at sea is the motive. Pirates make it for the profit, and sea-terrorists are to gain, so called, the effect of the theatre. In the context of increasing numbers of piratical attacks, especially at the coast of Somalia, Security Council of the United Nations and states undertook more intense activities. It should be however noted that states directly subject are rather reluctant to accusing and the sentencing of pirates in national courts in consideration of the complicated legal character of such matters and the necessity of assuring of the suitable standards of human rights. The question stays whether in the international law is necessary the introduction of the equal mechanism of accusing, the sentencing and punishing of captive pirates. In spite of the undertaken activities, accused pirates often go free because of the lack of proper legal bases or the political will for sentencing and the condemnation. The present elaboration tries to systematize the definition of the widely understood piracy and describes mainstreams of activities undertaken by the international community, targeting the fight with this problem.",,2 (184),37,65,United Nations Convention on the Law of the Sea; Political science; Jurisdiction; Territorial waters; International waters; Context (archaeology); Law; Terrorism; Convention; Business,,,,,,http://dx.doi.org/10.37232/sp.2010.2.2,,10.37232/sp.2010.2.2,,,0,,0,true,cc-by,gold 165-242-401-876-405,How Piracy Has Shaped the Relationship Between American Law and International Law,,2010,journal article,The American University law review,00031453,,,Joel H. Samuels,Introduction 1231 I. Piracy and Legal Reform Leading Up to the Judiciary Act 1235 II. The Role of the Courts in Developing Law Through Piracy Cases and the Impact of Those Cases on Modern American Legal Doctrines 1244 A. The Early Cases 1244 B. Universal Jurisdiction 1249 C. State Action 1253 Conclusion 1261,59,5,1231,,Comparative law; Political science; Public international law; Law; Universal jurisdiction; State action; International law,,,,,https://digitalcommons.wcl.american.edu/cgi/viewcontent.cgi?article=1251&context=aulr https://scholarcommons.sc.edu/law_facpub/40/ https://digitalcommons.wcl.american.edu/aulr/vol59/iss5/3/ http://www.wcl.american.edu/journal/lawrev/59/5samuels.pdf,https://scholarcommons.sc.edu/law_facpub/40/,,,1550102854,,0,,0,false,, 167-008-529-747-271,Application of Domestic Laws on International Piracy Crimes,,2009,journal article,Journal of Guangxi Administrative Cadre Institute of Politics and Law,,,,Gao Guo-qi,"In recent years,as the phenomenon of Aden Gulf Somali piracy becomes increasingly rampant,the joint effort in hitting the piracy crimes is strenghtened within the international scope.P.R.China has entered into the relevant international treaty on hitting piracy crimes and undertakes the international obligations of pursuing the piracy crimes from criminal aspects.This thesis discusses on how to apply to the Criminal Law of P.R.China to pursue the piracy crimes and maintains that it is adequate to pursue the piracy crimes and to undertake the obligations under international treaty within the existing criminal law regime of P.R.China,and it is not necessary to add an accusation of piracy crime in the Special Provisions of the Criminal Law.",,,,,Political science; Law; Criminal law; Somali; International treaty; Phenomenon; False accusation,,,,,https://en.cnki.com.cn/Article_en/CJFDTOTAL-GZGG200905018.htm,https://en.cnki.com.cn/Article_en/CJFDTOTAL-GZGG200905018.htm,,,2360409703,,0,,0,false,, 167-025-171-147-312,Software piracy concern over anticipated changes to Japanese copyright law,,1993,journal article,Computer Audit Update,09602593; 18790798,Elsevier BV,,,,1993,9,18,18,Copyright law; Internet privacy; Software; Computer security; Law; Business; Intellectual property; Computer science; Law and economics; Political science; Sociology; Operating system,,,,,,http://dx.doi.org/10.1016/0960-2593(93)90286-a,,10.1016/0960-2593(93)90286-a,,,0,,0,false,, 167-028-433-540-960,Music Piracy and Diminishing Revenues: How Compulsory Licensing for Interactive Webcasters Can Lead the Recording Industry Back to Prominence,,2013,journal article,University of Pennsylvania Law Review,00419907,,,Neil S. Tyler,INTRODUCTION 2102 I. THE MUSIC PIRACY EPIDEMIC 2106 A. Failed Efforts to Combat Piracy 2107 B. New and Innovative Ways to Combat Piracy 2109 II. THE MODERNIZATION OF MUSIC 2111 A. The Rise of Streaming Technology 2112 B. The Current Potential of Streaming Services 2115 III. THE HISTORY OF THE SOUND RECORDING PUBLIC PERFORMANCE RIGHT 2116 A. Early History of Sound Recording Rights 2118 B. Digital Performance Right in Sound Recordings Act 2118 C. DMCA Amendments 2120 1. Effects of the DMCA 2122 2. The Uncertainty and Dangers Facing Webcasters 2125 IV. THE DEVELOPMENT OF THE NONINTERACTIVE WEBCASTING ROYALTY RATE 2126 A. Copyright Arbitration Royalty Panel Proceedings 2127,161,7,2101,,Advertising; Sound recording and reproduction; Business; Arbitration; Music industry; Revenue; Music piracy; Digital performance; Modernization theory; Webcast,,,,,https://scholarship.law.upenn.edu/penn_law_review/vol161/iss7/9/ https://scholarship.law.upenn.edu/cgi/viewcontent.cgi?article=1035&context=penn_law_review,https://scholarship.law.upenn.edu/penn_law_review/vol161/iss7/9/,,,23129370,,0,,2,false,, 167-520-259-536-222,The Norwegian DeCSS Litigation – A DVD Piracy Trial,2004-07-01,2004,journal article,Business Law Review,01436295,Kluwer Law International BV,,Thomas Andersen,,25,Issue 7,187,189,,,,,,,http://dx.doi.org/10.54648/bula2004103,,10.54648/bula2004103,,,0,,0,false,, 167-797-718-620-602,Explaining Young People's Involvement in Online Piracy: An Empirical Assessment using the Offending Crime and Justice Survey for England and Wales,2016-01-05,2016,journal article,Victims & Offenders,15564886; 15564991,Informa UK Limited,United Kingdom,Ian Brunton-Smith; Daniel McCarthy,"The Internet has been widely acknowledged as facilitating many forms of youth offending. Existing research has identified important drivers of young people’s involvement in online crime, yet this has overwhelmingly relied on school or college samples. As such, it tells us little about those young people that have left the formal education system—a group who are more likely perpetrators of juvenile crime more generally. Focusing on young people’s involvement in online piracy offenses, our analysis draws on data from a nationally representative survey of England and Wales to better understand the dynamics of involvement in online crime across the population. We assess the potential overlaps between online and offline offending, the role of differential association and deviancy neutralization techniques in shaping offending behavior, as well as the protective effect of strong family support networks in reducing involvement in piracy. We find that illegal downloaders tend to be young, male, and have a higher number of delinquent friends. We also find that many of these offenders do not confine their offending to online spaces, with involvement in offline property offenses also high among this group",11,4,509,533,The Internet; Psychology; Justice (ethics); Differential association; Family support; Online and offline; Population; Empirical assessment; Juvenile delinquency; Social psychology,,,,,https://epubs.surrey.ac.uk/810074/ https://www.tandfonline.com/doi/full/10.1080/15564886.2015.1121943 https://www.tandfonline.com/doi/ref/10.1080/15564886.2015.1121943 https://core.ac.uk/download/42551933.pdf,http://dx.doi.org/10.1080/15564886.2015.1121943,,10.1080/15564886.2015.1121943,2230696907,,0,001-207-095-563-935; 001-226-155-152-112; 004-133-248-301-486; 004-923-776-990-322; 005-197-947-965-774; 006-522-723-913-783; 010-146-711-506-660; 011-970-832-954-189; 012-599-741-441-882; 012-776-583-962-352; 013-425-010-292-015; 013-687-872-841-030; 018-602-054-510-017; 024-733-351-861-814; 026-586-662-474-112; 027-467-733-981-539; 028-367-224-045-089; 028-538-620-751-544; 029-584-861-691-558; 031-279-347-108-025; 035-415-667-797-05X; 036-288-246-851-895; 037-328-562-745-656; 042-565-537-237-799; 042-840-674-327-735; 043-903-802-619-495; 046-924-185-122-871; 049-144-726-492-915; 050-386-437-394-929; 050-910-642-438-132; 053-659-957-455-991; 056-691-320-673-173; 057-464-788-206-462; 058-806-863-894-52X; 058-919-953-064-002; 059-691-094-029-417; 064-896-466-018-947; 067-339-005-241-596; 068-540-780-316-967; 072-643-558-233-032; 076-410-250-964-523; 079-997-337-083-90X; 080-608-943-134-256; 086-204-925-368-435; 087-741-665-010-68X; 090-402-072-299-467; 098-570-250-639-553; 110-753-746-053-294; 113-312-386-184-519; 115-149-335-125-979; 119-124-789-716-583; 119-531-502-608-218; 120-177-501-243-313; 123-538-500-409-553; 126-132-705-417-118; 126-772-810-967-037; 128-787-292-554-607; 129-587-970-540-23X; 136-299-699-040-998; 139-929-030-159-156; 144-971-557-371-823; 145-723-840-815-921; 150-527-549-363-854; 160-358-377-281-104; 160-376-214-644-07X; 161-493-572-775-810; 171-803-389-787-120; 175-905-268-229-256; 187-973-523-354-67X,16,true,cc-by-nc-nd,hybrid 168-302-509-256-743,Historical and Legal Analysis of Norms on Piracy,,2016,journal article,Актуальные проблемы российского права,19941471,Kutafin Moscow State Law University,,,,,,,,Law and economics; Political science; Law; Computer security; Computer science; Sociology,,,,,,http://dx.doi.org/10.17803/1994-1471.2016.71.10.027-033,,10.17803/1994-1471.2016.71.10.027-033,,,0,,0,false,, 168-315-949-325-186,"Global Software Piracy, Technology and Property Rights Institutions",2020-04-22,2020,journal article,Journal of The Knowledge Economy,18687865; 18687873,Springer Verlag,Germany,Simplice A. Asongu,"This study extends the literature on fighting software piracy by investigating how Intellectual Property Rights (IPRs) regimes interact with technology to mitigate software piracy when existing levels of piracy are considered. Two technology metrics (internet penetration rate and number of PC users) and six IPRs mechanisms (constitution, IPR law, main IP laws, WIPO Treaties, bilateral treaties and multilateral treaties) are used in the empirical analysis. The statistical evidence is based on: (i) a panel of 99 countries for the period 1994-2010 and (ii) interactive contemporary and non-contemporary Quantile regressions.The findings show that the relevance of IPR channels in the fight against software piracy is noticeably contingent on the existing levels of technology embodied in the pirated software. There is a twofold policy interest for involving modern estimation techniques such as interactive Quantile regressions. First, it uncovers that the impact of IPR systems on software piracy may differ depending on the nature of technologies used. Second, the success of initiatives to combat software piracy is contingent on existing levels of the piracy problem. Therefore, policies should be designed differently across nations with high-, intermediate- and low-levels of software piracy.",12,3,1,28,Business; Relevance (law); Constitution; Software; Global software; Intellectual property; Industrial organization; Business software; Entrepreneurship; Property rights,,,,,https://EconPapers.repec.org/RePEc:spr:jknowl:v:12:y:2021:i:3:d:10.1007_s13132-020-00653-1 https://mpra.ub.uni-muenchen.de/103150/ https://ideas.repec.org/a/spr/jknowl/v12y2021i3d10.1007_s13132-020-00653-1.html https://link.springer.com/article/10.1007/s13132-020-00653-1,https://EconPapers.repec.org/RePEc:spr:jknowl:v:12:y:2021:i:3:d:10.1007_s13132-020-00653-1,,,3121277941,,0,001-516-315-009-055; 003-120-061-431-142; 006-913-640-297-530; 007-559-358-394-991; 008-896-495-853-748; 010-421-402-067-194; 012-203-539-243-07X; 013-765-194-873-383; 015-808-798-057-897; 016-623-013-143-177; 018-931-875-920-651; 022-027-708-413-061; 026-621-534-864-651; 028-630-596-457-020; 029-945-161-770-934; 037-712-830-063-915; 038-280-704-640-240; 039-883-767-744-759; 041-849-157-283-572; 041-893-696-570-720; 046-534-914-774-543; 047-010-436-077-442; 047-691-102-180-446; 049-698-234-112-01X; 053-956-378-667-86X; 054-549-558-630-210; 054-575-891-386-310; 054-663-257-958-510; 062-169-487-131-224; 066-237-973-648-031; 068-192-019-137-08X; 068-369-874-929-679; 084-276-283-502-216; 086-417-859-025-870; 086-528-214-511-515; 097-165-496-887-789; 103-047-934-034-494; 107-007-285-779-662; 111-973-055-866-545; 112-650-832-546-977; 113-512-999-316-12X; 115-121-431-459-018; 118-179-693-472-854; 124-655-841-474-707; 125-495-818-933-457; 126-460-943-268-819; 133-793-936-162-353; 139-864-136-469-932; 145-811-348-738-768; 156-200-179-267-390; 185-197-322-646-367; 193-305-032-595-202,0,false,, 168-316-192-558-491,The Unintended Consequences of Anti-Piracy Laws on Markets with Asymmetric Piracy: The Case of the French Movie Industry,,2020,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Christophe Bellégo; Romain de Nijs,"Using the French anti-piracy law known as HADOPI as a natural experiment, we study the asymmetric effects of online piracy on cinema admissions. Applying four estimation strategies at different levels of observation (town, movie, country, and consumer), we find that the introduction of the law is associated with a 9% increase in the market share of American movies. This increase occurs at the expense of other movies. Although we find an increase in overall admissions, this effect is not statistically significant. These findings primarily originate from a high initial level of asymmetric piracy between American and other movies, which was attenuated by the anti-piracy law, resulting in a fiercer competition between movies. The results can also be explained by the behavior of younger consumers, and might be caused by consumers' budget or time constraints. We exclude positive shocks on the relative quality of American movies, the advent of 3D movies, supply side reactions by firms, and word of mouth effects of illegal downloads as explanations for this redistributive effect.",,,,,Word of mouth; Market share; Economics; Law; Unintended consequences; Quality (business); Competition (economics); Natural experiment; Movie theater; Film industry,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3545801,http://dx.doi.org/10.2139/ssrn.3545801,,10.2139/ssrn.3545801,3123085177,,0,,0,true,,green 168-872-799-822-495,"The Invisible Defense Against Music Piracy, 15 J. Marshall Rev. Intell. Prop. L. 297 (2016)",2016-04-05,2016,journal article,John Marshall Review of Intellectual Property Law,19308140,,,Paige Clark,,15,2,6,,Political science; Law; Music piracy,,,,,https://repository.law.uic.edu/cgi/viewcontent.cgi?article=1380&context=ripl https://repository.jmls.edu/ripl/vol15/iss2/6/ https://repository.law.uic.edu/ripl/vol15/iss2/6/,https://repository.jmls.edu/ripl/vol15/iss2/6/,,,2340225189,,0,,0,false,, 168-994-583-505-592,Diffusion and Effects of Cyber-Crime in Developing Economies,2010-11-20,2010,journal article,Third World Quarterly,01436597; 13602241,Informa UK Limited,United Kingdom,Nir Kshetri,"Cyber-crime's footprints across the developing world are getting bigger. The aim of this article is to examine the structure of cyber-crimes in developing economies. Its central idea is that economic and institutional factors facing cyber-criminals and potential victims in the developing world are different from those in the developed world. In economies characterised by low internet penetration rates and few resources devoted to fighting cyber-crimes, formal institutions related to such crimes tend to be thin and dysfunctional. A cyber-criminal is less likely to be stigmatised in such economies. Moreover, organisations' and individuals' technological and behavioural defence mechanisms are likely to be weaker. Many people in developing economies are also attracted into cyber-crime because of high unemployment and low wages.",31,7,1057,1079,Economies of agglomeration; Developed country; Economics; Dysfunctional family; Cyber crime; Internet penetration; High unemployment; Development economics; Economic system; Developing country,,,,,https://libres.uncg.edu/ir/uncg/f/N_Kshetri_Diffusion_2010.pdf https://core.ac.uk/display/149240563 https://www.tandfonline.com/doi/abs/10.1080/01436597.2010.518752 https://libres.uncg.edu/ir/uncg//listing.aspx?styp=ti&id=9115 https://core.ac.uk/download/149240563.pdf,http://dx.doi.org/10.1080/01436597.2010.518752,,10.1080/01436597.2010.518752,2021518206,,0,,40,true,,green 169-045-098-241-820,New campaign to reduce software piracy,,1996,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,1996,8,3,3,Computer science; Software; Computer security; Operating system,,,,,,http://dx.doi.org/10.1016/s1361-3723(96)90065-2,,10.1016/s1361-3723(96)90065-2,,,0,,1,false,, 169-516-066-822-880,A “rutter for piracy” in 2012,2012-03-31,2012,journal article,WMU Journal of Maritime Affairs,1651436x; 16541642,Springer Science and Business Media LLC,Sweden,Samuel Pyeatt Menefee; Maximo Q. Mejia,"This ""rutter for piracy"" begins with a brief update on contemporary piratical incidents and a short review of books and collections of articles dedicated to the topic of piracy, before presenting the ground-breaking group of scholarly essays which make up WMU Journal of Maritime Affairs' special issue on piracy at sea.",11,1,1,13,Engineering; Public international law; Law; Maritime security; Rutter,,,,,https://link.springer.com/content/pdf/10.1007%2Fs13437-012-0026-1.pdf https://link.springer.com/article/10.1007/s13437-012-0026-1 https://paperity.org/p/8697886/a-rutter-for-piracy-in-2012 https://core.ac.uk/display/81857171,http://dx.doi.org/10.1007/s13437-012-0026-1,,10.1007/s13437-012-0026-1,2055627592,,0,000-459-082-359-921; 004-284-104-668-332; 015-807-546-280-350; 018-902-831-047-51X; 025-784-266-343-445; 031-391-312-149-679; 033-106-124-233-969; 035-939-886-805-088; 037-990-138-540-391; 038-419-722-840-506; 040-626-569-617-458; 041-847-038-891-293; 048-533-178-322-976; 051-556-391-889-250; 051-694-882-548-819; 057-170-521-550-316; 060-564-404-094-593; 061-563-177-430-316; 063-203-515-670-958; 064-391-400-638-226; 072-224-764-986-979; 084-441-753-687-988; 090-486-677-719-541; 095-123-347-988-713; 095-204-184-312-78X; 099-383-319-583-168; 100-059-825-889-775; 101-005-538-482-174; 109-632-011-420-27X; 110-839-623-236-602; 120-412-777-001-726; 124-525-963-461-685; 124-894-971-183-009; 132-886-511-869-587; 135-502-618-395-40X; 148-842-908-850-40X; 149-197-393-969-029; 151-030-368-778-930; 155-969-793-455-558; 156-275-103-416-202; 159-472-698-303-03X; 170-006-881-138-933; 170-012-207-007-481; 179-829-784-044-841; 182-807-647-019-675; 185-104-823-389-543; 187-259-813-749-110; 187-740-957-200-638; 189-484-813-376-223; 196-350-296-966-072; 197-564-449-508-671,4,true,cc-by,hybrid 169-908-462-135-006,Questionnaire No. 6: Piracy,,1926,journal article,The American Journal of International Law,00029300,Cambridge University Press (CUP),United States,,,20,3,222,222,Business; Internet privacy; Computer science,,,,,,http://dx.doi.org/10.2307/2213211,,10.2307/2213211,,,0,,1,false,, 170-579-006-860-440,Attacking Somalia Pirates from the Perspective of International Cooperation,,2009,journal article,Journal of Heilongjiang Administrative Cadre College of Politics and Law,,,,Zhang Chao-ha,"Somalia piracies' action has been being a main problem of affecting and destroying international maritime safety that caused greatly concerning of international community and constituted an international crime of seriously endangering peace and security.Many countries have established universal jurisdiction for piracy crime actions.Some countries now go to Somalia waters to attack piracies after UN's authorization and effective agreement of Somalia's temporary government.There will come up with some strategies and methods through analysis of pirates' cause,harmfulness,attacking necessity and some problems resulting from attacking pirates by international cooperation.",,,,,Authorization; Political science; Law; Perspective (graphical); Universal jurisdiction; Action (philosophy); International community; Maritime safety,,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-LGLX200905032.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-LGLX200905032.htm,,,2383983297,,0,,0,false,, 171-367-090-419-763,Shorter Notices,2006-09-01,2006,journal article,The Pakistan Development Review,00309729,Pakistan Institute of Development Economics (PIDE),Pakistan,Samina Nazli; Afia Malik,Download the PDF file,45,3,501,504,Economics,,,,,https://core.ac.uk/download/pdf/337604224.pdf,http://dx.doi.org/10.30541/v45i3pp.501-504,,10.30541/v45i3pp.501-504,,,0,,0,true,,bronze 171-467-109-733-794,The huge costs of software piracy,,1997,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,1997,9,3,3,Software; Computer science; Computer security; Business; Internet privacy; Operating system,,,,,,http://dx.doi.org/10.1016/s1361-3723(97)90056-7,,10.1016/s1361-3723(97)90056-7,,,0,,1,false,, 171-682-890-012-582,Combating Somali Pirates: Fourth Circuit Casts Warning by Holding Piracy Includes Failed Attempts,,2013,journal article,Suffolk Transnational Law Review,10728546,,,Charles E. Sheehan,"United States v. Dire, 680 F.3d 446 (4th Cir. 2012). Piracy off the coast of Somalia, a problem that has emerged from the instability of the country's economic, social, and political sectors, threatens international security, the global economy, and American citizens and commercial interests. (1) Yet, despite joint efforts by the United States and the international community to combat this persistent danger, Somali pirates have not been deterred from pursuing this highly profitable criminal enterprise. (2) In United States v. Dire, (3) the Court of Appeals for the Fourth Circuit took a prolific step towards securing safe navigation of the seas when it interpreted ""piracy"" according to 18 U.S.C. [section] 1651. (4) The court rejected the defendants' challenge to their piracy convictions, concluding that the crime of piracy should be defined by the evolving standard under the law of nations to encompass violent conduct. (5) On April 1, 2010, on the high seas off the coast of Somalia, Abdi Wali Dire, along with four other Somalis, attacked the USS Nicholas. (6) All five defendants were transferred to the Eastern District of Virginia. (7) A federal grand jury returned a six-count indictment against the defendants on April 20, 2010. (8) On July 7, 2010, a federal grand jury returned a superseding indictment, with Count One charging defendants with piracy in violation of 18 U.S.C. [section] 1651. (9) The Court denied defendants' motions to dismiss Count One of the superseding indictment, determining that the alleged conduct, if proven true, would satisfy the definition of piracy under 18 U.S.C. [section] 1651. (10) After an eleven-day trial, the jury returned separate guilty verdicts against each of the five defendants. (11) Defendants timely appealed their piracy convictions, again asserting that simply opening fire at the USS Nicholas did not constitute piracy. (12) On petition for review, the Fourth Circuit affirmed the defendants' piracy convictions, holding that international law, through the law of nations, has defined piracy to include acts of violence committed on the high seas for private ends without an actual taking. (13) Piracy has existed for over 2000 years with the word ""pirate"" originating from the Latin term pirata. (14) Recognizing the immediate threat that piracy posed to society, the international community labeled pirates as hostes humani generis, or enemies of all mankind. (15) Because pirates indiscriminately attack ships from any nation, international law has recognized piracy as a crime that requires universal jurisdiction. (16) Nevertheless, despite the crime of piracy being at the forefront of the international community, ""piracy"" means different things to different people within criminal law jurisprudence. (17) Article I of the United States Constitution authorizes Congress to address the crime of piracy. (18) Congress enacted its first anti-piracy legislation in 1790 to penalize individuals who engaged in piratical acts. (19) However, in United States v. Palmer, the Supreme Court held that the Act was invalid as pertaining to conduct by subjects of a foreign state against foreign vessels. (20) Recognizing that the 1790 Act only addressed municipal piracy, Congress passed new legislation in 1819, phrasing the Act so that universal jurisdiction could also be invoked. (21) The Supreme Court soon interpreted section 5 of the Act of 1819 by concluding that piracy was % crime of a settled and determinate nature ... that robbery, or forcible depredations upon the sea, animo furandi, is piracy."" (22) Today, nearly 200 years later, the definition of piracy articulated in section 5 of the Act of 1819 remains virtually unchanged in 18 U.S.C. [section] 1651. (23) The plain reading of 18 U.S.C. [section] 1651 defines the crime of piracy by direct reference to the ""law of nations."" (24) In In re Piracy Gentium, the Privy Council of England decided that the international crime of piracy did not require a completed act of robbery. …",36,1,267,,Sociology; International waters; Law; Criminal law; Jury; Universal jurisdiction; Legislation; Supreme court; Indictment; International law,,,,,https://www.questia.com/library/journal/1G1-349222262/combating-somali-pirates-fourth-circuit-casts-warning,https://www.questia.com/library/journal/1G1-349222262/combating-somali-pirates-fourth-circuit-casts-warning,,,49879448,,0,,0,false,, 172-375-857-460-697,Technological Development in Information Technology and the Demise of the Music Industry: The Case of Sungura Music in Zimbabwe and Digong Music of South Africa,2014-07-01,2014,journal article,Mediterranean Journal of Social Sciences,20399340; 20392117,Richtmann Publishing,Italy,Zandi Lesame,"It’s agonizing to realize that someone spent months if not years of sleepless nights compiling, composing and committed to produce a piece of music art. In most cases before it gets into the market officially it is deplorable that thousands of copies would have been sold illegally and at a bargain price like R10-00 in South African currency (US$1-00) and US$1-00 in Zimbabwe currency. This on-the-street cheap pricing cannot remunerate the effort of the musicians neither does it benefit to the pirates. The issues of Intellectual Property Rights (IPRs) need to be respected in all forms of art. Before the 1990s, the music industry used to be lucrative for music artists but now some view it as unrewarding because fake artists copy their music (and also some films) and sell it on the streets before it reaches music stores. Copy right laws are no longer observed seriously. This paper seeks to answer the following questions: What should be done to improve music production and supply processes in Zimbabwe and South Africa? Who is to blame for this rampant music piracy in the Southern African countries - the information technologist who reproduces a music CD illegally or the musician? Management of art is complex and a number of musicians are not educated enough and thus have no basic business management knowledge and skills. This paper critiques the illegal act of music piracy in Zimbabwe and South African, and seeks to establish a music industry model of musical art marketing and sales towards profitability for music composers and producers. The article attempts to offer possible solutions to the music piracy challenge. DOI: 10.5901/mjss.2014.v5n15p272",5,15,272,272,Advertising; Popular music; Information technology; Currency; Sociology; Music industry; Demise; Music piracy; Intellectual property; Music,,,,,https://www.richtmann.org/journal/index.php/mjss/article/view/3231 https://www.richtmann.org/journal/index.php/mjss/article/download/3231/3185 https://www.mcser.org/journal/index.php/mjss/article/download/3231/3185 https://www.mcser.org/journal/index.php/mjss/article/view/3231 https://core.ac.uk/download/228536609.pdf,http://dx.doi.org/10.5901/mjss.2014.v5n15p272,,10.5901/mjss.2014.v5n15p272,2025034198,,0,025-031-373-146-600; 040-750-095-522-462; 061-852-687-714-790; 100-835-129-785-664; 145-616-913-856-289,1,true,cc-by,hybrid 172-406-736-064-937,Fighting against Somali pirates:a responsibility as well as a challenge,,2011,journal article,Annual of China Maritime Law,,,,Li Ying,"""Piracy"" is one of the international crimes which,according to the resolutions adopted by the UN Security Counsel,must be prosecuted and punished.Nevertheless,an effective legal mechanism is the precondition for such prosecution and punishment.Moreover,whether the crime of piracy be prosecuted through an international criminal institute or a domestic court,the principle of ""due process""must be respected and applied.And this,for China and other countries,is both a responsibility and a challenge.",,,,,Political science; China; Precondition; Law; Somali; Mechanism (sociology); Process (engineering),,,,,https://en.cnki.com.cn/Article_en/CJFDTOTAL-ZGHS201102002.htm,https://en.cnki.com.cn/Article_en/CJFDTOTAL-ZGHS201102002.htm,,,2378208439,,0,,0,false,, 173-238-839-610-001,"Equity: Unfair Competition: ""Mutt and Jeff"" Protected from ""Piracy""",,1921,journal article,Michigan Law Review,00262234; 19398557,JSTOR,United States,,,20,2,240,240,Unfair competition; Equity (law); Law and economics; Competition (biology); Business; Law; Economics; Political science; Biology; Ecology,,,,,,http://dx.doi.org/10.2307/1278391,,10.2307/1278391,,,0,,0,false,, 173-486-563-089-528,Piracy and Quality Choice in Monopolistic Markets,,2002,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Elena Argentesi; Matteo Alvisi; Emanuela Carbonara,"We study the impact of piracy on the quality choices of a monopolist. In the absence of piracy, the monopolist has no incentive to differentiate its products. With piracy the monopolist might instead produce more than one quality, so that differentiation arises as the optimal strategy. This is because the producer wants to divert consumers from the pirated good to the original one. Differentiation involves producing a low-quality good such that piracy is either reduced (albeit still observed in equilibrium) or even eliminated. The enforcement of copyright laws reduces the incentive to differentiate, stressing our result that differentiation is a reaction to piracy.",,,,,Economics; Microeconomics; Quality (business); Enforcement; Incentive; Product differentiation; Commerce; Monopolistic competition,,,,,https://core.ac.uk/display/100879407 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=341960 https://autopapers.ssrn.com/sol3/papers.cfm?abstract_id=341960 https://www.ssrn.com/abstract=341960 https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID341960_code021029640.pdf?abstractid=341960&mirid=2,http://dx.doi.org/10.2139/ssrn.341960,,10.2139/ssrn.341960,1525545999,,0,001-173-331-072-968; 004-602-038-504-698; 010-868-742-674-100; 021-175-476-550-080; 040-255-392-667-803; 045-523-803-520-989; 049-437-351-989-704; 049-537-689-727-339; 052-527-886-735-636; 053-426-243-364-652; 054-714-458-583-396; 056-134-823-809-165; 065-565-723-557-192; 078-410-292-183-154; 079-498-938-412-741; 096-977-975-759-335; 111-144-694-487-383; 126-996-752-002-343; 129-154-209-747-00X; 129-415-460-717-284; 153-552-384-031-475; 155-600-681-123-444; 192-826-001-407-763; 196-088-336-673-442,20,true,cc-by-nc,green 173-529-018-196-421,Internet piracy and consequences for victims,,2016,journal article,Temida,14506637; 24060941,National Library of Serbia,,Miljan Savic; M Nikola Petrovic,"After the evolution of technology made it possible to perform actions via the; Internet that constitute copyright violations, the analysis of the effects of; internet piracy on social welfare became the subject of academic polemics.; The main and the biggest victims of Internet piracy are the holders of; copyright and related rights, however, the damage that piracy causes them; comes from multiple sources, is difficult to quantify and is only a part of; the total social cost of piracy. However, there are other categories of; victims, such as those whose honor was besmirched as a result of piracy, and; who suffer the consequences in the form of negative emotional reactions, loss; of job as well as those who subsequently commit suicide. The object of this; paper is to describe the effects of internet piracy on the victims of this; phenomenon, and the goal is the analysis of the various direct and indirect; effects of piracy on victims and their motivation for future creation, as; well as analysis of prevention measures, with special emphasis on the; Republic of Serbia.",19,3-4,389,404,Internet privacy; The Internet; Business,,,,,http://www.doiserbia.nb.rs/Article.aspx?ID=1450-66371604389S,http://dx.doi.org/10.2298/tem1604389s,,10.2298/tem1604389s,2603066132,,0,,1,true,cc-by-nc-nd,gold 173-708-142-383-877,Cyber Crimes Against Property (Cyber Squatting & Software Piracy),,2013,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Rehan Khan,,,,,,Internet privacy; The Internet; Engineering; Government; Terrorism; Software; Stalking; Computer security; Cybersquatting; Hacker; Information Age,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2392687&rec=1&srcabs=2486125&alg=1&pos=6 https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2392687 https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2392687_code2159493.pdf?abstractid=2392687&mirid=1&type=2 https://papers.ssrn.com/sol3/Delivery.cfm?abstractid=2392687,http://dx.doi.org/10.2139/ssrn.2392687,,10.2139/ssrn.2392687,2216298383,,0,000-286-566-187-166; 026-251-687-758-643; 047-245-787-924-339; 085-181-150-662-093; 099-211-861-355-789; 173-708-142-383-877,1,false,, 174-165-099-000-073,Global Cooperation in Combating Sea Piracy: The Factors behind Global Piracy Trends,2016-08-30,2016,journal article,Hasanuddin Law Review,24429899; 24429880,"Hasanuddin University, Faculty of Law",,Radillah Khaerany; Maskun Maskun,"The rising number of sea travel is followed by the emerging number of sea crimes such as sea piracy and maritime terrorism. In recent two decades, the number of crimes on the sea have shown an alarming figure, where areas with a dense traffic of vessels such as the Gulf of Aden and Malacca Strait becomes the hot spots for piracy crime. The main reason behind the emerging of modern piracy is the increasing number of sea transported goods which create a significant opportunity to be a huge target of crime considering the drives behind piracy is financial reason. Some area of sea piracy took place commonly in Africa and Southeast Asia.",1,2,213,213,International trade; Terrorism; United Nations Convention on the Law of the Sea; Southeast asia; Law of the sea; Political science; Geography; Maritime security; Business; Economy; International law; Law; History; Economics; Public international law; Ancient history,,,,,,http://dx.doi.org/10.20956/halrev.v1n2.305,,10.20956/halrev.v1n2.305,,,0,,0,true,cc-by,gold 175-306-275-377-80X,"Piracy,Privacy, and Privatization: Fictional and Legal Approaches to the Electronic Future of Cash",,1997,journal article,The American University law review,00031453,,,Walter A. Effross,,46,4,1,,Internet privacy; Information privacy; Business; Law; Cash,,,,,https://digitalcommons.wcl.american.edu/aulr/vol46/iss4/1/ https://works.bepress.com/walter_effross/2/download/ https://digitalcommons.wcl.american.edu/cgi/viewcontent.cgi?article=2570&context=facsch_lawrev https://works.bepress.com/walter_effross/2/,https://digitalcommons.wcl.american.edu/aulr/vol46/iss4/1/,,,1494120355,,0,,0,false,, 175-362-851-035-426,TECHNICAL SECURITY IN ITE LAW AND COPYRIGHTS OF DEVICES AND SYSTEMS,2022-03-05,2022,journal article,"POLICY, LAW, NOTARY AND REGULATORY ISSUES (POLRI)",2809896x,PT. Transpublika Jaya Abadi,,Septian Rizky Dalimunthe; Sri Anisa Pujawati; Akmal Satria Alvin Sitorus,"Copyright is the creator's or recipient's exclusive right to publish or reproduce his work, or to grant permission to do so, without reducing the restrictions imposed by applicable laws and regulations. This research aims to determine how the legal protection of creators for the use of illegal software is based on the Copyrights Law No. 19 of 2002. The study employs normative law research methods, as well as secondary data obtained through library research. According to the findings, product piracy costs the creator both financially and morally, as well as having an economic impact on the country. Aside from that, using pirated software raises a fatal risk because malware/viruses can easily infiltrate software, opening the way for cyber attacks. As a consequence, it is recommended that legal proprietary software be used for work, learning, or other software-related activities. If people are unable to obtain legal software due to a lack of resources, they should consider other options, such as open source software that is available for free. Furthermore, proprietary software (closed) vendors must be able to offer reasonable prices. If a person or company infringes on another's copyright, they could face criminal charges or civil lawsuits.",1,2,27,36,Publication; Malware; Computer security; Permission; Fair use; Software; Work (physics); Business; Internet privacy; Product (mathematics); Aside; Law; Law and economics; Computer science; Engineering; Political science; Advertising; Sociology; Mechanical engineering; Art; Geometry; Mathematics; Literature; Programming language,,,,,,http://dx.doi.org/10.55047/polri.v1i2.124,,10.55047/polri.v1i2.124,,,0,,0,true,cc-by,hybrid 175-976-000-508-033,A FASHION FLOP: THE INNOVATIVE DESIGN PROTECTION AND PIRACY PREVENTION ACT,2013-10-25,2013,journal article,Journal of Law and Commerce,21647984; 07332491,"University Library System, University of Pittsburgh",,Lauren E. Purcell,A FASHION FLOP: THE INNOVATIVE DESIGN PROTECTION AND PIRACY PREVENTION ACT ,31,,203,220,Advertising; Business; Marketing,,,,,http://jlc.law.pitt.edu/ojs/index.php/jlc/article/view/53 http://jlc.law.pitt.edu/ojs/index.php/jlc/article/download/53/44 https://core.ac.uk/download/pdf/296521671.pdf,http://dx.doi.org/10.5195/jlc.2013.53,,10.5195/jlc.2013.53,2010122133,,0,,1,true,cc-by-nc-nd,gold 176-093-569-873-462,Action against software piracy,,1982,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,4,5,5,6,Computer security; Action (physics); Computer science; Business; Software; Operating system; Physics; Quantum mechanics,,,,,,http://dx.doi.org/10.1016/0142-0496(82)90052-2,,10.1016/0142-0496(82)90052-2,,,0,,0,false,, 176-431-351-812-973,Piracy Laws and the Effective Prosecution of Pirates,2010-12-31,2010,journal article,Boston College international and comparative law review,02775778,,,Diana Chang,"This Note analyzes the current international legal framework for the punishment and prosecution of maritime piracy. Piracy is an international problem that disrupts global maritime trade and endangers the safety and security of crewmen and ship owners. Although it is a well-recognized principle that each state has universal jurisdiction to prosecute pirates, the conflicting international definitions of piracy and the preponderance of attacks near states that lack resources to effectively prosecute pirates create a gap in enforcement within the international legal framework. This Note proposes that cooperating states should establish regional international piracy tribunals that can apply an appropriate, uniform definition of piracy while providing the judicial resources to enforce international piracy",33,2,273,,Business; Law; Universal jurisdiction; State (polity); Punishment; Enforcement; Maritime piracy,,,,,https://lawdigitalcommons.bc.edu/iclr/vol33/iss2/3/ https://paperity.org/p/82051675/piracy-laws-and-the-effective-prosecution-of-pirates https://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=1012&context=iclr,https://lawdigitalcommons.bc.edu/iclr/vol33/iss2/3/,,,1517866169,,0,,6,false,, 176-773-812-959-936,Piracy: big grip in Germany,,1994,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1994,11,2,2,Business; Computer security; Computer science,,,,,,http://dx.doi.org/10.1016/0142-0496(94)90150-3,,10.1016/0142-0496(94)90150-3,,,0,,0,false,, 177-419-113-583-241,Penegakan Hukum Hak Cipta Terhadap Pembajakan Film Secara Daring,2019-09-01,2019,journal article,Jurnal Meta Yuridis,26216450; 26142031,Universitas PGRI Semarang,,Ayup Suran Ningsih; Balqis Hediyati Maharani,"Hak cipta merupakan hak eksklusif pencipta yang timbul secara otomatis berdasarkan prinsip deklaratif setelah suatu ciptaan diwujudkan dalam bentuk nyata tanpa mengurangi pembatasan sesuai dengan peraturan perundang-undangan. Pelanggaran hak cipta bisa memberi dampak buruk bagi penciptanya, sering kali pelanggaran hak cipta membuat pemilik dari hak cipta mengalami kerugian ekonomi. Dalam hal ini, tentunya perlindungan hukum hak cipta harus ditegakkan. Karya sinematografi yaitu film yang seharusnya dilindungi hak penciptanya oleh Undang-Undang Hak Cipta, tetapi dalam kenyataannya banyak yang melakukan pembajakan digital dan illegal downloading dari film aslinya. Kemajuan teknologi sekarang ini membawa dampak yang baik sekaligus dampak yang buruk. Pembajakan digital di era sekarang yang semakin marak. Kurangnya kesadaran masyarakat mengenai penegakan hukum hak cipta merupakan salah satu faktor terjadinya pelanggaran hak cipta seperti download film online . Artikel ini membahas tentang bagaimana dampak buruk download film melalui cara yang tidak legal atau pembajakan digital serta penegakan hak cipta dalam menghadapi masalah illegal downloading . Penelitian ini menggunakan metode hukum normatif dengan Statute Approach .",2,1,13,32,Humanities; Political science,,,,,http://journal.upgris.ac.id/index.php/meta-yuridis/article/download/3440/2351 http://103.98.176.9/index.php/meta-yuridis/article/download/3440/2351 http://journal.upgris.ac.id/index.php/meta-yuridis/article/view/3440 http://103.98.176.9/index.php/meta-yuridis/article/view/3440/2351 https://core.ac.uk/download/pdf/234023951.pdf,http://dx.doi.org/10.26877/m-y.v2i1.3440,,10.26877/m-y.v2i1.3440,2946500023,,0,,1,true,cc-by,gold 177-477-904-466-864,On the Effectiveness of Private Security Guards on Board Merchant Ships off the Coast of Somalia -- Where is the piracy? What are the Legal Ramifications?,,2014,journal article,North Carolina Journal of International Law and Commercial Regulation,,,,Barry Dubner; Claudia Pastorius,"This article discusses the state of piracy off the coast of Somalia, and provides a brief history of the Somali situation. The purpose of the article is to examine the international rules, national laws, industry guidelines, and current practices regarding the engagement of private armed security guards on board merchant ships. The article also considers other counter-piracy measures, such as risk assessment procedures and other guidance on the matter set forth by the International Maritime Organization (IMO). The article analyzes a sample contract issued by the Baltic and International Maritime Council (BIMCO) for private armed guards and merchant vessels that illustrates how those parties manage their legal obligations. The article also considers the applicability of the Montreux Document to the human rights concerns implicated in using private armed security guards on merchant ships. The article concludes by noting that the great reduction in piracy activity and the lower success rate of pirate attacks may have prompted financiers who bankroll pirates to stop funding them.",39,4,1029,,Human rights; Political science; Law; Criminal law; State (polity); Somali; Private security; On board,,,,,https://scholarship.law.unc.edu/cgi/viewcontent.cgi?article=1997&context=ncilj https://scholarship.law.unc.edu/ncilj/vol39/iss4/1/ https://lawpublications.barry.edu/cgi/viewcontent.cgi?article=1060&context=facultyscholarship https://lawpublications.barry.edu/facultyscholarship/52/,https://scholarship.law.unc.edu/ncilj/vol39/iss4/1/,,,3124264361,,0,,3,false,, 178-406-050-581-727,The New Surveillance,,2003,journal article,Case Western Reserve law review,00087262,,,Sonia Katyal,"A few years ago, it was fanciful to imagine a world where intellectual property owners - such as record companies, software owners, and publishers - were capable of invading the most sacred areas of the home in order to track, deter, and control uses of their products. Yet, today, strategies of copyright enforcement have rapidly multiplied, each strategy more invasive than the last. This new surveillance exposes the paradoxical nature of the Internet: It offers both the consumer and creator a seemingly endless capacity for human expression - a virtual marketplace of ideas - alongside an insurmountable array of capacities for panoptic surveillance. As a result, the Internet both enables and silences speech, often simultaneously. This paradox, in turn, leads to the tension between privacy and intellectual property. Both areas of law face significant challenges because of technology's ever-expanding pace of development. Yet courts often exacerbate these challenges by sacrificing one area of law for the other, by eroding principles of informational privacy for the sake of unlimited control over intellectual property. Laws developed to address the problem of online piracy - in particular, the DMCA - have been unwittingly misplaced, inviting intellectual property owners to create private systems of copyright monitoring that I refer to as piracy surveillance. Piracy surveillance comprises extrajudicial methods of copyright enforcement that detect, deter, and control acts of consumer infringement. In the past, legislators and scholars have focused their attention on other, more visible methods of surveillance relating to employment, marketing, and national security. Piracy surveillance, however, represents an overlooked fourth area that is completely distinct from these other types, yet incompletely theorized, technologically unbounded, and, potentially, legally unrestrained. The goals of this Article are threefold: first, to trace the origins of piracy surveillance through recent jurisprudence involving copyright; second, to provide an analysis of the tradeoffs between public and private enforcement of copyright; and third, to suggest some ways that the law can restore a balance between the protection of copyright and civil liberties in cyberspace. This paper was selected as the winning entry for the 2004 Yale Law School Cybercrime and Digital Law Enforcement Conference writing competition, sponsored by the Yale Law School Information Society Project and the Yale Journal of Law and Technology",54,2,297,,Business; Law and economics; Marketplace of ideas; Cybercrime; Copyright infringement; Enforcement; Law enforcement; Cyberspace; Intellectual property; Jurisprudence,,,,,https://escholarship.org/content/qt68f1r8x5/qt68f1r8x5.pdf?t=pztp4k https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1525&context=caselrev https://escholarship.org/uc/item/68f1r8x5 https://works.bepress.com/sonia-katyal/42/ https://scholarlycommons.law.case.edu/caselrev/vol54/iss2/4/,https://escholarship.org/uc/item/68f1r8x5,,,3124566901,,0,,18,false,, 178-424-754-791-721,Technological Self-Help and Equality in Cyberspace,2011-02-22,2011,journal article,McGill Law Journal,19206356; 00249041,Consortium Erudit,Canada,Jennifer A. Chandler,"New technologies challenge the law in many ways, for example, they extend one’s capacity to harm others and to defend oneself from harm by others. These changes require the law to decide whether we have legal rights to be free from those harms, and whether we may react against those harms extrajudicially through some form of self-help (e.g., self-defence or defence of third parties) or whether we must resort to legal mechanisms alone. These questions have been challenging to answer in the cyberspace context, where new interests and new harms have emerged. The legal limits on permissible self-defence have historically been a function of necessity and proportionality to the threat. However, this article argues that case law and historical commentary reveal that equality between individuals is also an important policy issue underlying the limits on self-defence. The use of technologies in self-defence brings the question of equality to the fore since technologies may sometimes neutralize an inequality in strength between an attacker and a defender. A legal approach that limits resort to technological tools in self-defence would ratify and preserve that inequality. However, the relationship between technology and human equality is complex, and this article proposes an analytical structure for understanding it. The objective is to understand which technologies promote equality while imposing the least social costs when used in self-defence. The article proposes principles (including explicit consideration of the effects on equality) for setting limits on technological self-help, and illustrates their use by applying them to several forms of cyberspace counter-strikes against hackers, phishers, spammers, and peer-to-peer networks.",56,1,39,75,Sociology; Common law; Proportionality (law); Law and economics; Law; Emerging technologies; Harm; Cyberspace; Self-help; Inequality; Hacker,,,,,https://www.erudit.org/fr/revues/mlj/2010-v56-n1-mlj4002/045698ar/ https://id.erudit.org/iderudit/045698ar https://www.erudit.org/revue/mlj/2010/v56/n1/045698ar.html?vue=resume https://www.erudit.org/fr/revues/mlj/2010-v56-n1-mlj4002/045698ar.pdf https://core.ac.uk/display/59356362 https://core.ac.uk/download/59356362.pdf,http://dx.doi.org/10.7202/045698ar,,10.7202/045698ar,2078000226,,0,,1,true,, 178-465-893-412-999,"Masefield AG v Amlin Corporate Member Ltd; The Bunga Melati Dua Piracy, Ransom and Marine Insurance",2011-08-01,2011,journal article,Melbourne University Law Review,00258938,,,Kate Lewins; Robert Merkin,"The issue of piracy rarely comes before the courts, but the recent spike in piratical activity off the coast of Somalia has seen it reappear. This case note discusses one cargo owner’s attempt to claim loss by piracy against a marine insurance policy, and considers the circumstances in which such losses may be recoverable. Given that the policy covered piracy as an insured peril — as do most marine policies — the failure of the claim may seem somewhat surprising.",35,2,717,,Engineering; Publishing; Project commissioning; Law; Spike (software development); Ransom; Case note; Insurance policy,,,,,https://centaur.reading.ac.uk/90340/ https://researchrepository.murdoch.edu.au/id/eprint/9027/,https://centaur.reading.ac.uk/90340/,,,1500788412,,0,,0,false,, 178-760-466-079-038,Counterfeiting and Piracy - Removing the Incentives through Confiscation,,2008,journal article,European Intellectual Property Review,01420461,,,L. Blakeney; Michael Blakeney,,30,9,348,356,Business; Confiscation; Incentive; Computer security; Commerce,,,,,https://research-repository.uwa.edu.au/en/publications/counterfeiting-and-piracy-removing-the-incentives-through-confisc,https://research-repository.uwa.edu.au/en/publications/counterfeiting-and-piracy-removing-the-incentives-through-confisc,,,2762321235,,0,,1,false,, 179-037-344-213-01X,Effective Enforcement of Copyright,1990-06-01,1990,journal article,Singapore Academy of Law Journal,02182009,,,Phai Cheng Goh,"In the last ten years, many countries including several countries in the Pacific Rim Region have revised their copyright legislation to give more adequate protection to copyright owners in order to combat piracy of copyright works or other materials. In this paper, I shall examine the measures which can be taken by copyright owners to combat piracy of copyright works and other materials and to enforce their copyright in their creative works.",2,1,91,,Pacific Rim; Business; Publishing; Project commissioning; Law and economics; Law; Order (business); Legislation; Enforcement,,,,,http://search.informit.com.au/documentSummary;dn=924461328941973;res=IELHSS,http://search.informit.com.au/documentSummary;dn=924461328941973;res=IELHSS,,,3121407687,,0,,0,false,, 179-167-191-485-545,Agreement to jointly market anti-piracy tool,,1999,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,1999,3,3,3,Agreement; Business; Philosophy; Linguistics,,,,,,http://dx.doi.org/10.1016/s1361-3723(99)90003-9,,10.1016/s1361-3723(99)90003-9,,,0,,1,false,, 179-236-024-605-251,‘Customary internet-ional law’: Creating a body of customary law for cyberspace. Part 2: Applying custom as law to the Internet infrastructure ☆,,2010,journal article,Computer Law & Security Review,02673649,Elsevier BV,United Kingdom,Warren B. Chik,"Abstract The shift in socio-economic transactions from real space to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective. In Part 2 of this article, I will construct the customary rules to Internet law-making that are applicable to electronic transactions by adapting customary international law rules; apply the suggested rules for determining customary Internet norms and identify some existing practices that may amount to established norms on the Internet, specifically practices relating to the Internet Infrastructure and Electronic Contracting.",26,2,185,202,The Internet; Business; Public law; Public international law; Law; Customary international law; Cyberspace; Computer security; Legal aspects of computing; Private law; Commercial law,,,,,http://www.sciencedirect.com/science/article/pii/S026736491000021X https://core.ac.uk/display/13249478 https://works.bepress.com/warren_chik/13/ https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=1842&context=sol_research https://ink.library.smu.edu.sg/sol_research/843/ https://dblp.uni-trier.de/db/journals/clsr/clsr26.html#Chik10a https://www.sciencedirect.com/science/article/pii/S026736491000021X https://works.bepress.com/warren_chik/13/download/ https://core.ac.uk/download/13249478.pdf,http://dx.doi.org/10.1016/j.clsr.2010.01.007,,10.1016/j.clsr.2010.01.007,2076805029,,0,,0,true,cc-by-nc-nd,green 179-398-301-473-78X,KEBIJAKAN FORMULASI HUKUM PIDANA DALAM MELINDUNGI TRANSAKSI E - COMMERCE DI INDONESIA,2011-10-01,2011,journal article,LAW REFORM,25808508; 18584810,Institute of Research and Community Services Diponegoro University (LPPM UNDIP),,Rizka Andi Fitriono,"Kegiatan perdagangan di masyarakat telah berkembang sangat pesat. Hal tersebut dipengaruhi salah satunya dengan berkembangnya teknologi yang berbasis internet yang dikenal dengan nama e-commerce. E-commerce merupakan bentuk perdagangan yang mempunyai karakteristik tersendiri yaitu perdagangan yang melintasi batas negara, tidak bertemunya penjual dan pembeli, media yang dipergunakan internet.Kondisi tersebut di satu sisi sangat menguntungkan bagi para pihak baik konsumen maupun pelaku usaha karena Akses ke pasar global secara langsung dan banyak pilihan yang didapat dengan mudah, di sisi lain menimbulkan kejahatan baru karena karakteristik e-commerce yang khas. Maka dari itu sangat diperlukan perlindungan hukum dalam transaksi e-commerce. Sehubungan dengan hal tersebut, dalam tesis ini diangkat tiga permasalahan yaitu pertama bagaimanakah kebijakan formulasi hukum pidana dalam melindungi terhadap transaksi e commerce saat ini dan kedua bagaimanakah Kebijakan Formulasi Hukum Pidana dalam melindungi terhadap transaksi e-commerce yang akan datang. Metodelogi yang dipakai dalam penelitian ini menggunakan pendekatan yang yang bersifat yuridis normatif, yaitu dengan mengkaji/menganalisis data sekunder yang berupa bahan-bahan hukum terutama bahan hukum primer dan bahan hukum sekunder, Serta ditunjang dengan pendekatan yuridis historis dan yuridis komparatif. Hasil analisa yang dapat dijadikan sebagai kesimpulan dalam tesis ini terhadap Kebijakan Formulasi Hukum Pidana dalam melindungi terhadap transaksi e commerce saat ini  belum tercantumnya secara jelas dan terpadu dalam hukum positif di Indonesia, baik dalam Kitab UndangUndang Hukum Pidana (KUHP), maupun dalam perundang-undangan di luar KUHP. Akan tetapi, terdapat ketentuan dalam KUHP dan dalam perundang-undangan di luar KUHP yang dapat diterapkan terhadap transaksi e-commerce. Kebijakan formulasi perlindungan hukum pidana dalam transaksi e-commerce  yang akan datang adalah Konsep KUHP 2008 namun kebijakan formulasi ini dirasa masih kurang karena tidak mengatur secara khusus terhadap tindak pidana transaksi e-commerce. Oleh karena itu, menurut penulis Para pembuat kebijakan formulasi hukum pidana dalam melindungi  terhadap transaksi e-commerce seyogyanya adanya hubungan dan harmonisasi Undang-Undang Nomor 11 Tahun 2008 Tentang informasi dan Transaksi Elektronik yang bisa dikatakan cyberlaw Indonesia dengan undang-undang induk yaitu KUHP dan undang-undang khusus lainnya maupun konvensi internasional yang berkaitan dengan transaksi e-commerce. Kata Kunci : Kebijakan Formulasi, Transaksi E-Commerce, Hukum Pidana",7,1,76,108,,,,,,https://ejournal.undip.ac.id/index.php/lawreform/article/download/12479/9421 https://www.neliti.com/publications/108424/kebijakan-formulasi-hukum-pidana-dalam-melindungi-transaksi-e-commerce-di-indone http://ejournal.undip.ac.id/index.php/lawreform/article/view/12479/9421 https://ejournal.undip.ac.id/index.php/lawreform/article/view/12479 https://media.neliti.com/media/publications/108424-ID-none.pdf,http://dx.doi.org/10.14710/lr.v7i1.12479,,10.14710/lr.v7i1.12479,2587806864,,0,,3,true,cc-by-sa,gold 179-411-054-545-347,From Neutral Thirds to Private Law Enforcers: Toward a Criterial Framework for Requests Placed on Internet Service Providers,,2012,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Nicole van der Meulen; Arno R. Lodder,"Undeniably the traditional neutral role of ISPs has come under increasing pressure. This is mainly a result of the requests placed on them which are becoming more diverse and far reaching. ISPs are called upon to lead the fight against botnets, combat digital piracy and child pornography, amongst other things. These requests placed upon ISPs are often impractical and sometimes even illegitimate. The primary research objective for this contribution is an analysis of a number of themes which invoke the involvement of ISPs. In particular, we want to make an inventory of the thematic justifications used for the requests. Basically, what interest are ISPs asked to defend and how do these relate to their role within the realm of internet governance? The outcome of this analysis is the development of a preliminary criterial framework for requests placed on ISPs",,,,,,,,,,https://core.ac.uk/download/pdf/15476772.pdf,http://dx.doi.org/10.2139/ssrn.2809795,,10.2139/ssrn.2809795,,,0,,0,true,, 180-234-322-958-932,A wake-up call for Navies in the SADC region : towards more effective maritime law enforcement,2016-01-01,2016,journal article,Acta Criminologica: Southern African Journal of Criminology,10128093,,,Pieter Brits; Michelle Nel,"This article investigates whether the South African National Defence Force (SANDF) can, within the current legal framework, ensure effective law enforcement at sea. The article uses the South African Navy's anti-piracy operations as example to identify critical gaps in future law enforcement training and operations. The threat posed by pirates on the East Coast of Africa and the global response to it, highlights the importance of maritime security. Although law enforcement is traditionally regarded as a police function, many police services lack the capacity to enforce the law at sea, necessitating naval involvement and consequently blurring the lines between law enforcement and military operations. In a bid to provide maritime security and prevent piracy in the Mozambique Channel, South Africa entered into a multinational agreement with Mozambique and Tanzania. Operation Copper has been operating since 2011 and with the marked decline of piracy on the East Coast the argument has been made that the expense of the operation can no longer justify the long term commitment of limited resources. Should the focus not be shifted to the West Coast where South Africa has recently entered into the first large marine ecosystem convention with Namibia and Angola? Although the threat to maritime security in the Benguela Current is mainly limited to illegal fishing and drug trafficking, the looming threat of piracy further up the West Coast may soon necessitate anti-piracy operations in this area as well. Even if the SA Navy is adequately resourced, in order to enable it to meet its obligations, the question of governance remains pertinent. Regional maritime security strategies may be supported by the domestic legislative and strategic framework, but the same cannot be said for the SANDF's operational policy framework. There is a glaring lacuna in the Department of Defence's (DoD) policy and standard operating procedures. Effective law enforcement generally concludes with prosecution and punishment, yet South Africa neglects to take responsibility for this final step in its operations at sea, a fact exacerbated by the lack of appropriate training of its soldiers in the law enforcement arena.",29,2,172,187,Engineering; International trade; Multinational corporation; Law; Navy; Maritime security; Law enforcement; Convention; Law of the sea; Large marine ecosystem; Legislature,,,,,https://journals.co.za/content/crim/29/2/EJC199485,https://journals.co.za/content/crim/29/2/EJC199485,,,2593808710,,0,,0,false,, 180-708-463-161-937,The Law of Piracy: BIBLIOGRAPHY,,1988,journal article,International law studies,21546266,,,Alfred P. Rubin,,63,1,9,,Political science; Law; Bibliography,,,,,https://digital-commons.usnwc.edu/ils/vol63/iss1/9/ https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1773&context=ils,https://digital-commons.usnwc.edu/ils/vol63/iss1/9/,,,3172796954,,0,,0,false,, 181-606-657-643-503,Pirating the Runway: The Potential Impact of the Design Piracy Prohibition Act on Fashion Retail,,2009,journal article,Business law journal,18827640,,,H. Shayne Adler,,5,2,381,,Advertising; Business; Potential impact; Commerce; Runway,,,,,https://repository.uchastings.edu/hastings_business_law_journal/vol5/iss2/6/ http://repository.uchastings.edu/hastings_business_law_journal/vol5/iss2/6/ https://repository.uchastings.edu/cgi/viewcontent.cgi?article=1138&context=hastings_business_law_journal,https://repository.uchastings.edu/hastings_business_law_journal/vol5/iss2/6/,,,2763042126,,0,,3,false,, 182-471-074-345-732,The ‘Piracy Law’ from Delphi and the Law of the Cnidos Inscription,1978-09-17,1978,journal article,Greek Roman and Byzantine Studies,00173916,,,G. V. Sumner,,19,3,211,225,Law; Delphi; History,,,,,https://grbs.library.duke.edu/article/download/7401/4923 https://grbs.library.duke.edu/article/view/7401,https://grbs.library.duke.edu/article/view/7401,,,1528925817,,0,,22,true,cc-by,gold 182-862-912-556-933,Coalition to combat software piracy,,1988,journal article,Computers & Security,01674048; 18726208,Elsevier BV,United Kingdom,,,7,2,219,219,Computer science; Computer security; Software; Operating system,,,,,,http://dx.doi.org/10.1016/0167-4048(88)90378-1,,10.1016/0167-4048(88)90378-1,,,0,,0,false,, 183-581-780-379-028,National Solutions To An International Scourge: Prosecuting Piracy Domestically As A Viable Alternative To International Tribunals,,2011,journal article,University of Miami International and Comparative Law Review,,,,Kevin H. Govern,"This article will assess both the problems and potential solutions to contemporary seaborne threats of piracy, robbery, and terrorism, and discuss challenges and opportunities for the domestic and international forums prosecuting the crimes that constitute piracy and * Kevin H. Govern, J.D., LL.M., is an Associate Professor of Law at the Ave Maria School of Law and an Instructor of Legal Studies at the California University of Pennsylvania. He has also served as an Assistant Professor of Law at the United States Military Academy. The author gratefully acknowledges the cooperation of, and past collaborations with, his colleague Professor John I. Winn of Shenandoah University, on this and other subjects, and the assistance of Mmes. Melinda Alico, Class of 2012, and Katherine Herrmann, Class of 2011, Ave Maria School of Law in the preparation of this article. Any errors or omissions are solely the responsibility of the author. U. MIAMI INT'L & COMP. L. REv. maritime terrorism. In particular it will begin with a discussion of the (d)evolution of events in the late 20th Century, which has transformed the old problem of piracy into a modern scourge. Piratical tactics, techniques and procedures (TTP) gave rise to a distinctly different threat from that faced in the past. Accompanying this discussion is a survey of present-day piracy, followed by an analysis of why piratical activities are more susceptible now than ever before to the long arm of the law, especially, but not exclusively, domestic prosecution, as well as anti-piracy policies. The article will advance reasons for why domestic, rather than international, prosecution will be the prevailing remedy of choice when dealing with captured pirates. Concluding comments will note why it is likely that present and emergent anti-piracy activities will continue to expand across the spectrum of operations, and summarize the challenges and opportunities for the domestic and international forces preventing piracy, those capturing pirates, and the fora prosecuting the crimes that constitute piracy and maritime terrorism. I. NEW TIMES, OLD PROBLEMS: THE MODERN ERA OF MARITIME PIRACY IPirates] are peculiarly obnoxious because they maraud upon the open seas, the great highway of all maritime nations. So heinous is the offence considered, so difficult are such offenders to apprehend, and so universal is the interest in their prompt arrest and punishment, that they have long been regarded as outlaws and the enemies of all mankind.' Piracy is only one of many elements of what I call trans-national criminal activity because if [you are] using the seaways for piracy, [they are] probably being used for drug trafficking, human smuggling, Edwin D. Dickinson, Is the Crime of Piracy Obsolete?, 38 HARv. L. REV. 334, 338 (1925). 2 V. 19 2011 NATIONAL SOLUTIONS TO AN INTERNATIONAL SCOURGE and arms smuggling. So, the way countries come together and solve this is important.2 For thousands of years, piracy, or ""robbery of the high seas,"" has caused conflict in international waters. Increasingly, piracy has become part of a multifaceted criminal or terrorist enterprise, especially in certain flashpoint locations around the globe. Contemporary ""attacks appear to be escalating in frequency, sophistication and severity""in comparison to even the 200h Century's blight of piratical activity.3 Piracy has thus become a highly organized business with ""professional"" pirates, threatening the stability of the seas and their surrounding nations. The increase in frequency of pirate attacks and maritime conflicts causes a need for reassessment of the countermeasures that have been implemented throughout history to combat this problem. Typically, many countries who remain involved in combating and preventing piracy tend to promote military solutions and amendment to international laws. However, placing emphasis on the domestication of criminalizing piracy will eliminate many of the problems that arise out of conflicting laws, sovereignty over criminals, and international boundaries. The author Keith Johnson, in his 2010 work IWho's a Pirate?,mused on how it ""may seem strange there should be doubt about an offense as old as this one.""4 ""Piracy was the world's first crime with universal jurisdiction, meaning that any country had the right to apprehend pirates on the high seas."" This jurisdiction was first exercised by the Romans, who, in Johnson's estimation, took piracy ""so seriously [that] they overrode a cautious Senate and gave neardictatorial powers to an up-and-coming general named Pompey, who soon swept away piracy in the Mediterranean."" 61n the realm of one's employment status bearing on legal status, history has been replete 2 United States Navy Quotes About Maritime Strategy, NAVY.MIL, http://www.navy. mil/navydata/leadership/quotes.asp?q=253&c=6 (last visited Mar. 3, 2012). Frederick Chew, Piracy, Maritime Terrorism and Regional Interests, GEDDES PAPERS 73, 73 (Austl. Command and Staff Coll. 2005), http://www.defence.gov.au/adc/ docs/publications20l0/PublcnsGeddes2005 310310 PiracyMaritime.pdf. 4 Keith Johnson, Who's a Pirate? US. Court Sees Duel Over Definition, WALL ST. J., Aug. 14, 2010, at Al. Id.",19,1,1,,International waters; Political science; Sovereignty; Law; Terrorism; Universal jurisdiction; Jurisdiction; Associate professor; International law; Jurisprudence,,,,,https://repository.law.miami.edu/umiclr/vol19/iss1/3/ https://repository.law.miami.edu/cgi/viewcontent.cgi?article=1007&context=umiclr,https://repository.law.miami.edu/umiclr/vol19/iss1/3/,,,3122591582,,0,,1,false,, 184-376-943-769-025,"Copyright Piracy in China, 5 J. Marshall Rev. Intell. Prop. L. 583 (2006)",,2006,journal article,John Marshall Review of Intellectual Property Law,19308140,,,Ralph Oman,,5,4,1,,Political science; China; Law,,,,,https://repository.jmls.edu/ripl/vol5/iss4/1/ https://repository.law.uic.edu/ripl/vol5/iss4/1/ https://repository.law.uic.edu/cgi/viewcontent.cgi?article=1104&context=ripl,https://repository.jmls.edu/ripl/vol5/iss4/1/,,,805516904,,0,,0,false,, 184-482-053-138-132,On super universal jurisdiction stipulated by piracy crime of UN Convention of the Law of the Sea,,2010,journal article,Journal of Guangzhou University,,,,Zhou Guan-nan,"UN Convention of the Law of the Sea defined super universal jurisdiction of piracy and makes it very convenient and powerful to attack piracy.But,its exercise with no strict regional restriction would seriously violate national sovereignty.Therefore convention of the piracy restrict it to the high seas or any scope outside the jurisdiction.For piracy out of regional restriction,other jurisdiction than super universal jurisdiction is applicable.",,,,,International waters; Political science; United Nations Convention on the Law of the Sea; Law; Rationality; Universal jurisdiction; Jurisdiction; restrict; Convention; Scope (project management),,,,,http://en.cnki.com.cn/Article_en/CJFDTOTAL-GZDX201006010.htm,http://en.cnki.com.cn/Article_en/CJFDTOTAL-GZDX201006010.htm,,,2394335106,,0,,0,false,, 185-717-607-055-348,An exploration of the relationship between MP3 player ownership and digital piracy,2009-12-18,2009,journal article,Criminal Justice Studies,1478601x; 14786028,Informa UK Limited,United Kingdom,Thomas J. Holt; Robert G. Morris,"A great deal of research has explored the impact of technology on human behavior, particularly the emergence of the Internet and computer technology to facilitate digital piracy. Few studies have, however, considered how portable digital music, or MP3, players facilitate or reduce involvement in piracy. This study explores the relationship between digital ownership and participation in digital piracy among a population of college students. The findings suggest that MP3 player ownership is significantly connected to piracy, along with deviant peer connections. In addition, there are significant differences in the beliefs and attitudes of owners and non‐owners toward online deviance and piracy.",22,4,381,392,The Internet; Advertising; Business; Techniques of neutralization; MP3 player; Cybercrime; Population; Computer technology; Digital audio; Deviance (sociology),,,,,https://www.tandfonline.com/doi/full/10.1080/14786010903358109,http://dx.doi.org/10.1080/14786010903358109,,10.1080/14786010903358109,2077516637,,0,005-136-753-965-857; 006-682-744-683-262; 007-199-093-187-201; 010-146-711-506-660; 011-970-832-954-189; 013-425-010-292-015; 014-082-506-216-299; 020-973-534-331-792; 023-129-665-288-128; 024-876-069-992-106; 029-077-569-854-536; 041-218-394-266-097; 042-143-102-272-982; 042-740-939-869-735; 046-008-983-871-54X; 046-989-664-357-368; 052-957-225-051-771; 058-806-863-894-52X; 059-880-305-504-023; 064-455-985-564-196; 067-339-005-241-596; 072-084-774-976-983; 072-575-965-330-815; 074-777-270-980-043; 083-745-921-625-134; 092-945-483-843-213; 094-565-529-045-486; 094-993-001-535-461; 095-937-634-366-901; 096-762-470-199-768; 096-977-975-759-335; 098-570-250-639-553; 099-342-173-833-089; 102-081-486-785-210; 102-902-153-625-337; 104-925-931-575-132; 138-756-657-183-783; 138-939-454-933-38X; 150-527-549-363-854; 175-905-268-229-256; 189-350-593-744-480,26,true,,bronze 187-083-535-216-720,Effects of Music Piracy on the Nigerian Public: A Case Study of Enugu Urban,2015-01-27,2015,journal article,The Journal of social sciences and humanities,03868729,,,Sunday N. Nnamani,"Piracy is the unauthorized use or reproduction of copyrighted material. Some people view it as a violation of copyright law or the illegal duplication and distribution of sound recording or computer software. Definitely it is not a natural occurance but a deliberate misappropriation of the fruit of another man’s labour [1,8,15]. The paper examines the magnitude of the crime “piracy” in the Eastern part of Nigeria especially in their markets like to the damaging effect it has on intellectual property rites of the individuals. A 20-item questionnaire was designed, distributed, collected and analysed. The effect revealed that it had far reaching negative consequences on the individuals as well as the government of the day. Strategies for the combating of piracy in Nigeria were also outlined.",2,1,15,19,Government; Economics; Law; Creative industries; Reproduction (economics); Music piracy; Misappropriation; Computer software; Intellectual property; Distribution (economics); Criminology,,,,,http://www.sciepub.com/WJSSH/abstract/6032 http://pubs.sciepub.com/wjssh/2/1/3/wjssh-2-1-3.pdf http://information.soc.ku.ac.th/ojs/index.php/social/article/download/32/33 http://pubs.sciepub.com/wjssh/2/1/3/index.html,http://www.sciepub.com/WJSSH/abstract/6032,,,2406315839,,0,,0,false,, 187-325-987-344-837,On the Economics of International Sea Piracy—A Case of History Repeating Itself,,2012,journal article,Michigan State international law review,23282991,,,Barry Dubner; Ritvik Raturi,"It is estimated that in Somalia, there are about “50 main pirate leaders, around 300 leaders of pirate attack groups, and aground 2,500 ‘foot soldiers.’ It is believed that financing is provided by [approximately] 10 to 20 individuals. In addition, there is a large number of armed individuals guarding captured ships, and numerous ransom negotiators” working for the pirates. The purpose of this article is to show how and why there is a cottage industry developing to both prevent and fight piracy. The waste of human life is appalling. The economics of the situation is one of the main causes of sea piracy.Against this background, this essay will explore the “classical” period of piracy to see how much difference there is between the operations of pirates centuries ago, in the Caribbean, for example, and operations that are being used today off of Somalia. It will be observed that everything has changed and nothing has changed, meaning that although there are numerous new tactics used by pirates and their backers, the laws regarding piracy are essentially the same now as they were centuries ago; the prosecution of pirates and trying to create a prosecutorial system in a lawless country has become problematic, just as it was centuries ago; and the approach to the problem of sea piracy has been one of repeating past mistakes. This article will demonstrate that all of the economic and prosecutorial problems that exist today also existed hundreds of years ago.The resurgence of piracy is obviously due to the fact that it has become a financial success for the pirates and their backers. Now most of the countries are waiting to see what is going to happen to the relationship between pirates and the various extremist groups in Somalia. Can the relationship of extremists and organized crime syndicates with pirates become so successful that nobody in the country of Somalia will be able to stop it? Will piracy develop in the same manner as the South American drug trade in the 1970s, a relatively small-time operation turning into a huge global crisis? These are some of the questions that this article is going to explore.This discussion will commence with a look at some of the highlights of piracy that existed centuries ago.",20,3,745,,Nothing; Political economy; Political science; Organised crime; Meaning (existential); Ransom; Cottage industry; South american; Human life; nobody,,,,,http://lawpublications.barry.edu/cgi/viewcontent.cgi?article=1003&context=facultyscholarship,http://lawpublications.barry.edu/cgi/viewcontent.cgi?article=1003&context=facultyscholarship,,,3124771029,,0,,0,false,, 187-377-002-230-056,Piracy warning!,,1989,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,12,1,4,4,Business; Computer security; Internet privacy; Computer science,,,,,,http://dx.doi.org/10.1016/0142-0496(89)90099-4,,10.1016/0142-0496(89)90099-4,,,0,,0,false,, 188-251-466-110-418,Several International Law Issues Arising from Combating Somali Piracy,,2010,journal article,Journal of Northwest University of Political Science and Law,,,,Zhu Lijian,"he rampant piracy and armed robbery against ships off the Somali coast poses challenges to and impact on various branches of modern international law,thereby a number of legal issues are in urgent need of being resolved.The international community as a whole shall refine international law on fighting against piracy and armed robbery against ships in terms of prevention,suppression and punishment,including realization of universality of the definition of armed robbery against ships,more reliance on the 1988 Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation(SUA) and its Protocol of 2005,clarification of the classifications and contents of international human rights and humanitarian law applicable in use of force against piracy and armed robbery against ships,and exploration of more fair and effective criminal trial modes in punishment of them.",,,,,Human rights; Political science; Law; Universal jurisdiction; Punishment; Use of force; Somali; Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation; International community; International law,,,,,https://en.cnki.com.cn/Article_en/CJFDTOTAL-DOUB201003019.htm,https://en.cnki.com.cn/Article_en/CJFDTOTAL-DOUB201003019.htm,,,2384868034,,0,,0,false,, 188-664-596-913-214,"Book Review: Contemporary Maritime Piracy: International Law, Strategy, and Diplomacy at SeaKraskaJames, Contemporary Maritime Piracy: International Law, Strategy, and Diplomacy at Sea. Santa Barbara, CA: Praeger of ABC-CLIO [www.abc-clio.com], 2011. xxii + 253 pp., chapter notes, maps, appendix, index. US $49.95, cloth; ISBN 978-0-31338-724-1.",2012-06-01,2012,journal article,International Journal of Maritime History,08438714; 20527756,SAGE Publications,United States,Christopher Spearin,,24,1,531,532,Law; Index (economics); Maritime piracy; International law; Diplomacy; Classics; History,,,,,http://journals.sagepub.com/doi/10.1177/084387141202400198,http://dx.doi.org/10.1177/084387141202400198,,10.1177/084387141202400198,2315136017,,0,,0,false,, 189-212-462-921-55X,Copyright Law--Musical Style Piracy--Possible Methods of Legal Protection for the Musical Stylist,,1940,journal article,Kentucky Law Journal,0023026x,,,John L. Young,,28,4,4,,Political science; Law; Style (sociolinguistics); Copyright law; Legal protection; Musical,,,,,https://uknowledge.uky.edu/cgi/viewcontent.cgi?article=4371&context=klj https://uknowledge.uky.edu/klj/vol28/iss4/4/,https://uknowledge.uky.edu/klj/vol28/iss4/4/,,,2940629754,,0,,0,false,, 189-450-488-852-322,Rules of Engagement and Legal Frameworks for Multinational Counter-Piracy Operations,,2014,journal article,Case Western Reserve Journal of International Law,00087254,,,Laurie R. Blank,"In response to the upsurge in piracy in the Gulf of Aden, the international community has established three multinational counter-piracy task forces to protect shipping in this vital transit corridor and respond to pirate attacks. The multitude of task forces and units from different states are playing a critical role in combatting piracy and protecting shipping, but it also presents challenges with regard to the legal and operational frameworks and coordination necessary to keep those operations running smoothly. The law applicable to counter-piracy operations will govern how a state or multinational force uses force against pirates, how pirates are treated if captured, the crimes for which pirates can be prosecuted, and what mechanisms can be used in such prosecutions. This essay explores how the legal frameworks and the rules of engagement applicable to counter-piracy operations create a complicated interrelationship that can pose challenges in the context of multinational operations. The first section analyzes the legal frameworks that could and do apply to counter-piracy operations by military forces. The second section then builds on those frameworks with a discussion of rules of engagement and the specific challenges multinational operations face in coordinating and implementing effective rules of engagement in counter-piracy operations.",46,1,397,,Business; Multinational corporation; State (polity); Rules of engagement; Face (sociological concept); International community; Context (language use); Task (project management); Multitude; Computer security,,,,,https://scholarlycommons.law.case.edu/cgi/viewcontent.cgi?article=1044&context=jil https://scholarlycommons.law.case.edu/jil/vol46/iss1/19/,https://scholarlycommons.law.case.edu/jil/vol46/iss1/19/,,,3124581467,,0,,1,false,, 190-598-924-594-371,"Deliberate, Principled, Self-Interested Lawbreaking: The Ethics of Digital ‘Piracy’",,2017,journal article,SSRN Electronic Journal,15565068,Elsevier BV,,Hugh Breakey,"Is digital piracy – understood as illegally accessing or using copyrighted works, such as through a file-sharing platform – morally wrong? Such piracy typically falls into the intriguing category of self-interested lawbreaking, performed deliberately and in the context of a principled disagreement with the law. Existing treatments of the ethics of piracy fail to consider the full sweep of moral considerations implicated by such lawbreaking, collapsing the question into deceptively narrow enquiries. I argue there are many reasons, some stemming from quite surprising sources, for respecting copyright law, even for those who: think the law is unjust; are skeptical of the law’s democratic legitimacy; and are frustrated at the immoral behavior of large corporate content-providers.",,,,,Political science; Skepticism; Law and economics; Rule of law; Context (language use); Morally wrong; Digital piracy; Copyright law; Democratic legitimacy; Intellectual property,,,,,https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3219550,http://dx.doi.org/10.2139/ssrn.3219550,,10.2139/ssrn.3219550,3148937678,,0,,0,true,,green 191-544-756-916-935,Piracy Hearing: Public Hearing Tape Piracy,,1974,journal article,Performing Arts Review,00315249,Informa UK Limited,United Kingdom,Louis J. Lefkowitz,,5,1-2,5,62,Advertising; Business,,,,,http://www.tandfonline.com/doi/abs/10.1080/00315249.1974.9943377?queryID=%24{resultBean.queryID},http://dx.doi.org/10.1080/00315249.1974.9943377,,10.1080/00315249.1974.9943377,2053586270,,0,,0,false,, 191-687-177-782-221,UK health authority admits to software piracy,,1993,journal article,Computer Fraud & Security Bulletin,01420496; 18783856,Mark Allen Group,United Kingdom,,,1993,9,7,7,Software; Computer security; Business; Computer science; Operating system,,,,,,http://dx.doi.org/10.1016/0142-0496(93)90238-r,,10.1016/0142-0496(93)90238-r,,,0,,0,false,, 191-846-300-029-792,The Questions of Piracy in the Light of International Law and the Responsibility of a Failed State,2015-06-30,2015,journal article,Academic and Applied Research in Military and Public Management Science,27860744; 24985392,Academic and Applied Research in Military and Public Management Science,,István Harkai,"These days, one of the most significant issue is maritime piracy and armed robbery; it poses a high threat against international peace and security. These crimes can occur anywhere on the high seas, but the most infected areas are the western basin of the Indian Ocean, the Gulf of Aden, Southeast Asia, or the Gulf of Guinea, where piracy causes many troubles to world trade. The crime of piracy calls for a strong and substantive answer. In this paper, the author tries to look for legal and non-legal devices against piracy and tries to give an answer to the question whether we can take a failed state to account in international law?",14,2,173,185,State (computer science); International law; Political science; State responsibility; Law; International waters; International trade; Business; Algorithm; Computer science,,,,,,http://dx.doi.org/10.32565/aarms.2015.2.4,,10.32565/aarms.2015.2.4,,,0,,0,true,cc-by,hybrid 192-036-783-485-54X,The Japanese Act on the Punishment of and Measures against Piracy,2010-10-30,2010,journal article,Aegean Review of the Law of the Sea and Maritime Law,18649610; 18649629,Springer Science and Business Media LLC,,Jun Tsuruta,"Japan enacted and put into effect “the Act on the Punishment of and Measures against Piracy” in 2009. This note is intended to clarify some of the significances of the Act, by assessing the limitation of Japanese measures against and punishment of piracy before the enactment of the Act. The Act stipulates the definition of piracy, by making reference to the definition of piracy stipulated in Article 101 of the United Nations Convention on the Law of the Sea, and criminalizes piracy, irrespective of the nationality of its wrongdoers committing it. The enactment of the Act made it possible for the Japanese Government to escort not only Japanese-registered ships but also non-Japanese-registered ships as “prevention and suppression of crimes at sea.” And it makes piracy punishable irrespective of the nationality of its wrongdoers committing it. However, it has to be well examined when and how the universal jurisdiction adopted by the Act should be exercised, taking into consideration that the exercise of such jurisdiction is only exceptional to the flag state’s exercising of jurisdiction on the high seas.",1,2,237,245,International waters; Political science; United Nations Convention on the Law of the Sea; Public international law; Law; Universal jurisdiction; Punishment; Jurisdiction; Nationality; Flag state,,,,,https://link.springer.com/article/10.1007/s12180-010-0014-2/fulltext.html https://link.springer.com/article/10.1007%2Fs12180-010-0014-2 https://rd.springer.com/article/10.1007/s12180-010-0014-2,http://dx.doi.org/10.1007/s12180-010-0014-2,,10.1007/s12180-010-0014-2,1971662985,,0,,2,false,, 192-619-799-726-496,The Effects of WTO Case DS362 on Audiovisual Media Piracy in China,,2009,journal article,European Intellectual Property Review,01420461,,,Rogier Creemers,"The outcome of the recent WTO case China – Intellectual Property Rights, mainly concerned with copyright matters, was touted by both the U.S. and China as a victory. Looking beyond the rhetoric, however, shows that the effect of this case on copyright piracy in the real world is limited. The article outlines the case and analyzes its effects. Furthermore, it widens the scope of analysis, to include other factors influencing IP infringement in China, which are crucial in creating and supporting copyright piracy.",31,6,569,576,Rhetoric; Outcome (game theory); Political science; Law and economics; China; Victory; Scope (project management); Intellectual property,,,,,https://cris.maastrichtuniversity.nl/en/publications/the-effects-of-wto-case-ds362-on-audiovisual-media-piracy-in-chin,https://cris.maastrichtuniversity.nl/en/publications/the-effects-of-wto-case-ds362-on-audiovisual-media-piracy-in-chin,,,3125528187,,0,,0,false,, 193-567-112-001-216,Book piracy and Nigerian copyright law,1998-02-01,1998,journal article,Library Management,01435124,Emerald,United Kingdom,Clement Olujide Ajidahun,"The Nigerian copyright Decree No. 47 of 1988 gives protection to copyright owners with stiff penalties in the event of violations and piracy. This paper considers these provisions of the law in relation to the persistent book famine in the country, and offers suggestions which might help enhance the execution of the law.",19,1,22,25,Common law copyright; Economics; Law; Famine; Decree; Copyright law,,,,,https://www.emerald.com/insight/content/doi/10.1108/01435129810198558/full/html http://www.emeraldinsight.com/doi/citedby/10.1108/01435129810198558,http://dx.doi.org/10.1108/01435129810198558,,10.1108/01435129810198558,1967469136,,0,105-499-475-922-790,5,false,, 195-232-161-274-585,One or More Wireless Networks Are Available: Can ISPS Recover for Unauthorized Wi-Fi Use Under Cable Television Piracy Laws?,,2006,journal article,Catholic University Law Review,15306119,,,S. Gregory Herrman,,55,4,1095,1130,Wireless network; Cable television; Computer science; Telecommunications,,,,,https://scholarship.law.edu/lawreview/vol55/iss4/8/ https://scholarship.law.edu/cgi/viewcontent.cgi?article=1160&context=lawreview,https://scholarship.law.edu/lawreview/vol55/iss4/8/,,,838319517,,0,,0,false,, 195-663-625-292-357,Tackling Global Software Piracy under TRIPS: Insights from International Relations Theory,,2003,journal article,Harvard Law Review,0017811x; 2161976x,JSTOR,United States,,,116,4,1139,1139,TRIPS architecture; Software; Law and economics; International trade; Political science; Business; Computer science; Sociology; Programming language; Parallel computing,,,,,,http://dx.doi.org/10.2307/1342744,,10.2307/1342744,,,0,,0,false,, 195-770-781-208-050,On the Perfection of the Legislation to Punish Piracy in China,,2011,journal article,Journal of Dalian University of Technology,10008608,,,Sun Wen-hong,"By using the theory of criminal law,the paper interprets the characteristics of piracy under the international law based on the definition of international crime.In order to better enforce the universal jurisdiction over piracy under the international conventions,the necessity to perfect domestic legislation and its internal reasonableness were analyzed in view of legal value.The paper has furthered its discussion by arguing that the current Chinese Criminal Law should be fully coordinated with the international criminal law and some new offences should be added to Chinese Criminal Law with the reference of crimes under the international treaties concluded or acceded by our country,for the construction of a complete domestic legal system to punish international crimes.",,,,,Comparative law; Political science; Public international law; China; Law; Criminal law; Universal jurisdiction; Legislation; International law; Municipal law,,,,,https://en.cnki.com.cn/Article_en/CJFDTOTAL-DLGD201102018.htm,https://en.cnki.com.cn/Article_en/CJFDTOTAL-DLGD201102018.htm,,,2349828775,,0,,0,false,, 196-399-991-573-366,Studies on how to Prevent Bio-piracy under the System of Intellectual Property,,2010,journal article,Hebei Law Science,,,,Yang Xin-ying,"Bio-piracy is one of the hot topics of international environmental law and international intellectual property law in recent years.This article firstly introduces the meaning and domestic and foreign present situation of bio-piracy,then analyzes the insufficiency to resist bio-piracy of international law and proposes the tentative plan of protecting the heredity resources under the existing patent law system,finally analyzes the countermeasure of how to prevent and control bio-piracy in our country.",,,,,Environmental law; Business; Law; Countermeasure; Control (management); Meaning (existential); Patent law; Intellectual property; International law; Municipal law,,,,,http://en.cnki.com.cn/Article_en/CJFDTotal-HBFX201011015.htm,http://en.cnki.com.cn/Article_en/CJFDTotal-HBFX201011015.htm,,,2372190410,,0,,0,false,, 196-594-454-920-653,Design Protection in the United States and European Union: Piracy's Detrimental Effects in the Digital World,,2012,journal article,Brooklyn journal of international law,07404824,,,Katelyn Brandes,,37,3,8,,International trade; Political science; European union; Development economics,,,,,https://brooklynworks.brooklaw.edu/bjil/vol37/iss3/8/ https://brooklynworks.brooklaw.edu/cgi/viewcontent.cgi?article=1102&context=bjil,https://brooklynworks.brooklaw.edu/bjil/vol37/iss3/8/,,,2530439875,,0,,1,false,, 196-870-230-773-517,A New Look for the Fashion Industry: Redesigning Copyright Law with the Innovative Design Protection and Piracy Protection Act (IDPPPA),2011-12-31,2011,journal article,Journal of Business Entrepreneurship and the Law,,,,Brittany West,,5,1,3,,Advertising; Business; Law and economics; Copyright law; Fashion industry; Intellectual property,,,,,https://digitalcommons.pepperdine.edu/cgi/viewcontent.cgi?article=1071&context=jbel https://digitalcommons.pepperdine.edu/jbel/vol5/iss1/3/ https://paperity.org/p/84250288/a-new-look-for-the-fashion-industry-redesigning-copyright-law-with-the-innovative-design,https://digitalcommons.pepperdine.edu/jbel/vol5/iss1/3/,,,1498941456,,0,,1,false,, 197-132-169-229-871,"The effects of market size, wealth, and network effects on digital piracy and profit",2022-08-27,2022,journal article,European Journal of Law and Economics,09291261; 15729990,Springer Science and Business Media LLC,Netherlands,William M. Volckmann,"The effect of digital piracy is often framed as a creator having to compete against unauthorized copies of their own creation, despite intellectual property rights laws. This framing has empirical and theoretical support, but the empirical findings often suggest that the magnitude and even sign of piracy effects depend on the characteristics of the software and the market. For example, piracy seems to have a larger negative effect on sales of high-profile works, but a smaller and perhaps even positive effect on lesser-known works. This paper seeks a theoretical explanation of differential piracy effects. It is unique in that it gives considerable focus to the market size, and also to budgetary limitations of the consumer base, motivated by high piracy rates in developing countries. The models imply that piracy is more likely to help developers when the market for the software is smaller; when network effects are neither too weak nor too strong; when piracy is neither to accessible nor too inaccessible; when the cost of piracy is relatively homogeneous; and when the consumer base is not too poor. All things considered, the inclusion of market size, consumer budgets, and heterogeneous piracy costs suggest that piracy is less likely to be beneficial to developers than previous literature suggest. Developer profit may be higher or lower with piracy, but buyer welfare is no worse, and is sometimes better, with piracy.",,,,,Intellectual property; Network effect; Framing (construction); Empirical research; Business; Profit (economics); Economics; Consumer welfare; Two-sided market; Customer base; Advertising; Commerce; Welfare; Marketing; Industrial organization; Microeconomics; Market economy; Law; Philosophy; Structural engineering; Epistemology; Political science; Engineering,,,,,,http://dx.doi.org/10.1007/s10657-022-09750-9,,10.1007/s10657-022-09750-9,,,0,007-199-093-187-201; 017-986-226-467-991; 019-286-399-063-181; 019-297-304-577-424; 022-248-718-157-566; 022-591-905-684-888; 028-583-457-648-098; 038-375-524-238-459; 039-350-981-279-016; 049-698-234-112-01X; 052-774-446-911-198; 072-307-449-982-322; 082-927-324-029-407; 087-455-936-953-325; 101-239-761-473-096; 112-967-130-332-144; 118-675-220-855-858; 127-118-613-271-110; 129-154-209-747-00X; 138-063-868-446-465; 141-401-759-984-464; 147-218-447-430-406; 154-088-644-452-189; 162-892-956-699-76X,0,false,, 197-417-510-555-97X,Microsoft files piracy lawsuit in Canada,,1997,journal article,Computer Fraud & Security,13613723; 18737056,Mark Allen Group,United Kingdom,,,1997,8,3,3,Lawsuit; Computer security; Business; Internet privacy; Computer science; Political science; Law,,,,,,http://dx.doi.org/10.1016/s1361-3723(97)89833-8,,10.1016/s1361-3723(97)89833-8,,,0,,1,false,, 198-160-988-578-332,Casting a Wider Net: Addressing the Maritime Piracy Problem in Southeast Asia,,2005,journal article,Boston College international and comparative law review,02775778,,,Erik Barrios,"Because of the damage that maritime piracy inoicts on international trade and general safety, it has long been treated as a universal crime whose perpetrators were subject to punishment by any country that caught them. Piracy remains a serious threat to the international community in modern times, especially in Southeast Asia. Roughly 45% of the world’s commercial shipping passes through Southeast Asia, so the maritime attacks in this region cause billions of dollars in economic loss each year. These attacks have attracted additional attention due to the fact that they are now being committed by terrorists as well as traditional maritime bandits. This Note discusses the basis for punishing these attacks under international law, and considers whether the deanition of piracy under international law can encompass these attacks.",28,1,149,,International trade; Political science; Punishment; International community; Maritime piracy; Southeast asia; Development economics; International law,,,,,https://paperity.org/p/82107631/casting-a-wider-net-addressing-the-maritime-piracy-problem-in-southeast-asia https://lawdigitalcommons.bc.edu/iclr/vol28/iss1/4/ https://lawdigitalcommons.bc.edu/cgi/viewcontent.cgi?article=1078&context=iclr,https://paperity.org/p/82107631/casting-a-wider-net-addressing-the-maritime-piracy-problem-in-southeast-asia,,,1483534727,,0,,13,false,, 198-333-848-893-667,A Development Model Meets Piracy in Paraguay,,2012,journal article,California Western international law journal,08863210,,,James M. Cooper; Carlos Ruffinelli,,43,1,197,210,International trade; Political science; Development (topology),,,,,https://scholarlycommons.law.cwsl.edu/fs/49/ https://dialnet.unirioja.es/servlet/articulo?codigo=4136666 https://scholarlycommons.law.cwsl.edu/cgi/viewcontent.cgi?article=1048&context=fs https://works.bepress.com/james_cooper/13/,https://scholarlycommons.law.cwsl.edu/fs/49/,,,1685960460,,0,,1,false,, 199-149-186-026-658,Arrgh! Hollywood Targets Internet Piracy,2004-12-31,2004,journal article,Richmond Journal of Law and Technology,,,,Anna E. Engelman; Dale A. Scott,,11,1,3,,Internet privacy; The Internet; Business; DeCSS; Hollywood,,,,,https://scholarship.richmond.edu/cgi/viewcontent.cgi?article=1229&context=jolt https://scholarship.richmond.edu/jolt/vol11/iss1/4/ https://paperity.org/p/82392401/arrgh-hollywood-targets-internet-piracy,https://scholarship.richmond.edu/jolt/vol11/iss1/4/,,,2567366480,,0,,1,false,, 199-400-605-547-894,"The Case of the Castle John, or Greenbeard the Pirate?: Environmentalism, Piracy and the Development of International Law",,1993,journal article,California Western international law journal,08863210,,,Samuel Pyeatt Menefee,,24,1,2,,Political science; Law; Environmentalism; International law,,,,,https://scholarlycommons.law.cwsl.edu/cwilj/vol24/iss1/2/ https://scholarlycommons.law.cwsl.edu/cgi/viewcontent.cgi?article=1354&context=cwilj,https://scholarlycommons.law.cwsl.edu/cwilj/vol24/iss1/2/,,,2992339767,,0,,7,false,,