This module is a resource for lecturers
References
Publications, journal and media articles
- Albanese, Jay. (2018). Cybercrime as an Essential Element in Transnational Counterfeiting Schemes. Presentation at International Academic Conference: Linking Organized Crime and Cybercrime. A conference hosted by Hallym University and sponsored by the United Nations Office on Drugs and Crime (UNODC), 8 June 2018.
- Burkart, Patrick. (2010). Music and cyberliberties. Wesleyan University Press.
- Chaudhry, Peggy E., Sohail S. Chaudhry, Stephen A. Stumpf, and Hasshi Sudler. (2011). Piracy in Cyberspace: Consumer Complicity, Pirates and Enterprise Enforcement. Enterprise Information Systems, Vol. 5(2), 255-271.
- Chaudhry, Peggy E., Sohail S. Chaudhry, Stephen A. Stumpf, and Hasshi Sudler. (2011). Piracy in Cyberspace: Consumer Complicity, Pirates and Enterprise Enforcement. Enterprise Information Systems, Vol. 5(2), 255-271.
- Cheung, C.K. (2013). Understanding factors associated with online piracy behaviour of adolescents. International Journal of Adolescence and Youth, Vol. 18(2), 122-132.
- City of London Police (2016). Operation Creative and IWL.
- Clark, Birgit. (2018). Blockchain and IP Law: A Match Made in Crypto-Heaven. WIPO Magazine.
- Cornes, Richard and Todd Sandler. (1996). The theory of externalities, public goods, and club goods, second edition. Cambridge University Press.
- Denham, Jess. (2015). Game of Thrones season 5 breaks piracy record with 32m illegal downloads. The Independent, 23 April 2015.
- Department of Justice. (2004). 'Operation Fastlink' Is the Largest Global Enforcement Action Ever Undertaken Against Online Piracy.
- Dolliver, Diana and Katherine Love. (2015). Criminogenic asymmetries in cyberspace: A comparative analysis of two TOR marketplaces. Journal of Globalization Studies, Vol 6(2), 75-96
- Drath, Ross. (2012). Hotfile, Megaupload, and the future of copyright on the Internet: What can cyberlockers tell us about DMCA reform? The John Marshall Review of Intellectual Property Law, Vol. 12, 205-241.
- Fisher III, William W. and Cyrill P. Rigamonti. (2005). The South Africa AIDS Controversy: A Case Study in Patent Law and Policy. Harvard Law School.
- Gibbs, Samuel. (2017). Game of Thrones: HBO hackers threaten leak of season finale. The Guardian, 21 August 2017.
- Gifford Jr., Adam and Gary J. Santoni. (1979). Public economics: politicians, property rights, and exchange. Dryden, Press.
- Goldsmith, Andrew and Russell Brewer. (2015). Digital drift and the criminal interaction order. Theoretical Criminology, Vol. 19(1), 112-130.
- Gopal, Ram D. and G. Lawrence Sanders. (1998). International software piracy: Analysis of key issues and impacts. Information Systems Research, Vol. 9(4), 380-397.
- Gopal, Ram, G. Lawrence, Sudip Bhattacharjee, Manish Agrawal and Suzanne C. Wagner. (2004). A behavioral model of digital music piracy. Journal of Organizational Computing & Electronic Commerce, Vol. 14(2), 89-105.
- Higgins, George E. (2005). Can low self‐control help with the understanding of the software piracy problem? Deviant Behavior, Vol. 26:1-24.
- Higgins, George E. and Abbey L. Wilson. (2006). Low Self-Control, Moral Beliefs, and Social Learning Theory in University Students' Intentions to Pirate Software. Security Journal, Vol. 19(2), 75-92.
- Higgins, George E. and David Makin. (2004). Does Social Learning Theory Condition the Effects of Low Self-control on College Students' Software Piracy? Journal of Economic Crime Management, Vol. 2, 1-22.
- Higgins, George E. and David Makin. (2004). Self-Control, Deviant Peers, and Software Piracy. Psychological Reports, Vol. 95(3), 921-931.
- Higgins, George E., Brian D. Fell and Abbey L. Wilson. (2006). Digital piracy: assessing the contributions of an integrated self-control theory and social learning theory. Criminal Justice Studies, Vol. 19(1), 3-22.
- Higgins, George E., Brian D. Fell and Abby L. Wilson. (2007). Low Self-Control and Social Learning in Understanding Students' Intentions to Pirate Movies in the United States. Social Science Computer Review, Vol. 25(3), 339-357.
- Higgins, George E., Scott E. Wolfe and Catherine D. Marcum. (2008). Digital Piracy: An Examination of Three Measurements of Self-Control. Deviant Behavior, 29(5), 440-460.
- Higgins, George E., Scott E. Wolfe and Catherine D. Marcum. (2008). Digital Piracy and neutralization: A trajectory analysis from short-term longitudinal data. International Journal of Cyber Criminology, Vol. 2(2), 324-336.
- Hinduja, Sameer. (2001).Correlates of Internet software piracy. Journal of Contemporary Criminal Justice, Vol. 17,369-382.
- Hinduja, Sameer. (2012). General Strain, Self-Control, and Music Piracy. International Journal of Cyber Criminology, Vol. 6(1), 951-967
- Hinduja, Sameer. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology, Vol. 9(3), 187-204.
- Hinduja, Sameer and Jason Ingram. (2008). Self-control and ethical beliefs on the social learning of intellectual property theft. Western Criminology Review, Vol. 9(2), 52-72.
- Hinduja, Sameer and Jason Ingram. (2009). Social learning theory and music piracy: The differential role of online and offline peer influences. Criminal Justice Studies, Vol. 22(4), 405-420.
- Hohn, Dave A., Lisa R. Muftic and Kelly Wolf. (2006). Swashbuckling students: an exploratory study of Internet piracy. Security Journal, Vol. 19(2), 110-127.
- Ingram, Jason and Sameer Hinduja, S. (2008). Neutralizing music piracy: An empirical examination. Deviant Behavior, Vol. 29(4), 334-366.
- INTA. (2017). Launch of INTA-CIPAM Children's IP Awareness and Education Campaign in Schools. INTA Bulletin, Vol. 72(9).
- Lessig, Lawrence. (2004). Free culture: How big media uses technology and the law to lock down culture and control creativity. Penguin.
- Lessig, Lawrence. (2008). Remix: making art and commerce thrive in the hybrid economy. Penguin.
- Malin, Jenessa and Blain J. Fowers. (2009). Adolescent self-control and music and movie piracy. Computers in Human Behavior, Vol. 25(3), 718-722.
- Maras, Marie-Helen. (2016). Cybercriminology. Oxford University Press.
- Muhamading, Masriwanie. (2017). Malaysia launches Infringing Website List initiative to combat digital piracy. New Straits Times, 10 October 2017.
- Moore, Robert G., and Elizabeth McMullan. (2009). Neutralizations and rationalizations of digital piracy: A qualitative analysis of university students. International Journal of Cyber Criminology, Vol. 3(1), 441-451.
- Morris, Robert G. and George E. Higgins. (2009). Neutralizing Potential and Self-Reported Digital Piracy: A Multitheoretical Exploration Among College Undergraduates. Criminal Justice Review, Vol. 34(2), 173-195.
- Respect for Intellectual Property. (n.d.). Intellectual Property or "IP" Theft - What is that?
- Seale, Darryl A., Michael Polakowski, and Sherry Schneider. (1998). It's Not Really Theft! Personal and Workplace Ethics that Enable Software Privacy. Behavior and Information Technology, Vol. 17(1), 27-40.
- Silbey, Jessica M. (2018). The Mythical Beginnings of Intellectual Property. George Mason Law Review, Vol. 15, 319-379.
- Smallridge, Joshua L. and Jennifer R. Roberts. (2013). Crime Specific Neutralizations: An Empirical Examination of Four Types of Digital Piracy. International Journal of Cyber Criminology, Vol. 7(2), 125-140.
- Shin, Seung Kyoon, Ram D. Gopal, G. Lawrence Sanders, and Andrew B. Whinston. (2004). Global software piracy revisited. Communications of the ACM, Vol. 47(1), 103-107.
- Siponen Mikko and Anthony Vance. (2010). Neutralization: New insights into the problem of employee information systems security policy violation. Management Information Systems Quarterly, Vol. 34(3), 487-502.
- Skinner, B. F. and Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34, 495-518.
- Sykes, Gresham and David Matza. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, Vol. 22(6), 664-670.
- Trademarks & Brands Online (TBO). (2018). Canadian clothing company takes on online counterfeiters.
- UNODC. (2014a). Counterfeit: Don't buy into organized crime.
- UNODC. (2014b). "Counterfeit: Don't buy into organized crime" - UNODC launches new outreach campaign on $250 billion a year counterfeit business.
- UNODC. (2013). The Illicit Trafficking of Counterfeit Goods and Transnational Organized Crime.
- US Department of Justice. (2018). Six Former And Current Fitbit Employees Indicted For Possessing Multiple Trade Secrets Stolen From Jawbone.
- United States Trade Representative. (2018). 2018 Special 301 Report.
- Wall, David S. (2017). The Theft of Ideas as a Cybercrime: Downloading and Changes in the Business Model of Creative Arts. In M. McGuire and T. Holt (eds). The Handbook of Technology, Crime & Justice (pp. 161-177) , Routledge.
- WHO, WIPO, and WTO (2015). Public Health, Intellectual Property, and TRIPS at 20: Innovations and Access to Medicines; Learning from the Past, Illuminating the Future.
- WIPO. (2019). Looking Good: An Introduction to Industrial Designs for Small and Medium-sized Enterprises. Intellectual Property for Business Series, No. 2.
- WIPO. (n.d.). WIPO Copyright Treaty.
- WIPO. (n.d.). Geographical Indications.
- WIPO. (n.d.). Hague - The International Design System.
- WIPO. (n.d.). How are Trade Secrets Protected?
- WIPO. (1993). Introduction to Trademark Law & Practice The Basic Concepts: A WIPO Training Manual, second edition.
- WIPO. (n.d.). Lisbon - The International System of Appellations of Origins.
- WIPO. (n.d.). Madrid - International Trademark System.
- WIPO. (n.d.). Members of the Hague Union.
- WIPO. (n.d.). Members of the Madrid Union.
- WIPO. (n.d.). Mission.
- WIPO. (n.d.). PCT - The International Patent System.
- WIPO. (n.d.). Training and Awareness Activities.
- WIPO. (2009). The Economics of Intellectual Property: Suggestions for Further Research in Developing Countries and Countries with Economies in Transition.
- WIPO. (n.d.). The PCT now has 152 Contracting States.
- WIPO. (n.d.). WIPO Performances and Phonograms Treaty.
- World Intellectual Property Review (WIPR). (2018). Chanel accuses 94 online entities of counterfeiting.
- Zeithaml, Valarie A. (1988). Consumer Perceptions of Price, Quality, and Value: A Means-End Model and Synthesis of Evidence. Journal of Marketing, Vol. 52, 2-22.
Cases
- A&M Records, Inc. v. Napster, Inc., 239 F. 3d 1004 (2001).
- Feist Publications, Inc v. Rural Telephone Service Co Inc., 499 U.S. 340 (1991).
- Jewelers' Circular Pub. Co. v. Keystone Pub. Co., 281 F. 83 (2d Cir 1922).
International and national legislation
- Afghanistan. (2009). Trademark Registration Law.
- Andorra. (1995). Law on Trademarks.
- Association of Southeast Asian Nations (ASEAN). (1995). Framework Agreement on Intellectual Property Cooperation.
- Azerbaijan. (2012). Law of the Republic of Azerbaijan on the Enforcement of the Intellectual Property Rights and Fight Against Piracy.
- Burundi. (2005). Law No. 1/021 of 30 December 2005, on the Protection of Copyright and Related Rights.
- China. (2010). Copyright Law of the People's Republic of China (2010 Amendment).
- Commonwealth of Independent States. (2011). Agreement on Cooperation in the Area of Legal Protection of Intellectual Property and on Establishment of Interstate Council on Legal Protection of Intellectual Property.
- Costa Rica. (2008). Law No. 8686 of 21 November 2008, on Amendment, Addition and Repeal of Various Rules Governing Matters Pertaining to Intellectual Property.
- Council of Europe. (1955). European Convention relating to the Formalities Required for Patent Applications.
- Cuba (2002). Decree-Law No. 228 on Geographical Indications.
- Cuba. (1999). Decree-Law No. 203 on Trademarks and Other Distinctive Signs.
- Cyprus. (1998). Patents Law.
- El Salvador. (2017). Legislative Decree No. 611 of 15 February 2017, on Amendments to the Law on Intellectual Property.
- Equatorial Guinea. (1879). Law of 10 January 1879, on Intellectual Property.
- European Patent Convention. (1973). Convention on the Grant of European Patents.
- European Union. (2016). Directive (EU) 2016/943 of the European Parliament and of the Council of 8 June 2016 on the protection of undisclosed know-how and business information (trade secrets) against their unlawful acquisition, use and disclosure.
- Geneva Phonograms Convention. (1971). Convention for the Protection of Producers of Phonograms Against Unauthorized Duplication of Their Phonograms.
- International Trademark Association (INTA). (2016). Board Resolution on the Hague Agreement Concerning the International Registration of Industrial Designs.
- Kyrgyzstan. (2015). Law of the Kyrgyz Republic No. 8 of 14 January 1998, on Patents (as amended up to Law No. 76 of 10 April 2015).
- Nepal. (1965). Patent, Design and Trade Mark Act, 2022.
- Organization of American States (OAS). (1947). Inter-American Convention on the Rights of the Author in Literary, Scientific, and Artistic Works.
- Rome Neighboring Rights Convention. (1961). International Convention for the Protection of Performers, Producers of Phonograms and Broadcasting Organisations.
- United States. (1970). Extradition Order 1970 (bilateral treaty between New Zealand and the United States).
- United States. (2016). Defend Trade Secrets Act.
- Viet Nam. (2009). Law 36/2009/QH12 of 19 June 2009, amending and supplementing a Number of Articles of the Law on Intellectual Property.
- World Intellectual Property Organization (WIPO). (1883). Paris Convention for the Protection of Industrial Property.
- WIPO. (1891). Madrid Agreement Concerning the International Registration of Marks.
- WIPO. (1957). Nice Agreement Concerning the International Classification of Goods and Services for the Purposes of the Registration of Marks.
- WIPO. (1958). Lisbon Agreement for the Protection of Appellations of Origin and their International Registration.
- WIPO. (1967). Convention Establishing the World Intellectual Property Organization.
- WIPO. (1968). Locarno Agreement Establishing an International Classification for Industrial Designs.
- WIPO. (1970). Patent Cooperation Treaty.
- WIPO. (1971). Strasbourg Agreement Concerning the International Patent Classification.
- WIPO. (1989). Madrid Protocol Relating to the Madrid Agreement Concerning the International Registration of Marks.
- WIPO. (1994). Trademark Law Treaty.
- WIPO. (1994). Eurasian Patent Convention.
- WIPO. (1996). Copyright Treaty.
- WIPO. (1996). Performances and Phonograms Treaty.
- WIPO. (1999). Geneva Act of 1999 of the Hague Agreement Concerning the International Registration of Industrial Designs.
- WIPO. (2000). Patent Law Treaty.
- WIPO. (2006). Singapore Treaty on the Law of Trademarks.
- World Trade Organization (WTO). (1994). Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS).
- WTO. (2001). Doha Declaration on the TRIPS Agreement and Public Health.
Next: Exercises
Back to top