Access the full text.
Sign up today, get DeepDyve free for 14 days.
(1989)
State Are Free to Infringe on Copyrights
T. Bell (1983)
Copying Computer Software For Educational Purposes: Is It Allowed?.Personal Computing archive, 7
(1989)
Apple Wins First Round Against Microsoft
(1988)
The preemption of shrink wrap license in the wake of Vault Corp. v. Quaid Software Ltd
(1984)
Only one per customer
(1984)
~Fighting software pirates
(1989)
~Court Clarifies Non-Infringing: Copying Shrink-Wrap Law Invalidated
(1983)
A software consumer's Bill of Rights, ~ Hardcopy
Jack Sholkoff (1988)
Breaking the Mold: Forging a New and Comprehensive Standard of Protection for Computer Software, 8 Computer L.J. 389 (1988)The John Marshall Journal of Information Technology & Privacy Law, 8
(1984)
A watershed case for copyrighting
(1988)
Beyond DonglesThe Economist
Takaharu Higashima, Kenji Ushiku (1986)
A New Means of International Protection of Computer Programs Through the Paris Convention - A New Concept of Utility Model, 7 Computer L.J. 1 (1986)The John Marshall Journal of Information Technology & Privacy Law, 7
(1985)
The Lawyers Co-operative Publishing Co
The recent U. S. Supreme Court case BV Engineering v. UCLA copyright infringement litigation illustrates a continuing problem related to software protection (10). The microcomputer software market continues to expand and technology changes at the same time methods of software protection become obsolete and fail to protect developer's interests. With a steady increase in the size and complexity of software, software costs have become a major concern to the user. As a result, the incentive may not be to develop or purchase new software but instead to steal another's creations and infringe upon another's intellectual endeavors (8). Protection of software from unauthorized use has become a major issue of every software developer. This causes a heated battle among software developers, software lock busters and software users. The dispute is over whether users may or may not make copies of their purchased or leased software.
ACM SIGSAC Review – Association for Computing Machinery
Published: Feb 1, 1989
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.