School of Information and Library Science
University of North Carolina at Chapel Hill

INLS 584, Information Ethics
Fall 2013

Information/Data and Software as Intellectual Property

Information/Data as Intellectual Property

Aoki, K., Boyle, J., & Jenkins, J. (2006). Bound by Law?: Tales from the Public Domain. Durham, NC: Duke University Press. http://www.law.duke.edu/cspd/comics/digital.php.

Benkler, Y. (2001). The battle over the institutional ecosystem in the digital environment. Communications of the ACM, 44(2), 84-90. [ACM Digital Library]

Barlow, J. P. (2000). The next economy of ideas. Wired, 8(10). Available at http://www.wired.com/wired/archive/8.10/download.html.

Borrull, A. L., & Oppenheim, C. (2004). Legal aspects of the Web. Annual Review of Information Science & Technology, 38, 483-548. [UNC libraries; SILS - Reference Z699.A1 A65]

Bouchoux, D. (2001). Protecting Your Company's Intellectual Property: A Practical Guide to Trademarks, Copyrights, Patents & Trade Secrets. New York: AMACOM. [SILS - KF2980 .B38 2001]

British Academy. (2006, September). Copyright and Research in the Humanities and Social Sciences: A British Academy Review. London: British Academy, National Academy for the Humanities and Social Sciences. Available at http://www.britac.ac.uk/reports/copyright/.

Buchanan, E.A., & Henderson, K.A. (2009). Intellectual property. In Case Studies in Library and Information Science Ethics. Jefferson, NC: McFarland, 71-77. [SILS - Z682.35 .P75 B83 2009]

Campus Copyright Rights and Responsibilities: A Basic Guide to Policy Considerations. (2005). Association of American Universities, Association of American University Presses, Association of Research Libraries, and Association of American Publishers. http://www.arl.org/info/frn/copy/CampusCopyright05.pdf

Castro, C., & de Queiroz, R. (2013). The song of the sirens: Google Books Project and copyright in the digital age. Information, Communication & Society, 16(9), 1441-1455. [UNC libraries]

Constantinides, P. (2012). The development and consequences of new information infrastructures: The case of mashup platforms. Media, Culture & Society, 34(5), 606-622. [UNC libraries]

Copyright Office basics, Circular 1, Revised July 2006. http://www.copyright.gov/circs/circ1.html.

Covey, D. T. (2005, October). Acquiring Copyright Permission to Digitize and Provide Open Access to Books. Washington, DC: Digital Library Federation, Council on Library and Information Resources. [http://www.clir.org/pubs/abstract/pub134abst.html]

Davis, R. (2001). The digital dilemma. Communications of the ACM, 44(2), 77-83. [UNC libraries]

Dobusch, L. (2012). The digital public domain: Relevance and regulation. Information & communications Technology Law, 21(2), 179-202. [UNC libraries]

Doctorow, C. (2007). Pwned: How copyright turns us all into IP serfs. "Information in Life" digital video series. School of Information & Library Science, University of North Carolina at Chapel Hill. http://www.youtube.com/watch?v=NkBX-981_es&feature=PlayList&p=19189F4C412A6E09&index=9

Edwards, L., Klein, B., Lee, D., Moss, G., & Philip, F. (2012). Framing the consumer: Copyright regularion and the public. Convergence: The International Journal of Research into New Media Technologies, 19(1), 9-24. [UNC libraries]

Ewing, J. (2003). Copyright and authors. First Monday, 8(10). http://www.firstmonday.org/issues/issue8_10/ewing/index.html.

Fernández-Molina, J. C., & Peis, E. (2001). The moral rights of authors in the age of digital information. Journal of the American Society for Information Science & Technology, 52(2): 109-117. [UNC libraries]

Gasaway, L.N. (2000). Values conflict in a digital environment: Librarians versus copyright holders. Columbia-VLA Journal of Law and the Arts, 24(1), 115-161. (Read at least the following sections: Introduction, Section I (A-C), Section III.F, and the Conclusion.) [UNC libraries]

Green, D.A. (2010). Copyright revolt. Index on Censorship, 39(1), 143-148. [UNC libraries]

Henten, A., & Oest, A. (2005). Copyright: Rights-holders, users and innovators. Telematics and Informatics, 22(1-2), 1-9. [UNC libraries]

Himma, K.E. (2008). The justification of intellectual property: Contemporary philosophical disputes. Journal of the American Society for Information Science & Technology, 59(7), 1143-1161. [UNC libraries]

Lessig, L. (2007). How creativity is being strangled by the law. TED talks, http://blog.ted.com/2007/11/06/larry_lessig/.

Lessig, L. (2002). Free. In The Future of Ideas: The Fate of the Commons in a Connected World. New York: Vintage Books, 5-15. [Davis, SILS - K1401 .L47 2001] (Also reprinted in Bucy, E. P. (2005). Living in the Information Age: A New Media Reader. 2nd edition. Wadsworth/Thomson Learning, 296-303. [SILS - P91.25 .L58 2005])

Lu, B. (2013). Reconstructing copyright from 'copy-centric' to 'dissemination-centric' in the digial age. Journal of Information Science, 39(4), 479-493. [UNC libraries]

Mann, C. (1998). Who will own your next good idea? Atlantic Monthly, 282(3), 57-82. [UNC libraries]

Masango, C.A. (2008). Understanding copyright in support of scholarship: Some possible challenges to scholars and academic librarians in the digital environment? International Journal of Information Management, 19(3), 232-236. [UNC libraries]

Maxwell, T. (2004). Is copyright necessary? First Monday, 9(9). http://www.firstmonday.org/issues/issue9_9/maxwell/index.html.

Maxwell, T. (2005). Parsing the public domain. Journal of the American Society for Information Science & Technology, 56(11), 1130-1139. [UNC libraries]

Moore, A.D. (ed.) (2005). Information Ethics: Privacy, Property, and Power. Seattle: University of Washington Press, 113-122. [Davis - JC585 .I59 2005]

Morgan, E. L. (2006). Ethical and economic issues surrounding freely available images found on the Web. First Monday, 11(7). http://firstmonday.org/issues/issue11_7/morgan/index.html.

Moore, A.D. (2008). Personality-based, rule-utilitarian, and Lockean justifications of intellectual property. In Himma, K.E., & Tavani, H.T. (eds.), The Handbook of Information and Computer Ethics. Wiley, 105-130. [UNC libraries]

Moore, A.D. (1998). Intangible property: Privacy, power, and information control. American Philosophical Quarterly, 35(4), 365-378. [UNC libraries]

Mueller, M. (2008). Info-communism? Ownership and freedom in the digital economy. First Monday, 13(4). http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2058/1956.

Muir, A. (2012). Online copyright enforcement by internet service providers. Journal of Information Science, 39(2), 256-269. [UNC libraries]

National Research Council, Committee on Intellectual Property Rights and the Emerging Information Infrastructure, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications. (2000). The Digital Dilemma: Intellectual Property in the Information Age. Washington, DC: National Academy Press. [Davis - KF2979 .N388 2000; http://www.nap.edu/html/digital_dilemma/index.html]

National Research Council, Committee for a Study on Promoting Access to Scientific and Technical Data for the Public Interest, Commission on Physical Sciences, Mathematics, and Applications. (1999). A Question of Balance: Private Rights and the Public Interest in Scientific and Technical Databases. Washington, DC: National Academy Press. [Davis - KF2979 .N39 1999; http://books.nap.edu/books/0309068258/html/index.html]

Newman, S., & Koehler, W. (2004). Copyright: Moral rights, fair use, and the online environment. Journal of Information Ethics, 13(2), 38-57. [UNC libraries]

Picker, R.C. (2012). The yin and yang of copyright and technology. Communications of the ACM, 55(1), 30-32. [UNC libraries]

Samuelson, P. (2009). The dead souls of the Google Book Search settlement. [Legally speaking.] Communications of the ACM, 52(7), 28-30. [ACM Digital Library]

Samuelson, P. (2010). Should the Google Book settlement be approved? Communications of the ACM, 53(7), 32-34. [UNC libraries]

Samuelson, P. (2011). Why the Google Book settlement failed -- and what comes next? [Legally Speaking]. Communicatins of the ACM, 54(11), 29-31. [UNC libraries]

Schwabach, A. (2011). Fan Fiction and Copyright: Outsider Works and Intellectual Property Protection. Farnham, Surrey: Ashgate. [Davis, Law - K1447.95 .S39 2011]

Seadle, M. (2007). On copyright: Copyright cultures. Library Hi Tech, 25(3), 430-435. [UNC libraries]

Seadle, M. (2008). Copyright in the networked world: Gray copyright. Library Hi Tech, 26(2), 325-332. [UNC libraries]

Section 108 Study Group: Executive Summary. (March 2008). U.S. Copyright Office; National Digital Information Infrastructure and Preservation Program (NDIIP), Library of Congress. [http://www.section108.gov/docs/Sec108ExecSum.pdf]

Sheppard, T. (2009). Putting the public in the public domain: The public library's role in the re-conceptualization of the public domain. New Library World, 110(5/6), 207-218. [UNC libraries]

Snapper, J. W. (1999). On the Web, plagiarism matters more than copyright piracy. Ethics and Information Technology, 1(2), 127-136. [UNC libraries]

Spinello, R. A. (2003). The future of intellectual property. Ethics and Information Technology, 5(1), 1-16. [UNC libraries]

Spinello, R.A. (2007). Intellectual property rights. Library Hi Tech, 25(1), 12-22. [UNC libraries]

Spinello, R.A. (2008). Intellectual property: Legal and moral challenges of online file sharing. In Himma, K.E., & Tavani, H.T. (eds.), The Handbook of Information and Computer Ethics. Wiley, 553-569. [UNC libraries]

Tunca, T.I., & Wu, Q. (2013). Fighting fire with fire: Commercial piracy and the role of file sharing on copyright protection policy for digital goods. Information Systems Research, 24(2), 436-453. [UNC libraries]

Wilkinson, M.A., & Gerolami, N. (2009). The author as agent of information policy: The relationship between economic and moral rights in copyright. Government Information Quarterly, 26(2), 321-332. [UNC libraries]

Legal Overviews

Hirtle, P. B. (2004). Copyright term and the public domain in the United States. Information Outlook, 8(11), 26, 38, 29-30, 33. [SILS]

Hollaar, L. A. (2002). An overview of copyright. In Legal Protection of Digital Information. Washington, DC: Bureau of National Affairs. [SILS - KF3024.C6 H65 2002]

LaFrance, M. (2008). Copyright Law in a Nutshell. St. Paul, MN: Thomson/West. [SILS - KF2994 .L3 2008]

Laster, D. (1997). Copyright, trademark, and database issues. In Lee, L. C., & Davidson, J. S. (Eds.), Intellectual Property for the Internet. New York: Wiley Law Publications, 131-149. [SILS, Law - KF2980 .I546 1997]

Lipinski, T.A. (2011). Toward a functional understanding of fair use in U.S. copyright law. Annual Review of Information Science & Technology, 45, 525-621. [SILS Reference - Z699.A1 A65]

Miller, A. R., & Davis, M. H. (2000). Intellectual Property: Patents, Trademarks, and Copyright in a Nutshell. St. Paul, MN: West Group. [SILS - KF2980 .M52 2000]

Stim, R. (2001). Intellectual Property: Patents, Trademarks, and Copyrights. 2nd ed. Albany, NY: West/Thomson Learning. [SILS - KF2980 .S75 2001]

Stokes, S. (2002). Digital Copyright: Law and Practice. London: Butterworths. [SILS - KD1303 .C65 S76 2002]

Social Entrepreneurship and the Ethics of Open Access

Laurel, B. (2001). Utopian Entrepreneur. Cambridge: MIT Press. [SILS - HD60 .L347 2001]

Nicholas, D., Jamali M., H.R., Huntington, P., & Rowlands, I. (2005). In their very own words: Authors and scholarly journal publishing. Learned Publishing, 18(3), 212-220. [UNC libraries]

Saddington, J. (2013, July 23). Georgia Tech grad develops alternative photo sharing app. http://blog.pressgr.am/gt-grad/. (An example of social entrepreneurship)

Willinsky, J. (2006). The Access Principle: The Case for Open Access to Research and Scholarship. Cambridge, MA: MIT Press. [Davis Library - Z286.O63 W55 2006]

Xia, J. (2010). A longitudinal study of scholars attitudes and behaviors toward open-access journal publishing. Journal of the American Society for Information Science & Technology, 61(3), 615-624. [UNC libraries]

Digital Rights Management

Coyle, K. (2004). The "rights" in digital rights management. D-Lib Magazine, 10(9). http://www.dlib.org/dlib/september04/coyle/09coyle.html.

Felten, E. (2003). A skeptical view of DRM and fair use. Communications of the ACM, 46(4), 56-59. [ACM Digital Library]

Fox, B. L., & LaMacchia, B. A. (2002). Encouraging recognition of fair uses in DRM systems. Communications of the ACM, 46(4), 61-63. [ACM Digital Library]

Mulligan, D., Han, J., & Burstein, A. (2003). How DRM-based content delivery systems disrupt expectations of ‘personal use’. ACM Workshop on Digital Rights Management, 77-89. [ACM Digital Library]

Samuelson, P. (2003). DRM {and, or, vs.} the law. Communications of the ACM, 46(4), 41-45. [ACM Digital Library]

Samuelson, P., Reichman, J.H., & Dinwoodie, G. (2008). How to achieve (some) balance in anti-circumvention laws. Communications of the ACM, 51(2), 21-25. [ACM Digital Library]

Sohn, D. (2007). Understanding DRM. ACM Queue, 5(7), 32-39. [ACM Digital Library]

Yeung, M. M. ed. (1998). Digital watermarking: introduction. Communications of the ACM, 41(7), 30-33. [ACM Digital Library]

Property Rights in Archival/Museum Materials

Bettelheim, A., & Adams, R. (2007, April 13). Stolen antiquities. CQ Researcher, 17, 313-336. http://library.cqpress.com/cqresearcher/cqresrre2007041300.

Elginism, a web site dedicated to the reunification of the Parthenon Marbles. http://www.elginism.com/.

Eschenfelder, K.R., & Caswell, M. (2010). Digital cultural collections in an age of reuse and remixes. First Monday, 15(11). http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/3060/2640.

Greaves, T. (2002). Examining indigenous rights to culture in North America. Cultural Dynamics, 14(2), 121-142. [UNC Libraries]

Grimsted, P.K. (2002, Fall). Spoils of war returned: U.S. restitution of Nazi-looted cultural treasures to the USSR, 1945 - 1959, Part 1 (of 4). Prologue Magazine, 34(3). http://www.archives.gov/publications/prologue/2002/spring/spoils-of-war-1.html.

Grose, T.O. (1996). Reading the bones: Information content, value, and ownership issues raised by the Native American Graves Protection and Repatriation Act. Journal of the American Society for Information Science, 47(8), 624-631. [UNC libraries]

Landers, R.K. (1991, Jan. 18). Is America allowing its past to be stolen? CQ Researcher, 1, 34-49. http://library.cqpress.com/cqresearcher/cqresrre1991011800.

Lor, P., & Britz, J. (2004). Digitization of Africa's documentary heritage: Aid or exploitation? Journal of Information Ethics, 13(2), 78-93. (Of particular interest: Introduction, p78-80, and A Moral Framework Based on Justice, p87-92.) [UNC libraries]

Ownership of Cultural Artifacts. (2006, March 31). Issues & Controversies On File. Retrieved from Issues & Controversies database. [UNC libraries]

Preamble of the United Nations Ban on Illegally Obtained Cultural Property (sidebar). (2006, March 31). Issues & Controversies On File. Retrieved from Issues & Controversies database. [UNC libraries]

Reppas, M.J. (2007, Winter). Empty international museums' trophy cases of their looted treasures and return stolen property to the countries of origin and the rightful heirs of those wrongfully dispossessed. Denver Journal of International Law and Policy. [Online or via UNC libraries - Lexis Nexis]

Schafft, G.E. (2004). From Racism to Genocide : Anthropology in the Third Reich. Urbana: University of Illinois Press. [Google Books]

Music/Movie File Sharing

Bhattacharjee, S., Gopal, R. D., & Sanders, G. L. (2003). Digital music and online sharing: software piracy 2.0? Communications of the ACM, 46(7), 107-111. [ACM Digital Library]

Code of Best Practices in Fair Use for Online Video. Center for Social Media, American University, 2008. http://www.centerforsocialmedia.org/files/pdf/online_best_practices_in_fair_use.pdf.

Cook, D. A., & Wang, W. (2004). Neutralizing the piracy of motion pictures: Reengineering the industry's supply chain. Technology in Society, 26(4), 567-583. [Davis - T14.5 .T443]

Delchin, R.J. (2004). Musical copyright law: Past, present and future of online music distribution. Cardozo Arts & Entertainment Law Journal, 22, 343-399. [UNC libraries]

Easley, R. F., Michel, J. G., & Devaraj, S. (2003). The MP3 open standard and the music industry's response to internet piracy. Communications of the ACM, 46(11), 90-96. [ACM Digital Library]

Eschenfelder, K. R. (2005). Chasing down the social meaning of DeCSS: Investigating the internet posting of DVD circumvention software. Bulletin of ASIST, 31(5), 21-24. [UNC libraries]

Eschenfelder, K.R., Howard, R.G., & Desai, A.C. (2005). Who posts DeCSS and why?: A content analysis of Web sites posting DVD circumvention software. Journal of the American Society for Information Science & Technology, 56(13), 1405-1418. [UNC libraries]

Fetscherin, M. (2005). Movie piracy on peer-to-peer networks—the case of KaZaA. Telematics and Informatics, 22(1-2), 57-70. [UNC libraries]

Frost, R.L. (2007). Rearchitecting the music business: Mitigating music piracy by cutting out the record companies. First Monday, 12(8). [http://www.firstmonday.org/issues/issue12_8/frost/]

Gordon, W.J. (2008). Moral philosophy, information technology, and copyright: The Grokster case. In van den Hoven, J., & Weckert, J. (eds.), Information Technology and Moral Philosophy. Cambridge: Cambridge University Press, 270-300. [Davis Library - T58.5 .I53745 2008]

Graybosch, A. J. (2001). Bootlegs: intellectual property and popular culture. Journal of Information Ethics, 10(1), 35-50. [SILS]

Greenwood, C. (2010). Set yourself free. Index on Censorship, 39(3), 20-24. [UNC libraries]

Henderson, K. A. (2004). Deconstructing the RIAA's litigious solution to online music piracy. Journal of Information Ethics, 13(2), 24-37. [UNC libraries]

Hormann, K.C. (2009). The death of the DMCA? How Viacom v. Youtube may define the future of digital content. Houston Law Review, 46, 1345-1377. [UNC libraries]

Howard-Spink, S. (2004). Grey Tuesday, online cultural activism and the mash-up of music and politics. First Monday, 9(10). http://www.firstmonday.org/issues/issue9_10/howard/index.html.

Larsson, S., Svensson, M., & de Kaminski, M. (2013). Online piracy, anonymity and social change: Innovation through deviance. Convergence: The International Journal of Research into New Media Technologies, 19(1), 95-114. [UNC libraries]

Litman, J. (2003). Ethical disobedience. Ethics and Information Technology, 5(4), 217-223. [UNC libraries]

Logie, J. (2003). A copyright cold war? The polarized rhetoric of the peer-to-peer debates. First Monday, 8(7). http://firstmonday.org/issues/issue8_7/logie/index.html.

Postigo, H. (2008). Capturing fair use for the YouTube generation: The digital rights movement, the Electronic Frontier Foundation and the user-centered framing of fair use. Information, Communication, & Society, 11(7), 1008-1027. [UNC libraries]

Premkumar, G. P. (2003). Alternate distribution strategies for digital music. Communications of the ACM, 43(9), 80-95. [ACM Digital Library]

Samuelson, P. (2004). What's at stake in MGM v. Grokster? [Legally speaking]. Communications of the ACM, 47(2), 15-20. [ACM Digital Library]

Samuelson, P. (2005). Did MGM really win the Grokster case? [Legally speaking]. Communications of the ACM, 48(10), 19-24. [ACM Digital Library]

Samuelson, P. (2012). Can online piracy be stopped by laws? [Legally Speaking]. Communications of the ACM, 55(7), 25-27. [UNC libraries]

Samuelson, P. (2013). A copyright challenge to resales of digital music [Legally speaking]. Communications of the ACM, 56(3), 24-26. [UNC libraries]

Seadle, M. (2004). Copyright in a networked world: Ethics and infringement. Library Hi Tech, 22(1), 106-110. [UNC libraries]

Spinello, R. A. (2003). Digital music and peer-to-peer file sharing. In Readings in CyberEthics. 2nd ed. Sudbury, MA: Jones and Bartlett, 269-272. [SILS - TK5105.5 .R3722 2004]

Spitz, D., & Hunter, S. D. (2005). Contested codes: The social construction of Napster. The Information Society, 21(3), 169-180. [UNC libraries]

Taddeo, M., & Vaccaro, A. (2011). Analyzing peer-to-peer technology using information ethics. Information Society, 27(2), 105-112. [UNC libraries]

Waldfogel, J. (2012). Digitization and copyright: Some recent evidence from music [Economic and Business Dimensions]. Communications of the ACM, 55(5), 35-57. [UNC libraries]

Woody, T. (2003). The race to kill kazaa. Wired, 11(2). Available at http://www.wired.com/wired/archive/11.02/kazaa.html.

Digital Millennium Copyright Act

Digital Millennium Copyright Act. (1998). [Online from GPO]

The Digital Millennium Copyright Act. (n.d.) Educause. http://www.educause.edu/Browse/645?PARENT_ID=254.

Kerr, I. (2004). Should law protect the technologies that protect copyright? In Mendina, T., & Britz, J. J. (eds.), Information Ethics in the Electronic Age: Current Issues in Africa and the World. Jefferson, NC: McFarland, 173-184. [SILS - Z665 .I5795 2004]

Maxwell, T. A. (2004). Mapping information policy frames: The politics of the Digital Millennium Copyright Act. Journal of the American Society for Information Science & Technology, 55(1), 3-12. [UNC libraries]

Notes on the DeCSS case. In Spinello, R.A., & Tavani, H.T. (2004). Readings in Cyberethics. 2nd ed. Sudbury, MA: Jones and Bartlett, 264-268. [SILS - TK5105.5 .R3722 2004]

Spinello, R. A. (2004). The DMCA, copyright law, and the right to link. Journal of Information Ethics, 13(2), 8-23. [UNC libraries]

UCLA Online Institute for Cyberspace Law and Policy. (2001, February 8). The Digital Millennium Copyright Act. http://www.gseis.ucla.edu/iclp/dmca1.htm.

Unintended consequences: Five years under the DMCA, version 3. (2005?). Electronic Frontier Foundation. http://www.eff.org/IP/DMCA/20030102_dmca_unintended_consequences.html.

Vaagan, R., & Koehler, W. (2005). Intellectual property rights vs. public access rights: Ethical aspects of the DeCSS decryptation program. Information Research, 10(3), Paper 230. http://informationr.net/ir/10-3/paper230.html.

Software as Intellectual Property

Boyle, J. (2009). What intellectual property law should learn from software. Communications of the ACM, 52(9), 71-76. [ACM Digital Library]

Chan, R.Y.K., Ma, K.H.Y., & Wong, Y.H. (2013). The software piracy decision-making process of Chinese computer users. The Information Society, 29(4), 203-218. [UNC libraries]

Chiou, W.-B., Wan, P.-H., & Wan, C.-S. (2012). A new look at sofware piracy: Soft lifting primes an inauthentic sense of self, prompting further unethical behavior. International Journal of Human-Computer Studies, 70(2), 107-115. [UNC libraries]

Committee on Public Information, Section on Intellectual Property Law, American Bar Association. (2001). Intellectual Property: A Guide for Engineers: A Project for the Committee on Issues Identification, American Society of Mechanical Engineers. New York: ASME Press. [SILS - KF2980 .A5 2001]

Dandekar, N. (1997). Moral issues involved in protecting software as intellectual property. In Agre, P. E., & Schule, D. (eds.), Reinventing Technology, Rediscovering Community: Critial Explorations of Computing as a Social Practice. Greenwich, CT: Ablex, 73-83. [SILS - QA76.9 .C66 R47 1997]

Eschenfelder, K., Howard, R. G., & Desai, A. C. (2006). The ethics of DeCSS posting: Toward assessing the morality of the Internet posting of DVD copyright circumvention software. Information Research, 11, paper 273. http://InformationR.net/ir/11-4/paper273.html.

Georgiades, E. (2011). Resolving conflicting interests: Software patents versus open source. Information & Communications Technology Law, 20(3), 225-252. [UNC libraries]

Grodzinsky, F.S., & Wolf, M.J. (2008). Ethical interest in free and open source software. In Himma, K.E., & Tavani, H.T. (eds.), The Handbook of Information and Computer Ethics. Wiley, 245-271. [UNC libraries]

Hinduja, S. (2003). Trends and patterns among online software pirates. Ethics and Information Technology, 5(1), 49-61. [Online via UNC libraries]

Krakovsky, M. (2012). Patently inadequate. Communications of the ACM, 55(7), 18-20. [UNC libraries]

Mishra, A., Akman, I., & Yazici, A. (2007). Organizational software piracy: An empirical assessment. Behaviour & Information Technology, 26(5), 437-444. [UNC libraries]

Mishra, A., Akman, I., & Yazici, A. (2006). Software piracy among IT professionals in organizations. International Journal of Information Management, 26(5), 401-413. [UNC libraries]

Moores, T.T., & Chang, J.C.-J. (2006). Ethical decision makingi n software piracy: Initial development and a test of a four-component model. MIS Quarterly, 30(1), 167-180. [UNC libraries]

Rai, A.K., Allison, J.R., & Sampat, B.N. (2008-2009). University software ownership and litigation: A first examination. North Carolina Law Review, 87, 1519-1570. [UNC libraries]

Samuelson, P. (2012). Do software copyrights protect what programs do? [Legally Speaking]. Communications of the ACM, 55(3), 27-29. [UNC libraries]

Samuelson, P. (2012). Oracle v. Google: Are APIs copyrightable? [Legally Speaking]. Communications of the ACM, 55(11), 25-27. [UNC libraries]

Shin, S. K., Gopal, R. D., Sanders, G. L., & Whinston, A. B. (2004). Global software piracy revisited. Communications of the ACM, 47(1), 103-107. [ACM Digital Library]

Siponen, M., & Vartiainen, T. (2004). Unauthorized copying of software and levels of moral development: A literature analysis and its implications for research and practice. Information Systems Journal, 14(4), 387-407. [Online via UNC libraries]

Yoches, E. R., & Levine, A. J. (1989). Basic principles of copyright protection for computer software. Communications of the ACM, 32(5), 544-45. [ACM Digital Library]

Additional References

Aalberts, R.J., Poon, P., & Thistle, P. (2007). Trespass, nuisance, and spam: 11th century common law meets the internet. Communications of the ACM, 50(12), 40-45. [ACM Digital Library]

Aoki, K., Boyle, J., & Jenkins, J. (2006). Bound by Law?: Tales from the Public Domain. Durham, NC: Duke Center for the Study of the Public Domain. http://www.law.duke.edu/cspd/comics/digital.html

Auer, N., & Krupar, E. (2001). Mouse click plagiarism: the role of technology in plagiarism and the librarian's role in combating it. Library Trends, 49(3), 415-432. [Online via UNC libraries]

Boyle, J. (1997). A politics of intellectual property: environmentalism for the net? [Essay]. Duke Law Journal, 47, 87-116. [UNC libraries]

Chamberlain, K.A. (2011). "Lawfully made under this title": The implications of Costco v. Omega and the first sale doctrine on library lending. Journal of Academic Librarianship, 37(4), 291-298. [UNC libraries]

Cronan, T.P., Foltz, C.B., & Jones, T.W. (2006). Piracy, computer crime, and IS misuse at the university. Communications of the ACM, 49(6), 84-90. [ACM Digital Library]

Eschenfelder, K.R., Desai, A.C., & Downey, G. (2011). The pre-internet downloading controversy: The evolution of use rights for digital intellectual and cultural works. Information Society, 27(2), 69-91. [UNC libraries]

Everett, M. (2003). The social life of genes: Privacy, property, and the new genetics. Social Science & Medicine, 56(1), 53-65. [UNC libraries]

Fair(y) Use Tale, http://www.youtube.com/watch?v=CJn_jC4FNDo

Farb, S. (2006). Libraries, licensing and the challenge of stewardship. First Monday, 11(7). http://firstmonday.org/issues/issue11_7/farb/index.html.

Ficsor, M. (2008). Teaching copyright and related rights. In Takagi, Y., Allman, L., & Sinjela, M.A. (eds.), Teaching of Intellectual Property: Principles and Methods. Cambridge University Press, 33-62. [Law - K1401 .T43 2008]

Gardner, W., & Rosenbaum, J. (1998, Aug 7). [Policy forum: Intellectual property.] Database protection and access to information. Science, 281(5378), 786-787. [Online]

Gasaway, L. (1998). Copyright, the internet, and other legal issues. Journal of the American Society for Information Science, 49(11): 1003-1009. [UNC libraries]

Gasaway, L. (2002). What's happened to copyright? Copyright and the digital age. Information Outlook, 6(5), 16-17, 19-21. [UNC libraries]

Gerlach, J.H., Kuo, F.-Y.B., & Lin, C.S. (2009). Self sanction and regulative sanction against copyright infringement: A comparison between U.S. and China college students. Journal of the American Society for Information Science & Technology, 60(8), 1687-1701. [UNC libraries]

Ginsburg, J.C. (2007). The pros and cons of strengthening intellectual property protection: Technological protection measures and Section 1201 of the United States Copyright Act. Information & Communications Technology Law, 16(3), 191-216. [UNC libraries]

Grodzinsky, F. S., Miller, K., & Wolf, M. (2003). Ethical issues in open source software. In Spinello, R. A. (ed.), Readings in CyberEthics. 2nd ed. Sudbury, MA: Jones and Bartlett, 351-366. [SILS - TK5105.5 .R3722 2004] (Originally published in Journal of Information, Communication and Ethics in Society, 19(4), 193-205, October 2003.)

Halbert, D. J. (1999). The historical construction of copyright. In Intellectual Property in the Information Age: The Politics of Expanding Ownership Rights. Westport, CT: Quorum Books, 1-23. [SILS, Law - KF2979 .H35 1999]

Hirtle, P.B. (2008). Copyright renewal, copyright restoration, and the difficulty of determining copyright status. D-Lib Magazine, 14(7/8). http://www.dlib.org/dlib/july08/hirtle/07hirtle.html.

Hollaar, L. A. (2002). Legal Protection of Digital Information. Washington, DC: Bureau of National Affairs. [SILS - KF3024.C6 H65 2002]

Hugenholtz, P.B. (2013). Fair use in Europe. Communications of the ACM, 56(5), 26-28. [ACM Digital Library]

Introna, L.D., & Hayes, N. (2011). On sociomaterial imbrications: What plagiarism detection systems reveal and why it matters. Information & Organization, 21(2), 107-122. [UNC libraries]

Information bill of rights and responsibilities: III. Information as property. In Firestone, C. M., & Schement, J. R. (Eds.). (1995). Toward an Information Bill of Rights and Responsibilities. Washington, DC: Aspen Institute, 27-37. [Davis - HE7781 .T683 1995]

Kimppa, K.K. (2005). Intellectual property rights -- or rights to the immaterial -- in digitally distributable media gone all wrong. In Freeman, L.A., & Peace, A.G. (eds.), Information Ethics: Privacy and Intellectual Property. Hershey, PA: Information Science Publishing, 53-67. [Law Library - T58.5 .I5248 2005]

Kizza, J.M. (2007). Intellectual property rights and computer technology. In Ethical and Social Issues in the Information Age. London: Springer, 125-155. [UNC libraries]

Lawrence, A. (1995). Publish and be robbed? New Scientist, 145(1965), 32-37. [Davis library folio, in storage]

Lipinski, T. A. (2003). The myth of technological neutrality in copyright and the rights of institutional users: recent legal challenges to the information organization as mediator and the impact of the DMCA, WIPO, and TEACH. Journal of the American Society for Information Science and Technology, 54(9), 824-835. [UNC libraries]

McManis, C.R. (2008). Teaching current trends and future developments in intellectual property. In Takagi, Y., Allman, L., & Sinjela, M.A. (eds.), Teaching of Intellectual Property: Principles and Methods. Cambridge University Press, 299-319. [Law - K1401 .T43 2008]

Samuelson, P. (2007). Does copyright law need to be reformed? [Legally speaking]. Communications of the ACM, 50(10), 19-23. [ACM Digital Library]

Snapper, J. (2008). The matter of plagiarism: What, why, and if. In Himma, K.E., & Tavani, H.T. (eds.), The Handbook of Information and Computer Ethics. Wiley, 534-552. [UNC libraries]

Starkman, N. (2008, March). Do the (copy)right thing. T.H.E. Journal, 22,24-25. [http://thejournal.com/articles/22173]

Torremans, P. (2000). Moral rights in our digital age. In Stamatoudi, I., & Torremans, P. L. C. (eds.), Copyright in the New Digital Environment: The Need to Redesign Copyright. London: Sweet & Maxwell, 97-114. [SILS - K1420.5 .C77 2000]

Scenarios of Ethical Decisions: Information/Data as Intellectual Property

Alford, K. (2008). Ethical Situation, Copyright! (Developed for INLS 584, Spring 2008.) [Class Sakai site, Resources]

Baldwin, C. (1995?). Sonic Outlaws [videorecording]. San Francisco: Craig Baldwin. [UL Nonprint - 65-V6483]

Buchanan, E.A., & Henderson, K.A. (2009). Cases #4.1-4.25. In Case Studies in Library and Information Science Ethics. Jefferson, NC: McFarland, 77-94. [SILS - Z682.35 .P75 B83 2009]

Intellectual property issues. (n.d.) Negativland. http://www.negativland.com/intprop.html.

Scenario 1: Database agreement is violated. (1994). In Denning, D. S., & Lin, H. S. Rights and Responsibilities of Participants in Networked Communities. Washington, DC: National Academy Press, 88-94. [Davis - TK5105.5 .R54 1994]

Spinello, R. A. (2000). Framing as property theft? In Cyberethics: Morality and Law in Cyberspace. Sudbury, MA: Jones and Bartlett, 98. [SILS, Davis - TK5105.875 .I57 S68 2000]

Spinello, R. A. (2000). The www.nga domain name dispute (hypothetical). In Cyberethics: Morality and Law in Cyberspace. Sudbury, MA: Jones and Bartlett, 96-97. [SILS, Davis - TK5105.875 .I57 S68 2000]

Tavani, H.T. (2004). Case illustration: Dimitri Sklyarov's decryption program. In Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology. New York: Wiley, 228-229. [SILS - TK5105.5 .T385 2004]

Tavani, H.T. (2004). Case illustration: MGM Studios, Inc. v. Grokster, Ltd. In Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology. New York: Wiley, 232-233. [SILS - TK5105.5 .T385 2004]

Tavani, H.T. (2004). Case illustration: Decrypting code for DVD technology. In Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology. New York: Wiley, 234. [SILS - TK5105.5 .T385 2004]

Tavani, H.T. (2004). Case illustration: Using a Beatle's song in a television commercial for Nike. In Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology. New York: Wiley, 243. [SILS - TK5105.5 .T385 2004]

Tavani, H.T. (2004). Case illustration: eBay v. Bidder's Edge. In Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology. New York: Wiley, 275-276. [SILS - TK5105.5 .T385 2004]

Scenarios of Ethical Decisions: Software as Intellectual Property

Spinello, R. A. (1997). Case 6.3, Whose program is this? In Case Studies in Information and Computer Ethics. Upper Saddle River, NJ: Prentice Hall, 132-135. [Davis - QA76.9 .M65 S65 1997]

Spinello, R. A. (1997). Case 6.4, Doric Conversion Technologies, Inc. In Case Studies in Information and Computer Ethics. Upper Saddle River, NJ: Prentice Hall, 135-138. [Davis - QA76.9 .M65 S65 1997]

Spinello, R. A. (1997). Case 6.5, Software compatibility and reverse engineering. In Case Studies in Information and Computer Ethics. Upper Saddle River, NJ: Prentice Hall, 138-145. [Davis - QA76.9 .M65 S65 1997]

Tavani, H.T. (2004). Case illustration: Distributing proprietary software in cyberspace. In Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology. New York: Wiley, 230-231. [SILS - TK5105.5 .T385 2004]

Tavani, H.T. (2004). Case illustration: Amazon.com v. BarnesandNoble.com. In Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology. New York: Wiley, 238. [SILS - TK5105.5 .T385 2004]

Web Sites of Interest

Cornell Law School, The Legal Information Institute. (n.d.) http://www.law.cornell.edu/.

Findlaw. (1994-1999). http://findlaw.com/.

Intellectual Property. (2009). Electronic Frontier Foundation. http://www.eff.org/issues/intellectual-property.

Malhotra, Y., & Malhotra, M. (1994-1999). Intellectual Property: Copyrights, Trademarks & Patents. @Brint.com. http://www.brint.com/IntellP.htm.

O'Mahoney, B. (1995-1999). The Copyright Website. http://www.benedict.com/index.html.

The Section 108 Working Group, Library of Congress. (2005). http://www.loc.gov/section108/

Stanford University Libraries. (n.d.) Copyright & Fair Use. http://fairuse.stanford.edu/.

U.S. Copyright Office, The Library of Congress. (1999). http://lcweb.loc.gov/copyright/.

U.S. Patent and Trademark Office. (1999). http://www.uspto.gov/.


Return to INLS 584 Syllabus or INLS 584 Schedule


Creative Commons LicenseThe INLS 584 website, UNC-CH, Fall 2013, is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 United States License. Address all comments and questions to Barbara M. Wildemuth at wildemuth@unc.edu.
This page was last modified on August 1, 2013, by Barbara M. Wildemuth.