天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

當(dāng)前位置:主頁 > 社科論文 > 出版論文 >

網(wǎng)絡(luò)軟件著作權(quán)保護(hù)與侵權(quán)救濟(jì)問題研究

發(fā)布時間:2019-06-14 05:53
【摘要】:科技發(fā)展日新月異,人類文明不斷向前;ヂ(lián)網(wǎng)的出現(xiàn)深刻地變革了人類生活的幾乎所有方面,也給現(xiàn)行的法律制度帶來了越來越多的難題,尤其是在新興的計算機(jī)軟件行業(yè),原有法律本身已不足以應(yīng)對現(xiàn)實中的種種法律癥結(jié);隨著互聯(lián)網(wǎng)的加入,網(wǎng)絡(luò)軟件更是對傳統(tǒng)的法律制度形成了更大的挑戰(zhàn)。2007年的珊瑚蟲QQ案以其作者陳壽福身陷囹圄結(jié)束,其間有許多問題值得我們思考和研究,譬如法院對于珊瑚蟲的民事判決給網(wǎng)絡(luò)著作權(quán)的保護(hù)帶來了哪些啟示,珊瑚蟲案為何在民事判決后又轉(zhuǎn)入刑事程序,與珊瑚蟲QQ類似的外掛軟件路在何方等。 時光荏苒,三年后的2010年,因扣扣保鏢而激發(fā)的360與騰訊公司之間的爭斗再次引起人們的關(guān)注,同時也給了法律研究者一個對比研究的機(jī)會。那么,網(wǎng)絡(luò)軟件與傳統(tǒng)計算機(jī)軟件相比具有哪些不同之處?網(wǎng)絡(luò)軟件的著作權(quán)人如何才能更好地維護(hù)自己的權(quán)利?如何對普遍存在網(wǎng)絡(luò)軟件侵權(quán)進(jìn)行有效的救濟(jì)?我國現(xiàn)行法律制度應(yīng)當(dāng)進(jìn)行怎樣的變革才能緊隨時代的發(fā)展?諸如此類的諸多題都有待于研究者進(jìn)行深入的探究。 計算機(jī)軟件如今已成為信息產(chǎn)業(yè)中最重要的組成部分之一,法律對其進(jìn)行的規(guī)制經(jīng)過幾十年的發(fā)展也已相對完善。但對網(wǎng)絡(luò)軟件而言,由于其出現(xiàn)時間較晚,故而尚未引起法律研究者的注意,相關(guān)法律也并未能及時跟進(jìn)。筆者在總結(jié)計算機(jī)軟件領(lǐng)域以及網(wǎng)絡(luò)侵權(quán)領(lǐng)域相關(guān)文獻(xiàn)的基礎(chǔ)上,在第一章中對網(wǎng)絡(luò)軟件的由來以及定義在給出了自己的見解。同時讀者應(yīng)當(dāng)注意的是,本文所要討論的網(wǎng)絡(luò)軟件以及對其所下的定義是局限在一定范圍內(nèi)的,而非一切和網(wǎng)絡(luò)有關(guān)的軟件,其內(nèi)涵和外延都是相對確定的。 由于網(wǎng)絡(luò)軟件具備一些一般計算機(jī)軟件所不具備的特點,其權(quán)利的行使也與后者有著諸多不同。本文第二章探討了在網(wǎng)絡(luò)軟件領(lǐng)域可能被侵犯的幾個著作權(quán)的權(quán)能,對網(wǎng)絡(luò)軟件領(lǐng)域的復(fù)制權(quán)、修改權(quán)、發(fā)行權(quán)以及信息網(wǎng)絡(luò)傳播權(quán)等權(quán)能的侵權(quán)構(gòu)成進(jìn)行了詳盡的闡述。而后以此為工具對本文所提到的兩個案件進(jìn)行分析,回答了扣扣保鏢與珊瑚蟲QQ有哪些異同這一問題,指出了網(wǎng)絡(luò)軟件領(lǐng)域侵權(quán)構(gòu)成的關(guān)鍵所在。 僅僅指出哪些權(quán)能可能被侵犯并不足夠,法制的缺失使得網(wǎng)絡(luò)軟件著作權(quán)人對如何保護(hù)自己的著作權(quán)不能有系統(tǒng)的考慮和安排,筆者在本文的第三章對此給出了自己的建議。相信這些建議能為網(wǎng)絡(luò)軟件著作權(quán)人更加完善地維護(hù)自己的權(quán)利提供一些幫助。 同樣地,在法制確實的背景下,軟件開發(fā)者也不知道怎樣做才能規(guī)避侵權(quán)以維護(hù)自己開發(fā)軟件的權(quán)利。第四章對這一問題給出了自己的建議。同時在網(wǎng)絡(luò)軟件的侵權(quán)救濟(jì)問題上,筆者結(jié)合案例對網(wǎng)絡(luò)軟件著作權(quán)侵權(quán)救濟(jì)的三種救濟(jì)方式進(jìn)行了詳細(xì)的討論以及評價。希望這些建議能夠為我國網(wǎng)絡(luò)軟件領(lǐng)域法制的健全以及網(wǎng)絡(luò)軟件的發(fā)展貢獻(xiàn)出一份綿薄之力。
[Abstract]:With the rapid development of science and technology, human civilization is moving forward. The emergence of the Internet has changed the almost all aspects of human life and brought more and more difficulties to the existing legal system, especially in the emerging computer software industry. With the introduction of the Internet, the network software has made a great challenge to the traditional legal system. In 2007, the QQ case of the bug was concluded by the author, Chen Shoufu, and there were a lot of problems for us to think and study. For instance, the court's civil judgment on the worm of the Internet has brought some enlightenment to the protection of the copyright of the network, why the case of the bug is transferred to the criminal procedure after the civil judgment, where the external store software similar to the bug QQ is, etc. In 2010, three years later, the fighting between 360 and Tencent, which was inspired by the deduction of security guards, again raised concerns, and also gave legal researchers a comparative study. Yes. So, what is the difference between the network software and the traditional computer software How can the copyright owner of the network software better maintain its own right How to effectively save the widespread network software infringement The current legal system of our country should carry on the reform in order to follow the development of the times All the questions, such as the show, need to be explored by the researchers. The computer software has become one of the most important components in the information industry, and the regulation of the law has been developed for several decades. In the case of network software, due to the late appearance of the network software, the legal researchers have not been brought to the attention of the legal researchers, and the relevant laws do not On the basis of summarizing the computer software and the relevant literature in the field of network tort, in the first chapter, the author and the definition of the network software are given. At the same time, the reader should note that the network software to be discussed in this paper, as well as its definition, is limited to a certain extent, not all the software related to the network, its connotation and the extension are relative to each other. As the network software has the characteristics of some general computer software, the exercise of its rights is also related to the latter. In the second chapter, the paper discusses the capability of several copyright which may be infringed in the field of network software, and makes the right of copying, modifying, issuing right and information network communication right in the field of network software. In this paper, the two cases mentioned in this paper are analyzed in this paper, and the similarities and differences between the buckle bodyguard and the bug QQ are analyzed, and the tort composition in the area of network software is pointed out. The key point of this paper is to point out which capabilities may be violated and not enough, and the absence of the legal system makes the copyright owner of the network software do not have the systematic consideration and arrangement of how to protect the copyright of the copyright owner. In the third chapter, the author I believe that these suggestions can be more perfect for the copyright owners of the network software to safeguard their rights In the same way, under the true background of the rule of law, software developers do not know how to do so to avoid infringement for maintenance The right of the software to be developed. The fourth chapter is to the question At the same time, in the case of the tort relief of the network software, the author combined the case to the three kinds of relief methods of the copyright infringement relief of the network software Detailed discussion and evaluation. It is hoped that these suggestions can be the sound of the legal system in the network software field of our country and the development of the network software
【學(xué)位授予單位】:復(fù)旦大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2011
【分類號】:D923.41

【參考文獻(xiàn)】

相關(guān)期刊論文 前10條

1 趙俊林;計算機(jī)軟件法律保護(hù)模式研究[J];當(dāng)代法學(xué);2003年04期

2 王遷;;網(wǎng)絡(luò)環(huán)境中版權(quán)直接侵權(quán)的認(rèn)定[J];東方法學(xué);2009年02期

3 王遷;P2P軟件提供者的幫助侵權(quán)責(zé)任——美國最高法院Grokster案判決評析[J];電子知識產(chǎn)權(quán);2005年09期

4 付遷;;法不容情——騰訊QQ珊瑚蟲版軟件侵權(quán)案之管見[J];中國發(fā)明與專利;2008年02期

5 王遷;;論“網(wǎng)絡(luò)傳播行為”的界定及其侵權(quán)認(rèn)定[J];法學(xué);2006年05期

6 梅術(shù)文;;信息網(wǎng)絡(luò)傳播權(quán)合理使用的立法完善[J];法學(xué);2008年06期

7 孟楊;;對兩起信息網(wǎng)絡(luò)傳播侵權(quán)訴訟案的比較研究[J];法制與社會;2009年06期

8 王遷;;論著作權(quán)法中“發(fā)行”行為的界定——兼評“全球首宗BT刑事犯罪案”[J];華東政法學(xué)院學(xué)報;2006年03期

9 陳乃蔚,宋海;計算機(jī)軟件侵權(quán)的認(rèn)定[J];上海交通大學(xué)學(xué)報(社會科學(xué)版);1999年04期

10 王遷;論網(wǎng)絡(luò)環(huán)境中發(fā)行權(quán)的適用[J];知識產(chǎn)權(quán);2001年04期

相關(guān)重要報紙文章 前1條

1 馮曉青;[N];中國知識產(chǎn)權(quán)報;2003年

相關(guān)碩士學(xué)位論文 前7條

1 肖波;互聯(lián)網(wǎng)環(huán)境下計算機(jī)軟件的侵權(quán)與保護(hù)[D];西南大學(xué);2006年

2 薛秀玉;計算機(jī)軟件著作權(quán)侵權(quán)的認(rèn)定[D];西南政法大學(xué);2007年

3 秦健峰;網(wǎng)絡(luò)游戲外掛相關(guān)法律研究與對策[D];清華大學(xué);2007年

4 陳兆勇;網(wǎng)絡(luò)游戲外掛的法律問題研究[D];西南政法大學(xué);2009年

5 封愛青;計算機(jī)軟件最終用戶侵權(quán)責(zé)任研究[D];山東大學(xué);2009年

6 葛曉春;惡意軟件的民事法律規(guī)制[D];南京理工大學(xué);2010年

7 孫桂娟;關(guān)于“流氓軟件”的案例分析[D];蘭州大學(xué);2010年

,

本文編號:2499162

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/shekelunwen/chubanfaxing/2499162.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶90fb9***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com