網(wǎng)絡(luò)軟件著作權(quán)保護(hù)與侵權(quán)救濟(jì)問題研究
[Abstract]:With the rapid development of science and technology, human civilization is moving forward. The emergence of the Internet has changed the almost all aspects of human life and brought more and more difficulties to the existing legal system, especially in the emerging computer software industry. With the introduction of the Internet, the network software has made a great challenge to the traditional legal system. In 2007, the QQ case of the bug was concluded by the author, Chen Shoufu, and there were a lot of problems for us to think and study. For instance, the court's civil judgment on the worm of the Internet has brought some enlightenment to the protection of the copyright of the network, why the case of the bug is transferred to the criminal procedure after the civil judgment, where the external store software similar to the bug QQ is, etc. In 2010, three years later, the fighting between 360 and Tencent, which was inspired by the deduction of security guards, again raised concerns, and also gave legal researchers a comparative study. Yes. So, what is the difference between the network software and the traditional computer software How can the copyright owner of the network software better maintain its own right How to effectively save the widespread network software infringement The current legal system of our country should carry on the reform in order to follow the development of the times All the questions, such as the show, need to be explored by the researchers. The computer software has become one of the most important components in the information industry, and the regulation of the law has been developed for several decades. In the case of network software, due to the late appearance of the network software, the legal researchers have not been brought to the attention of the legal researchers, and the relevant laws do not On the basis of summarizing the computer software and the relevant literature in the field of network tort, in the first chapter, the author and the definition of the network software are given. At the same time, the reader should note that the network software to be discussed in this paper, as well as its definition, is limited to a certain extent, not all the software related to the network, its connotation and the extension are relative to each other. As the network software has the characteristics of some general computer software, the exercise of its rights is also related to the latter. In the second chapter, the paper discusses the capability of several copyright which may be infringed in the field of network software, and makes the right of copying, modifying, issuing right and information network communication right in the field of network software. In this paper, the two cases mentioned in this paper are analyzed in this paper, and the similarities and differences between the buckle bodyguard and the bug QQ are analyzed, and the tort composition in the area of network software is pointed out. The key point of this paper is to point out which capabilities may be violated and not enough, and the absence of the legal system makes the copyright owner of the network software do not have the systematic consideration and arrangement of how to protect the copyright of the copyright owner. In the third chapter, the author I believe that these suggestions can be more perfect for the copyright owners of the network software to safeguard their rights In the same way, under the true background of the rule of law, software developers do not know how to do so to avoid infringement for maintenance The right of the software to be developed. The fourth chapter is to the question At the same time, in the case of the tort relief of the network software, the author combined the case to the three kinds of relief methods of the copyright infringement relief of the network software Detailed discussion and evaluation. It is hoped that these suggestions can be the sound of the legal system in the network software field of our country and the development of the network software
【學(xué)位授予單位】:復(fù)旦大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2011
【分類號】:D923.41
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 趙俊林;計算機(jī)軟件法律保護(hù)模式研究[J];當(dāng)代法學(xué);2003年04期
2 王遷;;網(wǎng)絡(luò)環(huán)境中版權(quán)直接侵權(quán)的認(rèn)定[J];東方法學(xué);2009年02期
3 王遷;P2P軟件提供者的幫助侵權(quán)責(zé)任——美國最高法院Grokster案判決評析[J];電子知識產(chǎn)權(quán);2005年09期
4 付遷;;法不容情——騰訊QQ珊瑚蟲版軟件侵權(quán)案之管見[J];中國發(fā)明與專利;2008年02期
5 王遷;;論“網(wǎng)絡(luò)傳播行為”的界定及其侵權(quán)認(rèn)定[J];法學(xué);2006年05期
6 梅術(shù)文;;信息網(wǎng)絡(luò)傳播權(quán)合理使用的立法完善[J];法學(xué);2008年06期
7 孟楊;;對兩起信息網(wǎng)絡(luò)傳播侵權(quán)訴訟案的比較研究[J];法制與社會;2009年06期
8 王遷;;論著作權(quán)法中“發(fā)行”行為的界定——兼評“全球首宗BT刑事犯罪案”[J];華東政法學(xué)院學(xué)報;2006年03期
9 陳乃蔚,宋海;計算機(jī)軟件侵權(quán)的認(rèn)定[J];上海交通大學(xué)學(xué)報(社會科學(xué)版);1999年04期
10 王遷;論網(wǎng)絡(luò)環(huán)境中發(fā)行權(quán)的適用[J];知識產(chǎn)權(quán);2001年04期
相關(guān)重要報紙文章 前1條
1 馮曉青;[N];中國知識產(chǎn)權(quán)報;2003年
相關(guān)碩士學(xué)位論文 前7條
1 肖波;互聯(lián)網(wǎng)環(huán)境下計算機(jī)軟件的侵權(quán)與保護(hù)[D];西南大學(xué);2006年
2 薛秀玉;計算機(jī)軟件著作權(quán)侵權(quán)的認(rèn)定[D];西南政法大學(xué);2007年
3 秦健峰;網(wǎng)絡(luò)游戲外掛相關(guān)法律研究與對策[D];清華大學(xué);2007年
4 陳兆勇;網(wǎng)絡(luò)游戲外掛的法律問題研究[D];西南政法大學(xué);2009年
5 封愛青;計算機(jī)軟件最終用戶侵權(quán)責(zé)任研究[D];山東大學(xué);2009年
6 葛曉春;惡意軟件的民事法律規(guī)制[D];南京理工大學(xué);2010年
7 孫桂娟;關(guān)于“流氓軟件”的案例分析[D];蘭州大學(xué);2010年
,本文編號:2499162
本文鏈接:http://sikaile.net/shekelunwen/chubanfaxing/2499162.html