网络软件著作权保护与侵权救济问题研究
[Abstract]:With the rapid development of science and technology, human civilization is moving forward. The emergence of the Internet has changed the almost all aspects of human life and brought more and more difficulties to the existing legal system, especially in the emerging computer software industry. With the introduction of the Internet, the network software has made a great challenge to the traditional legal system. In 2007, the QQ case of the bug was concluded by the author, Chen Shoufu, and there were a lot of problems for us to think and study. For instance, the court's civil judgment on the worm of the Internet has brought some enlightenment to the protection of the copyright of the network, why the case of the bug is transferred to the criminal procedure after the civil judgment, where the external store software similar to the bug QQ is, etc. In 2010, three years later, the fighting between 360 and Tencent, which was inspired by the deduction of security guards, again raised concerns, and also gave legal researchers a comparative study. Yes. So, what is the difference between the network software and the traditional computer software How can the copyright owner of the network software better maintain its own right How to effectively save the widespread network software infringement The current legal system of our country should carry on the reform in order to follow the development of the times All the questions, such as the show, need to be explored by the researchers. The computer software has become one of the most important components in the information industry, and the regulation of the law has been developed for several decades. In the case of network software, due to the late appearance of the network software, the legal researchers have not been brought to the attention of the legal researchers, and the relevant laws do not On the basis of summarizing the computer software and the relevant literature in the field of network tort, in the first chapter, the author and the definition of the network software are given. At the same time, the reader should note that the network software to be discussed in this paper, as well as its definition, is limited to a certain extent, not all the software related to the network, its connotation and the extension are relative to each other. As the network software has the characteristics of some general computer software, the exercise of its rights is also related to the latter. In the second chapter, the paper discusses the capability of several copyright which may be infringed in the field of network software, and makes the right of copying, modifying, issuing right and information network communication right in the field of network software. In this paper, the two cases mentioned in this paper are analyzed in this paper, and the similarities and differences between the buckle bodyguard and the bug QQ are analyzed, and the tort composition in the area of network software is pointed out. The key point of this paper is to point out which capabilities may be violated and not enough, and the absence of the legal system makes the copyright owner of the network software do not have the systematic consideration and arrangement of how to protect the copyright of the copyright owner. In the third chapter, the author I believe that these suggestions can be more perfect for the copyright owners of the network software to safeguard their rights In the same way, under the true background of the rule of law, software developers do not know how to do so to avoid infringement for maintenance The right of the software to be developed. The fourth chapter is to the question At the same time, in the case of the tort relief of the network software, the author combined the case to the three kinds of relief methods of the copyright infringement relief of the network software Detailed discussion and evaluation. It is hoped that these suggestions can be the sound of the legal system in the network software field of our country and the development of the network software
【学位授予单位】:复旦大学
【学位级别】:硕士
【学位授予年份】:2011
【分类号】:D923.41
【参考文献】
相关期刊论文 前10条
1 赵俊林;计算机软件法律保护模式研究[J];当代法学;2003年04期
2 王迁;;网络环境中版权直接侵权的认定[J];东方法学;2009年02期
3 王迁;P2P软件提供者的帮助侵权责任——美国最高法院Grokster案判决评析[J];电子知识产权;2005年09期
4 付迁;;法不容情——腾讯QQ珊瑚虫版软件侵权案之管见[J];中国发明与专利;2008年02期
5 王迁;;论“网络传播行为”的界定及其侵权认定[J];法学;2006年05期
6 梅术文;;信息网络传播权合理使用的立法完善[J];法学;2008年06期
7 孟杨;;对两起信息网络传播侵权诉讼案的比较研究[J];法制与社会;2009年06期
8 王迁;;论著作权法中“发行”行为的界定——兼评“全球首宗BT刑事犯罪案”[J];华东政法学院学报;2006年03期
9 陈乃蔚,宋海;计算机软件侵权的认定[J];上海交通大学学报(社会科学版);1999年04期
10 王迁;论网络环境中发行权的适用[J];知识产权;2001年04期
相关重要报纸文章 前1条
1 冯晓青;[N];中国知识产权报;2003年
相关硕士学位论文 前7条
1 肖波;互联网环境下计算机软件的侵权与保护[D];西南大学;2006年
2 薛秀玉;计算机软件著作权侵权的认定[D];西南政法大学;2007年
3 秦健峰;网络游戏外挂相关法律研究与对策[D];清华大学;2007年
4 陈兆勇;网络游戏外挂的法律问题研究[D];西南政法大学;2009年
5 封爱青;计算机软件最终用户侵权责任研究[D];山东大学;2009年
6 葛晓春;恶意软件的民事法律规制[D];南京理工大学;2010年
7 孙桂娟;关于“流氓软件”的案例分析[D];兰州大学;2010年
,本文编号:2499162
本文链接:https://www.wllwen.com/shekelunwen/chubanfaxing/2499162.html