This document discusses some of the key legal aspects related to research, including intellectual property rights, copyright, patents, plagiarism, open access, and free software licenses. It provides an overview of concepts such as copyright and its duration, patentability requirements, fair use exemptions, and copyleft licensing. Examples are given around software patents, the IEEE copyright form, and definitions of free software and open access. The document is intended as a basic introduction and overview of legal topics for researchers, and notes that specific legal advice should come from a lawyer.
IPR: Legal Issues in Research Data Collection and Sharing by EUDAT | www.euda...EUDAT
| www.eudat.eu | v1.0, June 2014 - The development of skills and competence to manage IPR and leverage its influence requires increasing focus. However, how much detail do you know? Take copyright for example, What exactly is protected?, What rights are reserved and for how long? This presentation addresses such questions on copyright and other topics such as Database Right, Trade Secret and Licensing.
Who is it for?: Researchers, Data Managers, General public.
Information technologies and legislation part.1: Intellectual PropertyMorgan Magnin
This material comes from the course I give to 2nd year-students at Centrale Nantes who follow the "Webstrategies and development" program. During this semester long program, students have the opportunity to develop a sound understanding of current web marketing techniques and to put these techniques into practice through real professional missions undertaken with our partners. All courses are given in English. More information on our blog: https://pedagogie.ec-nantes.fr/web-sd/
This courses aims to give an overview of worldwide legislation with regard to the creation of websites. During the first part of my course (corresponding to these slides), I give the basics about intellectual property (patent, trademark, copyright, digital rights management). Next I focus on database rights, software licenses and personal data processing (have a look to my other slideshows).
Learning Objective: Develop an understanding of how an invention can be protected.
At some point in your life, a light bulb above your head shines bright, as you believe you’ve come up with something brilliant, namely an invention. But what now? How do you protect it?
Whether you want to produce and market your invention on your own, or license it to another company, the only way to profit from your invention and to guarantee that no one will steal your idea is to seek patent protection. This seminar will help you gain an understanding of patents and the process of pursuing patent protection of your inventions.
At the end of this seminar, participants will be able to:
a. Explore the pros and cons of pursuing patent protection.
b. Understand the patent application process.
c. Identify options for patent monetization.
IPR: Legal Issues in Research Data Collection and Sharing by EUDAT | www.euda...EUDAT
| www.eudat.eu | v1.0, June 2014 - The development of skills and competence to manage IPR and leverage its influence requires increasing focus. However, how much detail do you know? Take copyright for example, What exactly is protected?, What rights are reserved and for how long? This presentation addresses such questions on copyright and other topics such as Database Right, Trade Secret and Licensing.
Who is it for?: Researchers, Data Managers, General public.
Information technologies and legislation part.1: Intellectual PropertyMorgan Magnin
This material comes from the course I give to 2nd year-students at Centrale Nantes who follow the "Webstrategies and development" program. During this semester long program, students have the opportunity to develop a sound understanding of current web marketing techniques and to put these techniques into practice through real professional missions undertaken with our partners. All courses are given in English. More information on our blog: https://pedagogie.ec-nantes.fr/web-sd/
This courses aims to give an overview of worldwide legislation with regard to the creation of websites. During the first part of my course (corresponding to these slides), I give the basics about intellectual property (patent, trademark, copyright, digital rights management). Next I focus on database rights, software licenses and personal data processing (have a look to my other slideshows).
Learning Objective: Develop an understanding of how an invention can be protected.
At some point in your life, a light bulb above your head shines bright, as you believe you’ve come up with something brilliant, namely an invention. But what now? How do you protect it?
Whether you want to produce and market your invention on your own, or license it to another company, the only way to profit from your invention and to guarantee that no one will steal your idea is to seek patent protection. This seminar will help you gain an understanding of patents and the process of pursuing patent protection of your inventions.
At the end of this seminar, participants will be able to:
a. Explore the pros and cons of pursuing patent protection.
b. Understand the patent application process.
c. Identify options for patent monetization.
Plenary Paper delivered at the 12th Congress of Southeast Asian Librarians on Information Resources Empowerment: Enhancing Knowledge Heritage, held at the International Convention Center, Berakas, Brunei Darussalam, 2003 Oct 19
Glyn Moody - European Unitary Patent Court and software patentsglynmoody
Patents are not granted in Europe for computer programs "as such". But they are granted for the mysterious "computer-implemented inventions". Put that together with the imminent Unitary Patent Court that will allow companies in 25 EU countries to be sued using just a single patent, plus a shift from national jurisdictions to one overseen by the software patent-friendly European Patent Office, and you have a recipe for disaster. US-style patent trolls, which have cost the US economy hundreds of billions of dollars (details included) are probably coming to Europe soon.
Plenary Paper delivered at the 12th Congress of Southeast Asian Librarians on Information Resources Empowerment: Enhancing Knowledge Heritage, held at the International Convention Center, Berakas, Brunei Darussalam, 2003 Oct 19
Glyn Moody - European Unitary Patent Court and software patentsglynmoody
Patents are not granted in Europe for computer programs "as such". But they are granted for the mysterious "computer-implemented inventions". Put that together with the imminent Unitary Patent Court that will allow companies in 25 EU countries to be sued using just a single patent, plus a shift from national jurisdictions to one overseen by the software patent-friendly European Patent Office, and you have a recipe for disaster. US-style patent trolls, which have cost the US economy hundreds of billions of dollars (details included) are probably coming to Europe soon.
IT Innovation: Intellectual property issues in artifical intelligence and vir...Tom Webster
A ‘computer’ cannot be an ‘author’ under the Copyright Act, meaning, works created by computers do not attract copyright protection.
There is a vast dichotomy between what the relevant legislation states in Australia, and what could become common practice in the not so distant future. Legislative reform is required to adapt to the way technology is evolving at a rapid pace.
These are the slides of a presentation on IP and technology arbitration given at the annual meeting of the Dutch Association of Patent Attorneys given at April 11, 2014.
Are we burying our heads in the sand? Exploring issues around intellectual pr...Jennifer Cham
The threat of patent infringement to businesses is perhaps better known in industries such as pharmaceuticals, engineering and manufacturing. However, in the User Experience (UX) field there are potential issues around patent infringement that, as practitioners, we need to be aware of. This session (originally a discussion held at UX Cambridge 2014) aimed to increase awareness and start a discussion amongst UX professionals regarding intellectual property issues that may impact our work.
The session was an open discussion, where participants shared their experiences and concerns and posed questions for further exploration. The outcome was a sketchnote (https://www.flickr.com/photos/97823772@N02/15058945187/in/set-72157647610886191) which summarised the discussion. This was created by Chris Spalton, https://twitter.com/ChrisSpalton)
[Please note: we are not intellectual property legal experts. Examples are from our own experience in this area, and secondary research sources. The main aim was to start a conversation and to identify the gaps in our knowledge in this potentially important area.]
Intellectual Property is a Part of Social and Professional Issues in Computing. Intellectual Property relates to intangible creative work that is protected for the creator's use under the law as a patent, copyright, trademark, or trade secret. There are four types of protection in intellectual property Copyright, Patent, Trademark and Trade Secret.
https://www.bardehle.com
https://www.bardehle.com/en/team/karl-christof
In an online event organized by German-American Business Council of Boston, Christof Karl of BARDEHLE PAGENBERG talked with his US colleagues Susan Glovsky and Alexander Adams of Hamilton Brook Smith Reynolds about IP issues which entrepreneurs and managers of technology-oriented companies should keep in mind. Do you have a plan for securing your innovations through patents? How can you avoid pitfalls that can forfeit your patent rights? In which situations would it be better to protect the innovations as secret know-how rather than to patent them?
These are the slides for my presentation to the Menai Science Park Enterprise Hub on 30 June 2020.
This presentation explains what is meant by intellectual property and why it is important to business.
It considers different types of IP:
- patents
- trade marks
- registered designs
- copyrights and related rights,
I talked about related rights and how they can be obtained and rights that arise automatically,
I discussed enforcement and sources of further information including the Business and IP Centres at the British Library and Liverpool.
Finally, I mentioned the network of IP experts to assist M-SParc tenants and others in North Wales.
These are the slides for the presentation that I was due to give to the makers at FFPWS on 1 April. FFIWS is a maker space in Porthmadog with laser cutters, 3D printers and all sorts of other impressive kits. As my visit has had to be cancelled I have decided to deliver my presentation online. If there is still enough interest in Porthmadog (or anywhere else in the world for that matter) I will give a fee webinar on 15 April 2020 on IP Law for Makers, The IP law in question will be the law of Wales and England which will not be exactly the same elsewhere but most of the presentation should be relevant more or less anywhere.
Design of Software for Embedded SystemsPeter Tröger
The course covers basic principles of software design and development for embedded systems, with a special emphasis on automotive systems. Topics included in the slide deck are:
- Introduction and basic concepts
- Functional and non-functional requirements on embedded software
- Real-time execution environments and operating systems
- Programming languages and middleware for embedded systems
- Model-driven development for embedded systems
- Latest trends from research and practice
Human users should not be forced to edit XML documents. Sometimes, they may want to read it.
The presentation persists some arguments I stated about this topic again and again in the past. Discussions and opinions are more than welcome.
Earliest Galaxies in the JADES Origins Field: Luminosity Function and Cosmic ...Sérgio Sacani
We characterize the earliest galaxy population in the JADES Origins Field (JOF), the deepest
imaging field observed with JWST. We make use of the ancillary Hubble optical images (5 filters
spanning 0.4−0.9µm) and novel JWST images with 14 filters spanning 0.8−5µm, including 7 mediumband filters, and reaching total exposure times of up to 46 hours per filter. We combine all our data
at > 2.3µm to construct an ultradeep image, reaching as deep as ≈ 31.4 AB mag in the stack and
30.3-31.0 AB mag (5σ, r = 0.1” circular aperture) in individual filters. We measure photometric
redshifts and use robust selection criteria to identify a sample of eight galaxy candidates at redshifts
z = 11.5 − 15. These objects show compact half-light radii of R1/2 ∼ 50 − 200pc, stellar masses of
M⋆ ∼ 107−108M⊙, and star-formation rates of SFR ∼ 0.1−1 M⊙ yr−1
. Our search finds no candidates
at 15 < z < 20, placing upper limits at these redshifts. We develop a forward modeling approach to
infer the properties of the evolving luminosity function without binning in redshift or luminosity that
marginalizes over the photometric redshift uncertainty of our candidate galaxies and incorporates the
impact of non-detections. We find a z = 12 luminosity function in good agreement with prior results,
and that the luminosity function normalization and UV luminosity density decline by a factor of ∼ 2.5
from z = 12 to z = 14. We discuss the possible implications of our results in the context of theoretical
models for evolution of the dark matter halo mass function.
This pdf is about the Schizophrenia.
For more details visit on YouTube; @SELF-EXPLANATORY;
https://www.youtube.com/channel/UCAiarMZDNhe1A3Rnpr_WkzA/videos
Thanks...!
Multi-source connectivity as the driver of solar wind variability in the heli...Sérgio Sacani
The ambient solar wind that flls the heliosphere originates from multiple
sources in the solar corona and is highly structured. It is often described
as high-speed, relatively homogeneous, plasma streams from coronal
holes and slow-speed, highly variable, streams whose source regions are
under debate. A key goal of ESA/NASA’s Solar Orbiter mission is to identify
solar wind sources and understand what drives the complexity seen in the
heliosphere. By combining magnetic feld modelling and spectroscopic
techniques with high-resolution observations and measurements, we show
that the solar wind variability detected in situ by Solar Orbiter in March
2022 is driven by spatio-temporal changes in the magnetic connectivity to
multiple sources in the solar atmosphere. The magnetic feld footpoints
connected to the spacecraft moved from the boundaries of a coronal hole
to one active region (12961) and then across to another region (12957). This
is refected in the in situ measurements, which show the transition from fast
to highly Alfvénic then to slow solar wind that is disrupted by the arrival of
a coronal mass ejection. Our results describe solar wind variability at 0.5 au
but are applicable to near-Earth observatories.
THE IMPORTANCE OF MARTIAN ATMOSPHERE SAMPLE RETURN.Sérgio Sacani
The return of a sample of near-surface atmosphere from Mars would facilitate answers to several first-order science questions surrounding the formation and evolution of the planet. One of the important aspects of terrestrial planet formation in general is the role that primary atmospheres played in influencing the chemistry and structure of the planets and their antecedents. Studies of the martian atmosphere can be used to investigate the role of a primary atmosphere in its history. Atmosphere samples would also inform our understanding of the near-surface chemistry of the planet, and ultimately the prospects for life. High-precision isotopic analyses of constituent gases are needed to address these questions, requiring that the analyses are made on returned samples rather than in situ.
We present you a part of our Tampere University's team - FHAIVE!
Besides producing excellent science, they are in charge or coordinating this project as well Tampere University, Faculty of Medicine and Health Technology.
(May 29th, 2024) Advancements in Intravital Microscopy- Insights for Preclini...Scintica Instrumentation
Intravital microscopy (IVM) is a powerful tool utilized to study cellular behavior over time and space in vivo. Much of our understanding of cell biology has been accomplished using various in vitro and ex vivo methods; however, these studies do not necessarily reflect the natural dynamics of biological processes. Unlike traditional cell culture or fixed tissue imaging, IVM allows for the ultra-fast high-resolution imaging of cellular processes over time and space and were studied in its natural environment. Real-time visualization of biological processes in the context of an intact organism helps maintain physiological relevance and provide insights into the progression of disease, response to treatments or developmental processes.
In this webinar we give an overview of advanced applications of the IVM system in preclinical research. IVIM technology is a provider of all-in-one intravital microscopy systems and solutions optimized for in vivo imaging of live animal models at sub-micron resolution. The system’s unique features and user-friendly software enables researchers to probe fast dynamic biological processes such as immune cell tracking, cell-cell interaction as well as vascularization and tumor metastasis with exceptional detail. This webinar will also give an overview of IVM being utilized in drug development, offering a view into the intricate interaction between drugs/nanoparticles and tissues in vivo and allows for the evaluation of therapeutic intervention in a variety of tissues and organs. This interdisciplinary collaboration continues to drive the advancements of novel therapeutic strategies.
FAIRSpectra - Towards a common data file format for SIMS imagesAlex Henderson
Presentation from the 101st IUVSTA Workshop on High performance SIMS instrumentation and machine learning / artificial intelligence methods for complex data.
This presentation describes the issues relating to storing and sharing data from Secondary Ion Mass Spectrometry experiments, and some potential solutions.
Cancer cell metabolism: special Reference to Lactate PathwayAADYARAJPANDEY1
Normal Cell Metabolism:
Cellular respiration describes the series of steps that cells use to break down sugar and other chemicals to get the energy we need to function.
Energy is stored in the bonds of glucose and when glucose is broken down, much of that energy is released.
Cell utilize energy in the form of ATP.
The first step of respiration is called glycolysis. In a series of steps, glycolysis breaks glucose into two smaller molecules - a chemical called pyruvate. A small amount of ATP is formed during this process.
Most healthy cells continue the breakdown in a second process, called the Kreb's cycle. The Kreb's cycle allows cells to “burn” the pyruvates made in glycolysis to get more ATP.
The last step in the breakdown of glucose is called oxidative phosphorylation (Ox-Phos).
It takes place in specialized cell structures called mitochondria. This process produces a large amount of ATP. Importantly, cells need oxygen to complete oxidative phosphorylation.
If a cell completes only glycolysis, only 2 molecules of ATP are made per glucose. However, if the cell completes the entire respiration process (glycolysis - Kreb's - oxidative phosphorylation), about 36 molecules of ATP are created, giving it much more energy to use.
IN CANCER CELL:
Unlike healthy cells that "burn" the entire molecule of sugar to capture a large amount of energy as ATP, cancer cells are wasteful.
Cancer cells only partially break down sugar molecules. They overuse the first step of respiration, glycolysis. They frequently do not complete the second step, oxidative phosphorylation.
This results in only 2 molecules of ATP per each glucose molecule instead of the 36 or so ATPs healthy cells gain. As a result, cancer cells need to use a lot more sugar molecules to get enough energy to survive.
Unlike healthy cells that "burn" the entire molecule of sugar to capture a large amount of energy as ATP, cancer cells are wasteful.
Cancer cells only partially break down sugar molecules. They overuse the first step of respiration, glycolysis. They frequently do not complete the second step, oxidative phosphorylation.
This results in only 2 molecules of ATP per each glucose molecule instead of the 36 or so ATPs healthy cells gain. As a result, cancer cells need to use a lot more sugar molecules to get enough energy to survive.
introduction to WARBERG PHENOMENA:
WARBURG EFFECT Usually, cancer cells are highly glycolytic (glucose addiction) and take up more glucose than do normal cells from outside.
Otto Heinrich Warburg (; 8 October 1883 – 1 August 1970) In 1931 was awarded the Nobel Prize in Physiology for his "discovery of the nature and mode of action of the respiratory enzyme.
WARNBURG EFFECT : cancer cells under aerobic (well-oxygenated) conditions to metabolize glucose to lactate (aerobic glycolysis) is known as the Warburg effect. Warburg made the observation that tumor slices consume glucose and secrete lactate at a higher rate than normal tissues.
Cancer cell metabolism: special Reference to Lactate Pathway
Law in research
1. Some Legal Aspects of Research
Peter Tröger
Computer scientist, not lawyer !
Blekinge Institute of Technology
Mai 2008
2. Law Aspects | Research Methodology PT 2008
Law Basics
• Civil jurisdiction vs. criminal jurisdiction
• National law vs. international agreements
• Common sense vs. lawyers
• Some relevant aspects in research
• Intellectual property rights
• Copyright, patents, trademarks, licensing, ...
• There is more ...
• No suitor, no judge
• Real legal advice comes from a lawyer
2
3. Law Aspects | Research Methodology PT 2008
Intellectual Property Rights
• Protection of intangible assets of a (jurisdictional) person
• Result of mental production
• Protection of commercial rights (making money with it)
• Comes into live after finishing with the patent office
• Protection of copyright (to decide over the expression of the idea)
• Sources for regulations
• National law
• European law (treating a EU-foreigner as a native inhabitant)
• International agreements (Bern agreement, TRIPS, ...)
3
4. Law Aspects | Research Methodology PT 2008
Basic Terms
• Protective right
• Absolute right with only national effect
• Examples: trademark, patent, rights based on unique design, ...
• Creates the right for a monopol -> conflict with competition law
• Subject of protection
• Innovation to be protected, the intangible asset
• Bailee
• Creator of the asset or his legal successor
• Beneficiary
• Contract partner that gets usage rights for the innovation
4
5. Law Aspects | Research Methodology PT 2008
Basic Terms
• Effect of the protective right
• Exploitation activities only legal for the bailee
• Exhaustion of a protective right
• Bailee can no longer refer to his protective right
• License agreement == usage agreement
• Granting of a usage right in return of a reward (e.g. license fee)
• Protective law
• Granting of absolute exploitation rights in a limited time period
5
6. Law Aspects | Research Methodology PT 2008
Protection Duration
• Example Germany
• Based on yearly fee
• 20 years for patents
• 10 years for industrial designs
• 25 years for pattern
• Unlimited for trademarks
• 70 years after death for copyright
6
7. Law Aspects | Research Methodology PT 2008
Patenting Intellectual Property
• Ways to get a patent
• National patent, european patent
• International patent (patent cooperation treaty)
• Administrative act - once valid, stays valid until termination
• Investigation of patentability is mandatory on EU and international level
• Patent and non-patent literature (scientific articles, journals, ...)
• Patent office databases, commercial offers (google.com/patents)
• Patentable asset = unique invention
• Final product
• Procedure (manufacturing method, working method)
7
8. Law Aspects | Research Methodology PT 2008
Patents
• Properties of a true invention
• Enrichment of technology and benefit for the general public
• Must be finished, repeatable, usable, useful and doable
• Patentability of an invention
• New; based on innovative activity; commercially exploitable
• Exceptions to patentability
• Discoveries, scientific theories, mathematical methods
• Plans and rules for commercial or mental activities, including games
• Computer programs, excluding algorithms with technical character
8
9. Law Aspects | Research Methodology PT 2008
Example: PGP
• RSA encryption algorithm for PKI covered by US patent until 2000
• US version and international version
• Leaded to implementation change by MIT („legal_kludge=on“)
• IDEA symmetric encryption algorithm covered by European patent
• Runs out in 2011, free for non-commercial use
• Demands licensing of PGP for commercial usage
• Leaded to EIGamal usage in PGP 5, which is free of patents
• Distribution problem solved by splitting up algorithms and program
9
10. Law Aspects | Research Methodology PT 2008
Patent Infringement
• Patent holder can resist against patent infringement (example Germany)
• Sue for injunction action
• Sue for compensation payment
• Law violation
• Guiltiness (intent, negligence)
• Damage really exists
• Causality (guiltiness -> law violation -> damage)
• Warning letter („Abmahnung“)
• Territorial restriction
10
11. Law Aspects | Research Methodology PT 2008
Software Patent
• Software is not patentable in Europe
• European parliament dropped an intended directive in 2005
• Hot discussions - example Xerox Labs (nosoftwarepatents.com)
• Nearly 30.000 european software patents according to FFI
• Software is patentable in the US since 1980 (case law - Diamond vs. Dier)
• Territorial restriction still holds
• But: For every software the copyright applies
• Protects the specific piece of code, but not the underlying idea
• Examples: progress bar (IBM), LZW compression (Unisys),
double click (Microsoft), electronic cart (Sun)
11
13. Law Aspects | Research Methodology PT 2008
Copyright on Intellectual Property
• Legal concept implemented by national laws
• One of the intellectual property rights, originated in printing
• Relates to any expressible form of idea
• Anglo-american version vs. European version
• Give the creator of original work exclusive rights for it
• Always a natural person, regardless of age
• Lasts between 50 and 100 years after dead
• Covers the expression of an idea, not the idea itself
• Protects the rights of the creator, but no blockade effect as with patents
• Ensures adequate compensation, exploitation rights and creator rights
13
14. Law Aspects | Research Methodology PT 2008
Copyright Effects
• Creator rights
• Publication right (IF and HOW)
• Right on acknowledgement of creator-ship
• Right to prohibit distortion of original work
• Exploitation rights
• Exhibition, duplication, dissemination, broadcasting, presentation,
publication, sending, second use
• All rights are transferable by legal contract
• Creator-ship is not transferable in Europe (employee contract)
• Aside from software
14
15. Law Aspects | Research Methodology PT 2008
Copyrighted Material
• Spoken work
• Literature work (poems, plays)
• Scientific, technical and practical written work
• Computer programs (including design-time material)
• Music work, pantomimic work, art work, photo work, movie work
• Industrial designs: Cars, machines, ....
• Research: Papers, books, thesis's, drawings, diagrams, fonts, ...
• Taking parts of other peoples work is by default a crime
• Fair use doctrine relaxes this
15
16. Law Aspects | Research Methodology PT 2008
IEEE Copyright Form
„The undersigned hereby assigns to the Institute of Electrical and Electronics
Engineers, Incorporated (the “IEEE”) all rights under copyright that may exist
in and to the above Work, and any revised or expanded derivative works
submitted to the IEEE by the undersigned based on the Work. The
undersigned hereby warrants that the Work is original and that he/she is
the author of the Work; to the extent the Work incorporates text passages,
figures, data or other material from the works of others, the undersigned has
obtained any necessary permissions.“
„It is the formal policy of the IEEE to own the copyrights to all copyrightable
material in its technical publications and to the individual contributions
contained therein, in order to protect the interests of the IEEE, its authors and
their employers, and, at the same time, to facilitate the appropriate re-use of
this material by others. The IEEE distributes its technical publications
throughout the world and does so by various means such as hard copy,
microfiche, microfilm, and electronic media. It also abstracts and may translate
its publications, and articles contained therein, for inclusion in various
compendiums, collective works, databases and similar publications. „
16
17. Law Aspects | Research Methodology PT 2008
Limits of Copyright (Germany)
• Creator rights can be restricted in some situations
• Public safety
• Public information
• Public speeches, newspaper articles, radio comments, ...
• Public play for social events and reasons
• Public access for teaching and research
• Copying for private use (e.g. learning efforts)
• However: does not free from some basic obligations
(citation, minimum compensation)
17
18. Law Aspects | Research Methodology PT 2008
Copyleft
• Form of licensing, based on copyright rules
• Allow reproduction, adoption, and distribution of authors work
• License gives each person the authors freedoms
• Feature of some of the free software licenses (GNU GPL)
• „Weak copyleft“ free software license (Mozilla Public license)
• No all derived works inherit the copyleft license
• Non-copyleft free software license (Apache license, X11 license, BSD license)
• Freedom to create proprietary software from it
18
19. Law Aspects | Research Methodology PT 2008
Example: Free Software
Free software” is a matter of liberty, not price. To understand the concept, you should
think of “free” as in “free speech,” not as in “free beer.”
Free software is a matter of the users' freedom to run, copy, distribute, study, change
and improve the software. More precisely, it refers to four kinds of freedom, for the
users of the software:
• The freedom to run the program, for any purpose (freedom 0).
• The freedom to study how the program works, and adapt it to your needs
(freedom 1). Access to the source code is a precondition for this.
• The freedom to redistribute copies so you can help your neighbor (freedom 2).
• The freedom to improve the program, and release your improvements to the
public, so that the whole community benefits (freedom 3). Access to the source
code is a precondition for this.
19
20. Law Aspects | Research Methodology PT 2008
Law Problems with Free Software
• Software patents
• Publisher of free software already gave up his rights - safe usage
• But: Free software might use patented code
• Copyright
• Also free software must consider other peoples copyright
• Example: Mono framework
• Free software license is still a license
• Violation as any other law case (gpl-violations.org)
• Difference between free software and open source
20
21. Law Aspects | Research Methodology PT 2008
Example: Open Access
• Group of initiatives for free, immediate, permanent, full-text online access to
scientific and scholarly material
• Limited copyright and licensing restrictions
• Concept is clear, but economics remain unsolved
• Self-archiving (reliability, economics)
• Either keeping own public copy of document, or submitting to OA journal
• www.doaj.org
• Discussion about mandatory OA publishing for funded governmental projects
• Government would directly influence market competition (competition law)
• Original creator decides upon the license - Creative Commons
21
22. Law Aspects | Research Methodology PT 2008
Example: Creative Commons
• Non-profit organization founded by Lawrence Lessing
• Publishes different licenses which restrict only some (or no) aspects
• Mostly specific to US jurisdiction
• Highly debated in the community
• Copy, distribute, display, and perform rights for material
• Creators set conditions, which lead to appropriate licence
• „Attribution“ in the way the originator requests
• „Noncommercial“ purposes only
• „No derivative works“, only verbatim copies
• „Share alike“ distribution of derivative work
22
23. Law Aspects | Research Methodology PT 2008
Example: Plagiarism
• Plagiarism == theft of intellectual property
• In science already with paraphrasing (in contrast to literature)
• Document itself makes no crime, but the copyright of the original
• Stronger than misuse of sources (carelessly or inadequately citing ideas)
• Challenges [Purdue OWL 2007]
• Develop text on what have being said, but write something original
• Rely on experts and authorities, but improve and/or disagree with them
• Give credits to researchers before you, but make own contribution
• Build upon what you hear and read, but use your own words
23
24. Law Aspects | Research Methodology PT 2008
Plagiarism in US Law
• U.S. copyright laws - use another‘s original words as your own
• Protection of intellectual property (original ideas and information)
• Excludes compilations of available information, government work or work in
the public domain („common knowledge“)
• (C) symbol mandatory until 1989
• Amount of material is not relevant for copyright violation
• „Fair use“ laws allow usage with proper citation
• Nature of use (copy vs. transform), amount, effect of use on original
• Possible penalties: $100 - $50.000, one year in jail
• Intention doesn‘t matter, but „good faith defense“ is allowed
24
25. Law Aspects | Research Methodology PT 2008
Referencing (Conny Johansson)
• Avoid plagiarism
• If you use ideas, thoughts, words, figures, diagrams, results and so on from
others you must tell where you got it from!
• Plagiarism is a serious academic offense and a copyright violation
• Cultural difference is no excuse!!!
• Plagiarism will result in grade Fail and can be reported
• Use quotes sparingly. Too many quotes will result in Fail
• If I want to read what others have said, I’ll read their articles!
• You should present your interpretation of what has been said
25
26. Law Aspects | Research Methodology PT 2008
Referencing (Conny Johansson)
• Citing when presenting content
• A further potential problem is that stakeholders tend to think that everything
is critical [1][2].
• As shown by [Johansson et al. 2001] different stakeholders tend to have
different views of the importance of various quality requirements for a
system.
• When involving other aspects, such as cost, customer can change their
mind and high priority requirements may turn out to be less important if they
are very expensive to satisfy (Ruheet al. 2003).
• Quoting when directly copying from another source
• “The hardest single part of building a software system is deciding precisely
what to build. […] No other part of the work so cripples the resulting system
if done wrong. No other part is more difficult to rectify later”[5]
26
27. Law Aspects | Research Methodology PT 2008
Summary
• Intellectual property rights ensured by national laws
• Copyright, patents, trademarks, ...
• Copyright violation is a criminal activity
• Civil jurisdiction - Compensation payments
• Criminal jurisdiction - Prison (e.g. up to 5 years in Germany)
• Beside law aspects, scientific community is picky about the topic
• Citing and quoting best practices are described everywhere
• Your teacher was a student, too
• Other law aspects in research not discussed here
(ethics, disaster avoidance, computer fraud and abuse, ....)
27