Computers and Technology

The World Wide Web, a network of electronically produced and interconnected (or "linked") sites, called pages, that are accessible via personal computer, raises legal issues about the rights of owners of intellectual property, notably those who create documents for inclusion on Web pages. Some of these owners of intellectual property claim that unless copyright law is strengthened, intellectual property on the Web will not be protected from copyright infringement. Web users, however, claim that if their ability to access information on Web pages is reduced, the Web cannot live up to its potential as an open, interactive medium of communication. The debate arises from the Web’s ability to link one document to another. Links between sites are analogous to the inclusion in a printed text of references to other works, but with one difference: the cited document is instantly retrievable by a user who activates the link. This immediate accessibility creates a problem, since current copyright laws give owners of intellectual property the right to sue a distributor of unauthorized copies of their material even if that distributor did not personally make the copies. If person A, the author of a document, puts the document on a Web page, and person B, the creator of another Web page, creates a link to A’s document, is B committing copyright infringement?
To answer this question, it must first be determined who controls distribution of a document on the Web. When A places a document on a Web page, this is comparable to recording an outgoing message on one’s telephone answering machine for others to hear. When B creates a link to A’s document, this is akin to B’s giving out A’s telephone number, thereby allowing third parties to hear the outgoing message for themselves. Anyone who calls can listen to the message; that is its purpose. While B’s link may indeed facilitate access to A’s document, the crucial point is that A, simply by placing that document on the Web, is thereby offering it for distribution. Therefore, even if B leads others to the document, it is A who actually controls access to it. Hence creating a link to a document is not the same as making or distributing a copy of that document. Moreover, techniques are already available by which A can restrict access to a document. For example, A may require a password to gain entry to A’s Web page, just as a telephone owner can request an unlisted number and disclose it only to selected parties. Such a solution would compromise the openness of the Web somewhat, but not as much as the threat of copyright infringement litigation. Changing copyright law to benefit owners of intellectual property is thus ill-advised because it would impede the development of the Web as a public forum dedicated to the free exchange of ideas.
Which one of the following most accurately expresses the main point of the passage?
(A) Since distribution of a document placed on a Web page is controlled by the author of that page rather than by the person who creates a link to the page, creating such a link should not be considered copyright infringement.
(B) Changes in copyright law in response to the development of Web pages and links are ill-advised unless such changes amplify rather than restrict the free exchange of ideas necessary in a democracy.
(C) People who are concerned about the access others may have to the Web documents they create can easily prevent such access without inhibiting the rights of others to exchange ideas freely.
(D) Problems concerning intellectual property rights created by new forms of electronic media are not insuperably difficult to resolve if one applies basic commonsense principles to these problems.
(E) Maintaining a free exchange of ideas on the Web offers benefits that far outweigh those that might be gained by a small number of individuals if a radical alteration of copyright laws aimed at restricting the Web’s growth were allowed.

answer
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 10:40, StephiUnicorni
When running anti-virus software , what could be a reason where recipitent is not guaranteed that data being streamed will not get interrupted?
Answers: 1
image
Computers and Technology, 22.06.2019 10:40, pbarbee3034
Nims is applicable to all stakeholders with incident related responsibilities. true or false
Answers: 1
image
Computers and Technology, 22.06.2019 22:40, shaylawaldo11
Write a program that defines symbolic names for several string literals (chars between quotes). * use each symbolic name in a variable definition. * use of symbolic to compose the assembly code instruction set can perform vara = (vara - varb) + (varc - vard); ensure that variable is in unsigned integer data type. * you should also further enhance your symbolic logic block to to perform expression by introducing addition substitution rule. vara = (vara+varb) - (varc+vard). required: debug the disassembly code and note down the address and memory information.
Answers: 3
image
Computers and Technology, 23.06.2019 06:20, kiarakagni
What is a point-in-time measurement of system performance?
Answers: 3
Do you know the correct answer?
The World Wide Web, a network of electronically produced and interconnected (or "linked") sites, cal...

Questions in other subjects:

Konu
Mathematics, 28.04.2021 22:00
Konu
Mathematics, 28.04.2021 22:00
Konu
History, 28.04.2021 22:00
Konu
Biology, 28.04.2021 22:00