IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Information Technology for Intellectual Property Protection: Interdisciplinary Advancements

Information Technology for Intellectual Property Protection: Interdisciplinary Advancements
Author(s)/Editor(s): Hideyasu Sasaki (Ritsumeikan University, Japan)
Copyright: ©2012
DOI: 10.4018/978-1-61350-135-1
ISBN13: 9781613501351
ISBN10: 1613501358
EISBN13: 9781613501368

Purchase

View Information Technology for Intellectual Property Protection: Interdisciplinary Advancements on the publisher's website for pricing and purchasing information.


Description

Information technology for intellectual property protection has become an increasingly important issue due to the expansion of ubiquitous network connectivity, which allows people to use digital content and programs that are susceptible to unauthorized electric duplication or copyright and patent infringement.

Information Technology for Intellectual Property Protection: Interdisciplinary Advancements contains multidisciplinary knowledge and analysis by leading researchers and practitioners with technical backgrounds in information engineering and institutional experience in intellectual property practice. Through its discussions of both engineering solutions and the social impact of institutional protection, this book fills a gap in the existing literature and provides methods and applications for both practitioners and IT engineers.



Preface

Information technology for intellectual property protection is a hot issue on the globe in the twenty first century because the recent expansion of network connectivity to the Internet known as ubiquitous allows people to enjoy a number of contents and programs stored in the digital forms which are fragile to unauthorized electric duplication or copyright and patent infringement. Institutional protection against digital infringement of multimedia intellectual property has been practically supported by technical solutions which digitally maneuver multimedia contents and programs in the Internet. The advent of new solutions in the area of information technology will allow easy access to the tools for multimedia intellectual property infringement as a negative side effect of innovation.

Facing the digital infringement of intellectual property of contents and programs as operating software of those contents, those in the fields of multimedia information engineering and its institutional operations have been aware of a need of a complete reference of past, current, and future trends of multimedia intellectual property protection from technology to institutions. This book offers a first reference on information technology for intellectual property protection with multidisciplinary knowledge and analyses which are given by leading researchers and practitioners with technical backgrounds in information engineering and institutional experiences in intellectual property practice.

INTRODUCTION

The principal concern of this book is to provide those in the information technology and its institutional practice with a series of concise and thorough references on a variety of issues of intellectual property protection and its proper solutions from the technical aspects. We discuss both technical and institutional solutions to intellectual property protection.

We thoroughly discuss institutional and technical issues and provide their solutions on information technology for intellectual property protection. The goal of this book is to design a complete reference in the area of information technology for intellectual property protection. Already published books just discuss institutional analyses without interdisciplinary insights by technical experts. Meanwhile, technical references only talk about engineering solutions without the social impact to institutional protection.  This book should fill in that gap to fulfill a great mission under which people in the field of information technology for intellectual property protection can discuss all the related issues and their solutions from both institutional and technical aspects.

CHALLENGES

The book brings in a first guidance or introductory reference to graduate students and students in professional schools, researchers, and practitioners in the areas of policy, engineering, and education, and provides them with mandatory knowledge bases on information technology for intellectual property protection. This kind of complete reference has not been available in the previous research publication. Its scholarly value is found in the brand new aspect of engineering solutions to intellectual property protection.

The content of the book is appealing to academia, in which those concerned about intellectual property management are eager to acquire sound techniques for intellectual property protection and fundamental knowledge on intellectual property rights in the frontiers of IT outbursts. Meanwhile, the book works as a technical milestone for research trends of intellectual property protection engineering in the target of the next ten years. Both practitioners with technical agendas and IT engineers of institutional agendas should appreciate this kind of interdisciplinary title.

ORGANIZATION

The book is organized into eleven chapters:

Chapter 1 discusses a robust watermarking technique which is based on distributed multi-resolution transforms (DMT) and singular value decomposition to improve the protection of images.

Chapter 2 discusses masking models and watermarking with two strategies for using a masking model in its application to a classic watermarking technique.

Chapter 3 discusses content encryption for secure communication and provides an overview of encryption technology from background, brief history, and requirement to research progress with general and special encryption algorithms.

Chapter 4 discusses damage-less watermark extraction for information hiding using non-linear feature extraction scheme trained on frequency domain.

Chapter 5 discusses user authentication in IP networks and introduces basic concepts of authentication and challenge-response frameworks.

Chapter 6 discusses query rewriting algorithms for access control to avoid resource-leakage in Semantic Web systems.

Chapter 7 discusses ticketing services using an auction system design for seat reservations at theaters.

Chapter 8 discusses legal protection of Web pages from the database perspective and refers to the World Intellectual Property Organization Copyright Treatments and European Directive 96/92/CE with its future trends.

Chapter 9 discusses a concept of knowledge commons and open content licenses from the perspective of communities.

Chapter 10 discusses a peer-to-peer architecture based on autonomous and self-emerging communities for managing collective knowledge.

Chapter 11 discusses a community creation using bookmarks as resources available in the Internet to make linkages between people of common interests.

GUIDELINE

The main target of prospective academic audience is graduate students who study computer science, information engineering, system engineering, information studies, management of information technology, and library science. Another target is students who are working towards professional degrees in business schools, management schools, MOT programs, public policy schools, law schools, or their equivalents. The other target is not a small number of practitioners including lawyers who counsel to IT companies as in-house counsels or at firms, chief information officers (CIOs), chief technology officers (CTOs), and chief risk management officers (CROs) in enterprises and the consultants in those related fields. Not the last but an important part of prospective audience is found in a large number of intellectual property related staff or administrators in universities and librarians.

The book is designed to offer a reference in the communities on information technology for intellectual property protection. The book has eleven chapters, which should be well allocated as assignments in class at Junior or Senior engineering of the undergraduate lectures, and master-level graduate schools.
More...
Less...

Reviews and Testimonials

The content of the book is appealing to academia, in which those concerned about intellectual property management are eager to acquire sound techniques for intellectual property protection and fundamental knowledge on intellectual property rights in the frontiers of IT outbursts. Meanwhile, the book works as a technical milestone for research trends of intellectual property protection engineering in the target of the next ten years. Both practitioners with technical agendas and IT engineers of institutional agendas should appreciate this kind of interdisciplinary title.

– Hideyasu Sasaki, Ritsumeikan University, Japan

Author's/Editor's Biography

Hideyasu Sasaki (Ed.)
Hideyasu Sasaki is a graduate from the University of Tokyo (1994). He received an LLM from the University of Chicago Law School (1999), a MS (2001) and a PhD (2003) in cybernetic knowledge engineering (media and governance) with honors from Keio University. He is an associate professor in the Department of Information Science and Engineering, Ritsumeikan University (Kyoto, Japan). He was an assistant professor at Keio University from 2003 to 2005. His research interests include knowledge management (decision making theory and strategic decision science decision) and organizational and collective intelligence computing (support systems and e-negotiation). He is an active co-chair at the ICIW-SLAECE Workshop program committee and a program committee member at ICADL, EJC, etc. He was granted with the ICIW/SLAECE Best Paper Award in 2008. He has published more than forty articles world-wide in the recent five years. Since 2000, he has been admitted to practice as an Attorney-and-Counselor at Law in the New York State Bar.

More...
Less...

Body Bottom