:::

詳目顯示

回上一頁
題名:可用於自動蒐集開放網路內容之著作權授權表達法
作者:廖先志
作者(外文):Liao, Hsien-Jyh
校院名稱:國立交通大學
系所名稱:資訊管理研究所
指導教授:楊千
學位類別:博士
出版日期:2009
主題關鍵詞:著作權網際網路圖書館軟體機器人自由內容copyrightInternetlibrarysoftware robotsfree content
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:58
網路圖書館在近幾年日益重要,而自由內容或開放內容這類概念的出現,也深深影響了網路圖書館典藏內容的豐富程度。但是著作權問題一直是成功建立網路圖書館的一個重要議題。實際上,如何合法而有效率地在網路上收集館藏是網路圖書館管理者的一項挑戰。雖然使用軟體機器人在網路上自動蒐集館藏是一種有效率的作法,但因為軟體機器人通常無法正確地自動判讀在網路上所蒐集的作品其著作權授權範圍為何,故使用該機器人之網路圖書館管理者在散佈或重製蒐集回來的作品時,會有潛藏的侵害著作權風險。因此,建立一種授權表達機制,一方面可以被作者用來充分表達著作權授權的範圍,一方面又可以自動地被軟體機器人判讀,是一項合理的解決方案。
本文試圖提出二種可以達到上述要求的授權表示方式:其中第一種是改良CC授權,稱為CCFE,另外一種則是Robots標籤(Robots.txt and Robots Meta tags)的擴充版。CCFE可以很輕易地使可被機器人自動判讀的授權資訊與任何格式的檔案連結在一起。另一方面,經由擴充部分的標籤以後,Robots標籤也可以負擔起表達著作權授權範圍的工作。
Internet libraries have been gradually popular in recent years. The appearances of “Free Content” and “Open Content” actually affect the amounts of Internet libraries materials. However, copyright is one of the most important issues of construction of a successful Internet library. In fact, how to legally collecting works in an economic way is a great challenge for librarians. Launching software robots to automatically acquire works on the Internet is efficient but with high potential legal risks, because the robots can not automatically comprehend the real copyright authorization scope. As a result, the libraries distribute or reproduce the collected works may infringe the copyrights of authors. To solve this problem, an ideal solution is designing a scheme which can be identified by software robots and can be used to fully express copyright authorization scope.
In this thesis, we propose two mechanisms which both fulfill the two requirements above: one is an expansion of the Creative Commons license, the CCFE, and another is a revised edition of the Robots.txt and Robots Meta tags. The CCFE can reduce one of the main disadvantages of the original CC: machine-readable metadata can not be easily embedded in digital files. In addition, with some extra commands and tags, the Robots.txt and Robots Meta tags can also be used to express copyright authorization scope as well.
1. ACM Digital Library (2009) Term of Usage: Digital Library, available at: http://www.acm.org/publications/policies/use (accessed July 3, 2007).
2. Bailey, C. W. (2006), “What is open access?”, available at: “http://www.digital-scholarship.org/cwb/WhatIsOA.pdf (accessed March 3, 2009).
3. BBC (2006), “BBC Creative Archive pilot has ended”, available at: http://creativearchive.bbc.co.uk/news/archives/2006/09/hurry_while_sto.html (accessed July 3, 2007).
4. Barker, P. (2001), “Creating the Digital Library. A Special Report from the Primary Research Group: Book Review” The Electronic Library, 19(3), 186-187.
5. Bolin, R. (2006), “Locking down the library: How copyright, contract, and cybertrapass block Internet archiving”, 33 Pepp. L. Rev. (2006) P761
6. Budapest Open Access Initiative (2002), "Budapest Open Access Initiative, 14 February 2002, available at: http://www.soros.org/openaccess/read.shtml (accessed March 3, 2009).
7. CcPublisher (2007), available at http://wiki.creativecommons.org/ CcPublisher (accessed Dec. 3, 2007)
8. ClikZ Network (2007), “U.S. Search Engine Rankings, September 2007”, available at http://www.clickz.com/3627655 (accessed Dec. 3, 2007)
9. Chau, M. and Chen, H. (2003), “Personalized and focused Web spiders”, in: Zhong, N., Liu, J., Yao, Y. (Ed.), Web intelligence, Springer-Verlag, pp.197-217.
10. Cheong, F.C., (1996), “Internet Agents: Spiders, Wanderers, Brokers, and Bots”, New Riders Publishing, Indiana, USA.
11. Citeseer.ist (1997) available at: http://citeseer.ist.psu.edu/ (accessed July 3, 2007).
12. CiteseerX.ist (2009) “Submit Documents to CiteseerX” available at: http://citeseerx.ist.psu.edu/submit (accessed Jan. 23rd, 2009).
13. Copiepresse (2007), “Copiepresse v. Google, Inc”., Copiepresse v. Google, Inc., No. 06/10.928/C (Feb. 2, 2007).
14. Copiepresse (2009), available at: http://www.copiepresse.be (accessed Feb 1st, 2009)
15. Conner, S. (1996), “An Extended Standard for Robot Exclusion”, available at: http://www.conman.org/people/spc/robots2.html (accessed March 11, 2008)
16. Cornish, W. and Llewelyn, D. (2003a), “Intellectual Property: Patents, Copyright, Trade Marks and Allied Rights”, Sweet & Maxwell, London, PP475
17. Cornish, W. and Llewelyn, D. (2003a), “Intellectual Property: Patents, Copyright, Trade Marks and Allied Rights”, Sweet & Maxwell, London, PP485
18. Creative Commons (2009q), “XMP”, available at http://wiki.creativecommons.org/XMP (accessed Feb. 3, 2009)
19. Digital Library Federation (1998), “A working definition of digital library”, available at: www.diglib.org/about/dldefinition.htm (accessed July 20, 2008)
20. Drott, M. C. (2002), “Indexing aids at corporate websites: the use of robots.txt and META tags”, Information Processing and Management, Vol 38 No2, pp209-219.
21. eBay (2000), “eBay Inc. v. Bidder’s Edge, Inc.”, 100 F. Supp. 2d 1058 (N.D. Cal. 2000).
22. Feigin, Eric J. (2004), “Architecture of Consent: Internet Protocols and Their Legal Implications”, Stanford Law Review, Feb 2004, pp901-942.
23. Feldman, S. (2004), “Interview: Brewster Kahle”, June 2004 Queue, Volume 2 Issue 4 P24-33
24. Field (2006), “Field v. Goolgle, Inc.”, 412 F. Supp. 2d 1106 (D. Nev. 2006), available at: http://w2.eff.org/IP/blake_v_google/ google_nevada_order.pdf (accessed March 11, 2008).
25. Fielding, R. and Gettys, J. and Mogul, J. C. and Frystyk, H. and Masinter, L. and Leach, P.; Berners-Lee, T. (1999). "Hypertext Transfer Protocol - HTTP/1.1”, available at http://www.w3.org/Protocols/rfc2616/rfc2616.html (accessed March 11, 2009).
26. Flickr (2004), available at http://www.flickr.com/creativecommons/ (accessed July 3, 2009)
27. Free Software Foundation (1999), “The Free Software Definition”, available at http://www.gnu.org/philosophy/free-sw.html (accessed July 3, 2008)
28. Free Software Foundation (2006), “Digital Restrictions Management and Treacherous Computing”, available at http://www.fsf.org/campaigns/drm.html (accessed July 3, 2008)
29. Free Software Foundation (2007), “GNU General Public License Version 3”, available at http://www.gnu.org/licenses/gpl-3.0.txt (accessed July 3, 2008)
30. Google (2008a), “How Google crawls my site?”, available at: http://www.google.com/support/webmasters/bin/topic.py?topic=8843 (accessed March 11, 2008)
31. Google (2008b), “Preventing content from appearing in Google search results”, available at: http://www.google.com/support/webmasters/bin/topic.py?topic=8459 (accessed March 11, 2008)
32. Google (2007c), “Google Advanced Search”, available at http://www.google.com/advanced_search?hl=en (accessed July 3, 2007)
33. Gorman, G. E. (2006), “Giving way to Google”, Online Information Review, Vol 30 Iss 2, pp97-99.
34. Hart, Michael S. (2004) “Gutenberg Mission Statement by Michael Hart”, available at: http://www.gutenberg.org/wiki/Gutenberg:Project_Gutenberg_Mission_Statement_by_Michael_Hart (accessed Jan. 3rd, 2009)
35. Hirtle, P. B. (2003), “Digital Preservation and Copyright”, available at: http://fairuse.stanford.edu/commentary_and_analysis/2003_11_hirtle.html (accessed Jan. 3rd, 2009)
36. Hundie, K. (2003), “Library operations and Internet resources”, The Electronic Library, Vol 21 No 6 pg. 555-564
37. International DOI Foundation (2008), “Frequently Asked Questions about the DOI System: 1. What is a DOI® name?", available at http://www.doi.org/faq.html#1 (accessed March. 3rd, 2009)
38. Internet Archive (2009), available at: http://www.archive.org/index.php (accessed Jan. 3rd, 2009).
39. Issuu (2009a), available at: http://issuu.com (accessed Jan. 3rd, 2009).
40. Issuu (2009b), “Copyright FAQ”, available at:http://issuu.com/about/copyright (accessed Jan. 3rd, 2009).
41. Jones, P. (2001), “Open (source)ing the doors for contributor-run digital libraries”, Communications of the ACM Vol 44 Iss 5 pp 45-46.
42. Koster, M. (1993), “Guidelines for Robot Writers”, available at: http://www.robotstxt.org/guidelines.html , (accessed March 11, 2008)
43. Koster, M. (1994),” A Standard for Robot Exclusion”, available at: http://www.robotstxt.org/orig.html, (accessed March 11, 2008)
44. Koster, M. (1995), “Robot in the Web: threat or treat?”, available at: http://www.robotstxt.org/wc/threat-or-treat.html, (accessed March 11, 2008)
45. Koster, M. (1996), “Evaluation of the standard for robots exclusion”, available at: http://www.robotstxt.org/wc/eval.html, (accessed March 11, 2008)
46. Koster, M. (1997), “HTML Author’s Guide to the Robots Meta tags”, available at: http://www.robotstxt.org/wc/meta-user.html (accessed March 11, 2008)
47. LaMacchia, B. (2002), “Key Challenges in DRM: An Industry Perspective”, Proceedings of the 2002 ACM Workshop on Digital Rights Management, Wellington. pp. 51-60
48. Lessig, L.(2004), “Free culture: how big media uses technology and the law to lock down culture and control creativity”, Penguin Press, New York.
49. Lessig, L.(2005a), “CC in Review: Lawrence Lessig on CC & Fair Use”, available at: http://creativecommons.org/weblog/entry/5681 (accessed March 11, 2009)
50. Lessig, L.(2005b), “CC in Review: Lawrence Lessig on iCommons”, available at: http://creativecommons.org/weblog/entry/5700 (accessed March 11, 2009)
51. Lessig, L.(2006a), “Code: And Other Laws of Cyberspace, Version 2.0”, Basic Books, New York. pp123
52. Lessig, L.(2006b), “Code: And Other Laws of Cyberspace, Version 2.0”, Basic Books, New York. pp124
53. Lin, Y-H, Ko, T-M, Chuang, T-R, Lin, K-J (2006) “Open Source Licenses and the Creative Commons Framework: License Selection and Comparison”, Journal of Information Science and Engineering, Vol 22 No 2 pp1-17.
54. Lopatin, L. (2006), “Library digitization projects, issues and guidelines :A survey of the literature”, Library Hi Tech, Vol 24 No 2, pp273
55. McCray, A. T. and Gallagher, M. E. (2001), “Principles for digital library development”, Communication of ACM, Vol 44 Iss 5 , pp48-54
56. Millard, C. (2007), “Copyright In Information Technology and Data”, in: Reed, C. and Angel , J. (Ed.), Computer Law, Oxford University Press, pp.337-396.
57. MSN (2008a), “control which pages of your website are indexed”, available at: http://search.msn.com/docs/siteowner.aspx?t=SEARCH_WEBMASTER_REF_RestrictAccessToSite.htm (accessed March 11, 2009)
58. MSN (2008b), “Limit crawl frequency”, available at: http://search.msn.com/docs/siteowner.aspx?t=SEARCH_WEBMASTER_REF_RestrictAccessToSite.htm (accessed March 11, 2009)
59. National Science Foundation (1999), “Digital Libraries Initiative: Available Research, US Federal Government”, available at: http://dli2.nsf.gov/dlione/. (accessed March 11, 2008)
60. Netcraft (2008), “Netcraft Web Server Survey”, available at: http://news.netcraft.com/archives/web_server_survey.html (accessed July 9, 2008)
61. ODRL Initiative (2005), “ODRL Creative Commons Profile”, available at: http://odrl.net/Profiles/CC/SPEC.html (accessed March 9, 2009)
62. ODRL Initiative (2009), “The international effort to develop and promote ODRL”, available at: http://odrl.net/ (accessed March 9, 2009)
63. Open Content Alliance (2009) “Open Content Alliance: FAQ”, available at: http://www.opencontentalliance.org/faq/ (accessed March 13, 2009)
64. Open Source Initiative (2006), “The BSD License”, available at: http://www.opensource.org/licenses/bsd-license.php (accessed March 9, 2009)
65. O'Leary, Mick (2009), “Open Content Alliance Embodies Open Source Movement”, Information Today, Vol 26 Iss 1, pp 37-38
66. Rao, S.S. (2003), “Copyright: its implications for electronic information”, Online Information Review, Vol 27 Iss 4, pp. 264-275.
67. Raghavan, S. and Garcia-Molina, H. (2001), “Crawling the Hidden Web”, Proceedings of the 27th International Conference on Very Large Data Bases (VLDB), Sep. 11-14, 2001, Rome, Italy, available at: http://dbpubs.stanford.edu:8090/pub/2000-36 (accessed July 3, 2007).
68. Rao, S.S. (2003), “Copyright: its implications for electronic information”, Online Information Review, Vol 27 Iss 4, pp. 264-275.
69. Reed, C. (2004), “Internet law: Text and Materials”, Cambridge University Press, Cambridge, pp71.
70. RFC1738 (1994), available at ftp://ftp.rfc-editor.org/in-notes/rfc1738.txt (accessed July 3, 2007)
71. Rosenblatt, B. (1997). "The Digital Object Identifier: Solving the Dilemma of Copyright Protection Online", Journal of Electronic Publishing, Vol 3, Iss. 2, pp135-156.
72. Samuelson, P. (2003), “Unsolicited Communications as Trespass?”, Communication of ACM, Vol 46 No 10, pp15-20.
73. Scribd (2009) available at: http://www.scribd.com/ (accessed Jan. 3rd, 2009).
74. Seadle, Michael. (2006), “Copyright in the networked world: using facts”, Library Hi Tech, Vol 24 No 3, pp. 463-468
75. Seadle, Mi and Greifeneder, E.(2007), ”Defining a digital library”, Library Hi Tech Vol. 25 No. 2, 2007 pp. 169-173
76. Sieman, J. S. (2007), “Using the implied license to inject common sense into digital copyright”, North Carolina Law Review, Vol 85, pp885-930.
77. Smith, G (2007), “Copiepresse v Google - the Belgian judgment dissected”, available at: http://www.birdbird.com/english/publications/articles/Copiepresse-v-Google.cfm?RenderForPrint=1 (accessed July 2, 2008)
78. Snyder, H., and Rosenbaum, H. (1998) “How Public is the Web? Robots, Access, and Scholarly Communication”, Proceedings of the 61st Annual Meeting of the American Society for Information Science, vol. 35, pp 453-462.
79. Spinello, Richard A. (2007), “Intellectual property rights”, Library Hi Tech, Vol 25 No 1, pp. 12-22
80. Sterling, J.A.L. (2003a), “World Copyright Law”, Sweet & Maxwell, London, pp530
81. Sterling, J.A.L. (2003b), “World Copyright Law”, Sweet & Maxwell, London, pp533
82. Sterling, J.A.L. (2003c), “World Copyright Law”, Sweet & Maxwell, London, pp17
83. Sterling, J.A.L. (2003d), “World Copyright Law”, Sweet & Maxwell, London, pp337
84. Sterling, J.A.L. (2003e), “World Copyright Law”, Sweet & Maxwell, London, pp531
85. Sutter, G. (2007), “Online Intermediaries”, in: Reed, C. and Angel , J. (Ed.), Computer Law, Oxford University Press, pp.233-282.
86. Tan, P-N., and Kumar, V. (2002) “Discovery of web robot sessions based on their navigational patterns”, Data Mining and Knowledge Discovery, Vol 6 No 1, pp9-35.
87. Thelwall, M. and Stuart, D. (2006), “Web crawling ethics revisited: Cost, privacy, and denial of service”, Journal of the American Society for Information Science and Technology, Vol 57 No 13, pp.1771-1779.
88. Wikipedia (2001), “GNU Free Documentation License”, available at http://en.wikipedia.org/wiki/GNU_Free_Documentation_License (accessed July 3, 2007)
89. Wikipedia (2007a), “Comparison of file systems”, available at http://en.wikipedia.org/wiki/Comparison_of_file_systems (accessed Dec. 3, 2007)
90. Wikipedia (2007b), “Resource Description Framework”, available at http://en.wikipedia.org/wiki/Resource_Description_Framework (accessed Dec. 3, 2007)
91. Yahoo (2007), “Creative Commons Search”, available at http://search.yahoo.com/cc (accessed July 3, 2007)
92. Yahoo (2008a), “Yahoo! Slurp—Yahoo!'s Web Crawler”, available at: http://help.yahoo.com/l/us/yahoo/search/webcrawler/ (accessed March 11, 2008)
93. Yahoo (2008b), “How do I prevent my site or certain subdirectories from being crawled?”, available at: http://help.yahoo.com/l/us/yahoo/search/webcrawler/slurp-02.html (accessed March 11, 2008)
94. Yahoo (2008c), “How do I keep my page from being cached in Yahoo! Search?”, available at: http://help.yahoo.com/l/us/yahoo/search/webcrawler/slurp-05.html (accessed March 11, 2008)
95. Yahoo (2008d), “How can I reduce the number of requests you make on my web site?”, available at: http://help.yahoo.com/l/us/yahoo/search/webCrawler/slurp-03.html (accessed March 11, 2009)
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE