Academic literature on the topic 'Computer games – Law and legislation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer games – Law and legislation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer games – Law and legislation"

1

Kiryshina, Irina. "Advertising in Video Games: Legal Qualifications." Legal Linguistics, no. 22(33) (December 27, 2021): 41–47. http://dx.doi.org/10.14258/leglin(2021)2208.

Full text
Abstract:
The article is addressed to the legal analysis of advertising placed in video games. Topical issues of the concept of advertising are touched upon from the point of view of its compliance with the legal definition enshrined in the Federal Law "On Advertising". There has been analized the distribution of advertising in video games, such as ads embedded in game content, including "product placement". In Russian legislation, there is an analogue of this category which is defined by the legislator as “references to a product, means of its individualization, about a manufacturer or seller of a product, which are organically integrated into works of science, literature or art”. The conclusion is made about the possibility of qualifying this technique as an advertisement in the absence of a sign of "organic integration". The examples of judicial and law enforcement practice of inorganic integration are considered. In such cases, the disseminated information is recognized as advertising, in respect of which the requirements of advertising legislation regarding restrictions on advertising of tobacco and alcohol, weapons and a number of other goods must be observed. There are special requirements for video games for minors in order to protect their rights. The author presents the position regarding the qualification of targeted advertising from the point of view of its compliance with such a sign of advertising as being addressed to an indefinite group of people. The conclusion is supported by the argument that personalization of an advertising message does not exclude its qualification as an advertisement. The problem of advertising distribution in computer games, including multiplayer games, carried out via the Internet, where obtaining the preliminary consent of the online game user to receive advertising is achieved by including this condition in the user agreement, is investigated. The conclusion is made about the need to improve legal regulation in the studied field.
APA, Harvard, Vancouver, ISO, and other styles
2

Liesching, Marc, and Christoph J. M. Safferling. "Protection of Juveniles in Germany – A Report on the New Legislation." German Law Journal 4, no. 6 (June 1, 2003): 541–57. http://dx.doi.org/10.1017/s2071832200016217.

Full text
Abstract:
In April, 2002, a 19 year-old pupil ran amok in a high school in Erfurt, killing several teachers and fellow pupils. The young man was reported to have played computer games, in particular games known as “ego-shooter,” quite excessively. These tragic events fueled the plans of the German government and the Federal states to reform the law for the protection of children and young persons. The legislative machinery issued new legislation at a rather impressive pace. Only one year after the tragedy in Erfurt, on 1 April 2003, two major legal documents entered into force: the Jugendschutzgesetz (JuSchG – Juvenile Protection Act) of the Federal government and the Jugendmedienschutz-Staatsvertrag (JMStV – Agreement of the German Federal States regarding the Protection of Human Dignity and Juveniles in Radio and Televised Media). This complicated two-fold structure stems from the federal nature of the German state where the competence to legislate is divided between the Federal Government and the individual Laender (Federal States). The latter, in order to achieve uniformity among themselves and reaching the breadth of the Germany territory, must cooperate and legislate in the form of an interstate agreement. The JuSchG regulates mainly the protection of juveniles in the public and limits the distribution of items, which have been determined to be dangerous, like printed material, videos, DVDs or CD-Roms. In contrast thereto the JMStV pertains to the protection of juveniles in the radio broadcasting industry and in the so called “Telemedia,” in particular the internet. In the following, we will give a short overview of the developments wrought by these new laws.
APA, Harvard, Vancouver, ISO, and other styles
3

Talan, Maria V., Anton E. Shalagin, and Almaz D. Idiyatullov. "Legal regulation of liability for offenses related to inducement to suicide: Domestic and foreign experience." Vestnik of Saint Petersburg University. Law 13, no. 4 (2022): 1078–98. http://dx.doi.org/10.21638/spbu14.2022.415.

Full text
Abstract:
In this work, a team of authors tried to analyze the current state of legal regulation of acts related to suicide under Russian and foreign criminal legislation. For this, historical, comparative legal, comparative and systemic-structural methods were used. The study reflects the evolution of beliefs about suicide. It is noted that the legislation of more than 160 countries contains provisions on liability for criminal involvement in the suicide of another person. More than 38 legal systems do not mention suicide as a criminal institution. Particular attention is paid to five groups of crimes associated with suicide. The first group includes responsibility for attempted suicide, which is punishable in more than 24 countries around the world. The following contains a wide list of acts related to the inducement of suicidal behavior in the form of: driving to suicide or attempted suicide, inducement to commit suicide (incitement) or assistance in committing it (assistance, aiding, advice, consultation). The third group is made up of norms that consider these acts as one of the types of murder or incitement to it. The fourth group contains corpus delicti with responsibility for disseminating information about methods of committing suicide, promoting suicide and public calls for its implementation. The last group contains privileged compounds with responsibility for euthanasia. The article reveals the features of new types of criminal activity carried out by spreading suicidal ideology on the Internet, persuading children and adolescents to commit suicide by negative information impact and drawing them into computer games that pose a threat to life and health. The article reflects the relationship of suicide with cyberbullying, cyber-harassment, as well as with the illegal activities of destructive criminal organizations (sects), extremism and terrorism. The necessity of further improvement of criminal law mechanisms for protecting individuals from criminal encroachments and anti-suicidal measures is substantiated.
APA, Harvard, Vancouver, ISO, and other styles
4

Butkevich, S. A. "PREVENTION OF THREATS TO MENTAL SECURITY: LEGAL, CRIMINOLOGICAL AND PSYCHOLOGICAL-PEDAGOGICAL TOOLS." Scientific Notes of V. I. Vernadsky Crimean Federal University. Juridical science 7 (73), no. 2 (2022): 310–22. http://dx.doi.org/10.37279/2413-1733-2021-7-2-310-322.

Full text
Abstract:
The article considers the current threats to the mental security of the individual and society. In particular, the main attention is paid to characterizing the real and potential consequences of excessive enthusiasm for computer games, the distribution of shock, dangerous and harmful content in the information space, censoring by social networks and other new media of information on various Internet platforms in the corporate interests, as well as the functioning of the shadow segment of the Internet. The study of the provisions of foreign legislation and Russian normative initiatives, the systematization of scientific views on this issue and the content analysis of publications on Internet resources allowed not only to reveal the specifics of information and cybernetic threats to mental security in modern conditions, but also to prepare author’s proposals and recommendations for improving the system of criminological prevention of their determinants, psychological and pedagogical impact on adolescents and young people in order to minimize (level out) the consequences of the negative influence of the information and telecommunications environment on the mental, physical and social development of the individual. The results of the research can be used in rule-making, law enforcement, psychological and pedagogical practices.
APA, Harvard, Vancouver, ISO, and other styles
5

Farmaki, Despoina. "Copyright protection of video games: a comparative study." Interactive Entertainment Law Review 5, no. 2 (December 30, 2022): 107–21. http://dx.doi.org/10.4337/ielr.2022.02.04.

Full text
Abstract:
Abstract The legal nature of video games in terms of copyright is hard to determine. Video games are highly interactive multimedia that are made up of individual elements that are the ‘product’ of creative effort and expertise. Video games are also complex multimedia works that combine video, music, art and characters. There is a debate on which work is qualified to be copyright protected: is it the video game as a whole or the individual elements of it? To question further, under which category of protected works should they be classified? This article will shed light on the above considerations by employing a combination of doctrinal and comparative analyses. European and national legislation and case law will be analysed, with particular emphasis on four national jurisdictions: Germany, France, Greece and the UK. The article discusses the divergent opinions among academics, national and European case law, and will suggest that copyright registration of video games would provide more clarity.
APA, Harvard, Vancouver, ISO, and other styles
6

Blume, Peter. "Computer crime legislation in Denmark." International Review of Law, Computers & Technology 3, no. 1 (January 1987): 153–57. http://dx.doi.org/10.1080/13600869.1987.9966261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kempton, Nick. "Interaction of EU and UK copyright in a post-Brexit world: will video games get more protection than they bargain for?" Interactive Entertainment Law Review 3, no. 2 (December 23, 2020): 131–37. http://dx.doi.org/10.4337/ielr.2020.02.05.

Full text
Abstract:
The UK's approach to copyright and its adoption of a closed list of categories of work has led to unforeseeable gaps in protection in video games and fails to recognize the intellectual creativity that has gone into various elements of a video game, such as in-game animation. However, the CJEU's decision in Cofemel (C-683/17) has sought to harmonize copyright in the EU and provides two simplified requirements for subsistence of copyright allowing for expansive protection and open ended categories of work. This decision broadens out copyright in a way which may fill in some of the gaps of protection for video games but at what cost? This article explores how Cofemel might impact the video games industry in practice, as well as the ways in which the UK courts might address Cofemel in light of its direct conflict with UK legislation at a critical political time where the UK is about to depart from the EU.
APA, Harvard, Vancouver, ISO, and other styles
8

Nycum, Susan H. "Computer Crime Legislation in the United States." Israel Law Review 21, no. 1 (1986): 64–89. http://dx.doi.org/10.1017/s0021223700008906.

Full text
Abstract:
Thirty-three states have enacted statutes that encompass in some way what is referred to in this paper as “computer crime”. In some states, computer crime laws are referred to as such only because of the inclusion of the word computer in some general provision. In others, complex and specific statutes exist.Each of the computer crime state statutes presently in effect has its own peculiar combination of a variety of possible offenses. The bulk of the statutes proscribe as computer crime a core set of activities such as accessing, altering, damaging or destroying a computer with the intent to devise or execute any scheme or artifice to defraud or deceive. This “computer crime”, and a few others to be outlined later, are found in a majority of the state statutes with some individual variations. This paper presents a list of computer crimes common to many of the statutes, describes variations in those crimes and examines in more detail the unusual crimes.
APA, Harvard, Vancouver, ISO, and other styles
9

Lastowka, Greg. "Law and Games Studies." Games and Culture 1, no. 1 (January 2006): 25–28. http://dx.doi.org/10.1177/1555412005281420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Al-Billeh, Tareq, and Hamzeh Abu Issa. "THE CRIMINAL LIABILITY FOR VIOLENCE ACTS THAT OCCUR DURING SPORTS GAMES IN THE JORDANIAN LEGISLATION: THE CONSIDERATENESS OF THE SPORTS GAMES RULES." Journal of Southwest Jiaotong University 57, no. 5 (October 30, 2022): 585–97. http://dx.doi.org/10.35741/issn.0258-2724.57.5.47.

Full text
Abstract:
The research cured the issue of the criminal liability for acts of violence that occur during sports games in Jordanian legislation, where it highlighted the fact that, in the Jordanian Penal Law, the Jordanian legislator authorized cases of violence that occur during sports games if the rules of the sports game are observed, and this considerateness was treated as a reason for justification, whereas the research dilemma lies in the lack of legal provisions for the legal effect of misuse of sports games. The research concluded with many results and recommendations, the most important of which is the need to add new legal provisions to the Penal Law that include the legal impact of the misuse of sports games and demonstrate the cases of infringement of the norms and rules of sports and the extent of the criminal intent of some participants in the sports game, in addition to an indication of the penalty limit imposed on cases of infringement of the right established under the provisions of the law.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Computer games – Law and legislation"

1

Lee, Yin Harn. "Videogame modifications under copyright law." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.709009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ital, Eric Guy. "Copyright law and the Internet : in modern South African law." Thesis, Stellenbosch : Stellenbosch University, 2000. http://hdl.handle.net/10019.1/51666.

Full text
Abstract:
Thesis (LLM)--University of Stellenbosch, 2000.
ENGLISH ABSTRACT: The Internet is coming more and more into focus of national and international legislation. Especially with regard to copyright law, the rapid growth of the Internet, its global character, its novel technical applications and its private and commercial use by millions of people makes the control over a work complicated and raises copyright problems all over the world. Present legislation is therefore challenged to avoid gaps in the law. Considering the rapid growth of online providers and users in South Africa, it is likely that copyright disputes with regard to the Internet will evolve here soon. In this dissertation, the "world" of the Internet and its lawfulness with regard to existing South African copyright law will be examined. The examination tries to establish whether South African copyright law is able to cope with the present Internet problems and whether it leads to reasonable results. The first chapter of this dissertation will give an overview of the basic principles of the Internet, including the history, development and function of the Internet. Furthermore the changing aspects by means of diqital technology will be discussed. Because the global character of the Internet lead to "international" infringements, governments are considering the prospect of reaching international accord on the protection of intellectual property in the digital era. In chapter two, the present international harmonisation of copyright law will be introduced. Especially the quick adoption of the World Intellectual Property Organisation Treaties in December 1996 demonstrated that an international realisation for a call for action is existing. In chapter three, the application of South African copyright law with regard to the Internet will be discussed. First, it will be examined if a digital work on the Internet is protected in the same way as a "traditional" work. Second, the various rights of the copyright holder are discussed in connection with the use of a work on the Internet. Third, the potential application of the exclusive rights of the copyright holder to various actions on the Internet, such as caching, Web linking and operating an online service will be discussed. The Internet is a worldwide entity, and, as such, copyright infringement on this system is an international problem. The scenario of global, simultaneous exploitation of works on the Internet conflicts sharply with the current system of international copyright protection, which is firmly based on national copyright laws with territorial effects. Section four provides therefore an overview of the applicable law on an international net and analyses the necessity and borders of protection.
AFRIKAANSE OPSOMMING: Nasionale en internasionale wetgewing fokus in In toenemende mate op die Internet. Die versnelde groei van die Internet, sy wêreldkarakter, sy nuwe tegnologiese aanwendings en sy private en kommersiële gebruik deur miljoene mense maak beheer oor In werk baie gekompliseerd en skep veral outeursregprobleme regoor die wêreld. Wetgewing soos dit tans is, word dus uitgedaag om die leemtes in die reg te ondervang. Gegewe die vinnige groei van gekoppelde verskaffers en gebruikers in Suid-Afrika, is dit waarskynlik dat - outeursreggeskille met betrekking tot die Internet binnekort ook hier gaan ontwikkel. In hierdie verhandeling gaan die "wêreld" van die Internet en sy wettigheid onder bestaande Suid-Afrikaanse outeursregwetgewing ondersoek word. In die ondersoek word gepoog om vas te stelof Suid-Afrikaanse outeursregwetgewing geskik is om die Internetprobieme wat tans bestaan te hanteer en of dit lei tot aanvaarbare resultate. Die eerste hoofstuk van die verhandeling sal In oorsig gee van die basiese beginsels van die Internet, insluitende die geskiedenis, ontwikkeling en funksie van die Internet. Verder sal die veranderende aspekte as gevolg van digitale tegnologie bespreek word. Die wêreldkarakter van die Internet gee aanleiding tot "internasionale" inbreukmakings en om hierdie rede oorweeg regerings die moontlikheid van internasionale ooreenkomste oor die beskerming van intellektuele eiendom in die digitale era. In hoofstuk twee word die bestaande internasionale harmonisering van outeursreg bespreek. Veral die vinnige aanname van die World Intellectual Property Organisation se verdrae in Desember 1996, illustreer dat daar In internasionale bewustheid is dat iets in die verband gedoen moet word. In die derde hoofstuk word die aanwending van die Suid-Afrikaanse outeursreg met betrekking tot die Internet bespreek. Eerstens word ondersoek of a digitale werk op die Internet op dieselfde wyse as 'n "tradisionele" werk beskerm kan word. Tweedens word die verskillende regte van die outeursreghebbende in verband met die gebruik van 'n werk op die Internet, bespreek. Derdens word die potensiële aanwending van die eksklusiewe regte van die outeursreghebbende op verskillende aksies op die Internet, soos byvoorbeeld kasberging, web koppeling en die werking van 'n gekoppelde diens, bespreek. Die Internet is 'n wêreldwye verskynsel en sodanig is outeursreginbreukmaking op hierdie stelsel 'n internasionale probleem. Die scenario van 'n wêreldwye, gelyktydige uitbuiting van werke op die Internet is in skerp konflik met die huidige stelsel van internasionale outeursregbeskerming wat stewig gegrond is op nasionale wetgewing met territoriale werking. Hoofstuk vier bied daarom 'n oorsig oor die toepaslike reg op 'n internasionale netwerk en analiseer die nodigheid en ook grense van beskerming.
APA, Harvard, Vancouver, ISO, and other styles
3

Mik, Eliza. "Contract formation in open electronic networks." Phd thesis, Faculty of Law, 2007. http://hdl.handle.net/2123/4995.

Full text
Abstract:
Thesis (Ph. D.)--University of Sydney, 2007.
Title from title screen (viewed 28 May 2009) Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy to the Faculty of Law. Degree awarded 2007. Includes bibliography references. Also available in print format.
APA, Harvard, Vancouver, ISO, and other styles
4

Temur, Nuri. "Computer Crime as a Barrier to Electronic Commerce: New Solutions for Public Law Enforcement." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3171/.

Full text
Abstract:
Electronic commerce was expected to grow exponentially, but the actual rate of growth in recent years has been disappointing. Recent surveys of perceptions of the development of electronic commerce clearly focus our attention on the perception and fear of computer crime as the major cause of this disappointing growth pattern. The thesis critiques existing private law solutions to this problem and argues from a normative theory on “the commons” for the application of new public law enforcement solutions in the public trust, sanctions, and public coproduction of order. The thesis argues that given the failures of existing private law solutions to the problem, these public law enforcement solutions should be more effective, efficient, and more satisfactory.
APA, Harvard, Vancouver, ISO, and other styles
5

Mabeka, Nombulelo Queen. "When does the conduct of an employer infringe on an employee's constitutional right to privacy when intercepting or monitoring electronic communications?" Thesis, University of the Western Cape, 2008. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_5883_1253850534.

Full text
Abstract:

"
The Regulation of Interception of Communications and Provision of Communication Related Information Act 70 of 2002 (RICA) that regulates the monitoring of electronic communications has not yet been tested by our courts. This paper explores the likelihood of an infringement of an employee's right to privacy by an employer in the process of intercepting the latters electronic communications. It is argued that there is no explicit provision of the protection of the right to privacy that is provided in the LRA. It is further argued that the provisions of section 4, 5 and 6 of RICA as they stand do not necessarily provide for the protection of an employee's right to privacy, but the incorporation of these sections could be construed as meaning that the legislature or the framers of the legislation intended to limit the employers right to trade freely, at the same breath, limit the employees right to privacy. It is argued that RICA does not provide protection for the right to privacy wherein consent has been obtained under duress or based on misrepresentation of facts. It is contended that the interception of employees electronic communications in such circumstances would be regarded as an infringement of such employees right to privacy. The burden of proving duress or misrepresentation of facts rests on the employee who alleges that such consent was obtained under duress or based on misrepresentation of facts. It is also argued that RICA does not define the meaning of the words in the course of carrying on of business or reasonable steps provided in section 6 of RICA. It is argued that the meaning of in the course of carrying on of business would be determined by the type of the industry upon which the business operates, as well as the circumstances of the case. Reasonable steps would be regarded as being taken if employers notify employees that their electronic communications would be intercepted..."

APA, Harvard, Vancouver, ISO, and other styles
6

Frantz, Courtney Siler. "An electronic storage and access system for special education legislation." W&M ScholarWorks, 1995. https://scholarworks.wm.edu/etd/1539618425.

Full text
Abstract:
In the field of education, instructional leaders must know the regulations governing the assessment, curriculum, and instruction of all students. An area of special concern is the regulations governing programs for students with disabilities. Although the average population of students with disabilities may represent less than 10% of the total student body, the school administrator is responsible for maintaining access to the most current regulations, for accurately interpreting, and effectively implementing federal and state mandates to ensure that the due process rights of the students with disabilities are upheld. Yet the laws and regulations governing special education programs are continually changing. Having immediate and accurate access to the most current regulations are critical problems for administrators of special education programs.;One means of providing the regulations is the computer. With the use of hypertext-based software, computers are presently and successfully being used in business and medicine for training and reference storage. Therefore, SpeciaLink was developed to serve as a prototypical system for the delivery of the regulations governing special education programs.;To evaluate SpeciaLink, an experiment was conducted to test the effectiveness and efficiency of manipulating and extracting the stored regulations. A controlled experiment involving the use of hypertext programming was conducted in Virginia school districts. The research project used a random sample of secondary school administrators from 15 school districts. The sample frame participants were given a survey to identify their knowledge of the Virginia Regulations Governing Special Education Programs for Children with Disabilities, 1994. For a trial period of two months, the experimental group was given the software, SpeciaLink, that allowed them to electronically access the regulations. After the trial, the entire sample frame was re-surveyed.;Following the pilot program, statistical interpretation of the results revealed that a hypertext-based system is an effective and efficient tool for manipulating and extracting information from the regulations governing special education programs. Because the hypertext-based software promises to be so useful in special education, future research should examine the possibilities of expanding the use of electronically storing local mandates and court litigation that pertain to special education programming.
APA, Harvard, Vancouver, ISO, and other styles
7

Karjiker, Sadulla. "Open-source software and the rationale for copyright protection of computer programs." Thesis, Stellenbosch : Stellenbosch University, 2013. http://hdl.handle.net/10019.1/80044.

Full text
Abstract:
Thesis (LLD)--Stellenbosch University, 2013.
ENGLISH ABSTRACT: The rationale for the legal protection of copyright works is based on the perceived need to encourage the creation of works which are considered to be socially beneficial. By awarding authors proprietary rights in their creations, copyright law allows authors the ability to earn direct financial returns from their efforts, and, thus, copyright law provides the required incentives for authors to create copyright works. Since the early days of commercial software development, copyright protection has been extended to computer programs; thus, by providing such protection it was assumed that their production should be encouraged, and that without such protection they will not be produced to the extent required by society. Comparatively recently, we have witnessed large-scale production of open-source software, which is licensed on generous terms, giving users the right to freely use, modify and redistribute such software. By adopting such licensing terms, the authors of open-source software are unable to charge licensees a fee for permission to use their software, which is the reward which copyright assumes authors seek to create such software. This development has made it necessary to re-evaluate the rationale for copyright protection of computer programs, and determine whether the continued protection of computer programs is justifiable. This study seeks to first establish a coherent theoretical justification for copyright protection, which it is submitted should be an economic justification, rather than a moral justification. The legal analysis in this work seeks to establish whether the copyright protection of computer programs is consistent with the economic justification for copyright protection. In particular, the analysis focuses on the current scope of copyright protection, and seeks to establish whether such protection is excessive, stifling creativity and innovation, and, thus, imposing too high a social cost. It is contended that copyright doctrine has generally sought to minimise these costs, and that current scope of copyright protection of computer programs leaves enough creative room for the production of new software. Despite the fact that the effect of open-source software licences is that authors are unable to earn the direct financial rewards which copyright enables authors to earn as an incentive to create such software, their authors continue to have financial incentives to create such software. Commercial firms who invest in open-source software do so because they seek to provide financially-rewarding related services in respect of software, or because it serves to promote sales in their complementary products. Similarly, the participation of individual computer programmers is largely consistent with the standard economic theories relating to labour markets and the private provision of public goods. Individuals are principally motivated by economic motives, such as career concerns. Copyright protection gives participants the choice to opt for the direct financial rewards which its proprietary protection enables, or the more indirect financial rewards of open-source software development. It is submitted within this research that rather than undermining the rationale for copyright protection of computer programs, the development of open-source software has illustrated that copyright protection allows for the emergence of alternative business models, which may be more economically advantageous to authors.
AFRIKAANSE OPSOMMING: Die rasionaal agter outeursregbeskerming wat deur die reg verleen word is gebasseer op 'n behoefte om die skepping van werke wat sosiaal voordelig geag word te bevorder. Outeursreg verleen aan outeurs direkte finansiële vergoeding vir hul inspanning deur die vestiging van eiendomsreg oor hul werke. Dus, outeursreg voorsien outeurs van die nodige insentiewe om sulke werke te skep. Sedert die begindae van kommersiële sagteware ontwikkeling, is outeursregbeskerming uitgebrei om aan rekenaarprogramme sulke beskerming te bied. Deur die bied van outeursregbeskerming word daar aangeneem dat die ontwikkeling van rekenaarprogramme aangemoedig word en dat sonder die genoemde beskerming programme nie geproduseer sal word tot in 'n mate benodig deur die samelewing nie. Onlangs egter, is daar 'n grootskaalse ontwikkeling van oopbronsagteware opgemerk. Hierdie sagteware word onder ruime terme gelisensieer en gee aan gebruikers die reg om die genoemde sagteware te gebruik, te wysig en vrylik te versprei. Deur sulke terme van lisensiëring aan te neem word outeurs verhoed om vanaf lisensiehouers 'n fooi te vorder vir die toestemming om die sagteware te gebruik. Outeursreg neem aan dat hierdie vergoeding die basis vorm waarom outeurs sulke sagteware ontwikkel. Hierdie ontwikkeling maak dit nodig om die rasionaal agter outeursregbeskerming van rekenaarprogramme te her-evalueer en ook om vas te stel of die volgehoue beskerming van rekenaarprogramme regverdigbaar is. Hierdie studie poog om, eerstens, 'n samehangende teoretiese regverdiging vir outeursreg te vestig. Daar word aan die hand gedoen dat hierdie beskerming 'n ekonomiese, eerder as 'n morele regverdiging as grondslag moet hê. Die regsontleding vervat in hierdie werk poog om vas te stel of die outeursregbeskerming wat aan rekenaarprogramme verleen word in lyn is met die ekonomiese regverdiging van outeursregbeskerming. Die analise fokus in besonder op die huidige bestek van outeursregbeskerming en poog om vas te stel of sodanige beskerming oormatig is, of dit kreatiwiteit en innovasie onderdruk en derhalwe te hoë sosiale koste tot gevolg het. Daar word geargumenteer dat outeursreg in die algemeen poog om sosiale koste te verlaag en dat die huidige omvang van outeursregbeskerming van rekenaarprogramme voldoende kreatiewe ruimte vir die ontwikkeling van nuwe sagteware laat. Die effek van oopbronsagteware is dat outeurs nie in staat is om direkte finansiële vergoeding te verdien, wat as insentief gesien word vir die ontwikkeling van sagteware, nie. Ten spyte hiervan is daar steeds voldoende finansiële insentiewe om sodanige sagteware te ontwikkel. Kommersiële firmas belê in oopbronsagteware om finansiëel lonende verwante dienste ten opsigte van sagteware te voorsien. Dit kan ook dien om verkope in hul onderskeie aanvullende produkte te bevorder. Eweweens is die deelname van individuele rekenaarprogrameerders oorwegend in lyn met die standaard ekonomiese teoriëe ten opsigte van die arbeidsmark en die privaat voorsiening van openbare goedere. Individue word gemotiveer deur ekonomiese motiewe, soos byvoorbeeld oorwegings wat verband hou met hul loopbane. Outeursregbeskerming bied aan deelnemers die keuse om voordeel te trek uit die direkte finansiële vergoeding wat moontlik gemaak word deur outeursregbeskerming of uit die meer indirekte finansiële vergoeding gebied deur die ontwikkeling van oopbronsagteware. In hierdie navorsing word daar geargumenteer dat die ontwikkeling van oopbronsagteware geillustreer het dat outeursregbeskerming die onstaan van alternatiewe besigheidsmodelle toelaat wat ekonomies meer voordelig is vir outeurs in plaas daarvan dat dit die rasionaal vir die outeursregbeskerming van rekenaarprogramme ondermyn.
APA, Harvard, Vancouver, ISO, and other styles
8

Bac, Joanna Ewa. "Software intelligence (SI), dependent legal personhood & SI-human amalgamation : an evolutionary step for US patent law and SI." Thesis, University of Aberdeen, 2018. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=237873.

Full text
Abstract:
This doctoral thesis addresses the question of why and how the United States of America (US) legal system should grant legal personhood to software intelligence (SI). This new legal status of SI is visualised as a dependent type of person. The SI dependent legal person would be determined by an inextricable connection between SI and a new type of corporate body, introduced here as SI-Human Amalgamation (SIHA). SI has been defined as one or more computer programmes with an ability to create work that is unforeseen by humans. This includes SI capacity to generate unforeseen innovations, patentable inventions and/or infringe the rights of other patent holders. At present, SI is an entity unrecognised by law. The fact that SI is neither a natural nor a legal person indicates that it cannot be considered the rights' owner or liability bearer. This in turn creates tensions both in society and legal systems because questions, such as, who should hold those rights or be liable for autonomous acts of SI, remain unanswered. It is argued that the SI dependent legal person and SIHA, are necessary to address the new challenges introduced by SI. SI and SIHA, their creativity and actions would be distinct from those performed by human beings involved in the creation of this amalgamation, such as SI's operators or programmers. As such, this structure would constitute an amalgamation based on human beings and SI cooperation (SIHA). SI, as a dependent legal person, would hold the patents rights to its own inventions thus ensuring favourable conditions for the incentives of the US patent system. In addition, the proposed legal framework with the use of legislative instruments could address any liability concerns arising from the foreseen and unforeseen actions, omissions and failure to act of SI.
APA, Harvard, Vancouver, ISO, and other styles
9

Steh, Stephen R. "Unauthorized Access Crimes." Youngstown State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nichols, Kenneth Nolan. "Technical-legal aspects of software patents." CSUSB ScholarWorks, 1996. https://scholarworks.lib.csusb.edu/etd-project/1249.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer games – Law and legislation"

1

Duisberg, Alexander, Henriette Picot, and Catrin Agerhäll. Recht der Computer- und Videospiele: The law of video and computer games. Berlin: Erich Schmidt Verlag, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lipson, Ashley S. Computer and video game law: Cases, statutes, forms, problems & materials. Durham, N.C: Carolina Academic Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

D, Brain Robert, ed. Computer and video game law: Cases, statutes, forms, problems & materials. Durham, N.C: Carolina Academic Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Keimpŏp chedo ŭi hyŏnhwang kwa kwaje: Game law. Sŏul T'ŭkpyŏlsi: Pagyŏngsa, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Keim sŏbisŭ wa pŏp: Game service & law. Sŏul T'ŭkpyŏlsi: Kyŏngin Munhwasa, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Charne, Jim. Representing the games industry client 2011. New York, N.Y: Practising Law Institute, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Charne, Jim. Representing the games industry client 2010. New York, N.Y: Practising Law Institute, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

American Bar Association. Section of Intellectual Property Law. Computer games and virtual worlds: A new frontier in intellectual property law. Chicago, Ill: American Bar Association, Section of Intellectual Property Law, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

A, Dannenberg Ross, ed. Computer games and virtual worlds: A new frontier in intellectual property law. Chicago, IL: American Bar Association, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pak, Mun-su. Keim sijang ŭi kyuje ka sanŏp saengt'aegye palchŏn e mich'inŭn yŏnghyang kwa sisachŏm. Sŏul T'ŭkpyŏlsi: Sanŏp Yŏn'guwŏn, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer games – Law and legislation"

1

Closa, Daniel, Alex Gardiner, Falk Giemsa, and Jörg Machek. "Games." In Patent Law for Computer Scientists, 129–42. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05078-7_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kononova, Olga, and Aleksa Grant. "Computer Games in Focus of Modern Russian and American Legislation." In Communications in Computer and Information Science, 148–58. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69784-0_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bai, Xuemei, and Ling Zhong. "Legal Protection of Blockchain from the Perspective of the Cybersecurity Law: Legislation and Practice of China." In Communications in Computer and Information Science, 585–92. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-7993-3_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dreier, Thomas. "Projecting Images of Families into the Law—the Example of Internet-Related Cases Decided by the German Courts." In Families and New Media, 151–72. Wiesbaden: Springer Fachmedien Wiesbaden, 2023. http://dx.doi.org/10.1007/978-3-658-39664-0_7.

Full text
Abstract:
AbstractFamily and Internet may appear to be an “unlikely combination,” since technology is generally considered to be neutral and thus not gender-related, even if a clear gender imbalance can be observed among computer science students and professionals who are largely male. From the point of view of the networked structures of the Internet, and hence from the point of view of Internet law, no fundamental distinction is made between family and non-family relationships and connections. Despite this, it may be worthwhile to search legislation and case law for existing rules and decisions that discuss issues of families and their members who use the Internet.
APA, Harvard, Vancouver, ISO, and other styles
5

Pina, Pedro. "Computer Games and Intellectual Property Law." In Digital Rights Management, 777–88. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2136-7.ch035.

Full text
Abstract:
In the present chapter, the author briefly studies the particular tension between the current copyright paradigm, based on the dichotomy active creator – passive consumer, and the control over creative transformative usages of digital works in the field of computer games, such as mods or add-ons, and exposes some reactions that go from voluntary licensing schemes, such as copyleft licenses, to compulsory licenses.
APA, Harvard, Vancouver, ISO, and other styles
6

Zhulin, Evgeniy. "WHY DON'T LAWYERS LIKE COMPUTER GAMES?" In LAW IN FUTURE: INTELLECTUAL PROPERTY, INNOVATION, INTERNET, 155–63. INION RAN, 2019. http://dx.doi.org/10.31249/pravbud/2019.00.16.

Full text
Abstract:
The article is devoted to computer games and the need for their detailed legal regulation. The article deals with approaches to the legal definition of a computer game, their monetization, determination of the circle of authors of a computer game, regulation of individual elements of the game and in-game services.
APA, Harvard, Vancouver, ISO, and other styles
7

Chetwynd, Jonathan. "Browser-Native Games That Use Real-World XML Data." In Computer Games as Educational and Management Tools, 122–35. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60960-569-8.ch008.

Full text
Abstract:
The rising tide of scientific data available on the web, has the potential to help us consider the complex problems that concern us today, and simulation games can help us visualize, model and plan for alternative futures. However, the modularisation of knowledge has limited communication across subject domains, and copyright legislation and business practices may need to change, if the many new visualisation tools needed are to be interoperable and share common interfaces. A game standard and specification for the web, together with easy-to-use authoring tools for creating browser-native games that use real-world XML data; could enhance communication, and engage the public in the understanding of science, and its progress.
APA, Harvard, Vancouver, ISO, and other styles
8

Lloyd, Ian J. "9. National and international responses to computer-related crime." In Information Technology Law, 161–72. Oxford University Press, 2020. http://dx.doi.org/10.1093/he/9780198830559.003.0009.

Full text
Abstract:
Computer related crime features increasingly prominently in criminal statistics. As we move towards a cashless society where money is represented by data held on a computer system, so the range and scale of conduct is assuming almost epidemic proportions. Significant issues arise whether and where particular forms of conduct constitute criminal offences. These decisions have historically been a matter for national authorities. As with many issues covered in this book, the emergence of the Internet has brought about significant changes as it has become increasingly apparent that national legislation can be of limited effectiveness. Although cross-border conduct has occurred for very many years and the doctrine of extradition is a well-established one, such actions were the exception to a norm in which all aspects of conduct occurred in a single jurisdiction. The United Kingdom’s legislative history in the field of computer related crime date to the Computer Misuse Act of 1990. In many respects, this legislation restated the position that had been reached under common law where a number of cases had determined that computer related conduct could be prosecuted under existing provisions of the criminal law. In 2001 the Council of Europe Cybercrime Convention was opened for signature and remains the most significant international instrument in the field, having been ratified by almost all European States and a number, including the United States, of non-European jurisdictions. As well as making provision for harmonising substantive criminal offences, there have been moves to enhance cooperation between law enforcement agencies at a procedural level.
APA, Harvard, Vancouver, ISO, and other styles
9

Aplin, Tanya, and Jennifer Davis. "2. Copyright I." In Intellectual Property Law:. Oxford University Press, 2017. http://dx.doi.org/10.1093/he/9780198743545.003.0002.

Full text
Abstract:
All books in this flagship series contain carefully selected substantial extracts from key cases, legislation, and academic debate, providing able students with a stand-alone resource. Copyright refers to a set of exclusive rights in relation to cultural works such as literature, newspapers, photographs, drawings, artworks, films, music, and plays, and also extends to less obviously aesthetic creations, such as computer programs and databases. This chapter discusses the history, justifications, and sources of UK copyright law as well as the requirements for copyright protection.
APA, Harvard, Vancouver, ISO, and other styles
10

Lloyd, Ian J. "10. Substantive criminal law provisions." In Information Technology Law, 173–88. Oxford University Press, 2020. http://dx.doi.org/10.1093/he/9780198830559.003.0010.

Full text
Abstract:
This chapter examines the provisions of the Council of Europe’s Convention on Cybercrime to determine the major headings under which computer-related conduct might be prosecuted and to analyse the effectiveness of UK legislation in the field. The focus is on offences against the confidentiality, integrity, and availability of computer data and systems, which essentially refers to computer hacking and to attempts to impair the operation of computer systems through interception of communications, the promulgation of viruses, or the launching of denial of service attacks. The chapter discusses also the law on computer-related fraud and forgery.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer games – Law and legislation"

1

TROFIMOV, Egor, and Oleg METSKER. "Computer Techniques and Indicators in the Policy of Optimization of Legislation and Law Enforcement." In Proceedings of the International Conference Digital Age: Traditions, Modernity and Innovations (ICDATMI 2020). Paris, France: Atlantis Press, 2020. http://dx.doi.org/10.2991/assehr.k.201212.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Beattie, Scott. "Law and Pop: Regulation and Ruleplay in the online world of Popomundo." In Annual International Conferences on Computer Games, Multimedia and Allied Technology. Global Science & Technology Forum (GSTF), 2008. http://dx.doi.org/10.5176/978-981-08-8227-3_cgat08-35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

De Medeiros Pereira, Matheus, and Lucas Debatin. "Acessibilidade em Jogo Digital via Comandos de Voz para Pessoas com Deficiência Motora." In Computer on the Beach. Itajaí: Universidade do Vale do Itajaí, 2022. http://dx.doi.org/10.14210/cotb.v13.p103-110.

Full text
Abstract:
ABSTRACTEnsuring accessibility is a mandatory issue by law, both in everyday life and in the context of recreational activities. In electronic games this is no different, to ensure accessibility for people with disabilities (PwD), developers and research are constantly seeking to innovate in technical and methodological issues. This work will present an electronic game of the 2D platform genre for the computer, which offers the user the possibility of controlling through voice commands, generating a form of accessibility for motor PwD. During testing, the API achieved an average margin of error of 14.72% per reconition. Tests were carried out with 21 people without disabilities, who differed by their intimacy with digital games. Based on the results obtained, it was possible to verify that the players performance when using the standard control was superior to the performance using voice controls. This allowed us to analyze that, although voice control is an accessibility option, it is not efficient when compared to the standard options (mouse and keyboard), as the performance of users was superior.
APA, Harvard, Vancouver, ISO, and other styles
4

Trofimov, Egor Viktorovich, Oleg Gennad'evich Metsker, and Maksim Vladimirovich Petrov. "The Computer and Legal Methodology for Legislation and Law Enforcement Optimization Qualitative Assessment Based on Big Data Analysis: Methods and Metrics on the Example of the Scope of Administrative Offences." In АКТУАЛЬНЫЕ ВОПРОСЫ РАЗВИТИЯ ГОСУДАРСТВЕННОСТИ И ПУБЛИЧНОГО ПРАВА. Санкт-Петербург: Санкт-Петербургский институт (филиал) ВГУЮ (РПА Минюста России), 2020. http://dx.doi.org/10.47645/978-5-6044512-3-6_2020_1_175.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Koshelev, Anton, and Ekaterina Rusakova. "ELECTRONIC EVIDENCE IN CIVIL PROCEEDINGS IN INDIA." In NORDSCI International Conference. SAIMA Consult Ltd, 2020. http://dx.doi.org/10.32008/nordsci2020/b2/v3/10.

Full text
Abstract:
A significant leap in the development of information technology over the past twenty years has made the global legal community respond to new challenges that have come along with the progress in the digital environment. Together with the convenience of using electronic resources, society has developed a need for a simple and understandable legislative regulation of legal relations arising from the use of computer information technologies and various products of electronic digital activity in order to protect their interests potentially. The concept and types of electronic evidence in civil proceedings in different countries have different meanings. Meanwhile, the regulations of their procedural admissibility and applicability differ. The common thing is the tendency towards an increase in the use of electronic information carriers in court proceedings, increasing importance for establishing specific facts, and the decisive evidentiary role in making decisions by the court. India became one of the first countries to realize the growing level of implementation of Internet technologies, electronic digital storage media, and computer dominance in society and the state's daily life [1] (Artemyeva, Y.A. et al.). The consequence of this understanding was the timely development and implementation of the substantive and procedural bases in evidence law for practical, understandable, and convenient use of electronic evidence in civil proceedings. The article examines the types and procedural status of electronic evidence and analyzes the current legislation and law enforcement practice in the admissibility and application of electronic evidence in civil proceedings in India. The study identifies the existing system of electronic evidence in the legal field of India, the determination of the advantages and disadvantages in the gathering, presentation, research, and evaluation of electronic evidence by the court in civil proceedings, as well as the identification of the procedural order for their provision. The researchers have identified the following tasks to achieve the goals: • to define and research the legislation of India governing the concept, types and procedural order of applicability and admissibility of electronic evidence in civil proceedings in India; • to develop a particular procedural order for the effective use of the institution of electronic evidence in civil litigation in India; • to identify the current trends in the gathering, presentation, research, and evaluation of electronic evidence in India's courts, based on the established judicial practice study. The research methodology is based on general theoretical and scientific methods of cognition, including abstraction and specification, analysis and synthesis, modeling and comparison, and systemic, logical, and functional analyzes. The scientific novelty of the research consists of a comprehensive study of the instruments of legal regulation of the institution of electronic evidence in India's legal field, including regulatory legal acts and judicial precedents, and a consideration of the possibility of applying Indian approaches in the jurisdictions of other countries. The analysis of legislation and jurisprudence regarding electronic evidence in India's civil proceedings was carried out using the synergistic principle of object study, statistical-sequential analysis, and empirical research method. This study's results can be used in lawmaking to develop and improve regulations regarding the procedural status and use of electronic evidence in civil litigation in any country. The reference, citation, and use of this article's conclusions and materials are permissible when conducting lectures and seminars on civil procedure and private international law, research activities, law enforcement practice, and teaching.
APA, Harvard, Vancouver, ISO, and other styles
6

Xu, Meng, Bo Liu, and Yue Shi. "AR Experimental Game Design of Children Character Based on Etymon Literacy Method." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1001795.

Full text
Abstract:
Purpose With the promulgation of China's "Three-child Policy", the cardinal number of children population has surged. The era of parent-child format arrives. Since ancient times, China has emphasized on education. With the development of the internet, people have improved the Chinese character position unprecedently. In recent years, the game education APP of mobile terminal has developed with irresistible force due to the development of the mobile devices and the influence of COVID-19. But due to its virtual property, offline interaction is weak, and it isn't easy to review and memorize. The preschool children at the age of 3-6 focus on the concrete thinking, and their recognition to external things mainly depends on the concretization and representation of things and the association of representation, accordingly constructing knowledge. Therefore, under the trend of reduction of excessive homework burden and off-campus tutoring, it is critical to inquire how to effectively build the popular online and offline "AR game gene" in design research. Method The significance and opportunity for etymon literacy method to be introduced to children Chinese game design is found through theoretical research; The AR technology is used in practice through technical research to build the design method of virtual and real interaction; The law of development of Children's cognition and motion interaction is researched and the characteristics of word root and grapheme of Chinese characters are split and combined to find the coherence point of Children's cognitive development and literacy method and design a set of suitable Chinese character formula, excavating the similarity of word formation thought and design thought, and enlightening children's thought with word formation; Results Chinese character laboratory aims at the children at the age of 3-6 [critical period of Whole Brain Development], is oriented by the development of multiple intelligence of children, and takes AR foundation as technological base. The whole design research is analyzed in this paper and the work formation process is summarized. Conclusions The etymon literacy method and AR experimental game are of important innovative significance in children's thinking development. Chinese character laboratory fully considers the uniqueness of children in social cognition in design through etymon literacy method, will utilize children's curiosity to introduce laboratory concept, namely experiment is game, and conducts series connection of commonly used characters in the form of Chinese character atlas from fragment to systematization. In the meanwhile, AR children's interactive games are characterized by the vivid and interesting virtual Chinese character model, entity Chinese character card, AR technology's unique interactivity, immersion and imagination, and utilize the computer technology to achieve interaction, conforming to the children's concrete thinking. In the future, technology will gradually replace mankind's left brain for calculation and analysis, but the creative thinking controlled by right brain can't be substituted by technology, because the knowledge is limited, but the imagination and creativity are limitless. This design breaks through the boundedness, singleness and fragmentization of current Chinese character literacy for children, which not only can promote the development of comprehensive quality and creative thinking, but also can help children learn Chinese characters in open thinking. So it is considered as a key to develop the potential of children in all directions.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography