Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3291801.3291813acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbdrConference Proceedingsconference-collections
research-article

Intellectual Property Risks and Protection Mechanisms of Big Data

Published: 27 October 2018 Publication History

Abstract

In order to deepen the innovative application of big data in different industries and accelerate the research on big data technologies, it is important to clarify the intellectual property risks of big data and to understand the intellectual property protection mechanisms. In data processing, attention should be paid to the risk of copyright infringement of web crawlers in data acquisition process; the risk of copyright infringement of cloud computing platform in data storage process; and the risk of personal privacy infringement caused by big data analysis and mining. When big data is integrated with traditional industries such as retail industry, logistics industry and health care industry, intellectual property protection mechanisms such as copyright protection of database, trade secrets protection, anti-competition regulation of data monopolies, and data privacy regulation should be given extensive attention.

References

[1]
Zhou, D. J. and Li, Z. J. 2009. High Performance Web Crawler: An Overview of Research (in Chinese). Computer Science, 8, 26--29.
[2]
Yang, H. Q. 2015. Risk Analysis of Copyright Infringement of Search Terms: Discussion Based on Robots.txt (in Chinese). Chinese Copyright, 2, 45--51.
[3]
Liu, J. R. 2017. Why History Selects Server Standards (in Chinese). Intellectual Property, 2, 22--32.
[4]
Marc, M. 2009. Cartoon Network LP, LLLP v. CSC Holdings, Inc. New York Law School Law Review, 54, 10, 585--600.
[5]
Tang, X. P., Wang, H. J. and Du, X. Y. 2012. Big Data Analysis: Competition and Coexistence between RDBMS and MapReduce (in Chinese). Journal of Software, 1, 32--45.
[6]
Miller, K., Miller, M., Moran, M. and Dai, B. 2018. Data Management Life Cycle, Texas A&M Transportation Institute, March 2018. Available from https://static.tti.tamu.edu/tti.tamu.edu/documents/PRC-17-84-F.pdf (last visited on 2018-06-24).
[7]
Schwieger, D. and Ladwig, C. 2016. Protecting Privacy in Big Data: A Layered Approach for Curriculum Integration. Information Systems Education Journal, 14, 3, 45--54.
[8]
Schönberger, V. M. and Cukier, K. 2013. The Age of Big Data. Sheng, Y. Y. and Zhou, T. translated. Hangzhou: Zhejiang People's Publishing House.
[9]
Peng, M. 2016. Protection of Intellectual Property Law in the Big Data Era (in Chinese). Communication and Copyright. 6, 178--180.
[10]
Ren, Z. L. and Cao, W. Z. 2006. Copyright Law: Principles, Rules and Cases (in Chinese). Beijing: Tsinghua University Press.
[11]
Michael, M. 2014. Disclosing Big Data. Minnesota Law Review. 99, 2, 535--583.
[12]
Namrata, K. 2017. The Privacy Battle Over the World's Largest Biometric Database. The Atlantic (2017-9-5).
[13]
Data and medicine: A Revolution in Health Care is Coming. The Economist. (2018-2-1).
[14]
Dove, E. S. 2015. Biobanks, Data Sharing, and The Drive for a Global Privacy Governance Framework. Journal of Law Medicine & Ethics, 43, 4, 675--689.

Cited By

View all
  • (2021)The Impact of Data Protection Regulations on Start-Up EnterprisesRecent Developments in Individual and Organizational Adoption of ICTs10.4018/978-1-7998-3045-0.ch007(120-133)Online publication date: 2021
  • (2019)Privatization and Privacy in the Digital CityCities and the Digital Revolution10.1007/978-3-030-29800-5_4(85-106)Online publication date: 17-Oct-2019

Index Terms

  1. Intellectual Property Risks and Protection Mechanisms of Big Data

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICBDR '18: Proceedings of the 2nd International Conference on Big Data Research
    October 2018
    221 pages
    ISBN:9781450364768
    DOI:10.1145/3291801
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Shandong Univ.: Shandong University
    • University of Queensland: University of Queensland
    • Dalian Maritime University

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 October 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Big Data
    2. Data Processing
    3. Intellectual Property
    4. Protection Mechanism
    5. Risk

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    Conference

    ICBDR 2018

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)24
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 12 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)The Impact of Data Protection Regulations on Start-Up EnterprisesRecent Developments in Individual and Organizational Adoption of ICTs10.4018/978-1-7998-3045-0.ch007(120-133)Online publication date: 2021
    • (2019)Privatization and Privacy in the Digital CityCities and the Digital Revolution10.1007/978-3-030-29800-5_4(85-106)Online publication date: 17-Oct-2019

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media