{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T04:32:42Z","timestamp":1654144362199},"reference-count":50,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1981,1,1]],"date-time":"1981-01-01T00:00:00Z","timestamp":347155200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information &amp; Management"],"published-print":{"date-parts":[[1981,1]]},"DOI":"10.1016\/0378-7206(81)90002-1","type":"journal-article","created":{"date-parts":[[2002,10,11]],"date-time":"2002-10-11T12:41:01Z","timestamp":1034340061000},"page":"55-69","source":"Crossref","is-referenced-by-count":3,"title":["A critical review of proprietary software protection"],"prefix":"10.1016","volume":"4","author":[{"given":"Charles R.","family":"Franz","sequence":"first","affiliation":[]},{"given":"Susan J.","family":"Wilkins","sequence":"additional","affiliation":[]},{"given":"Jonathan C.","family":"Bower","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0378-7206(81)90002-1_BIB1","doi-asserted-by":"crossref","unstructured":"David Bender, Computer Programs: Should they be Patentable, 68 Columbia L. Rev. 241.","DOI":"10.2307\/1120883"},{"key":"10.1016\/0378-7206(81)90002-1_BIB2","article-title":"Trade Secret Protection","volume":"909","author":"Bender","year":"1970","journal-title":"38 Geo Wash L. Rev."},{"key":"10.1016\/0378-7206(81)90002-1_BIB3","series-title":"Data Processing Contracts and the Law","author":"Bernacchi","year":"1974"},{"key":"10.1016\/0378-7206(81)90002-1_BIB4","article-title":"Legal Aspects of Proprietary Software","author":"Bigelow","year":"1968","journal-title":"Datamation"},{"key":"10.1016\/0378-7206(81)90002-1_BIB5","article-title":"Introduction: Symposium Computers in Law and Society","author":"Bigelow","year":"1977","journal-title":"Wash. U.L.Q."},{"key":"10.1016\/0378-7206(81)90002-1_BIB6","article-title":"Supreme Court Denies Flook a Patent","author":"Bigelow","year":"1978","journal-title":"Computer Law & Tax Report"},{"key":"10.1016\/0378-7206(81)90002-1_BIB7","series-title":"Data Processing Contracts","author":"Brandon","year":"1976"},{"key":"10.1016\/0378-7206(81)90002-1_BIB8","doi-asserted-by":"crossref","unstructured":"Catholic U.L., Rev. 26: 835 (1977).","DOI":"10.1016\/S0001-2092(07)60844-8"},{"key":"10.1016\/0378-7206(81)90002-1_BIB9","first-page":"15","article-title":"Golden Rule Applies to DPer Changing Jobs","volume":"11","author":"Delandy","year":"1977","journal-title":"Computerworld"},{"key":"10.1016\/0378-7206(81)90002-1_BIB10","article-title":"The Legal Problems of Data Base Technology","author":"Dixon","year":"1977","journal-title":"Wash. U.L.Q."},{"key":"10.1016\/0378-7206(81)90002-1_BIB11","doi-asserted-by":"crossref","unstructured":"Drake, L., Rev. 26 : 180\u2013198 (1976\u20131977).","DOI":"10.1093\/bioscience\/26.3.198"},{"key":"10.1016\/0378-7206(81)90002-1_BIB12","first-page":"28","article-title":"Toward Protecting Software","volume":"24","author":"Freed","year":"1978","journal-title":"Datamation"},{"key":"10.1016\/0378-7206(81)90002-1_BIB13","first-page":"3","author":"Galbi","year":"1972","journal-title":"Copyright and Unfair Competition Law as Applied to the Protection of Computer Programming"},{"key":"10.1016\/0378-7206(81)90002-1_BIB14","first-page":"28","article-title":"Toward Protecting Software","volume":"24","author":"Gordon","year":"1978","journal-title":"Datamation"},{"key":"10.1016\/0378-7206(81)90002-1_BIB15","first-page":"466","author":"Graham","year":"1968","journal-title":"Process Patents for Computer Programs"},{"key":"10.1016\/0378-7206(81)90002-1_BIB16","series-title":"Computers and the Law","article-title":"Proprietary Protection of Hardware and Software","author":"Jacobs","year":"1969"},{"key":"10.1016\/0378-7206(81)90002-1_BIB17","first-page":"5","article-title":"Privacy Emphasis Expected in 96th Congress","volume":"13","author":"Kirchner","year":"1979","journal-title":"Computerworld"},{"issue":"No. 3","key":"10.1016\/0378-7206(81)90002-1_BIB18","article-title":"Computer Software Protection: Report of an Institute Clinic","volume":"Vol. 13","author":"Koller","year":"1970","journal-title":"Idea"},{"key":"10.1016\/0378-7206(81)90002-1_BIB19","first-page":"125","article-title":"Should Software Be Copyrighted?","volume":"24","author":"Myers","year":"1978","journal-title":"Datamation"},{"key":"10.1016\/0378-7206(81)90002-1_BIB20","first-page":"978","author":"Nimmer","year":"1977","journal-title":"The Subject Matter of Copyright Under the Act of 1976"},{"key":"10.1016\/0378-7206(81)90002-1_BIB21","article-title":"Legal Problems of Computer Abuse","author":"Nycum","year":"1977","journal-title":"Wash. U.L.Q."},{"key":"10.1016\/0378-7206(81)90002-1_BIB22","unstructured":"Oberman, Copyright Protection for Computer-Produced Directories, 41 Fordham L. Rev. 767."},{"key":"10.1016\/0378-7206(81)90002-1_BIB23","first-page":"527","article-title":"Protection of Proprietary Interests in Computer Software","author":"Pope","year":"1979","journal-title":"Ala. L. Rev."},{"key":"10.1016\/0378-7206(81)90002-1_BIB24","article-title":"The Patentability of Software and Firmware","author":"Ross","year":"1977","journal-title":"Journal of the Patent Office Society"},{"key":"10.1016\/0378-7206(81)90002-1_BIB25","first-page":"57","article-title":"Cybertek Wins Legal Battle Over Trade Secrets","volume":"11","author":"Scannel","year":"1977","journal-title":"Computerworld"},{"key":"10.1016\/0378-7206(81)90002-1_BIB26","article-title":"Protecting Property in Computer Software","author":"Schuyler","year":"1969","journal-title":"The Law of Software"},{"key":"10.1016\/0378-7206(81)90002-1_BIB27","first-page":"13","article-title":"Alabama High Court: Software Not Taxable","volume":"12","author":"Upton","year":"1978","journal-title":"Computerworld"},{"key":"10.1016\/0378-7206(81)90002-1_BIB28","first-page":"12","article-title":"Tennessee Tax Applies to In-House Software","volume":"12","author":"Upton","year":"1978","journal-title":"Computerworld"},{"key":"10.1016\/0378-7206(81)90002-1_BIB29","article-title":"Legal Protection of Computer Programs","author":"Wessel","year":"1965","journal-title":"Harvard Business Review"},{"key":"10.1016\/0378-7206(81)90002-1_BIB30","article-title":"Computer Intellectual Property Claims: Computer Software and Data Base Protection","author":"Keplinger","year":"1977","journal-title":"Wash. U.L.Q."},{"key":"10.1016\/0378-7206(81)90002-1_BIB31","doi-asserted-by":"crossref","unstructured":"In re Abrams, 188 F.2d 165 (C.C.P.A. 1951).","DOI":"10.2307\/2986390"},{"key":"10.1016\/0378-7206(81)90002-1_BIB32","unstructured":"In re Bernhart, 417 F.2d 1395 (C.C.P.A. 1969)."},{"key":"10.1016\/0378-7206(81)90002-1_BIB33","doi-asserted-by":"crossref","unstructured":"In re Chatfield, 545 F.2d 152 (C.C.P.A. 1976).","DOI":"10.5694\/j.1326-5377.1976.tb128217.x"},{"key":"10.1016\/0378-7206(81)90002-1_BIB34","unstructured":"Computer Software Copyright Act of 1980, H.R.6934, introduced March 26, 1980."},{"key":"10.1016\/0378-7206(81)90002-1_BIB35","unstructured":"Continental Casualty Co. v. Beardsley, 253 F.2d 702 (1958)."},{"key":"10.1016\/0378-7206(81)90002-1_BIB36","unstructured":"Copyright Registration for Computer Programs - Announcement From the Copyright Office, 11 Bull. Copyright Soc'y 361 (1964)."},{"key":"10.1016\/0378-7206(81)90002-1_BIB37","unstructured":"Dann v. Johnston, 425 U.S. 219, 47 L. Ed. 2d 692, 96 S.Ct. 1393 (1976)."},{"key":"10.1016\/0378-7206(81)90002-1_BIB38","unstructured":"Data Cash System, Inc. v. JS&A Group, Inc., 480 F. Supp. 1063 (1979)."},{"key":"10.1016\/0378-7206(81)90002-1_BIB39","unstructured":"Data Cash System, Inc. v. JS&A Group, Inc., No. 80\u20131085, slip option (1980)."},{"key":"10.1016\/0378-7206(81)90002-1_BIB40","unstructured":"Final report of the National Commission of New Technological Uses of Copyrighted Works, July 31, 1978."},{"key":"10.1016\/0378-7206(81)90002-1_BIB41","unstructured":"Gott?chalk v. Benson, 409 U.S. 63, 34 L.Ed. 2d 273, 93 S.Ct. 253 (1972)."},{"key":"10.1016\/0378-7206(81)90002-1_BIB42","unstructured":"International News v. Associated Press, 248 U.S. 215, 63 L.Ed. 211, 39 S.Ct. 68 (1918)."},{"key":"10.1016\/0378-7206(81)90002-1_BIB43","unstructured":"Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 40 L.Ed. 2d. 315, 94 S.Ct. 1979 (1974)."},{"key":"10.1016\/0378-7206(81)90002-1_BIB44","unstructured":"Mazer v. Stein, 347 U.S. 201 (1954)."},{"key":"10.1016\/0378-7206(81)90002-1_BIB45","unstructured":"McKay Radio & Telegraph Co. v. Radio Corp. of America, 306 U.S. 86 (1939)."},{"key":"10.1016\/0378-7206(81)90002-1_BIB46","unstructured":"MICR-Shield Co. v. First Nat. Bank, 2 CLSR 1."},{"key":"10.1016\/0378-7206(81)90002-1_BIB47","unstructured":"In re Musgrave, 431 F.2d 822 (C.C.P.A. 1970)."},{"key":"10.1016\/0378-7206(81)90002-1_BIB48","unstructured":"National Tube Co. v. Eastern Tube Co., 69 Ohio St 560, 70 N.E. 1127 (1903)."},{"key":"10.1016\/0378-7206(81)90002-1_BIB49","unstructured":"Parker v. Flook, 437 U.S. 584, 57 L.Ed. 2d. 451, 98 S.Ct 2522 (1978)."},{"key":"10.1016\/0378-7206(81)90002-1_BIB50","unstructured":"Patent Office Examination of Patent, Application on Computer Programs, Notice of Issuance Guidelines, 33 Fed. Reg. 15609-10 (1968)."}],"container-title":["Information &amp; Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0378720681900021?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0378720681900021?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,5]],"date-time":"2020-03-05T14:52:33Z","timestamp":1583419953000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0378720681900021"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1981,1]]},"references-count":50,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1981,1]]}},"alternative-id":["0378720681900021"],"URL":"https:\/\/doi.org\/10.1016\/0378-7206(81)90002-1","relation":{},"ISSN":["0378-7206"],"issn-type":[{"value":"0378-7206","type":"print"}],"subject":[],"published":{"date-parts":[[1981,1]]}}}