{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T21:46:49Z","timestamp":1767649609535,"version":"3.41.2"},"reference-count":80,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2003,2,1]],"date-time":"2003-02-01T00:00:00Z","timestamp":1044057600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003,2,1]]},"abstract":"<jats:p>The problems that the great developments in digital information and the Internet are creating for copyright may be partly solved through new legislation as well as through the implementation of technological systems (generically known as ECMS) that help protect it. These two approaches \u2013 legal and technological \u2013 interact, as the new copyright laws protect these electronic measures through the prohibition of their circumvention. The contents of the three main legal norms that have regulated this area to date, the US Digital Millennium Copyright Act, the European Directive and the new Australian Copyright Act, are analysed in an attempt to determine what impact they might have on the traditional limitations and exceptions to copyright (fair use\/dealing, private copying, library privileges) that benefit libraries, their users and the general public.<\/jats:p>","DOI":"10.1108\/00220410310458000","type":"journal-article","created":{"date-parts":[[2003,2,5]],"date-time":"2003-02-05T01:11:06Z","timestamp":1044407466000},"page":"41-68","source":"Crossref","is-referenced-by-count":12,"title":["Laws against the circumvention of copyright technological protection"],"prefix":"10.1108","volume":"59","author":[{"given":"J.","family":"Carlos Fern\u00e1ndez\u2010Molina","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","reference":[{"key":"key2022031120474000500_b1","unstructured":"American Library Association (2000), Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies. Comments of the Library Associations, available at: http:\/\/lcweb.loc.gov\/copyright\/1201\/comments\/162.pdf (accessed 29 July 2002)."},{"key":"key2022031120474000500_b2","unstructured":"Attorney General\u2019s Department (2000), Copyright Amendment (Digital Agenda) Act 2000, available at: http:\/\/scaletext.law.gov.au\/html\/comact\/10\/6223\/top.htm (accessed 29 July 2002)."},{"key":"key2022031120474000500_b3","doi-asserted-by":"crossref","unstructured":"Ayyar, R.V.V. (1998), \u201cInterest or right? The process and politics of a diplomatic conference on copyright\u201d, The Journal of World Intellectual Property, Vol. 1 No. 1, pp. 3\u201026.","DOI":"10.1111\/j.1747-1796.1998.tb00001.x"},{"key":"key2022031120474000500_b4","unstructured":"Bell, T.W. (1998), \u201cFair use vs fared use: the impact of automated rights management on copyright\u2019s fair use doctrine\u201d, North Carolina Law Review, Vol. 76, pp. 557\u2010619, available at: www.tomwbell.com\/writings\/FullFared.html (accessed 29 July 2002)."},{"key":"key2022031120474000500_b5","unstructured":"Benkler, Y. (1999), \u201cFree as the air to common use: first amendment constraints on enclosure of the public domain\u201d, New York University Law Review, Vol. 74 No. 2, pp. 354\u2010446, available at: www.nyu.edu\/pages\/lawreview\/74\/2\/benkler.pdf (accessed 29 July 2002)."},{"key":"key2022031120474000500_b6","doi-asserted-by":"crossref","unstructured":"Benkler, Y. (2001), \u201cThe battle over the institutional ecosystem in the digital environment\u201d, Communications of the ACM, Vol. 44 No. 2, pp. 84\u201090.","DOI":"10.1145\/359205.359235"},{"key":"key2022031120474000500_b7","unstructured":"Besek, J. (2001), \u201cUnited States (national report). The scope of the prohibition on circumvention of technological measures: exceptions\u201d, paper presented at the ALAI 2001 Congress: Adjuncts and Alternatives to Copyright, New York, NY, 13\u201017 June, available at: www.law.columbia.edu\/conferences\/2001\/Reports\/usa_id2_en.doc (accessed 29 July 2002)."},{"key":"key2022031120474000500_b8","doi-asserted-by":"crossref","unstructured":"Boyle, J. (1997), \u201cA politics of intellectual property: environmentalism for the net?\u201d, Duke Law Journal, Vol. 47 No. 1, pp. 87\u2010116.","DOI":"10.2307\/1372861"},{"key":"key2022031120474000500_b9","unstructured":"Bygrave, L.A. and Koelman, K.J. (2000), \u201cPrivacy, data protection and copyright: their interaction in the context of electronic copyright management systems\u201d, in Hugenholtz, P.B. (Ed.), Copyright and Electronic Commerce. Legal Aspects of Electronic Copyright Management, Kluwer Law International, The Hague, pp. 59\u2010124."},{"key":"key2022031120474000500_b10","unstructured":"Clark, C. (1996), \u201cThe answer to the machine is in the machine\u201d, in Hugenholtz, P.B. (Ed.), The Future of Copyright in a Digital Environment, Kluwer Law International, The Hague, pp. 139\u201048."},{"key":"key2022031120474000500_b11","unstructured":"Cohen, J.E. (1996), \u201cA right to read anonymously: a closer look at \u2018copyright management\u2019 in cyberspace\u201d, Connecticut Law Review, Vol. 28, pp. 981\u20101039, available at: www.law.georgetown.edu\/faculty\/jec\/read_anonymously.pdf (accessed 29 July 2002)."},{"key":"key2022031120474000500_b12","unstructured":"Cohen, J.E. (1997), \u201cSome reflections on copyright management systems and laws designed to protect them\u201d, Berkeley Technology Law Journal, Vol. 12 No. 1, available at: www.law.berkeley.edu\/journals\/btlj\/articles\/12_1\/Cohen\/html\/reader.html (accessed 29 July 2002)."},{"key":"key2022031120474000500_b13","unstructured":"Cohen, J.E. (1999), \u201cWIPO treaty implementation in the United States: will fair use survive?\u201d, European Intellectual Property Review, Vol. 21 No. 6, pp. 285\u201097."},{"key":"key2022031120474000500_b14","doi-asserted-by":"crossref","unstructured":"Cornish, G.P. (1997), \u201cElectronic copyright management systems: dream, nightmare or reality?\u201d, IFLA Journal, Vol. 23 No. 4, pp. 284\u20107.","DOI":"10.1177\/034003529702300410"},{"key":"key2022031120474000500_b15","unstructured":"DeWerra, J. (2001), \u201cThe legal system of technological protection measures under the WIPO treaties, the Digital Millennium Copyright Act, the EU directives and other national laws (Japan, Australia)\u201d, paper presented at the ALAI 2001 Congress: Adjuncts and Alternatives to Copyright, New York, NY, 13\u201017 June, available at: www.law.columbia.edu\/conferences\/2001\/Reports\/dewerra.doc (accessed 29 July 2002)."},{"key":"key2022031120474000500_b16","unstructured":"Digital Dilemma (2000), The Digital Dilemma: Intellectual Property in the Information Age. Appendix G: The Digital Millennium Copyright Act of 1998 and Circumvention of Technological Protection Measures, National Academic Press, Washington, DC, pp. 311\u201030, available at: http:\/\/books.nap.edu\/html\/digital_dilemma\/appG.html (accessed 29 July 2002)."},{"key":"key2022031120474000500_b17","unstructured":"Dusollier, S. (1999), \u201cElectrifying the fence: the legal protection of technological measures for protecting copyright\u201d, European Intellectual Property Review, Vol. 21 No. 6, pp. 285\u201097."},{"key":"key2022031120474000500_b18","unstructured":"Elkin\u2010Koren, N. (1997), \u201cCopyright policy and the limits of freedom of contract\u201d, Berkeley Technology Law Journal, Vol. 12 No. 1, available at: www.law.berkeley.edu\/journals\/btlj\/articles\/12_1\/Elkin\u2010Koren\/html\/reader.html (accessed 29 July 2002)."},{"key":"key2022031120474000500_b19","doi-asserted-by":"crossref","unstructured":"Elkin\u2010Koren, N. (2000), \u201cThe privatization of information policy\u201d, Ethics and Information Technology, Vol. 2 No. 4, pp. 201\u20109.","DOI":"10.1023\/A:1011462828572"},{"key":"key2022031120474000500_b20","unstructured":"European Commission (1999), Amended Proposal for a European Parliament and Council Directive on the Harmonisation of Certain Aspects of Copyright and Related Rights in the Information Society, 21\/05\/1999, COM(1999)250 final, Official Journal C 180, European Commission, Brussels, 25 June."},{"key":"key2022031120474000500_b21","unstructured":"European Union (1991), Council Directive 91\/250\/CEE of 14 May 1991 on the Legal Protection of the Computer Programs, Official Journal L 122, 17 May."},{"key":"key2022031120474000500_b22","unstructured":"European Union (1998), Directive 98\/84\/EC of the European Parliament and of the Council of 20 November 1998 on the Legal Protection of Services Based on, or Consisting of, Conditional Access, Official Journal L 320, 28 November."},{"key":"key2022031120474000500_b23","unstructured":"European Union (2001), Directive 2001\/29\/EC of the European Parliament and of the Council of 22 May 2001 on the Harmonisation of Certain Aspects of Copyright and Related Rights in the Information Society, Official Journal L 167, 22 June."},{"key":"key2022031120474000500_b24","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez\u2010Molina, J.C. and Peis, E. (2001), \u201cThe moral rights of authors in the age of digital information\u201d, Journal of the American Society for Information Science and Technology, Vol. 52 No. 2, pp. 109\u201017.","DOI":"10.1002\/1097-4571(2000)9999:9999<::AID-ASI1060>3.0.CO;2-B"},{"key":"key2022031120474000500_b25","unstructured":"Fitzpatrick, S. (2000), \u201cCopyright imbalance: US and Australian responses to the WIPO digital copyright treaty\u201d, European Intellectual Property Review, Vol. 22 No. 5, pp. 214\u201026."},{"key":"key2022031120474000500_b26","doi-asserted-by":"crossref","unstructured":"Garrett, J.R. and Lyons, P.A. (1993), \u201cToward an electronic copyright management system\u201d, Journal of the American Society for Information Science, Vol. 44 No. 8, pp. 468\u201073.","DOI":"10.1002\/(SICI)1097-4571(199309)44:8<468::AID-ASI5>3.0.CO;2-W"},{"key":"key2022031120474000500_b27","unstructured":"Garrote, I. (2001), El derecho de autor en Internet. La directiva sobre derechos de autor y derechos afines en la sociedad de la informaci\u00f3n, Comares, Granada."},{"key":"key2022031120474000500_b28","doi-asserted-by":"crossref","unstructured":"Gasaway, L.N. (2001), \u201cAnti\u2010circumvention: a view from librarians and educators\u201d, paper presented at the ALAI 2001 Congress: Adjuncts and Alternatives to Copyright, New York, NY, 13\u201017 June, available at: www.law.columbia.edu\/conferences\/2001\/pres_gasaway.doc (accessed 29 July 2002).","DOI":"10.7771\/2380-176X.3504"},{"key":"key2022031120474000500_b29","doi-asserted-by":"crossref","unstructured":"Gimbel, M. (1998), \u201cSome thoughts on the implications of trusted systems for intellectual property law\u201d, Stanford Law Review, Vol. 50 No. 5, p. 1671\u201087.","DOI":"10.2307\/1229309"},{"key":"key2022031120474000500_b30","doi-asserted-by":"crossref","unstructured":"Ginsburg, J.C. (2000), \u201cFrom having copies to experiencing works: the development of an access right in US copyright law\u201d, Columbia Law School, Public Law Working Paper, No. 8, available at: http:\/\/papers2.ssrn.com\/paper.taf?ABSTRACT_ID=222493 (accessed 29 July 2002).","DOI":"10.2139\/ssrn.222493"},{"key":"key2022031120474000500_b31","unstructured":"Greenleaf, G. (1999), \u201c\u2018IP, phone home\u2019: ECMS, (c) \u2013 tech, and protecting privacy against surveillance by digital works\u201d, paper presented at the 21st International Conference on Privacy and Personal Data Protection, 13\u201015 September 1999, Hong Kong, available at: www2.austlii.edu.au\/\u223cgraham\/publications\/ip_privacy (accessed 29 July 2002)."},{"key":"key2022031120474000500_b32","unstructured":"Heide, T. (2000), \u201cAccess control and innovation under the emerging EU electronic commerce framework\u201d, Berkeley Technology Law Journal, Vol. 15 No. 3, available at: www.law.berkeley.edu\/journals\/btlj\/articles\/15_3\/heide\/heide.html (accessed 29 July 2002)."},{"key":"key2022031120474000500_b33","unstructured":"Hugenholtz, P.B. (2000), \u201cWhy the copyright directive is unimportant, and possibly invalid\u201d, European Intellectual Property Review, Vol. 22 No. 11, pp. 409\u2010505."},{"key":"key2022031120474000500_b34","unstructured":"Isaias, P. (1999), \u201cTechnology issues and electronic copyright management systems\u201d, Ariadne, Vol. 21, available at: www.ariadne.ac.uk\/issue21\/ecms (accessed 29 July 2002)."},{"key":"key2022031120474000500_b35","unstructured":"Koelman, K.J. (2000), \u201cA hard nut to crack: the protection of technological measures\u201d, European Intellectual Property Review, Vol. 22 No. 6, pp. 272\u201088."},{"key":"key2022031120474000500_b36","unstructured":"Koelman. K.J. (2001), \u201cThe protection of technological measures vs the copyright limitations\u201d, paper presented at the ALAI 2001 Congress: Adjuncts and Alternatives to Copyright, New York, NY, 13\u201017 June, available at: www.law.columbia.edu\/conferences\/2001\/pres_koelman.doc (accessed 29 July 2002)."},{"key":"key2022031120474000500_b37","unstructured":"Koelman, K.J. and Helberger, N. (2000), \u201cProtection of technological measures\u201d, in Hugenholtz, P.B. (Ed.), Copyright and Electronic Commerce: Legal Aspects of Electronic Copyright Management, Kluwer Law International, The Hague, pp. 165\u2010227."},{"key":"key2022031120474000500_b38","unstructured":"Koizumi, N. (2001), \u201cThe new or evolving \u2018access right\u2019: comments for panel session 1. D. 1\u201d, paper presented at the ALAI 2001 Congress: Adjuncts and Alternatives to Copyright, New York, NY, 13\u201017 June, available at: www.law.columbia.edu\/conferences\/2001\/pres_koizumi.doc (accessed 29 July 2002)."},{"key":"key2022031120474000500_b39","unstructured":"Koskinen\u2010Olsson, T. (2001), \u201cSecure IPR\u2010content on the Internet\u201d, paper presented at the WIPO Second International Conference on Electronic Commerce and Intellectual Property, Geneva, 19\u201021 September, available at: http:\/\/ecommerce.wipo.int\/meetings\/2001\/conference\/presentations\/pdf\/koskinen.pdf (accessed 29 July 2002)."},{"key":"key2022031120474000500_b40","unstructured":"Lessig, L. (1999a), Code and Other Laws of Cyberspace, Basic Books, New York, NY."},{"key":"key2022031120474000500_b41","doi-asserted-by":"crossref","unstructured":"Lessig, L. (1999b), \u201cThe law of the horse: what cyberlaw might teach\u201d, Harvard Law Review, Vol. 113 No. 2, pp. 501\u201049.","DOI":"10.2307\/1342331"},{"key":"key2022031120474000500_b42","unstructured":"Leymonerie, R. (1998), \u201cCriptage et droit d\u2019auteur\u201d, Les Cahiers de Propriet\u00e9 Intellectuelle, Vol. 10 No. 2, available at: www.robic.com\/cpi\/Cahiers\/10\u20102\/06LeymonerieW97.html (accessed 29 July 2002)."},{"key":"key2022031120474000500_b43","unstructured":"Lindsay, D. (2001), \u201cAustralia (national report). The scope of the prohibition on circumvention of technological measures: exceptions\u201d, paper presented at the ALAI 2001 Congress: Adjuncts and Alternatives to Copyright, New York, NY, 13\u201017 June, available at: www.law.columbia.edu\/conferences\/2001\/Reports\/Australia_id2_en.doc (accessed 29 July 2002)."},{"key":"key2022031120474000500_b44","unstructured":"Lucas, A. (1997), \u201cLe droit d\u2019auteur et protections techniques\u201d, in Dellebeke, M. (Ed.), Copyright in Cyberspace, ALAI Study Days, Amsterdam, 4\u20108 June, Cramwinckel, Amsterdam, pp. 343\u201056."},{"key":"key2022031120474000500_b45","unstructured":"Lucas, A. (1998), Droit d\u2019auteur et num\u00e9rique, Litec, Paris."},{"key":"key2022031120474000500_b46","unstructured":"MacKaay, E. (1996), \u201cThe economics of emergent property rights on the Internet\u201d, in Hugenholtz, P.B. (Ed.), The Future of Copyright in a Digital Environment, Kluwer Law International, The Hague, pp. 13\u201026."},{"key":"key2022031120474000500_b47","unstructured":"Marks, D.S. and Turnbull, B.H. (2000), \u201cTechnical protection measures. The intersection of technology, law and commercial licenses\u201d, European Intellectual Property Review, Vol. 22 No. 5, pp. 198\u2010212."},{"key":"key2022031120474000500_b48","unstructured":"Mart\u00edn\u2010Prat, M. (2001), \u201cThe scope of the legal protection of technological measures (access control\/rights control) in the EU directive on copyright and related rights in the information society: the relation between such protection and exceptions to copyright and related rights\u201d, paper presented at the ALAI 2001 Congress: Adjuncts and Alternatives to Copyright, New York, NY, 13\u201017 June, available at: www.law.columbia.edu\/conferences\/2001\/pres_martin\u2010prat.doc (accessed 29 July 2002)."},{"key":"key2022031120474000500_b49","unstructured":"Merges, R.P. (1997), \u201cThe end of friction? Property rights and contract in the \u2018Newtonian\u2019 world of on\u2010line commerce\u201d, Berkeley Technology Law Journal, Vol. 12 No. 1, available at: www.law.berkeley.edu\/journals\/btlj\/articles\/12_1\/Merges\/html\/reader.html (accessed 29 July 2002)."},{"key":"key2022031120474000500_b50","unstructured":"Miller, S. (2001), \u201cPayment in an on\u2010line world\u201d, in Edwards, L. and Waelde, C. (Eds), Law and the Internet: A Framework for Electronic Commerce, 2nd ed., Hart Publishing, Oxford, pp. 55\u201078."},{"key":"key2022031120474000500_b51","doi-asserted-by":"crossref","unstructured":"Mintzer, F., Lotspiech, J. and Morimoto, N. (1997), \u201cSafeguarding digital library contents and users: digital watermarking\u201d, D\u2010Lib Magazine, December, available at: www.dlib.org\/dlib\/december97\/ibm\/12lotspiech.html (accessed 29 July 2002).","DOI":"10.1045\/december97-lotspiech"},{"key":"key2022031120474000500_b52","doi-asserted-by":"crossref","unstructured":"Nimmer, D. (2000), \u201cA riff on fair\u2010use in the Digital Millennium Copyright Act\u201d, University of Pennsylvania Law Review, Vol. 148 No. 3, pp. 673\u2010742.","DOI":"10.2307\/3312825"},{"key":"key2022031120474000500_b53","unstructured":"Oman, R. (1998), \u201cFrom scourge to savior: how digital technology will save authorship in the age of the Internet\u201d, WIPO International Forum on the Exercise and Management of Copyright and Neighbouring Rights in the Face of the Challenges of Digital Technologies, Sevilla, 14\u201016 May, WIPO, Geneva, pp. 207\u201026."},{"key":"key2022031120474000500_b54","unstructured":"Oppenheim, C. (1996), \u201cLegal issues associated with copyright management systems\u201d, Ariadne, Vol. 2, available at: www.ariadne.ac.uk\/issue2\/copyright (accessed 29 July 2002)."},{"key":"key2022031120474000500_b55","unstructured":"O\u2019Rourke, M.A. (1998), \u201cFencing cyberspace: drawing borders in a virtual world\u201d, Minnesota Law Review, Vol. 82 No. 3, pp. 609\u2010704."},{"key":"key2022031120474000500_b56","doi-asserted-by":"crossref","unstructured":"Phoha, V.V. (2001), \u201cThe DMCA needs fixing\u201d, Communications of the ACM, Vol. 44 No. 12, pp. 33\u20104.","DOI":"10.1145\/501317.501335"},{"key":"key2022031120474000500_b57","unstructured":"Reidenberg, J.R. (1998), \u201cLex Informatica: the formulation information policy rules through technology\u201d, Texas Law Review, Vol. 76 No. 3, pp. 553\u201093."},{"key":"key2022031120474000500_b58","unstructured":"Samuelson, P. (1999), \u201cIntellectual property and the digital economy: why the anti\u2010circumvention regulations need to be revised\u201d, Berkeley Technology Law Journal, Vol. 14 No. 2, available at: www.law.berkeley.edu\/journals\/btlj\/articles\/14_2\/Samuelson\/html\/reader.html (accessed 29 July 2002)."},{"key":"key2022031120474000500_b59","unstructured":"Samuelson, P. (2000), \u201cTowards more sensible anti\u2010circumvention regulations\u201d, Proceedings of Financial Cryptography 2000 Conference, available at: www.sims.berkeley.edu\/\u223cpam\/papers\/fincrypt2.doc (accessed 29 July 2002)."},{"key":"key2022031120474000500_b60","doi-asserted-by":"crossref","unstructured":"Samuelson, P. (2001), \u201cAnticircumvention rules: threat to science\u201d, Science, Vol. 293 No. 5537, pp. 2028\u201031.","DOI":"10.1126\/science.1063764"},{"key":"key2022031120474000500_b61","unstructured":"Schlachter, E. (1997), \u201cThe intellectual property renaissance in cyberspace: why copyright law could be unimportant on the Internet\u201d, Berkeley Technology Law Journal, Vol. 12 No. 1, available at: www.law.berkeley.edu\/journals\/btlj\/articles\/12_1\/Schlachter\/html\/reader.html (accessed 29 July 2002)."},{"key":"key2022031120474000500_b62","unstructured":"Sirinelli, P. (2001), \u201cThe scope of the prohibition on circumvention of technological measures: exceptions\u201d, paper presented at the ALAI 2001 Congress: Adjuncts and Alternatives to Copyright, New York, NY, 13\u201017 June, available at: www.law.columbia.edu\/conferences\/2001\/Reports\/GenRep_id2_en.doc (accessed 29 July 2002)."},{"key":"key2022031120474000500_b63","unstructured":"Smith, N.A. (1997), \u201cUnited States of America\u201d, in Dellebeke, M. (Ed.), Copyright in Cyberspace, ALAI Study Days, Amsterdam, 4\u20108 June, Cramwinckel, Amsterdam, pp. 416\u201030."},{"key":"key2022031120474000500_b64","unstructured":"Smith, N.A. and Smith, A.V. (1997), \u201cTechnical protection devices and copyright law\u201d, Boston University Journal of Sciences and Technology Law, Vol. 3, available at: www.bu.edu\/law\/scitech\/volume3\/3jstl07.pdf (accessed 29 July 2002)."},{"key":"key2022031120474000500_b65","doi-asserted-by":"crossref","unstructured":"Stefik, M. (1997a), \u201cShifting the possible: how trusted systems and digital property rights challenge us to rethink digital publishing\u201d, Berkeley Technology Law Journal, Vol. 12 No. 1, available at: www.law.berkeley.edu\/journals\/btlj\/articles\/12_1\/Stefik\/html\/reader.html (accessed 29 July 2002).","DOI":"10.1007\/BFb0026717"},{"key":"key2022031120474000500_b66","doi-asserted-by":"crossref","unstructured":"Stefik, M. (1997b), \u201cTrusted systems\u201d, Scientific American, Vol. 276 No. 3, pp. 78\u201081.","DOI":"10.1038\/scientificamerican0397-78"},{"key":"key2022031120474000500_b67","unstructured":"Strowell, A. and Dusollier, S. (1999), La protection l\u00e9gale des syst\u00e8mes techniques, WIPO document, WCT\u2010WPPT\/IMP\/2, available at: www.wipo.int\/fre\/meetings\/1999\/wct_wppt\/pdf\/imp99_2.pdf (accessed 29 July 2002)."},{"key":"key2022031120474000500_b68","unstructured":"United States Copyright Office (2000), Rulemaking on Exemptions from Prohibition on Circumvention of Technological Measures that Control Access to Copyrighted Works, available at: www.loc.gov\/copyright\/1201\/anticirc.html (accessed 29 July 2002)."},{"key":"key2022031120474000500_b69","unstructured":"United States House of Representatives (1998a), Digital Millennium Copyright Act 1998, available at: www.loc.gov\/copyright\/legislation\/hr2281.pdf (accessed 29 July 2002)."},{"key":"key2022031120474000500_b70","unstructured":"United States House of Representatives (1998b), WIPO Copyright Treaties Implementation and On\u2010Line Copyright Infringement Liability Limitation, Report to Accompany H.R. 2281, 22 May, Report 105\u2010551, Part 1, available at: www.ipmall.fplc.edu\/hosted_resources\/Hrept_105\u2010551_May_22_.pdf (accessed 29 July 2002)."},{"key":"key2022031120474000500_b71","unstructured":"United States House of Representatives (1998c), Digital Millennium Copyright Act of 1998. Report together with Additional Views to Accompany H.R. 2281, 22 July, Report 105\u2010551, Part 2, available at: www.ipmall.fplc.edu\/hosted_resources\/Hrept_105\u2010551_pt._2_.pdf (accessed 29 July 2002)."},{"key":"key2022031120474000500_b72","unstructured":"United States Library of Congress (2000), Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, 27 October, available at: www.loc.gov\/copyright\/fedreg\/65fr64555.html (accessed 29 July 2002)."},{"key":"key2022031120474000500_b73","unstructured":"United States Senate (1998), The Digital Millennium Copyright Act of 1998. Report together with Additional Views to Accompany S. 2037, 11 May, Report 105\u2010190, available at: www.ipmall.fplc.edu\/hosted_resources\/S._Rept._105\u2010190.pdf (accessed 29 July 2002)."},{"key":"key2022031120474000500_b74","unstructured":"Vinje, T. (1997), \u201cThe new WIPO Copyright Treaty: a happy result in Geneva\u201d, European Intellectual Property Review, Vol. 19 No. 5, pp. 230\u20106."},{"key":"key2022031120474000500_b75","unstructured":"Vinje, T. (1999), \u201cCopyright imperiled?\u201d, European Intellectual Property Review, Vol. 21 No. 4, pp. 192\u2010207, available at: www.eblida.org\/ecup\/publica\/vinje.rtf (accessed 29 July 2002)."},{"key":"key2022031120474000500_b76","unstructured":"Waelde, C. (2001), \u201cThe quest for access in the digital era: copyright and the Internet\u201d, Journal of Information, Law and Technology, Vol. 6 No. 1, available at: http:\/\/elj.warwick.ac.uk\/jilt\/01\u20101\/waelde.html (accessed 29 July 2002)."},{"key":"key2022031120474000500_b77","unstructured":"WIPO (1971), Berne Convention for the Protection of Literary and Artistic Works, Paris Act of July 24, 1971, as amended on 28 September 28, 1979, available at: www.wipo.int\/clea\/docs\/en\/wo\/wo001en.htm (accessed 29 July 2002)."},{"key":"key2022031120474000500_b78","unstructured":"WIPO (1996a), WIPO Copyright Treaty, adopted by the Diplomatic Conference on 20 December 1996, available at: www.wipo.int\/clea\/docs\/en\/wo\/wo033en.htm (accessed 29 July 2002)."},{"key":"key2022031120474000500_b79","unstructured":"WIPO (1996b), WIPO Performances and Phonograms Treaty, adopted by the Diplomatic Conference on 20 December 1996, available at: www.wipo.int\/clea\/docs\/en\/wo\/wo034en.htm (accessed 29 July 2002)."},{"key":"key2022031120474000500_b80","unstructured":"WIPO (1996c), Basic Proposal for the Substantive Provisions of the Treaty on Certain Questions Concerning the Protection of Literary and Artistic Works to be Considered by the Diplomatic Conference, WIPO document CRNR\/DC\/4 of 30 August 1996, available at: www.wipo.int\/eng\/diplconf\/4dc_all.htm (accessed 29 July 2002)."}],"container-title":["Journal of Documentation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/00220410310458000","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/00220410310458000\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/00220410310458000\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:37:08Z","timestamp":1753400228000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jd\/article\/59\/1\/41-68\/196191"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,2,1]]},"references-count":80,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2003,2,1]]}},"alternative-id":["10.1108\/00220410310458000"],"URL":"https:\/\/doi.org\/10.1108\/00220410310458000","relation":{},"ISSN":["0022-0418"],"issn-type":[{"type":"print","value":"0022-0418"}],"subject":[],"published":{"date-parts":[[2003,2,1]]}}}