{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T15:35:18Z","timestamp":1759937718341,"version":"3.41.2"},"reference-count":67,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2008,10,17]],"date-time":"2008-10-17T00:00:00Z","timestamp":1224201600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,10,17]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>This paper aims to provide an update to the last major review by Burrull and Oppenheim of legal aspects of information management in relation to the web.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The paper reports developments in the primary areas of law in relation to the internet since 2004. Topics covered include: copyright, domain names and trademarks, linking, framing, caching and spamdexing (the use of artificial means to enhance one's position in search engines' outputs), patents, censorship, defamation, liability, conflict of laws and jurisdiction and legal deposit.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The paper shows that legal issues surrounding the internet are likely to become increasingly difficult and that either a new system is needed to resolve disputes, or that a new body of law is needed. It also suggests that information professionals need to contribute more to the ongoing legal debate.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The paper systematically describes legal issues associated with the management of electronic information.<\/jats:p><\/jats:sec>","DOI":"10.1108\/00220410810912460","type":"journal-article","created":{"date-parts":[[2008,11,1]],"date-time":"2008-11-01T08:07:32Z","timestamp":1225526852000},"page":"938-955","source":"Crossref","is-referenced-by-count":4,"title":["Legal issues for information professionals IX"],"prefix":"10.1108","volume":"64","author":[{"given":"Charles","family":"Oppenheim","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022021320481527400_b1","unstructured":"ArXiv (n.d.), available at: www.arxiv.org (accessed 12 May 2008)."},{"key":"key2022021320481527400_b2","unstructured":"Ayre, C. and Muir, A. (2004), \u201cThe right to preserve\u201d, D\u2010Lib Magazine, March 2004, available at: http:\/\/dlib.org\/dlib\/march04\/ayre\/03ayre.html (accessed 12 May 2008)."},{"key":"key2022021320481527400_b3","doi-asserted-by":"crossref","unstructured":"Bailey, S. and Thompson, D. (2006), \u201cBuilding the UK's first public web archive\u201d, D\u2010Lib Magazine, January, available at: www.dlib.org\/dlib\/january06\/thompson\/01thompson.html (accessed 12 May 2008).","DOI":"10.1045\/january2006-thompson"},{"key":"key2022021320481527400_b4","unstructured":"Bainbridge, D. (2003), \u201cTrademark infringement, the internet and jurisdiction\u201d, Journal of Information, Law and Technology, available at: www2.warwick.ac.uk\/fac\/soc\/law\/elj\/jilt\/2003_1\/bainbridge (accessed 12 May 2008)."},{"key":"key2022021320481527400_b5","doi-asserted-by":"crossref","unstructured":"Bakker, P. (2005), \u201cFile sharing \u2013 fight, ignore or compete?\u201d, Telematics and Informatics, Vol. 22, pp. 41\u201055.","DOI":"10.1016\/j.tele.2004.06.004"},{"key":"key2022021320481527400_b6","doi-asserted-by":"crossref","unstructured":"Bigos, O. (2005), \u201cJurisdiction over cross\u2010border wrongs on the internet\u201d, International and Comparative Law Quarterly, Vol. 54 No. 3, p. 585.","DOI":"10.1093\/iclq\/lei019"},{"key":"key2022021320481527400_b69","unstructured":"British Library (n.d.), \u201cAnalysis of 100 contracts offered to British Library\u201d, available at: www.bl.uk\/ip\/pdf\/ipmatrix.pdf (accessed 30 June 2008)."},{"key":"key2022021320481527400_b8","doi-asserted-by":"crossref","unstructured":"Burrell, R. and Coleman, A. (2005), Copyright Exceptions: The Digital Impact, Cambridge University Press, Cambridge.","DOI":"10.1017\/CBO9780511666964"},{"key":"key2022021320481527400_b9","doi-asserted-by":"crossref","unstructured":"Burrull, A.L. and Oppenheim, C. (2004), \u201cLegal aspects of the web\u201d, Annual Review of Information Science and Technology, Vol. 38, pp. 483\u2010548.","DOI":"10.1002\/aris.1440380111"},{"key":"key2022021320481527400_b76","unstructured":"Chartered Institute of Library and Information Professionals (n.d.), \u201cInfoethics\u201d, available at: www.infoethics.org.uk\/CILIP\/admin\/index.htm (accessed 30 June 2008)."},{"key":"key2022021320481527400_b11","doi-asserted-by":"crossref","unstructured":"Ciffolilli, A. (2006), \u201cThe economics of open source hijacking and the declining quality of digital information resources\u201d, First Monday, Vol. 12, available at: www.firstmonday.org\/issues\/issue9_9\/ciffolilli\/index.html (accessed 12 May 2008).","DOI":"10.5210\/fm.v9i9.1173"},{"key":"key2022021320481527400_b12","unstructured":"Collins, M. (2005), The Law of Defamation and the Internet, Oxford University Press, Oxford."},{"key":"key2022021320481527400_b77","unstructured":"Covenant Eyes (n.d.), available at: www.covenanteyes.com (accessed 12 May 2008)."},{"key":"key2022021320481527400_b70","unstructured":"Cox, J. (n.d.), \u201cModel standard licenses for use by publishers, librarians and subscription agents for electronic resources\u201d, available at: www.licensingmodels.com (accessed 12 May 2008)."},{"key":"key2022021320481527400_b78","unstructured":"Creative Commons (n.d.), available at: http:\/\/creativecommons.org (accessed 12 May 2008)."},{"key":"key2022021320481527400_b16","unstructured":"Cunningham, A. (2004), \u201cAssessing the justification for rights management systems\u201d, Journal of Information Law and Technology, No. 3, available at: www2.warwick.ac.uk\/fac\/soc\/law2\/elj\/jilt\/2004_3\/cunningham\/(accessed 12 May 2008)."},{"key":"key2022021320481527400_b17","unstructured":"Davison, M.J. (2005), The Legal Protection of Databases, Cambridge University Press, Cambridge."},{"key":"key2022021320481527400_b18","unstructured":"DeHaas, R.J. (2007), \u201cAccess of internet use for a selected user\u201d, US Patent Application 20070061869, available at: www.freepatentsonline.com\/y2007\/006189.html (accessed 15 March 2007)."},{"key":"key2022021320481527400_b19","doi-asserted-by":"crossref","unstructured":"Derclaye, E. (2008), The Legal Protection of Databases, Edward Elgar, Cheltenham.","DOI":"10.4337\/9781847209986"},{"key":"key2022021320481527400_b20","doi-asserted-by":"crossref","unstructured":"Deveci, H.A. (2005), \u201cPersonal jurisdiction: where cyberspace meets the real world I\u201d, Computer Law and Security Report, Vol. 21, pp. 464\u201077.","DOI":"10.1016\/j.clsr.2005.09.003"},{"key":"key2022021320481527400_b21","doi-asserted-by":"crossref","unstructured":"Deveci, H.A. (2006), \u201cPersonal jurisdiction: where cyberspace meets the real world II\u201d, Computer Law and Security Report, Vol. 22, pp. 39\u201045.","DOI":"10.1016\/j.clsr.2005.09.002"},{"key":"key2022021320481527400_b73","unstructured":"Directory of Open Access Journals (n.d.), available at: www.doaj.org (accessed 12 May 2008)."},{"key":"key2022021320481527400_b75","unstructured":"Directory of Open Access Repositories (n.d.), available at: www.opendoar.org (accessed 12 May 2008)."},{"key":"key2022021320481527400_b24","unstructured":"Durrant, F. (2006), Negotiating Licences for Digital Resources, Facet, London."},{"key":"key2022021320481527400_b25","doi-asserted-by":"crossref","unstructured":"Eschenfelder, K.R. and Desai, A.C. (2004), \u201cSoftware as protest: the unexpected resiliency of US\u2010based DeCSS posting and linking\u201d, The Information Society, Vol. 20, pp. 101\u201016.","DOI":"10.1080\/01972240490422987"},{"key":"key2022021320481527400_b26","unstructured":"European Commission (2005), \u201cEvaluation of database right\u201d, available at: http:\/\/europa.eu.int\/comm\/internal_market\/copyright\/prot\u2010databases\/prot\u2010databases_en.htm#20051212_2 (accessed 12 May 2008)."},{"key":"key2022021320481527400_b27","unstructured":"Giavarra, E. (2001), Licensing Digital Resources: How to Avoid the Legal Pitfalls, Deutsches Bibliothekinstitut, Berlin."},{"key":"key2022021320481527400_b28","doi-asserted-by":"crossref","unstructured":"Gillespie, T. (2007), Wired Shut, MIT Press, Cambridge, MA.","DOI":"10.7551\/mitpress\/7253.001.0001"},{"key":"key2022021320481527400_b29","unstructured":"Gringras, C. and Todd, E. (2008), Gringras on the Laws of the Internet, Tottel Publishing, London."},{"key":"key2022021320481527400_b30","unstructured":"Guibault, L.M.C.R. (2002), Copyright Limitations and Contract, Kluwer Law, The Hague."},{"key":"key2022021320481527400_b31","doi-asserted-by":"crossref","unstructured":"Hann, G. (2003), \u201cLiability in cyberspace\u201d, Business Information Review, Vol. 20 No. 2, pp. 95\u2010101.","DOI":"10.1177\/0266382103202010"},{"key":"key2022021320481527400_b32","unstructured":"Harris, L.E. (2002), Licensing Digital Content: A Practical Guide for Librarians, American Library Association, Chicago, IL."},{"key":"key2022021320481527400_b33","doi-asserted-by":"crossref","unstructured":"Hart, T. and Rolletschek, G. (2003), \u201cThe challenges of regulating the web\u201d, Info, Vol. 5 No. 5, pp. 6\u201024.","DOI":"10.1108\/14636690310500420"},{"key":"key2022021320481527400_b34","doi-asserted-by":"crossref","unstructured":"Hess, C. and Ostrom, E. (2007), Understanding Knowledge as a Commons, MIT Press, Cambridge, MA.","DOI":"10.7551\/mitpress\/6980.001.0001"},{"key":"key2022021320481527400_b35","doi-asserted-by":"crossref","unstructured":"Hope, J. (2008), Biobazaar: The Open Source Revolution and Biotechnology, Harvard University Press, Cambridge, MA.","DOI":"10.4159\/9780674033603"},{"key":"key2022021320481527400_b79","unstructured":"Internet Archive (n.d.), available at: www.archive.org (accessed 12 May 2008)."},{"key":"key2022021320481527400_b37","unstructured":"Jacobs, N. (2006), Open Access: Key Strategic, Technical and Economic Aspects, Chandos Publishing, Oxford."},{"key":"key2022021320481527400_b38","doi-asserted-by":"crossref","unstructured":"Jaffe, A.B. and Lerner, J. (2007), Innovation and Its Discontents, Princeton University Press, Princeton.","DOI":"10.2202\/1932-0213.1006"},{"key":"key2022021320481527400_b39","unstructured":"Joint, A. (2003), \u201cOnline chatroom regulation\u201d, Computer Law and Security Report, Vol. 19 No. 1, pp. 44\u20108."},{"key":"key2022021320481527400_b40","doi-asserted-by":"crossref","unstructured":"Jones, R., Andrew, T. and MacColl, J. (2006), The Institutional Repository, Chandos Publishing, Oxford.","DOI":"10.1533\/9781780630830"},{"key":"key2022021320481527400_b41","doi-asserted-by":"crossref","unstructured":"Kavcic\u2010Colic, A. (2003), \u201cArchiving the web: some legal aspects\u201d, Library Review, Vol. 52 No. 5, pp. 203\u20108.","DOI":"10.1108\/00242530310476698"},{"key":"key2022021320481527400_b42","doi-asserted-by":"crossref","unstructured":"King, I. (2004), \u201cInternationalising internet governance: does ICAN have a role to play?\u201d, Information and Communication Technology Law, Vol. 13 No. 3, pp. 243\u201058.","DOI":"10.1080\/1360083042000296277"},{"key":"key2022021320481527400_b43","doi-asserted-by":"crossref","unstructured":"Kohl, U. (2007), Jurisdiction and the Internet, Cambridge University Press, Cambridge.","DOI":"10.1017\/CBO9780511495311"},{"key":"key2022021320481527400_b44","unstructured":"Legal Deposit Libraries Act (2003), available at: www.opsi.gov.uk\/acts\/en2003\/2003en28.htm (accessed 12 May 2008)."},{"key":"key2022021320481527400_b45","doi-asserted-by":"crossref","unstructured":"Leith, P. (2007), Software and Patents in Europe, Cambridge University Press, Cambridge.","DOI":"10.1017\/CBO9780511495267"},{"key":"key2022021320481527400_b46","unstructured":"Lessig, L. (1999), Code, Basic Books, New York, NY."},{"key":"key2022021320481527400_b47","unstructured":"Lessig, L. (2004), Free Culture, Penguin Press, New York, NY."},{"key":"key2022021320481527400_b48","unstructured":"Lex [Column] (2006), \u201cMusic industry\u201d, The Financial Times, January 24."},{"key":"key2022021320481527400_b49","doi-asserted-by":"crossref","unstructured":"Markel, M. (2002), \u201cDeep linking: an ethical and legal analysis\u201d, IEEE Transactions on Professional Communication, Vol. 45 No. 2, pp. 77\u201083.","DOI":"10.1109\/TPC.2002.1003689"},{"key":"key2022021320481527400_b51","doi-asserted-by":"crossref","unstructured":"May, C. (2007), Digital Rights Management: The Problem of Expanding Ownership Rights, Chandos Publishing, Oxford.","DOI":"10.1533\/9781780631011"},{"key":"key2022021320481527400_b71","unstructured":"NESLI (n.d.), \u201cThe model Nesli2 licence for journals\u201d, available at: www.nesli2.ac.uk\/model.htm (accessed 12 May 2008)."},{"key":"key2022021320481527400_b53","doi-asserted-by":"crossref","unstructured":"Plotkin, R. (2003), \u201cFrom idea to action: toward a unified theory of software and the law\u201d, International Review of Law, Computers & Technology, Vol. 17 No. 3, pp. 337\u201046.","DOI":"10.1080\/1360086032000174423"},{"key":"key2022021320481527400_b54","doi-asserted-by":"crossref","unstructured":"Plotkin, R. (2005), \u201cSoftware patentability and practical utility: what's the use?\u201d, International Review of Law, Computers & Technology, Vol. 19 No. 1, pp. 23\u201036.","DOI":"10.1080\/13600860500051283"},{"key":"key2022021320481527400_b55","doi-asserted-by":"crossref","unstructured":"Porsdam, H. (2006), Copyright and Other Fairy Tales: Hans Christian Andersen and the Commodification of Creativity, Edward Elgar, Aldershot.","DOI":"10.4337\/9781781951019"},{"key":"key2022021320481527400_b56","doi-asserted-by":"crossref","unstructured":"Prins, J.E.J. (2003), \u201cConsumers, liability and the online world\u201d, Information and Communication Technology Law, Vol. 12 No. 2, pp. 143\u201064.","DOI":"10.1080\/1360083032000106935"},{"key":"key2022021320481527400_b57","unstructured":"Reed, C. (2004), Internet Law, Cambridge University Press, Cambridge."},{"key":"key2022021320481527400_b58","doi-asserted-by":"crossref","unstructured":"Rowland, D. and Campbell, A. (2002), \u201cContent and access agreements: an analysis of some of the legal issues arising from linking and framing\u201d, International Review of Law, Computers & Technology, Vol. 16 No. 2, pp. 171\u201086.","DOI":"10.1080\/1360086022000003982"},{"key":"key2022021320481527400_b59","unstructured":"Rustad, M.L. and Koenig, T.H. (2005), \u201cRebooting cybertort law\u201d, Washington Law Review, Vol. 80 No. 2, pp. 335\u2010416."},{"key":"key2022021320481527400_b60","unstructured":"Saadat, M. (2005), \u201cJurisdiction and the internet after Gutnik and Yahoo!\u201d, Journal of Information Law and Technology, No. 1, available at: www2.warwick.ac.uk\/fac\/soc\/law\/elj\/jilt\/2005_1\/saadat\/(accessed 12 May 2008)."},{"key":"key2022021320481527400_b74","unstructured":"SHERPA (n.d.), \u201cPublisher copyright policies and self\u2010archiving\u201d, available at: www.sherpa.ac.uk\/romeo.php (accessed 12 May 2008)."},{"key":"key2022021320481527400_b62","doi-asserted-by":"crossref","unstructured":"Spinello, R.A. (2002), \u201cThe use and misuse of metatags\u201d, Ethics and Information Technology, Vol. 4, pp. 23\u201030.","DOI":"10.1023\/A:1015279707974"},{"key":"key2022021320481527400_b63","doi-asserted-by":"crossref","unstructured":"Sutter, G. (2003), \u201cThe UK and online intermediary liability\u201d, International Review of Law, Computers & Technology, Vol. 17 No. 1, pp. 73\u201084.","DOI":"10.1080\/1360086032000063138"},{"key":"key2022021320481527400_b64","doi-asserted-by":"crossref","unstructured":"Tang, P. and Pare, D. (2003), \u201cGathering the foam: are business method patents a deterrent to software innovation and commercialisation?\u201d, International Review of Law, Computers & Technology, Vol. 17 No. 2, pp. 127\u201062.","DOI":"10.1080\/1360086032000122538"},{"key":"key2022021320481527400_b65","doi-asserted-by":"crossref","unstructured":"Von Bernstorff, J. (2003), \u201cDemocratic global Internet regulation? Governance, networks, international law and the shadow of hegemony\u201d, European Law Journal, Vol. 9 No. 4, pp. 511\u201026.","DOI":"10.1111\/1468-0386.00189"},{"key":"key2022021320481527400_b66","doi-asserted-by":"crossref","unstructured":"Walsh, M.G. et al. (2003), \u201cMarketers' book in cyberspace: the Anticybersquatting Consumer Protection Act\u201d, Journal of Public Policy & Marketing, Vol. 22 No. 1, pp. 96\u2010101.","DOI":"10.1509\/jppm.22.1.96.17629"},{"key":"key2022021320481527400_b72","unstructured":"Web2Rights Project (n.d.), \u201cBasic information about the IP and Web 2.0 landscape\u201d, available at: http:\/\/web2rights.org.uk\/documents.html (accessed 30 June 2008)."},{"key":"key2022021320481527400_b68","unstructured":"Willinsky, J. (2005), The Access Principle, MIT Press, Cambridge, MA."}],"container-title":["Journal of Documentation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/00220410810912460","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/00220410810912460\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/00220410810912460\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:38:01Z","timestamp":1753400281000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jd\/article\/64\/6\/938-955\/204360"}},"subtitle":["An overview of recent developments in the law, in relation to the internet"],"short-title":[],"issued":{"date-parts":[[2008,10,17]]},"references-count":67,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2008,10,17]]}},"alternative-id":["10.1108\/00220410810912460"],"URL":"https:\/\/doi.org\/10.1108\/00220410810912460","relation":{},"ISSN":["0022-0418"],"issn-type":[{"type":"print","value":"0022-0418"}],"subject":[],"published":{"date-parts":[[2008,10,17]]}}}