{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:09:29Z","timestamp":1754158169526,"version":"3.41.2"},"reference-count":50,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2004,4,1]],"date-time":"2004-04-01T00:00:00Z","timestamp":1080777600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004,4,1]]},"abstract":"<jats:p>To deal with the new circumstances arising in the digital environment, with its particular conditions for the access, distribution and use of intellectual works, three distinct approaches exist: legal (copyright laws are modified to adapt them to the new context), technological (systems designed to control access and use of works), and contractual (through licenses to regulate the conditions of use of the works). The joint use of technological measures and licenses, together with the laws that protect both, are seriously endangering the effectiveness of the limitations to copyright set forth by law to benefit libraries, their users and citizens in general. This represents a strong privatisation of access to information. Using as a point of reference the laws of countries that are on the front lines of this terrain \u2013 the USA, the European Union and Australia \u2013 some problems created by the new forms of protection of intellectual works are examined.<\/jats:p>","DOI":"10.1108\/14684520410531646","type":"journal-article","created":{"date-parts":[[2004,4,28]],"date-time":"2004-04-28T19:38:36Z","timestamp":1083181116000},"page":"148-157","source":"Crossref","is-referenced-by-count":5,"title":["Contractual and technological approaches for protecting digital works: their relationship with copyright limitations"],"prefix":"10.1108","volume":"28","author":[{"given":"J.","family":"Carlos Fern\u00e1ndez\u2010Molina","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","reference":[{"key":"key2022012719461964800_b1","unstructured":"Australian Government (2000), Copyright Amendment (Digital Agenda) Act 2000, available at: scaletext.law.gov.au\/html\/comact\/10\/6223\/top.htm."},{"key":"key2022012719461964800_b2","doi-asserted-by":"crossref","unstructured":"Benkler, Y. (2001), \u201cThe battle over the institutional ecosystem in the digital environment\u201d, Communications of the ACM, Vol. 44 No. 2, pp. 84\u201090.","DOI":"10.1145\/359205.359235"},{"key":"key2022012719461964800_b3","doi-asserted-by":"crossref","unstructured":"Boyle, J. (1996), Shamans, Software, and Spleens: Law and the Construction of the Information Society, Harvard University Press, Cambridge, MA.","DOI":"10.4159\/9780674028630"},{"key":"key2022012719461964800_b4","doi-asserted-by":"crossref","unstructured":"Cohen, J.E. (1998), \u201cLochner in cyberspace: the new economic orthodoxy of rights management\u201d, Michigan Law Review, Vol. 97 No. 2, pp. 462\u2010563.","DOI":"10.2307\/1290291"},{"key":"key2022012719461964800_b5","unstructured":"Copyright Law Review Committee (Australia) (2002), Copyright and Contract, available at: www.law.gov.au\/clrc."},{"key":"key2022012719461964800_b6","unstructured":"Crews, K.D. (2001), \u201cLooking ahead and shaping the future: provoking change in copyright law\u201d, Journal of the Copyright Society of the USA, Vol. 49 No. 2, pp. 549\u201084."},{"key":"key2022012719461964800_b7","doi-asserted-by":"crossref","unstructured":"Denicola, R.C. (1999), \u201cFreedom to copy\u201d, Yale Law Journal, Vol. 108 No. 7, pp. 1661\u201086.","DOI":"10.2307\/797446"},{"key":"key2022012719461964800_b8","unstructured":"DeWerra, J. (2001), \u201cThe legal system of technological protection measures under the WIPO Treaties, the Digital Millennium Copyright Act, the European Union directives and other national laws (Japan, Australia)\u201d, ALAI 2001 Congress: Adjuncts and Alternatives to Copyright, New York, NY, June 13\u201017, available at: www.alai2001.org\/2001_conference\/Reports\/dewerra.doc."},{"key":"key2022012719461964800_b9","doi-asserted-by":"crossref","unstructured":"Dinwoodie, G.B. (2000), \u201cA new copyright order: why national courts should create global norms\u201d, University of Pennsylvania Law Review, Vol. 149 No. 2, pp. 469\u2010580.","DOI":"10.2307\/3312732"},{"key":"key2022012719461964800_b10","doi-asserted-by":"crossref","unstructured":"Dreyfuss, R.C. (2000), \u201cUCITA in the international marketplace: are we about to export bad innovation policy?\u201d, Brooklyn Journal of International Law, Vol. 26 No. 1, pp. 49\u201055, available at: papers.ssrn.com\/paper.taf?abstract_id=217389.","DOI":"10.2139\/ssrn.217389"},{"key":"key2022012719461964800_b11","unstructured":"EBLIDA (2000), EBLIDA Response to the Proposal for a Directive on the Harmonisation of Certain Aspects of Copyright and Related Rights in the Information Society. Comments on the Text of the Amended Proposal of 14 September 2000 approved by COREPER, available at: www.eblida.org\/topics\/position\/response_october_ en.htm."},{"key":"key2022012719461964800_b12","doi-asserted-by":"crossref","unstructured":"Elkin\u2010Koren, N. (2000), \u201cThe privatisation of information policy\u201d, Ethics and Information Technology, Vol. 2 No. 4, pp. 201\u20109.","DOI":"10.1023\/A:1011462828572"},{"key":"key2022012719461964800_b13","unstructured":"European Union (1991), Council Directive 91\/250\/CEE of 14 May 1991 on the Legal Protection of the Computer Programs, Official Journal L 122, May 17, 1991."},{"key":"key2022012719461964800_b14","unstructured":"European Union (1996), Directive 96\/9\/EC of the European Parliament and of the Council of 11 March 1996 on the Legal Protection of Databases, Official Journal L 77, March 27, 1996."},{"key":"key2022012719461964800_b15","unstructured":"European Union (2001), Directive 2001\/29\/EC of the European Parliament and of the Council of 22 May 2001 on the Harmonisation of Certain Aspects of Copyright and Related Rights in the Information Society, Official Journal L 167, June 22, 2001."},{"key":"key2022012719461964800_b16","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez\u2010Molina, J.C. (2003), \u201cLaws against the circumvention of copyright technological protection\u201d, Journal of Documentation, Vol. 59 No. 1, pp. 41\u201068.","DOI":"10.1108\/00220410310458000"},{"key":"key2022012719461964800_b17","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez\u2010Molina, J.C. and Peis, E. (2001), \u201cThe moral rights of authors in the age of digital information\u201d, Journal of the American Society for Information Science and Technology, Vol. 52 No. 2, pp. 109\u201017.","DOI":"10.1002\/1097-4571(2000)9999:9999<::AID-ASI1060>3.0.CO;2-B"},{"key":"key2022012719461964800_b18","unstructured":"Fitzpatrick, S. (2000), \u201cCopyright imbalance: US and Australian responses to the WIPO Digital Copyright Treaty\u201d, European Intellectual Property Review, Vol. 22 No. 5, pp. 214\u201026."},{"key":"key2022012719461964800_b19","doi-asserted-by":"crossref","unstructured":"Foroughi, A., Albin, M. and Gillard, S. (2002), \u201cDigital rights management: a delicate balance between protection and accessibility\u201d, Journal of Information Science, Vol. 28 No. 5, pp. 389\u201095.","DOI":"10.1177\/016555150202800504"},{"key":"key2022012719461964800_b20","doi-asserted-by":"crossref","unstructured":"Gatten, J.N. (2002), \u201cThe politics of the Uniform Computer Information Transaction Act (UCITA) in digital information policy development\u201d, Online Information Review, Vol. 26 No. 6, pp. 385\u201091.","DOI":"10.1108\/14684520210452718"},{"key":"key2022012719461964800_b21","doi-asserted-by":"crossref","unstructured":"Ginsburg, J.C. (2000), \u201cInternational copyright: from a \u201cbundle\u201d of national copyright laws to a supranational code?\u201d, Journal of the Copyright Society of the USA, Vol. 47, pp. 265\u201089.","DOI":"10.2139\/ssrn.222508"},{"key":"key2022012719461964800_b22","unstructured":"Guibault, L.M.C.R. (2000), \u201cContracts and copyright exemptions\u201d, in Hugenholtz, P.B. (Ed.), Copyright and Electronic Commerce: Legal Aspects of Electronic Copyright Management, Kluwer Law International, The Hague, pp. 125\u201063."},{"key":"key2022012719461964800_b23","unstructured":"Guibault, L.M.C.R. (2003), \u201cLe tir manqu\u00e9 de la Directive europ\u00e9enne sur le droit d'auteur dans la soci\u00e9t\u00e9 de l'information\u201d, Cahiers de Propri\u00e9t\u00e9 Intellectuelle, Vol. 15 No. 2, pp. 537\u201074, available at: www.ivir.nl\/publications\/guibault\/directive_europeenne.html."},{"key":"key2022012719461964800_b24","unstructured":"Hardy, I.T. (1995), \u201cContracts, copyright and preemption in a digital world\u201d, Richmond Journal of Law and Technology, Vol. 1 No. 1, available at: law.richmond.edu\/jolt\/\/v1i1\/hardy.html."},{"key":"key2022012719461964800_b25","unstructured":"Heller, J.S. (2001), \u201cUCITA: still crazy after all these years, and still not ready for prime time\u201d, The Richmond Journal of Law and Technology, Vol. 8 No. 1, available at: law.richmond.edu\/jolt\/noflash_site\/lthome.htm."},{"key":"key2022012719461964800_b26","unstructured":"Hugenholtz, P.B. (2000), \u201cWhy the copyright directive is unimportant, and possibly invalid\u201d, European Intellectual Property Review, Vol. 22 No. 11, pp. 499\u2010505."},{"key":"key2022012719461964800_b27","unstructured":"Information Infrastructure Task Force (USA) (1995), Intellectual Property and the National Information Infrastructure: the Report of the Working Group on Intellectual Property Rights, available at: www.uspto.gov\/Web\/offices\/com\/doc\/ipnii."},{"key":"key2022012719461964800_b28","unstructured":"Koelman, K.J. and Helberger, N. (2000), \u201cProtection of technological measures\u201d, in Hugenholtz, P.B. (Ed.), Copyright and Electronic Commerce: Legal Aspects of Electronic Copyright Management, Kluwer Law International, The Hague, pp. 165\u2010227."},{"key":"key2022012719461964800_b29","doi-asserted-by":"crossref","unstructured":"Lemley, M.A. (1999), \u201cBeyond preemption: the law and policy of intellectual property licensing\u201d, California Law Review, Vol. 87 No. 1, pp. 111\u201072.","DOI":"10.2307\/3481005"},{"key":"key2022012719461964800_b30","unstructured":"Lessig, L. (1999), Code and Other Laws of Cyberspace, Basic Books, New York, NY."},{"key":"key2022012719461964800_b31","unstructured":"Litman, J. (1998), \u201cThe tales that Article 2B tells\u201d,Berkeley Technology Law Journal, Vol. 13 No. 3, available at: www.law.berkeley.edu\/journals\/btlj\/articles\/vol13\/Litman\/html\/reader.html."},{"key":"key2022012719461964800_b32","unstructured":"Long, D.E. (2001), \u201c\u2018Globalisation\u2019: a future trend or a satisfying mirage?\u201d, Journal of the Copyright Society of the USA, Vol. 49 No. 1, pp. 313\u201056."},{"key":"key2022012719461964800_b33","doi-asserted-by":"crossref","unstructured":"McManis, C.R. (1999), \u201cThe privatisation (or \u2018shrink\u2010wrapping\u2019) of American copyright law\u201d, California Law Review, Vol. 87 No. 1, pp. 173\u201090.","DOI":"10.2307\/3481006"},{"key":"key2022012719461964800_b34","unstructured":"Neal, J.G. (2000), \u201cThe fight against UCITA\u201d, Library Journal, Vol. 125 No. 15, pp. 36\u20108."},{"key":"key2022012719461964800_b35","unstructured":"NCCUSL (2003), UCITA Standby Committee is Discharged, available at: www.nccusl.org\/nccusl\/DesktopModules\/NewsDisplay.aspx?ItemID=56."},{"key":"key2022012719461964800_b36","doi-asserted-by":"crossref","unstructured":"Newby, T.G. (1999), \u201cWhat's fair here is not fair everywhere: does the American fair use doctrine violate international copyright law?\u201d, Stanford Law Review, Vol. 51 No. 6, pp. 1633\u201063.","DOI":"10.2307\/1229532"},{"key":"key2022012719461964800_b37","unstructured":"Okediji, R. (2000), \u201cToward an international fair use doctrine\u201d, Columbia Journal of Transnational Law, Vol. 39 No. 1, pp. 75\u2010175."},{"key":"key2022012719461964800_b38","unstructured":"O'Rourke, M.A. (1998), \u201cFencing cyberspace: drawing borders in a virtual world\u201d, Minnesota Law Review, Vol. 82 No. 3, pp. 609\u2010704."},{"key":"key2022012719461964800_b39","doi-asserted-by":"crossref","unstructured":"Phan, D.T.T. (1998), \u201cWill fair use function on the Internet?\u201d, Columbia Law Review, Vol. 98 No. 1, pp. 169\u2010216.","DOI":"10.2307\/1123397"},{"key":"key2022012719461964800_b40","doi-asserted-by":"crossref","unstructured":"Ragueneau, A.D. (2002), \u201cUCITA and the impact on European copyright law: a choice of law analysis\u201d, Journal of the Copyright Society of the USA, Vol. 49 No. 4, pp. 1057\u2010116.","DOI":"10.2139\/ssrn.283954"},{"key":"key2022012719461964800_b41","unstructured":"Reidenberg, J.R. (1998), \u201cLex Informatica: the formulation information policy rules through technology\u201d, Texas Law Review, Vol. 76 No. 3, pp. 553\u201093."},{"key":"key2022012719461964800_b42","doi-asserted-by":"crossref","unstructured":"Samuelson, P. (1998), \u201cDoes information really have to be licensed?\u201d, Communications of the ACM, Vol. 41 No. 9, pp. 15\u201020.","DOI":"10.1145\/285070.285073"},{"key":"key2022012719461964800_b43","unstructured":"Therien, J.R. (2001), \u201cExorcising the spectre of a \u201cpay\u2010per\u2010use\u201d society: toward preserving fair use and the public domain in the digital age\u201d, Berkeley Technology Law Journal, Vol. 16, Supplement, available at: www.law.berkeley.edu\/journals\/btlj\/articles\/vol16\/therien\/therien.pdf."},{"key":"key2022012719461964800_b44","unstructured":"US Government (1998), Digital Millennium Copyright Act 1998, available at: www.loc.gov\/copyright\/legislation\/hr2281.pdf."},{"key":"key2022012719461964800_b45","unstructured":"US Library of Congress (2000), Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies, Final Rule, available at: www.copyright.gov\/fedreg\/2000\/65fr64555.pdf."},{"key":"key2022012719461964800_b46","unstructured":"US Register of Copyrights (2001), Digital Millennium Copyright Act. Section 104 Report, available at: www.loc.gov\/copyright\/reports\/studies\/dmca\/dmca_study.html."},{"key":"key2022012719461964800_b47","unstructured":"WIPO (1971), Berne Convention for the Protection of Literary and Artistic Works, Paris Act of July 24, 1971, as amended on September 28, 1979, available at: www.wipo.int\/clea\/docs\/en\/wo\/wo001en.htm."},{"key":"key2022012719461964800_b48","unstructured":"WIPO (1996a), WIPO Copyright Treaty, adopted by the Diplomatic Conference on December 20, 1996, available at: www.wipo.int\/clea\/docs\/en\/wo\/wo033en.htm."},{"key":"key2022012719461964800_b49","unstructured":"WIPO (1996b), WIPO Performances and Phonograms Treaty, adopted by the Diplomatic Conference on 20 December, 1996, available at: www.wipo.int\/clea\/docs\/en\/wo\/wo034en.htm."},{"key":"key2022012719461964800_b50","unstructured":"WTO (1994), Agreement on Trade\u2010Related Aspects of Intellectual Property Rights, available at: www.wto.org\/english\/tratop_e\/trips_e\/t_agm0_e.htm."}],"container-title":["Online Information Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14684520410531646","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520410531646\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520410531646\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:40:08Z","timestamp":1753404008000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/oir\/article\/28\/2\/148-157\/314246"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,4,1]]},"references-count":50,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2004,4,1]]}},"alternative-id":["10.1108\/14684520410531646"],"URL":"https:\/\/doi.org\/10.1108\/14684520410531646","relation":{},"ISSN":["1468-4527"],"issn-type":[{"type":"print","value":"1468-4527"}],"subject":[],"published":{"date-parts":[[2004,4,1]]}}}