{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T22:30:26Z","timestamp":1767652226087,"version":"3.40.3"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Technol. Soc. Mag."],"published-print":{"date-parts":[[2003]]},"DOI":"10.1109\/mtas.2003.1216242","type":"journal-article","created":{"date-parts":[[2003,7,29]],"date-time":"2003-07-29T17:37:29Z","timestamp":1059500249000},"page":"40-47","source":"Crossref","is-referenced-by-count":2,"title":["Anti-circumvention misuse"],"prefix":"10.1109","volume":"22","author":[{"given":"D.L.","family":"Burk","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3998\/mpub.9798641"},{"issue":"5","key":"ref2","first-page":"6","volume":"110","journal-title":"17 U.S.C. \u00a7\u00a7"},{"journal-title":"17 U.S.C. \u00a7","key":"ref3","first-page":"109"},{"journal-title":"17 U.S.C. \u00a7","key":"ref4","first-page":"107"},{"issue":"5","key":"ref5","first-page":"1091","article-title":"Reverse engineering and the rise of electronic vigilantism: Intellectual property implications of \u2018lock-out\u2019 programs","volume":"68","author":"Cohen","year":"1995","journal-title":"Southern California Law Rev."},{"issue":"5","key":"ref6","first-page":"1239","article-title":"Intellectual property and shrinkwrap licenses","volume":"68","author":"Lemley","year":"1995","journal-title":"Southern California Law Rev."},{"issue":"3","key":"ref7","first-page":"1025","article-title":"Legal-ware: Contract and copyright in a digital age","volume":"67","author":"Madison","year":"1998","journal-title":"Fordham Law Rev."},{"issue":"1","key":"ref8","first-page":"137","article-title":"Shifting the possible: How trusted systems and digital proprietary rights challenge us to rethink digital publishing","volume":"12","author":"Stefik","year":"1997","journal-title":"Berkeley Technology Law J."},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2307\/1229514"},{"issue":"3","key":"ref10","first-page":"1089","article-title":"Copyright and the jurisprudence of self-help","volume":"13","author":"Cohen","year":"1998","journal-title":"Berkeley Technology Law J"},{"volume-title":"Code and Other Laws of Cyberspace","year":"1999","author":"Lessig","key":"ref11"},{"issue":"1","key":"ref12","first-page":"161","article-title":"Some reflections on copyright management systems and laws designed to protect them","volume":"12","author":"Cohen","year":"1997","journal-title":"Berkeley Technology Law J"},{"issue":"3","key":"ref13","first-page":"553","article-title":"Lex informatica: The formulation of information policy rules through technology","volume":"76","author":"Reidenberg","year":"1998","journal-title":"Texas Law Rev."},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/545148.545195"},{"volume":"273","journal-title":"aff\u2019d sub nom Universal City Studio v. Corley","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2307\/3312825"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.280776"},{"journal-title":"No. C99-2070P (W.D. Wa. Jan. 18, 2000)","key":"ref18"},{"issue":"3","key":"ref19","first-page":"73","article-title":"Contributory infringement\/patent misuse: Metaphysics and metamorphosis","volume":"44","author":"Oddi","year":"1982","journal-title":"Univ. of Pittsburgh Law Rev."},{"journal-title":"314 U.S. 488","year":"1942","key":"ref20"},{"journal-title":"379 U.S. 29","year":"1964","key":"ref21"},{"journal-title":"35 U.S.C. \u00a7\u00a7 271(c), (d)","key":"ref22"},{"journal-title":"Mallinckrodt, Inc. v. Medipart, Inc., 976 F.2d 700 (Fed. Cir. 1992)","key":"ref23"},{"issue":"3","key":"ref24","first-page":"865","article-title":"The evolving Common Law Doctrine of copyright misuse: A unified theory and its application to software","volume":"15","author":"Frischman","year":"2000","journal-title":"Berkeley Technology Law J"},{"journal-title":"911 F.3d 970 (4th Cir. 1990)","key":"ref25"},{"journal-title":"121 F.3d 516 (9th Cir. 1997)","key":"ref26"},{"journal-title":"166 F.3d 772 (5th Cir. 1999)","key":"ref27"}],"container-title":["IEEE Technology and Society Magazine"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/44\/27357\/01216242.pdf?arnumber=1216242","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T04:46:24Z","timestamp":1743309984000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1216242\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"references-count":27,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2003]]}},"URL":"https:\/\/doi.org\/10.1109\/mtas.2003.1216242","relation":{},"ISSN":["0278-0097"],"issn-type":[{"type":"print","value":"0278-0097"}],"subject":[],"published":{"date-parts":[[2003]]}}}