{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:26:10Z","timestamp":1750220770115,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,2,19]],"date-time":"2020-02-19T00:00:00Z","timestamp":1582070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,2,19]]},"DOI":"10.1145\/3385209.3385228","type":"proceedings-article","created":{"date-parts":[[2020,6,7]],"date-time":"2020-06-07T00:35:48Z","timestamp":1591490148000},"page":"97-101","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Legal Protection of Copyright on Copyrighted Content Downloaded Through the Internet"],"prefix":"10.1145","author":[{"given":"Arvin","family":"Indrawan","sequence":"first","affiliation":[{"name":"Mobile Application &amp; Technology - School of Computer Science, Bina Nusantara University, Jakarta, Indonesia"}]},{"given":"Garry","family":"Stevens","sequence":"additional","affiliation":[{"name":"Mobile Application &amp; Technology - School of Computer Science, Bina Nusantara University, Jakarta, Indonesia"}]},{"given":"Gratianus Martin","family":"Brianto","sequence":"additional","affiliation":[{"name":"Mobile Application &amp; Technology - School of Computer Science, Bina Nusantara University, Jakarta, Indonesia"}]},{"given":"Ford Lumban","family":"Gaol","sequence":"additional","affiliation":[{"name":"Computer Science Department, BINUS Graduate Program-Doctor of Computer Science, Bina Nusantara University, Jakarta, Indonesia"}]},{"given":"Tanty","family":"Oktavia","sequence":"additional","affiliation":[{"name":"Information Systems Program -School of Information Systems Bina Nusantara University, Jakarta, Indonesia"}]}],"member":"320","published-online":{"date-parts":[[2020,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Ahmad Nehaluddin.: Copyright Protection in Cyberspace: A critical study with reference to Electronic Copyright Management Systems (ECMS) (2009)."},{"key":"e_1_3_2_1_2_1","unstructured":"Florijn Peter.: Intellectual Property and Copyright Law in a Digital Age (2015)."},{"key":"e_1_3_2_1_3_1","unstructured":"Michael Nwosu Isochukwu.: Copyright Protection: The Legal and Sophisticated Response in the Digital Age (2016)."},{"key":"e_1_3_2_1_4_1","unstructured":"Jansen M.: The Protection of Copyright Works on the Internet - an overview (2005)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.30722\/sup.9781920898724"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Long Dorris Estelle.: Protecting Copyright in the Digital Environment: Suggested Amendments to the 2005 Civil Code (Vietnam) to Clarify the Boundary Between Protection and Access (2013).","DOI":"10.2139\/ssrn.2479924"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Oduor Frederick Oduol.: The Internet and Copyright Protection: Are We Producing Global Generation of Copyright Criminal (2011).","DOI":"10.2139\/ssrn.1640253"},{"key":"e_1_3_2_1_8_1","unstructured":"Rafiqi Fareed Ahmad & Bhat Iftikhar Hussian.: Copyright Protection in Digital Environment: Emerging Issues (2013)."},{"key":"e_1_3_2_1_9_1","unstructured":"Flanagan A. & Maniatis S.M.: Intellectual Property on the Internet (2008)."},{"key":"e_1_3_2_1_10_1","unstructured":"Kolisnykova Hanna V. & Lekhar Oksana V.: Copyright Protection on Youtube and Instagram (2018)."},{"key":"e_1_3_2_1_11_1","unstructured":"Kumar Rajendra & R Latha.: Copyright Protection in the Internet: an Indian Perspective (2001)."},{"key":"e_1_3_2_1_12_1","unstructured":"Alzapiedi Kate.: Copyright Challenges and Solutions (2012)."},{"key":"e_1_3_2_1_13_1","unstructured":"Sengupta Shantashree S.: Copyright Infringement & Plagiarism: Are they really two side of coin? (2015)"}],"event":{"name":"ICIIT 2020: 2020 5th International Conference on Intelligent Information Technology","acronym":"ICIIT 2020","location":"Hanoi Viet Nam"},"container-title":["Proceedings of the 2020 5th International Conference on Intelligent Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3385209.3385228","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3385209.3385228","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:14Z","timestamp":1750200074000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3385209.3385228"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,19]]},"references-count":13,"alternative-id":["10.1145\/3385209.3385228","10.1145\/3385209"],"URL":"https:\/\/doi.org\/10.1145\/3385209.3385228","relation":{},"subject":[],"published":{"date-parts":[[2020,2,19]]},"assertion":[{"value":"2020-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}