{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T00:26:40Z","timestamp":1777854400589,"version":"3.51.4"},"reference-count":75,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2005,8,1]],"date-time":"2005-08-01T00:00:00Z","timestamp":1122854400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Information Science"],"published-print":{"date-parts":[[2005,8]]},"abstract":"<jats:p>\n                    <jats:bold>This study explored differences in DeCSS posting between EU member nations, the                     PRC, Hong Kong, and Macau. DeCSS is a software program that circumvents DVD copy                     and access protection systems. The study investigated the number of websites in                     each nation that posted DeCSS. The study also examined the degree to which                     website authors included political speech on their websites referring to changes                     in copyright law brought about by World Intellectual Property Organization                     Treaty requirements. It also examined whether or not websites made reference to                     Free\/Open Source software. Results found no DeCSS posting websites in the PRC,                     Macau, Luxembourg, Spain or Portugal; and results found few DeCSS posting                     websites in Hong Kong, Ireland, Italy and Greece. Results show more DeCSS                     posting websites in northern EU nations, especially the Netherlands, Germany,                     the UK and France. The paper draws on institutional theory and collective action                     theory to suggest explanations for the observed differences in DeCSS posting.<\/jats:bold>\n                  <\/jats:p>","DOI":"10.1177\/0165551505054414","type":"journal-article","created":{"date-parts":[[2005,6,14]],"date-time":"2005-06-14T10:23:39Z","timestamp":1118744619000},"page":"317-331","source":"Crossref","is-referenced-by-count":4,"title":["The limits of DeCSS posting: a comparison of internet posting of DVD                 circumvention devices in the European Union and China"],"prefix":"10.1177","volume":"31","author":[{"given":"Kristin R.","family":"Eschenfelder","sequence":"first","affiliation":[{"name":"School of Library and Information Studies, University of                         Wisconsin-Madison, USA,"}]},{"given":"Anuj C.","family":"Desai","sequence":"additional","affiliation":[{"name":"Law School, University of Wisconsin-Madison, USA"}]},{"given":"Ian","family":"Alderman","sequence":"additional","affiliation":[{"name":"Computer Sciences, University of Wisconsin-Madison, USA"}]},{"given":"S. Joanna","family":"Sin","sequence":"additional","affiliation":[{"name":"School of Library and Information Studies, University of                         Wisconsin-Madison, USA"}]},{"given":"Shen","family":"Yi","sequence":"additional","affiliation":[{"name":"School of Library and Information Studies, University of                         Wisconsin-Madison, USA"}]}],"member":"179","published-online":{"date-parts":[[2005,8]]},"reference":[{"key":"e_1_2_2_1_1","volume-title":"Worldwide Internet Piracy Study: a Motion Picture Association of                     America Survey","author":"Motion Picture Association of America","year":"2004","unstructured":"Motion Picture Association of America , Worldwide Internet Piracy Study: a Motion Picture Association of America Survey (2004). Available at: www.mpaa.com (accessed September 2004)."},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1108\/EUM0000000007116"},{"key":"e_1_2_2_3_1","volume-title":"The Future of Ideas","author":"L. Lessig","year":"2001","unstructured":"L. Lessig , The Future of Ideas ( Random House, New York , 2001)."},{"issue":"36","key":"e_1_2_2_4_1","first-page":"65","author":"World Intellectual Property Organization","year":"1997","unstructured":"World Intellectual Property Organization , WIPO Copyright Treaty (WCT) , International Legal Materials (36) (1997) 65-75 . Available at: www.wipo.int\/treaties\/en\/ip\/wet\/index.html (accessed January 2005).","journal-title":"International Legal Materials"},{"issue":"36","key":"e_1_2_2_4_2","first-page":"76","author":"WIPO Performances and Phonograms Treaty (WPPT)","year":"1997","unstructured":"WIPO Performances and Phonograms Treaty (WPPT) , International Legal Materials (36) (1997) 76-91 . Available at www.wipo.int\/treaties\/en\/ip\/wppt\/index.html (accessed January 2005).","journal-title":"International Legal Materials"},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490480938"},{"key":"e_1_2_2_6_1","article-title":"DVD Players","author":"R. Phillips","year":"2003","unstructured":"R. Phillips , DVD Players , Linux Journal (December 2003). Available at: www.linuxjournal.com (accessed May 2004).","journal-title":"Linux Journal"},{"issue":"25","key":"e_1_2_2_7_1","first-page":"40","article-title":"The tyranny of copyright","author":"R. Boynton","year":"2004","unstructured":"R. Boynton , The tyranny of copyright , New York Times Magazine (25 January) (2004) 40-45 .","journal-title":"New York Times Magazine"},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v9i4.1133"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490422987"},{"key":"e_1_2_2_10_1","article-title":"Why do Website authors post DeCSS? A content analysis of Websites posting                         DVD circumvention software","author":"K.R. Eschenfelder","unstructured":"K.R. Eschenfelder , R.G. Howard and A.C. Desai , Why do Website authors post DeCSS? A content analysis of Websites posting DVD circumvention software , Journal of the American Society for Information Science and Technology (in press).","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"e_1_2_2_11_1","first-page":"1","volume-title":"The New Institutionalism in Organizational Analysis","author":"P. DiMaggio","year":"1991","unstructured":"P. DiMaggio and W. Powell , Introduction. In: P. DiMaggio and W. Powell (eds), The New Institutionalism in Organizational Analysis ( University of Chicago Press, Chicago , 1991) 1-38."},{"key":"e_1_2_2_12_1","volume-title":"Institutions and Organizations","author":"W.R. Scott","year":"2001","unstructured":"W.R. Scott , Institutions and Organizations ( Sage, Thousand Oaks , 2001)."},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972240290075174"},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.2307\/2392880"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511805431"},{"key":"e_1_2_2_16_1","volume-title":"China\u2019s Internet Development and Usage Report","author":"China Internet Network Information Center","year":"2004","unstructured":"China Internet Network Information Center , China\u2019s Internet Development and Usage Report (January 2004). Available at: www.cnnic.net.cn\/en\/index\/0O\/02\/index.htm (accessed June 2004)."},{"key":"e_1_2_2_17_1","volume-title":"World Telecommunication Indicators","author":"International Telecommunications Union","year":"2003","unstructured":"International Telecommunications Union , World Telecommunication Indicators (2003). Available at: www.itu.int\/ITU-D\/ict (accessed November 2004)."},{"key":"e_1_2_2_18_1","first-page":"137","article-title":"Shifting the possible: how trusted systems and digital property rights                         challenge us to rethink digital publishing","volume":"12","author":"M. Stefik","year":"1997","unstructured":"M. Stefik , Shifting the possible: how trusted systems and digital property rights challenge us to rethink digital publishing , Berkeley Technology Law Journal 12 (1997) 137-159 .","journal-title":"Berkeley Technology Law Journal"},{"issue":"5","key":"e_1_2_2_19_1","first-page":"389","article-title":"Digital rights management: a delicate balance between protection and accessibility","volume":"28","author":"A. Foroughi","year":"2002","unstructured":"A. Foroughi , M. Albin and S. Gillard , Digital rights management: a delicate balance between protection and accessibility , Journal of Information Science 28(5) (2002) 389-395 .","journal-title":"Journal of Information Science"},{"key":"e_1_2_2_20_1","first-page":"369","article-title":"The US digital agenda at WIPO","volume":"37","author":"P. Samuelson","year":"1997","unstructured":"P. Samuelson , The US digital agenda at WIPO , Virginia Journal of International Law 37 (1997) 369-439 .","journal-title":"Virginia Journal of International Law"},{"key":"e_1_2_2_21_1","volume-title":"The Law of Copyright and the Internet","author":"M. Ficsor","year":"2002","unstructured":"M. Ficsor , The Law of Copyright and the Internet ( Oxford University Press, Oxford\/New York , 2002)."},{"key":"e_1_2_2_22_1","first-page":"58","article-title":"The Copyright in the Information Society Directive: an overview","volume":"24","author":"M. Hart","year":"2002","unstructured":"M. Hart , The Copyright in the Information Society Directive: an overview , European Intellectual Property Review 24 (2002), 58-64 .","journal-title":"European Intellectual Property Review"},{"key":"e_1_2_2_23_1","first-page":"496","article-title":"The interface between the protection of technological measures and the                         exercise of exceptions to copyright and related rights","volume":"25","author":"N. Braun","year":"2003","unstructured":"N. Braun , The interface between the protection of technological measures and the exercise of exceptions to copyright and related rights , European Intellectual Property Review 25 (2003) 496-503 .","journal-title":"European Intellectual Property Review"},{"issue":"1","key":"e_1_2_2_24_1","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1108\/00220410310458000","article-title":"Laws against the circumvention of copyright technological protection","volume":"59","author":"J.C. Fernandez-Molina","year":"2003","unstructured":"J.C. Fernandez-Molina , Laws against the circumvention of copyright technological protection , Journal of Documentation 59(1) (2003) 41-68 .","journal-title":"Journal of Documentation"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/641205.641231"},{"key":"e_1_2_2_26_1","volume-title":"Workshop on Implementation Issues of the WIPO Copyright Treaty (WCT)                     and the WIPO Performances and Phonograms Treaty (WPPT)","author":"A. Strowel","unstructured":"A. Strowel and S. Dusollier , Workshop on Implementation Issues of the WIPO Copyright Treaty (WCT) and the WIPO Performances and Phonograms Treaty (WPPT) (1999). Available at: http:\/\/www.wipo.int\/documents\/en\/meetings\/1999\/wct_wppt\/doc\/imp99_2.doc, 1999 (accessed May 2004)."},{"key":"e_1_2_2_27_1","series-title":"Berkman Publication Series No.                 2004-10","volume-title":"Transposing the Copyright Directive: Legal Protection of Technological                     Measures in EU-Member States","author":"U. Gasser","year":"2004","unstructured":"U. Gasser and M. Girsberger , Transposing the Copyright Directive: Legal Protection of Technological Measures in EU-Member States (Berkman Publication Series No. 2004-10). Available at: http:\/\/cyber.law.harvard.edu\/publications (accessed November 2004)."},{"key":"e_1_2_2_28_1","volume-title":"China, International Copyright Law and Practice","author":"X. Hong","year":"2003","unstructured":"X. Hong , China, International Copyright Law and Practice (Release 15) ( Matthew Bender & Co., Newark, NJ , 2003) CHI-1 to CHI-81."},{"key":"e_1_2_2_29_1","unstructured":"Copyright Law of the Peoples\u2019 Republic of China Article 47(6)."},{"key":"e_1_2_2_30_1","volume-title":"Copyright Protection of Technological Measures","author":"Z. Lian","year":"2002","unstructured":"Z. Lian , Copyright Protection of Technological Measures (2002). Available at: http:\/\/wwww.chinacourt.org\/public\/detail.php?id=12335 (accessed May 2004)."},{"key":"e_1_2_2_31_1","first-page":"35","article-title":"IP, phone home: the uneasy relationship between copyright and privacy,                         illustrated in the laws of Hong Kong and Australia","volume":"32","author":"G. Greenleaf","year":"2002","unstructured":"G. Greenleaf , IP, phone home: the uneasy relationship between copyright and privacy, illustrated in the laws of Hong Kong and Australia , Hong Kong Law Journal 32 (2002) 35-38 .","journal-title":"Hong Kong Law Journal"},{"key":"e_1_2_2_32_1","unstructured":"Copyright Ordinance \u00a7273 (Hong Kong SAR Copyright Ordinance \u00a7 273)."},{"key":"e_1_2_2_33_1","first-page":"322","volume-title":"Citizenship and Participation in the Information Age","author":"K. O\u2019Neill","year":"2000","unstructured":"K. O\u2019Neill , Websites of resistance: internetworking and civil society. In: M. Pendakur and R. Harris (eds), Citizenship and Participation in the Information Age ( Garamond Press, Aurora , 2000) 322-335."},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/10402659908426237"},{"key":"e_1_2_2_35_1","volume-title":"The Social Movement Society","author":"D.S. Meyer","year":"1998","unstructured":"D.S. Meyer and S. Tarrow , The Social Movement Society ( Rowman & Littlefield, Lanham , 1998)."},{"key":"e_1_2_2_36_1","volume-title":"Open Network: Closed Regimes","author":"S. Kalathil","year":"2003","unstructured":"S. Kalathil and T. Boas , Open Network: Closed Regimes ( Carnegie Endowment for International Peace, Washington D.C. , 2003)."},{"key":"e_1_2_2_37_1","volume-title":"Empirical Analysis of Internet Filtering in China","author":"J. Zittrain, J.","year":"2003","unstructured":"J. Zittrain, J. and B. Edelman , Empirical Analysis of Internet Filtering in China (2003). Available at: cyber. law.harvard.edu\/publications, Research Publication No. 2003-02 ( Berkman Center for Internet and Society, Cambridge, MA ., 2003) (accessed December 2003)."},{"key":"e_1_2_2_38_1","first-page":"234","volume-title":"Asian Cyberactivism: Freedom of Expression and Media                 Censorship","author":"L. Xiguang","year":"2004","unstructured":"L. Xiguang , ICT and the demise of propaganda: China\u2019s Internet experience. In S. Gan , J. Gomez and U. Johannen (eds), Asian Cyberactivism: Freedom of Expression and Media Censorship ( Friedrich Naumann Foundation, Bangkok , 2004) 234-269."},{"key":"e_1_2_2_39_1","article-title":"US, China reach trade agreements on copyright piracy, opening                         China\u2019s distribution","author":"M. Crutsinger","year":"2004","unstructured":"M. Crutsinger , US, China reach trade agreements on copyright piracy, opening China\u2019s distribution , Washington Dateline (21 April 2004).","journal-title":"Washington Dateline"},{"key":"e_1_2_2_40_1","volume-title":"Special 301 Report","author":"USTR","year":"2004","unstructured":"USTR , US Department of Commerce , Special 301 Report (2004). Available at: http:\/\/www.ustr.gov\/Document_Library\/Reports_Publications\/2004\/2004_Special_301\/Section_Index.html (accessed November 2004)."},{"key":"e_1_2_2_41_1","volume-title":"IIPA\u2019s 2003 Estimated Trade Losses Due to Copyright Piracy                     and Piracy Levels In-Country","author":"IIPA","year":"2004","unstructured":"IIPA , IIPA\u2019s 2003 Estimated Trade Losses Due to Copyright Piracy and Piracy Levels In-Country (2004). Available at: http:\/\/www.iipa.com (accessed November 2004)."},{"key":"e_1_2_2_42_1","first-page":"991","article-title":"A tale of two copyrights: literary property in revolutionary France and America","volume":"64","author":"J. Ginsburg","year":"1990","unstructured":"J. Ginsburg , A tale of two copyrights: literary property in revolutionary France and America , Tulane Law Review 64 (1990) 991-1023 .","journal-title":"Tulane Law Review"},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1002\/1097-4571(2000)9999:9999<::AID-ASI1060>3.0.CO;2-B"},{"key":"e_1_2_2_44_1","doi-asserted-by":"crossref","DOI":"10.1515\/9780804779296","volume-title":"To Steal a Book is an Elegant Offense: Intellectual Property Law in                     Chinese Civilization","author":"W. Alford","year":"1995","unstructured":"W. Alford , To Steal a Book is an Elegant Offense: Intellectual Property Law in Chinese Civilization ( Stanford University Press, Stanford , 1995)."},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551504045852"},{"issue":"3","key":"e_1_2_2_46_1","first-page":"615","article-title":"Awakening of a sleeping dragon: the evolution of copyright conception in China","volume":"51","author":"X. Feng","year":"2004","unstructured":"X. Feng , L. Yang and F.X. Huang , Awakening of a sleeping dragon: the evolution of copyright conception in China , Journal of the Copyright Society of the U.S.A 51(3) (2004) 615-644 .","journal-title":"Journal of the Copyright Society of the U.S.A"},{"key":"e_1_2_2_47_1","volume-title":"Sunde vs. Johansen","author":"J.J. Bing","year":"2003","unstructured":"J.J. Bing , Sunde vs. Johansen ( Norwegian Research Center for Computers and Law, Oslo , 2003). Available at: http:\/\/www.domstol.no\/archive\/Oslotingrett\/Nye%20avgjorelser\/DVD-jon.doc, English translation (accessed February 2004)."},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/641205.641232"},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/570907.570919"},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/332833.332851"},{"key":"e_1_2_2_51_1","article-title":"Microsoft\u2019s power play: will trusting computing mean the end of                         the PC as we know it?","author":"R. McMillan","year":"2003","unstructured":"R. McMillan , Microsoft\u2019s power play: will trusting computing mean the end of the PC as we know it? Linux Magazine (January 2003).","journal-title":"Linux Magazine"},{"key":"e_1_2_2_52_1","article-title":"Linux rising in China","author":"R. Weisman","year":"2004","unstructured":"R. Weisman , Linux rising in China , Linux Insider (January 30 2004).","journal-title":"Linux Insider"},{"key":"e_1_2_2_53_1","article-title":"Linux revolution: Asian countries push open source","author":"J. Krikke","year":"2003","unstructured":"J. Krikke , Linux revolution: Asian countries push open source , Linux Insider (December 17 2003).","journal-title":"Linux Insider"},{"key":"e_1_2_2_54_1","first-page":"3F","article-title":"Linux to benefit from law in China","author":"J. Chao","year":"2004","unstructured":"J. Chao , Linux to benefit from law in China , Palm Beach Post (14 March 2004), 3F .","journal-title":"Palm Beach Post"},{"key":"e_1_2_2_55_1","volume-title":"Sun and the China Standard Software Company Partner to Establish the                     JAVA Desktop System as the Foundation for China\u2019s Fast Growing IT                 Industry","author":"Sun Microsystems","year":"2003","unstructured":"Sun Microsystems , Sun and the China Standard Software Company Partner to Establish the JAVA Desktop System as the Foundation for China\u2019s Fast Growing IT Industry (2003). Available at: www.sun.com\/smi\/Press\/sunflash\/2003-11 (accessed June 2004)."},{"key":"e_1_2_2_56_1","volume-title":"Chinese Firms Could Benefit From Microsoft\u2019s Loss in                 China","author":"L. Liu","year":"2003","unstructured":"L. Liu , Chinese Firms Could Benefit From Microsoft\u2019s Loss in China (2003). Available at: www.gartner.com, Research Report: FT-15-2027 (accessed April 2004)."},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1177\/016555150302900103"},{"key":"e_1_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/503124.503125"},{"key":"e_1_2_2_59_1","volume-title":"Free\/Libre and Open Source Software: Survey and Study (FLOSS)","author":"International Institute of Infonomics","year":"2002","unstructured":"International Institute of Infonomics , Free\/Libre and Open Source Software: Survey and Study (FLOSS) ( University of Maastricht, The Netherlands , 2002). Available at: http:\/\/www.infonomics.nl\/FLOSS\/report\/ (accessed September 2004)."},{"key":"e_1_2_2_60_1","volume-title":"Boston Consulting Group Hacker Survey Phase I","author":"Boston Consulting Group","year":"2002","unstructured":"Boston Consulting Group , Boston Consulting Group Hacker Survey Phase I (2002). Available at: http:\/\/www.bcg.com\/opensource\/BCGHackerSurveyOSCON24July02v073.pdf (accessed September 2004)."},{"key":"e_1_2_2_61_1","volume-title":"Rebel Code: Inside Linux and the Open Source Revolution","author":"G. Moody","year":"2001","unstructured":"G. Moody , Rebel Code: Inside Linux and the Open Source Revolution ( Perseus, Cambridge, MA , 2001)."},{"key":"e_1_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1177\/089443930001800304"},{"key":"e_1_2_2_63_1","volume-title":"Content Analysis: an Introduction to Its Methodology","author":"K. Krippendorf","year":"1980","unstructured":"K. Krippendorf , Content Analysis: an Introduction to Its Methodology ( Sage, Beverly Hills , 1980)."},{"key":"e_1_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781412983488"},{"key":"e_1_2_2_65_1","volume-title":"Pigdog Journal DeCSS Distribution Center","author":"Mr Bad","year":"2002","unstructured":"Mr Bad , Pigdog Journal DeCSS Distribution Center (2002). Available at: http:\/\/skunk.pigdog.org\/decss (accessed February 2004)."},{"key":"e_1_2_2_66_1","article-title":"Let freedom ring? Not so fast. China\u2019s still China","author":"J. Kahn","year":"2004","unstructured":"J. Kahn , Let freedom ring? Not so fast. China\u2019s still China , The New York Times (May 3 2004).","journal-title":"The New York Times"},{"key":"e_1_2_2_67_1","volume-title":"Shanghai and Shandong to Monitor Internet Cafes","author":"China Information Center","year":"2004","unstructured":"China Information Center , Shanghai and Shandong to Monitor Internet Cafes (2004). Available at: www.cicus.org (accessed April 2004)."},{"key":"e_1_2_2_68_1","volume-title":"European Union The Languages of Europe","year":"2005","unstructured":"European Union The Languages of Europe. Available at: http:\/\/europa.eu.int\/comm\/education\/policies\/lang\/languages\/index_en.html%23non-native%20speakers (accessed January 2005)."},{"key":"e_1_2_2_69_1","article-title":"Linux, digital rights on collision course","author":"S. Shankland","year":"2004","unstructured":"S. Shankland , Linux, digital rights on collision course , CNET News (3 August 2004). Available at: http:\/\/news.com.com\/2100-7344-5295804.html (accessed September 2004).","journal-title":"CNET News"},{"key":"e_1_2_2_70_1","volume-title":"Homesteading the Noosphere","author":"E. Raymond","year":"2002","unstructured":"E. Raymond , Homesteading the Noosphere (2002). Available at:www.tuxedo.org\/%7Eesr (accessed February 2004)."},{"key":"e_1_2_2_71_1","volume-title":"Embracing Insanity: Open Source Software Development","author":"R. Pavlicek","year":"2000","unstructured":"R. Pavlicek , Embracing Insanity: Open Source Software Development ( SAMS, Indianapolis , 2000)."},{"key":"e_1_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1177\/107769900007700107"},{"key":"e_1_2_2_73_1","article-title":"Tech, Studio Giants Team on new DVD locks","author":"J. Borland","year":"2004","unstructured":"J. Borland , Tech, Studio Giants Team on new DVD locks , CNET News (July 14, 2004). Available at: http:\/\/news.com.com\/2100-1025-5269286.html (accessed September 2004).","journal-title":"CNET News"},{"key":"e_1_2_2_74_1","article-title":"Firms announce video antipiracy technology","author":"Reuters News Service","year":"2004","unstructured":"Reuters News Service , Firms announce video antipiracy technology , CNET News (10 September 2004). Available at: http:\/\/news.com.com\/2011-1026-5361429.html (accessed September 2004).","journal-title":"CNET News"}],"container-title":["Journal of Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551505054414","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0165551505054414","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T23:07:00Z","timestamp":1777504020000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0165551505054414"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,8]]},"references-count":75,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2005,8]]}},"alternative-id":["10.1177\/0165551505054414"],"URL":"https:\/\/doi.org\/10.1177\/0165551505054414","relation":{},"ISSN":["0165-5515","1741-6485"],"issn-type":[{"value":"0165-5515","type":"print"},{"value":"1741-6485","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,8]]}}}