TY - GEN
T1 - Intellectual Capital - A Third Party's Point of View
AU - Ophir, Dan
N1 - 21st European Conference on Knowledge Management (ECKM), Conventry Univ, ELECTR NETWORK, DEC 02-04, 2020
PY - 2020
Y1 - 2020
N2 - The four main participants concerning Intellectual Property are the owner, the receiver, the users, and the guards watching the ethicality. Generally, the disagreements between the IC owners and their receivers are resolved in the courts, where the ownership claims are investigated; the guard's role is to decrease the illegal transferring of the IC from the owners to illegal receivers (stealing the Intellectual Property). Such illegal IC acquisition causes damage to the IC's legal owners. However, this is not the case in IC transfer, in which the IC owners collaborate with the IC receivers and the guards make efforts to avoid such a transfer. Here the owners are not adversely affected and do not claim their ownership; on the contrary, they try to hide their ownership - the victims are third-party persons. An example of such illegal, collaborative IC transfer may serve students' interests in the context of an examination and their work submitted to the teacher for evaluation. The two stages of dealing with the above problems are as follows: 1. Avoiding the flow of information from outside the students' community and transferring it to the students themselves. Such avoidance may partially succeed, using some technical blocking methods; however, during classwork, the situation is more difficult, for example, dealing with homework. 2. Detection is the stage whereby the first line of security is inadequate, or it refers to increasing the protection level of the students' evaluation process. This stage requires more sophisticated methods for comparing two works and for estimating the probability that one work has been copied. The treatment of this issue depends on the types of work in various faculties. They may be divided into three main groups: 1. Humanities and Social Sciences - whose works are more verbal; 2. Natural Sciences and Engineering - in which the submitted works require some kind of formalization, including mathematical formulas and computing results. 3. Art - sculptures, paintings, and music - the results of the composers should be compared.
AB - The four main participants concerning Intellectual Property are the owner, the receiver, the users, and the guards watching the ethicality. Generally, the disagreements between the IC owners and their receivers are resolved in the courts, where the ownership claims are investigated; the guard's role is to decrease the illegal transferring of the IC from the owners to illegal receivers (stealing the Intellectual Property). Such illegal IC acquisition causes damage to the IC's legal owners. However, this is not the case in IC transfer, in which the IC owners collaborate with the IC receivers and the guards make efforts to avoid such a transfer. Here the owners are not adversely affected and do not claim their ownership; on the contrary, they try to hide their ownership - the victims are third-party persons. An example of such illegal, collaborative IC transfer may serve students' interests in the context of an examination and their work submitted to the teacher for evaluation. The two stages of dealing with the above problems are as follows: 1. Avoiding the flow of information from outside the students' community and transferring it to the students themselves. Such avoidance may partially succeed, using some technical blocking methods; however, during classwork, the situation is more difficult, for example, dealing with homework. 2. Detection is the stage whereby the first line of security is inadequate, or it refers to increasing the protection level of the students' evaluation process. This stage requires more sophisticated methods for comparing two works and for estimating the probability that one work has been copied. The treatment of this issue depends on the types of work in various faculties. They may be divided into three main groups: 1. Humanities and Social Sciences - whose works are more verbal; 2. Natural Sciences and Engineering - in which the submitted works require some kind of formalization, including mathematical formulas and computing results. 3. Art - sculptures, paintings, and music - the results of the composers should be compared.
KW - Forging
KW - Copyrights
KW - Machine Learning
KW - Signature
KW - Ethics
KW - Privacy
KW - Cyber Security
KW - Patents' Registration
KW - Morphology Processing
KW - Steganography
UR - http://www.scopus.com/inward/record.url?scp=85099882857&partnerID=8YFLogxK
M3 - ???researchoutput.researchoutputtypes.contributiontobookanthology.conference???
SN - 978-1-912764-82-2
T3 - Proceedings of the European Conference on Knowledge Management
SP - 603
EP - 611
BT - PROCEEDINGS OF THE 21ST EUROPEAN CONFERENCE ON KNOWLEDGE MANAGEMENT (ECKM 2020)
A2 - GarciaPerez, A
A2 - Simkin, L
CY - CURTIS FARM, KIDMORE END, NR READING, RG4 9AY, ENGLAND
T2 - 21st European Conference on Knowledge Management, ECKM 2020
Y2 - 2 December 2020 through 4 December 2020
ER -