Ce module est une ressource pour les enseignants

Références

Publications et articles

  • Albanese, Jay. (2018). Cybercrime as an Essential Element in Transnational Counterfeiting Schemes. Presentation at International Academic Conference: Linking Organized Crime and Cybercrime. Une conférence accueillie par la Hallym University et parrainée par l’ONUDC, 8 juin 2018.
  • Burkart, Patrick. (2010). Music and cyberliberties. Wesleyan University Press.
  • Chaudhry, Peggy E., Sohail S. Chaudhry, Stephen A. Stumpf, and Hasshi Sudler. (2011). Piracy in Cyberspace: Consumer Complicity, Pirates and Enterprise Enforcement. Enterprise Information Systems, Vol. 5(2), 255-271.
  • Chaudhry, Peggy E., Sohail S. Chaudhry, Stephen A. Stumpf, and Hasshi Sudler. (2011). Piracy in Cyberspace: Consumer Complicity, Pirates and Enterprise Enforcement. Enterprise Information Systems, Vol. 5(2), 255-271.
  • Cheung, C.K. (2013). Understanding factors associated with online piracy behaviour of adolescents. International Journal of Adolescence and Youth, Vol. 18(2), 122-132.
  • City of London Police (2016). Operation Creative and IWL.
  • Clark, Birgit. (2018). Blockchain and IP Law: A Match Made in Crypto-Heaven. WIPO Magazine.
  • Cornes, Richard and Todd Sandler. (1996). The theory of externalities, public goods, and club goods, second edition. Cambridge University Press.
  • Denham, Jess. (2015). Game of Thrones season 5 breaks piracy record with 32m illegal downloads. The Independent, 23 April 2015.
  • Department of Justice. (2004). 'Operation Fastlink' Is the Largest Global Enforcement Action Ever Undertaken Against Online Piracy.
  • Dolliver, Diana and Katherine Love. (2015). Criminogenic asymmetries in cyberspace: A comparative analysis of two TOR marketplaces. Journal of Globalization Studies, Vol 6(2), 75-96
  • Drath, Ross. (2012). Hotfile, Megaupload, and the future of copyright on the Internet: What can cyberlockers tell us about DMCA reform? The John Marshall Review of Intellectual Property Law, Vol. 12, 205-241.
  • Fisher III, William W. and Cyrill P. Rigamonti. (2005). The South Africa AIDS Controversy: A Case Study in Patent Law and Policy. Harvard Law School.
  • Gibbs, Samuel. (2017). Game of Thrones: HBO hackers threaten leak of season finale. The Guardian, 21 August 2017.
  • Gifford Jr., Adam and Gary J. Santoni. (1979). Public economics: politicians, property rights, and exchange. Dryden, Press.
  • Goldsmith, Andrew and Russell Brewer. (2015). Digital drift and the criminal interaction order. Theoretical Criminology, Vol. 19(1), 112-130.
  • Gopal, Ram D. and G. Lawrence Sanders. (1998). International software piracy: Analysis of key issues and impacts. Information Systems Research, Vol. 9(4), 380-397.
  • Gopal, Ram, G. Lawrence, Sudip Bhattacharjee, Manish Agrawal and Suzanne C. Wagner. (2004). A behavioral model of digital music piracy. Journal of Organizational Computing & Electronic Commerce, Vol. 14(2), 89-105.
  • Higgins, George E. (2005). Can low self‐control help with the understanding of the software piracy problem? Deviant Behavior, Vol. 26:1-24.
  • Higgins, George E. and Abbey L. Wilson. (2006). Low Self-Control, Moral Beliefs, and Social Learning Theory in University Students' Intentions to Pirate Software. Security Journal, Vol. 19(2), 75-92.
  • Higgins, George E. and David Makin. (2004). Does Social Learning Theory Condition the Effects of Low Self-control on College Students' Software Piracy? Journal of Economic Crime Management, Vol. 2, 1-22.
  • Higgins, George E. and David Makin. (2004). Self-Control, Deviant Peers, and Software Piracy. Psychological Reports, Vol. 95(3), 921-931.
  • Higgins, George E., Brian D. Fell and Abbey L. Wilson. (2006). Digital piracy: assessing the contributions of an integrated self-control theory and social learning theory. Criminal Justice Studies, Vol. 19(1), 3-22.
  • Higgins, George E., Brian D. Fell and Abby L. Wilson. (2007). Low Self-Control and Social Learning in Understanding Students' Intentions to Pirate Movies in the United States. Social Science Computer Review, Vol. 25(3), 339-357.
  • Higgins, George E., Scott E. Wolfe and Catherine D. Marcum. (2008). Digital Piracy: An Examination of Three Measurements of Self-Control. Deviant Behavior, 29(5), 440-460.
  • Higgins, George E., Scott E. Wolfe and Catherine D. Marcum. (2008). Digital Piracy and neutralization: A trajectory analysis from short-term longitudinal data. International Journal of Cyber Criminology, Vol. 2(2), 324-336.
  • Hinduja, Sameer. (2001).Correlates of Internet software piracy. Journal of Contemporary Criminal Justice, Vol. 17,369-382.
  • Hinduja, Sameer. (2012). General Strain, Self-Control, and Music Piracy. International Journal of Cyber Criminology, Vol. 6(1), 951-967
  • Hinduja, Sameer. (2007). Neutralization theory and online software piracy: An empirical analysis. Ethics and Information Technology, Vol. 9(3), 187-204.
  • Hinduja, Sameer and Jason Ingram. (2008). Self-control and ethical beliefs on the social learning of intellectual property theft. Western Criminology Review, Vol. 9(2), 52-72.
  • Hinduja, Sameer and Jason Ingram. (2009). Social learning theory and music piracy: The differential role of online and offline peer influences. Criminal Justice Studies, Vol. 22(4), 405-420.
  • Hohn, Dave A., Lisa R. Muftic and Kelly Wolf. (2006). Swashbuckling students: an exploratory study of Internet piracy. Security Journal, Vol. 19(2), 110-127.
  • Ingram, Jason and Sameer Hinduja, S. (2008). Neutralizing music piracy: An empirical examination. Deviant Behavior, Vol. 29(4), 334-366.
  • INTA. (2017). Launch of INTA-CIPAM Children's IP Awareness and Education Campaign in Schools. INTA Bulletin, Vol. 72(9).
  • Lessig, Lawrence. (2004). Free culture: How big media uses technology and the law to lock down culture and control creativity. Penguin.
  • Lessig, Lawrence. (2008). Remix: making art and commerce thrive in the hybrid economy. Penguin.
  • Malin, Jenessa and Blain J. Fowers. (2009). Adolescent self-control and music and movie piracy. Computers in Human Behavior, Vol. 25(3), 718-722.
  • Maras, Marie-Helen. (2016). Cybercriminology. Oxford University Press.
  • Muhamading, Masriwanie. (2017). Malaysia launches Infringing Website List initiative to combat digital piracy. New Straits Times, 10 October 2017.
  • Moore, Robert G., and Elizabeth McMullan. (2009). Neutralizations and rationalizations of digital piracy: A qualitative analysis of university students. International Journal of Cyber Criminology, Vol. 3(1), 441-451.
  • Morris, Robert G. and George E. Higgins. (2009). Neutralizing Potential and Self-Reported Digital Piracy: A Multitheoretical Exploration Among College Undergraduates. Criminal Justice Review, Vol. 34(2), 173-195.
  • Respect for Intellectual Property. (n.d.). Intellectual Property or "IP" Theft - What is that?
  • Seale, Darryl A., Michael Polakowski, and Sherry Schneider. (1998). It's Not Really Theft! Personal and Workplace Ethics that Enable Software Privacy. Behavior and Information Technology, Vol. 17(1), 27-40.
  • Silbey, Jessica M. (2018). The Mythical Beginnings of Intellectual Property. George Mason Law Review, Vol. 15, 319-379.
  • Smallridge, Joshua L. and Jennifer R. Roberts. (2013). Crime Specific Neutralizations: An Empirical Examination of Four Types of Digital Piracy. International Journal of Cyber Criminology, Vol. 7(2), 125-140.
  • Shin, Seung Kyoon, Ram D. Gopal, G. Lawrence Sanders, and Andrew B. Whinston. (2004). Global software piracy revisited. Communications of the ACM, Vol. 47(1), 103-107.
  • Siponen Mikko and Anthony Vance. (2010). Neutralization: New insights into the problem of employee information systems security policy violation. Management Information Systems Quarterly, Vol. 34(3), 487-502.
  • Skinner, B. F. and Fream, A. M. (1997). A social learning theory analysis of computer crime among college students. Journal of Research in Crime and Delinquency, 34, 495-518.
  • Sykes, Gresham and David Matza. (1957). Techniques of neutralization: A theory of delinquency. American Sociological Review, Vol. 22(6), 664-670.
  • Trademarks & Brands Online (TBO). (2018). Canadian clothing company takes on online counterfeiters.
  • ONUDC. (2014a). Ne soutenez pas le crime organisé.
  • ONUDC. (2014b). « Contrefaçon. Ne soutenez pas le crime organisé. » – L’ONUDC lance une campagne de sensibilisation sur les 250 milliards de dollars générés chaque année par la contrefaçon.
  • ONUDC. (2013). Le trafic illicite de biens contrefaits et la criminalité transnationale organisée.
  • US Department of Justice. (2018). Six Former And Current Fitbit Employees Indicted For Possessing Multiple Trade Secrets Stolen From Jawbone.
  • United States Trade Representative. (2018). 2018 Special 301 Report.
  • Wall, David S. (2017). The Theft of Ideas as a Cybercrime: Downloading and Changes in the Business Model of Creative Arts. In M. McGuire and T. Holt (eds). The Handbook of Technology, Crime & Justice (pp. 161-177) , Routledge.
  • WHO, WIPO, and WTO (2015). Public Health, Intellectual Property, and TRIPS at 20: Innovations and Access to Medicines; Learning from the Past, Illuminating the Future.
  • WIPO. (2019). Looking Good: An Introduction to Industrial Designs for Small and Medium-sized Enterprises. Intellectual Property for Business Series, No. 2.
  • OMPI. (s.d.). Traité de l’OMPI sur le droit d’auteur
  • OMPI. (s.d.). Indications géographiques.
  • OMPI. (s.d.).Système international des dessins et modèles industriels. –La Haye

Arrêts

  • A&M Records, Inc. v. Napster, Inc., 239 F. 3d 1004 (2001).
  • Feist Publications, Inc v. Rural Telephone Service Co Inc., 499 U.S. 340 (1991).
  • Jewelers' Circular Pub. Co. v. Keystone Pub. Co., 281 F. 83 (2d Cir 1922).

Lois nationales et internationales

Section suivante : Exercices
Haut de page