INTELLECTUAL PROPERTY RIGHTS, ETHICS AND VALUES IN NIGERIA: A CRITICAL INVESTIGATION
Abstract
Full Text:
PDFReferences
Adedej,A.(2011a).CombatingpiracythroughopticalDiscplantregulationinNigeria:Prospectsandchallenges.JournalofIntellectualProperty[NJIP],MaidenEdition,1-12.Adedej,A.(2011b).TheStrategicActionAgainstPiracy(STRAP)PolicyinNigeria,ResearchPapersfromtheWIPO-WTOColloquiumforTeachersofIntellectualPropertyLaw2010.(Geneva:WIPO-WTO,2011),107-118.Adewopo,A.A.(2008).TheGainisMorethanthePain:CostBenefitPerspectiveoftheRegulationandControlofCopyrightBasedIndustriesinNigeria?.Internationalsymposiumoneconomiccrimes.JesusCollegeUniversityofCambridgeUnitedKingdom.p.6http://www.nials-nigeria.org/journals/Wole%20Adedejinjip.pdfAfolayan, O. T. (2020). Intellectual Property Rights Protection in Nigeria.International Journal of Library and Information Services, 9(2), 51-57. https://doi.org/10.4018/ijlis.2020070103Appleyard,M.(2015).Corporateresponsestoonlinemusicpiracy:Strategiclessonsforthechallengeofadditivemanufacturing,BusinessHorizons,58(1),69-76.doi:10.1016/j.bushor.2014.09.007Bell,E.E.(2017).ANarrativeInquiry:ABlackMaleLookingtoTeach.TheQualitativeReport,22(4),1137-1150.Bennett, S. (2017). What is information governance and how does it differ from data governance? Governance Directions, 69(8), 462–467.Blakeney,M.(2005).GuidebookOnEnforcementOfIntellectualPropertyRights.QueenMaryIntellectualPropertyResearchInstituteQueenMary,UniversityofLondon.Retrievedfrom:http://trade.ec.europa.eu/doclib/docs/2005/april/tradoc_122641.pdf
Blakeney, M., &Mengistie, G. (2011). Intellectual Property and Economic Development in sub-Saharan Africa. Journal of World Intellectual Property 14(3/4): 238–264. doi: 10.111/j.1747-1796-00417.xBode, K. (2013). Hollywood Wants Right to Use Malware Against Pirates Retrieved fromhttp://www.dslreports.com/shownews/Hollywood-Wants-Right-to-Use-Malware-Against-Pirates-124388BusinessSoftwareAlliance(2011).ShadowMarket.In2011Globalsoftwarepiracystudy.NinthEdition,May,2012Carolan, E. (2016). The continuing problems with online consent under the EU's emerging data protectionprinciples. Research funded byIrish Research Council (R12963). ComputerLaw &SecurityReview, 32(2), 462-473. doi:10.1016/j.clsr.2016.02.004Chaudhry,P.E.,Zimmerman,A.,Peters,J.R.,&Cordell,V.V.(2009).Preservingintellectualpropertyrights:Managerialinsightintotheescalatingcounterfeitmarketquandary,BusinessHorizons,52(1),57-66.doi:10.1016/j.bushor.2008.04.003Chen, Y., &Puttitanun, P. (2005).Intellectual Property Rights and Innovation in Developing Countries.Journal of Development Economics, 78(1), 474-493. doi:10.1016/j.jdeveco.2004.11.005 Coronado, A. S. (2013). ComputerSecurity:PrinciplesandPractice, Second Edition. Journal of Information Privacy andSecurity, 9(2), 62-65. doi:10.1080/15536548.2013.10845680Deep, J. F., &Saradindu, B. (2017). Intellectual property rights, social values, and innovation: a cross-country simultaneous equations model. Economics of Innovation and New Technology, 1-22. https://doi.org/10.1080/10438599.2019.1700607FBI. (2013). It’s an age-old crime: stealing. Retrieved fromhttp://www.fbi.gov/about-us/investigate/white_collar/ipr/iprHill, C., & Burrows, G. (2017). New voices: Theusefulnessof a narrative approach to social work research. QualitativeSocialWork:Researchand Practice, 16(2), 273-288. doi:10.1177/1473325017689966Hoffman, D. D., Singh, M., &Prakash, C. (2015).The Interface Theory of Perception Psychonomic.Bulletin& Review, 22(6), 1480-1506.doi:10.3758/s13423-015-0890-8ITU (2017).Intellectual Property Rights (IPRs), International Telecommunication Union, Retrieved May 22, 2017, from http://www.itu.int/en/ITU-T/ipr/Pages/default.aspx.Komatsu, A., Takagi, D., &Takemura, T. (2013).Human aspects of information security.Information Management & Computer Security, 21(1), 5-15.doi:10.1108/09685221311314383
Narain, S. A., Gupta, M. P., &Ojha, A. (2014).Identifying factors of "organizational information security management. Journal of Enterprise Information Management, 27(5), 667-644.doi:10.1108/jeim-07-2013-0052Neba, A. (2013). IPR systems and technology transfer at research institutions in southern Africa.Regional and Thematic Papers on Research Management 2009–2013Ogutu, S. O., Okello, L. J., &Otieno, D. J. (2014). Impact of Information and Communication Technology-Based Market Information Services on Smallholder Farm Input Use and Productivity: The Case of Kenya. World Development, 64(1), 311–321. Oladimeji, T. T., &Foltyn, G. B. (2018). ICT and Its Impact on National Development In Nigeria: An Overview. Research & Reviews: Journal of Engineering and Technology, 7(1), 1-10.Olise, F. P. (2010). Information and Communication Technologies (ICTs) and Sustainable Development in Africa: Mainstreaming the Millennium Development Goals (MDGs) into Nigeria’s Development Agenda.Journal of Social Sciences, 24(3), 155-167.Olubiyi,I. A., Adaji,A. E., &Adetula,A.F.(2020).Increasing the commercial value of image rights in Nigeria: legal possibilities.JournalofIntellectualPropertyLaw&Practice, 15(3), 193–197. https://doi.org/10.1093/jiplp/jpz177Osunde, C. (2017). Small and Medium Enterprises: Management of Intellectual Property Rights in Nigeria. Intellectual Property Rights, 5(1), 1-12. https://doi.org/10.4172/2375-4516.100080Perez, R. G., Branch, R., &Kuofie, M. (2014).EOFISI Model as a Predictive Tool to Favor Smaller Gaps on the Information Security Implementations.Journal of Information Technology and Economic Development, 5(1), 1-20.Piquero, N. L. (2005). Causes and prevention of intellectual property crime.TrendsinOrganizedCrime,4(1),40-61.Reid, R. (2012).What to Do When Attacked By Pirates. Wall Street Journal.Retrieved fromhttp://www.wsj.com/articles/SB10001424052702303552104577438212250619458Sargolzaei, E., &Fateme , F. (2017). Examining software Intellectual Property rights. (IJACSA) International Journal of Advanced Computer Science and Applications, 8(11), 594-600.Scarnato,J.M.(2017).Thevalueofdigitalvideodataforqualitativesocialworkresearch:Anarrativereview.QualitativeSocialWork:ResearchandPractice,doi:10.1177/1473325017735885Stallings, W., & Brown, L. (2012).Computer security: Principles and practice(2nd ed.).Upper Saddle River, NJ: Prentice Hall.
Stanley, N. (2011). Intellectual Property Theft: Protecting Data Against Cyber Criminals. Retrieved fromhttp://www.bloorresearch.com/analysis/11762/intellectual-property-theft-protecting-data-cyber.htmlStewart,G.,&Lacey,D.(2012),"Deathbyathousandfacts",InformationManagement&ComputerSecurity,20(1),29-38.doi:10.1108/09685221211219182Tade, O., &Akinleye, B.(2012). ?We are Promoters not Pirates?: A Qualitative AnalysisofArtistesandPiratesonMusicPiracyinNigeria.InternationalJournalofCyberCriminology,6(2).Retrievedfrom:http://www.cybercrimejournal.com/Tade&Akenliye2012julyijcc.pdfTaylor, R. G., & Robinson, S. L. (2015). An information system security breach at First Freedom Credit Union 1: what goes in must come out. Journal of the International Academy for Case Studies, 21(1), 131-138.Toyo, O. D., &Ejedafiru, F. E. (2016).Utilization of Informationand Communication Technologies (ICTs) for Sustainable EconomicDevelopment in Nigerian. International Journal of Ergonomics and Human Factors, 12(2), 22-34. WIPO (2017), based on data from the World Bank (top), October 2011 and Pinkovskiy and Sala-i-Martin (2009).
Refbacks
- There are currently no refbacks.