dc.contributor.author |
Anicitus, PDDA |
|
dc.contributor.author |
Dissanayake, MDAS |
|
dc.contributor.author |
Jayawardena, SS |
|
dc.contributor.author |
Lakjeewa, DM |
|
dc.contributor.author |
Basnagoda, SNR |
|
dc.date.accessioned |
2022-12-14T07:26:43Z |
|
dc.date.available |
2022-12-14T07:26:43Z |
|
dc.date.issued |
2012 |
|
dc.identifier.citation |
****** |
en_US |
dc.identifier.uri |
http://dl.lib.uom.lk/handle/123/19783 |
|
dc.description.abstract |
The evolutionary development of Information and Communication Technology has become a doubled edge knife since it has made human life console and easy, and at
the same time unsafe and vulnerable. In this paper we have
put an effort to search research and understand the means of
copyright violation in software industry and methods of
preventing. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Department of Computer Science and Engineering, University of Moratuwa. |
en_US |
dc.subject |
Software |
en_US |
dc.subject |
Software copyright |
en_US |
dc.subject |
Berne Convention |
en_US |
dc.subject |
Copyright infringement |
en_US |
dc.title |
Copyright infringement of software |
en_US |
dc.type |
Conference-Full-text |
en_US |
dc.identifier.faculty |
Engineering |
en_US |
dc.identifier.department |
Department of Computer Science and Engineering |
en_US |
dc.identifier.year |
2012 |
en_US |
dc.identifier.conference |
CSE Symposium 2014 |
en_US |
dc.identifier.place |
Katubedda |
en_US |
dc.identifier.pgnos |
pp. 107-112 |
en_US |
dc.identifier.proceeding |
Proceedings of the CSE Symposium 2014 |
en_US |