skip to main content
10.1145/1509096.1509134acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicegovConference Proceedingsconference-collections
research-article

Implementing national copyright laws: a Jordanian case study

Published:01 December 2008Publication History

ABSTRACT

Intellectual property is a major commodity being produced and shared throughout the world. Advancements in technologies coupled with globalization efforts have allowed such property to easily cross geographical boundaries. Various international treaties and national laws have been set in place to ensure intellectual property owners of their rights. This paper reports the results of an exploratory investigation into the major challenges and returns resulting from the implementation of a national copyright law in Jordan. The paper begins by providing the reader with an overview of Jordan in relation to copyrights. This study relied on both primary and secondary data. The challenges associated with such a law were categorized into implementation, cultural, and socio-economic factors. Respondents identified monetary returns, strategic outcomes, and creative stimulation as key returns resulting from enforcing the law. Finally, the data illustrated that public education and awareness campaigns, and training programs are essential to the success of such a law.

References

  1. Abu-Ghazaleh Intellectual Property (AGIP), 2007, Retrieved March 3, 2007, from www.agip.com/search.aspx?keywords=Ottoman&lang=enGoogle ScholarGoogle Scholar
  2. Abu-Ghazaleh Intellectual Property AGIP Bulletin April 2005, 2005, Retrieved April 19, 2008, agip.com.bulletin_news.aspx?id=926&month=4&year=2005&lan=enGoogle ScholarGoogle Scholar
  3. Agreement on Trade-Related Aspects of Intellectual Property Rights, 1994.Google ScholarGoogle Scholar
  4. Berne Convention for the Protection of Literary and Artistic Works, 1979.Google ScholarGoogle Scholar
  5. Berne Notification No. 204 - Accession by the Hashemite Kingdom of Jordan, 1999, from www.wipo.int/edocs/notdocs/en/berne/treaty_berne_204.htmlGoogle ScholarGoogle Scholar
  6. Bryman, A., Social Research Methods, Oxford University Press Inc., New York, 2004.Google ScholarGoogle Scholar
  7. Business Software Alliance, Fourth Annual BSA and IDC Global Software Piracy Study, 2007, Retrieved November 5, 2007, from w3.bsa.org/globalstudy/Google ScholarGoogle Scholar
  8. Business Software Alliance, Business Software Alliance - About BSA&Members, 2008, Retrieved March 4, 2008, from www.bsa.org/country/BSA%20and%20Members.aspxGoogle ScholarGoogle Scholar
  9. CIA - The World Fact Book -- Jordan, 2007, Retrieved March 1, 2007, from www.cia.gov/cia/publications/factbook/geos/jo.htmlGoogle ScholarGoogle Scholar
  10. CIA - The World Fact Book -- United States, 2007, Retrieved March 1, 2007, from www.cia.gov/cia/publications/factbook/geos/us.htmlGoogle ScholarGoogle Scholar
  11. The Constitution of the Hashemite Kingdom of Jordan, 1952, Retrieved March 9, 2007, from www.kinghussein.gov.jo/constitution_jo.htmlGoogle ScholarGoogle Scholar
  12. Copyright Law of the United States of America and Related Laws Contained in Title 17 of the United States Code, 2003.Google ScholarGoogle Scholar
  13. Copyright Protection Law No. (22) of 1992 2005.Google ScholarGoogle Scholar
  14. Deposit Regulation. In N. L.-M. o. C.-T. H. K. o. Jordan (Ed.), 1994.Google ScholarGoogle Scholar
  15. Directive 96/9/EC of the European Parliament and of the Council of 11 March 1996 on the Legal Protection of Databases 1996, Retrieved March 10, 2007, from europa.eu.int/ISPO/infosoc/legreg/docs/969ec.htmlGoogle ScholarGoogle Scholar
  16. Intellectual Property Needs and Expectations of Traditional Knowledge Holders, World Intellectual Property Organization, Geneva, 2001.Google ScholarGoogle Scholar
  17. Jordan - History - The Ottoman Empire 2007, Retrieved March 1, 2007, www.kinghussein.gov.jo/his_ottoman.htmlGoogle ScholarGoogle Scholar
  18. Jordan becomes 136th member of the WTO 2000, Retrieved March 1, 2007, from www.wto.org/english/news_e/pres00_e/pr174_e.htmGoogle ScholarGoogle Scholar
  19. Juicy bits and literary lights: Little known facts about your favorite authors, 2000, Retrieved April 18, 2008, www.prin ceton.edu/~paw/web_exclusives/features/features_13.htmlGoogle ScholarGoogle Scholar
  20. Lewinski, S. v., "Symposium: Traditional Knowledge, Intellectual Property, and Indigenous Culture: Article: The Protection of Folklore", Cardozo Journal of International and Comparative Law, 2003.Google ScholarGoogle Scholar
  21. Liu, D., "Can Copyright Lend its Cinderellaic Magic to Chinese Folklore?" J. Marshall Rev. Int. Prop. L. 203, 2006.Google ScholarGoogle Scholar
  22. Luck, T. (2007, September 18). Computer system builder to do jail time for piracy. The Jordan Times.Google ScholarGoogle Scholar
  23. Luck, T. (2008, January 28). Courts, NLD crack down on pirated satellite television broadcasts. The Jordan Times.Google ScholarGoogle Scholar
  24. Luck, T. (2008, January 10). Vendor jailed for DVD piracy. The Jordan Times.Google ScholarGoogle Scholar
  25. Protection of Folklore: UNESCO/WIPO Regional Consultations on Safeguarding of Traditional and Popular Culture, 1999, Retrieved April 29 2007, 2007, from portal.unesco.org/culture/en/files/14289/10644889685Tunis1999.pdf/Tunis1999.pdfGoogle ScholarGoogle Scholar
  26. Special 301 Report In Office of the United States Trade Representative (Ed.), 2005.Google ScholarGoogle Scholar
  27. The United States Constitution,Google ScholarGoogle Scholar
  28. What is WIPO?, 2008, Retrieved April 19, 2008, from wipi.int.about-wipo.en-what_is_wipo.htmlGoogle ScholarGoogle Scholar
  29. WTO | What is the WTO?, 2008, Retrieved April 18, 2008, from www.wto.org.english.thewto_e/whatis_e/Whatis_e.htmGoogle ScholarGoogle Scholar

Index Terms

  1. Implementing national copyright laws: a Jordanian case study

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICEGOV '08: Proceedings of the 2nd international conference on Theory and practice of electronic governance
      December 2008
      561 pages
      ISBN:9781605583860
      DOI:10.1145/1509096

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 December 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate350of865submissions,40%
    • Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader