-
21
Counterterrorism Planning in the Shipping Industry Leveraging Competitive Intelligence
Published 2025-01-01“…The first chapter delves into primary threats, including hijacking, piracy, ship-borne terrorism, and port attacks, providing an in-depth analysis of their implications and necessary countermeasures. …”
Get full text
Article -
22
WORK OF THE PRODUCER OF THE ANIMATED FILM ON THE PREPARATPRY PERIOD
Published 2016-01-01“…Considered such aspects as the idea, develop the concept, its visualization, search buyers, work on script, develop a production plan, budgeting, ensuring protection of materials against piracy. The article explores the relationship of the producer with other representatives of the audiovisual business, in particular with customer entertainment products, as the establishment of these linkages is very important on the preparatory period. …”
Get full text
Article -
23
Yorùbá Films in Time Perspective: Past, Present, and Future
Published 2021-12-01“…Therefore, the present trend in the Yoruba film industry, whereby skilled film producers now have their films premiered at and release to only cinemas where they could be watched legally and piracy is prevented, is seen in this paper as a return to the origin of the development of the Yoruba films. …”
Get full text
Article -
24
Evaluation of approaches to the regulation of digital film distribution
Published 2021-06-01“…The paper generalizes them in the form of proposals for anti-piracy regulation, promotion of original content of online cinemas in international markets, as well as for effective interaction of online cinemas with the Ministry of Culture and the Cinema Foundation. …”
Get full text
Article -
25
Exploring the possibilities of using cryptocurrencies in production in creative industries
Published 2024-06-01“…Copyright is the main method of prevention of piracy and theft of intellectual property. Studying the prospects of using cryptocurrency in production in creative industries is necessary to make its formation as an important tool in this area possible.…”
Get full text
Article -
26
A Novel Rules Based Approach for Estimating Software Birthmark
Published 2015-01-01“…Comparing birthmarks of software can tell us whether a program or software is a copy of another. Software theft and piracy are rapidly increasing problems of copying, stealing, and misusing the software without proper permission, as mentioned in the desired license agreement. …”
Get full text
Article -
27
Monitoring the reliability of integrated circuits protection against Trojans: encoding and decoding of combinational structures
Published 2021-09-01“…The emergence of counterfeit integrated circuits, problems of piracy, overproduction, unauthorized interference in the design of microcircuit, hardware Trojans require the development of methods and means of their timely detection. …”
Get full text
Article -
28
Problems of Legal Regulation of Academic Integrity Compliance in Ukraine
Published 2020-12-01“…The following problems of the current state of legal regulation of academic integrity in Ukraine have been identified: diversity in the approaches of educational institutions to the criteria used in testing scientific papers for literary piracy; the existence of a legal conflict regarding the regulation of the issue of “self-plagiarism” between the provisions of the Law of Ukraine “On Education” and the Resolution of the Cabinet of Ministers of Ukraine No. 567 dated from July 24, 2013; the need to distinguish between additional and detailed liability for the violation of academic integrity; inconsistency of terminology in the current legislation, etc. …”
Get full text
Article -
29
PROFILES AND PREFERENCES OF ON-LINE MILLENIAL SHOPPERS IN BULGARIA
Published 2014-05-01“…Unlike other markets where online music purchases are growing, high levels of digital piracy in Bulgaria strongly discourage Bulgarian students from purchasing music online. …”
Get full text
Article -
30
PROFILES AND PREFERENCES OF ON-LINE MILLENIAL SHOPPERS IN BULGARIA
Published 2014-05-01“…Unlike other markets where online music purchases are growing, high levels of digital piracy in Bulgaria strongly discourage Bulgarian students from purchasing music online. …”
Get full text
Article -
31
The Evolution of the NATO-Russia Relations
Published 2020-11-01“…In fact, during the 1990s2000s, Russia and the Alliance cooperated successfully in such areas as the fight against piracy and international terrorism, rescue at sea, etc. …”
Get full text
Article -
32
The U.S.-China Rivalry in Africa: Challenges and Prospects
Published 2022-05-01“…It is possible to find some common ground, for example, in developing market relations, promoting infrastructure projects, combating piracy, expanding healthcare facilities in the African states, etc. …”
Get full text
Article -
33
Safe delivery of goods and services with smart door locks: Unlocking potential use
Published 2025-01-01“…A successful unattended delivery system behind closed door can reduce the number of failed deliveries, porch piracy, and unnecessary trips to let in service providers, and might enhance perceived flexibility and convenience of consumers.…”
Get full text
Article -
34
International and domestic experience of intellectual property legal protection on the Internet and separate methods of police crimes detection in this area
Published 2022-09-01“…The history of the adoption of laws on the protection of intellectual property in the USA “On Combating Online Piracy” (SOPA) and “On Prevention of Real Network Threats to Economic Creativity and Theft of Intellectual Property” (PIPA) was studied. …”
Get full text
Article -
35
Defense Stability and Ecosystem Sustainability in the Strait of Malacca: Maritime Security Challenges from an International Relations Perspective
Published 2025-01-01“…The strait plays a crucial role in global trade and geopolitics; however, the high volume of maritime traffic has led to issues such as maritime security threats, including piracy, smuggling, and geopolitical tensions, as well as environmental threats like marine pollution and ecosystem degradation. …”
Get full text
Article -
36
Optimal Information Hiding: Advanced Bitstream-Based Watermarking for Secure and Efficient Integration of Image Data in Digital Videos
Published 2024-01-01“…Video watermarking is a technique used to embed a visible or invisible mark onto a video file in order to claim ownership, protect intellectual property rights, and detect unauthorized users. The issue of video piracy arises due to the advancement of Internet services and the utilization of various storage technologies. …”
Get full text
Article -
37
Developing the Preventing Model of Transnational Crimes in Russia and Indonesia in the Age of Sanctions and Global Economic Instability
Published 2024-12-01“…This study reveals novel insights into the distinct patterns of transnational crime: Russia primarily faces cybercrime, economic offenses, and money laundering, while Indonesia grapples with human trafficking, environmental crimes, and maritime piracy. These findings contribute to a new understanding of geopolitical variations in transnational criminal activities. …”
Get full text
Article -
38
Ketahanan dan Kualitas Visual Watermarked Image Menggunakan Integer Wavelet Transform (IWT) dan Chinese Remainder Theorem (CRT)
Published 2023-04-01“…Hasil penelitian diperoleh nilai-nilai Peak Signal-to-Noise Ratio (PSNR) mendekati 1 dan Normalized Correlation Coefficient (NCC) sama dengan 0,71337, menunjukkan metode IWT dan CRT mampu menghasilkan watermarked image dengan kualitas visual atau imperceptibility yang baik dan mampu memberikan ketahanan image terhadap beberapa serangan seperti gaussian, salt & pepper dan kompresi JPEG2000 tetapi tidak tahan terhadap serangan rotasi dan kontras karena nilai NCC dibawah 0,5 Abstract Today's ease of accessing and sharing digital media raises concerns about copyright infringement or piracy. So it is necessary to give identity to each digital media so that it is not easily hijacked or claimed by irresponsible parties. …”
Get full text
Article -
39
مدى وعى أعضاء هیئة التدریس بجامعة المنوفیة بالانتحال العلمى : دراسة استکشافیة
Published 2020-01-01“…Given the great importance of information technology today in all areas,especially the use of the Internet because of its many facilities, a new type ofcrime was violated that violates the sanctity and privacy of this information via theInternet and they are what is known as scientific plagiarism, scientific theft, orinformation piracy, and that is in The Arab scientific community witnessed thespread of many unhealthy phenomena, the most prominent of which is thescientific theft phenomenon of Arab intellectual production, which has becomeone of the most dangerous negative phenomena experienced by university andresearch societies and institutions in Egypt and the Arab world, and has evenbecome one of The ugliest crimes common in our current society. …”
Get full text
Article