Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Analytical Methods in the Quality Control of Scientific Publications Part III: Publishers’ Ethics and Editors’ Complicity
(Articles)
Ilia Brondz
Int'l J. of Analytical Mass Spectrometry and Chromatography
Vol.2 No.3
,September 25, 2014
DOI:
10.4236/ijamsc.2014.23008
3,239
Downloads
4,323
Views
Citations
Balance of Power between Copyright Owners and Music Teachers
(Articles)
Givewell Munyaradzi
,
Richard Makoni
Creative Education
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/ce.2012.32032
3,804
Downloads
6,459
Views
Citations
On the Relationship between the Application of Actual Performance and Compensation for Damages in the Civil Code of the People’s Republic of China
(Articles)
Peng Xiao
Beijing Law Review
Vol.13 No.3
,September 1, 2022
DOI:
10.4236/blr.2022.133033
101
Downloads
771
Views
Citations
Opt-Out Clause Is Not a Blank Check under Good Faith Lens
(Articles)
Gabriel Soares dos Santos Machado
Beijing Law Review
Vol.10 No.4
,September 25, 2019
DOI:
10.4236/blr.2019.104057
589
Downloads
1,686
Views
Citations
This article belongs to the Special Issue on
Economic Law and Commercial Law
Cyberattack Ramifications, The Hidden Cost of a Security Breach
(Articles)
Meysam Tahmasebi
Journal of Information Security
Vol.15 No.2
,February 29, 2024
DOI:
10.4236/jis.2024.152007
79
Downloads
416
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
Research on Copyright Ownership Based on Template Writing Works
(Articles)
Rumin Wen
,
Yingbo Zhai
,
Jizhe Cui
Open Access Library Journal
Vol.11 No.1
,January 31, 2024
DOI:
10.4236/oalib.1111159
34
Downloads
185
Views
Citations
Accessible Copies of Copyright Work for Visually Impaired Persons in India
(Articles)
Priya R. Pillai
Creative Education
Vol.3 No.6A
,October 26, 2012
DOI:
10.4236/ce.2012.326159
5,546
Downloads
8,280
Views
Citations
This article belongs to the Special Issue on
Higher Education
Role of Copyright Institutions and Enforcement Agencies in the Digital and Online Dissemination of Copyright Works
(Articles)
Okubor Cecil Nwachukwu
,
Omonemu Edewor Tony
Beijing Law Review
Vol.13 No.3
,September 20, 2022
DOI:
10.4236/blr.2022.133038
141
Downloads
1,720
Views
Citations
Regulatory Response to Copyright Protection in an Online and Digital Environment: A Comparative Analysis
(Articles)
Okubor Cecil Nwachukwu
,
Kwubosu Ikechukwu
Beijing Law Review
Vol.13 No.4
,December 30, 2022
DOI:
10.4236/blr.2022.134063
147
Downloads
1,404
Views
Citations
The “Copyright Troll” of Photographic Works in the Internet Era: A Study of Countermeasures and Legal Regulation
(Articles)
Huiyu Zhang
Open Journal of Social Sciences
Vol.11 No.5
,May 25, 2023
DOI:
10.4236/jss.2023.115017
76
Downloads
329
Views
Citations
Breach Notification in the General Data Protection Regulation
(Articles)
M’Bia Hortense De-Yolande
,
Théo Doh-Djanhoundji
,
Gabo Yves Constant
Voice of the Publisher
Vol.9 No.4
,December 26, 2023
DOI:
10.4236/vp.2023.94026
58
Downloads
273
Views
Citations
Protection Model of Security Systems Based on Neyman-Person Criterion
(Articles)
Haitao Lv
,
Ruimin Hu
,
Jun Chen
,
Zheng He
Communications and Network
Vol.5 No.3C
,October 7, 2013
DOI:
10.4236/cn.2013.53B2104
2,819
Downloads
4,525
Views
Citations
An Overview of the Copyright Protection Laws in Bangladesh—A Critical Analysis of the Copyright Act, 2000 with Its Loopholes and Recommendations
(Articles)
Muhammad Farhad Hosen
Beijing Law Review
Vol.8 No.2
,June 29, 2017
DOI:
10.4236/blr.2017.82011
2,665
Downloads
21,435
Views
Citations
Copyright Protection of Digital Movies Using the Coalition of Technology and Law in China
(Articles)
Xia Liu
,
Yunfei Zha
Chinese Studies
Vol.7 No.4
,September 13, 2018
DOI:
10.4236/chnstd.2018.74023
1,388
Downloads
4,205
Views
Citations
Psychological Contract Breach and Turnover Intention: The Intermediary Role of Job Satisfaction
(Articles)
Xiaoqing Xie
,
Hanmin Liu
,
Huang Deng
Open Journal of Business and Management
Vol.3 No.4
,October 12, 2015
DOI:
10.4236/ojbm.2015.34036
3,450
Downloads
5,869
Views
Citations
Experiment and Simulation of Earthen Embankment Breach
(Articles)
Sanit Wongsa
Journal of Geoscience and Environment Protection
Vol.3 No.10
,December 18, 2015
DOI:
10.4236/gep.2015.310010
3,987
Downloads
4,722
Views
Citations
Dam Breach Analysis Using HEC-RAS and HEC-GeoRAS: The Case of Kesem Kebena Dam
(Articles)
Abimael Leoul
,
Nebiyou Kassahun
Open Journal of Modern Hydrology
Vol.9 No.4
,October 11, 2019
DOI:
10.4236/ojmh.2019.94007
1,324
Downloads
4,147
Views
Citations
A Review of Cybersecurity Challenges in Small Business: The Imperative for a Future Governance Framework
(Articles)
Binita Saha
,
Zahid Anwar
Journal of Information Security
Vol.15 No.1
,January 15, 2024
DOI:
10.4236/jis.2024.151003
171
Downloads
1,381
Views
Citations
An Authentication Method for Digital Audio Using a Discrete Wavelet Transform
(Articles)
Yasunari Yoshitomi
,
Taro Asada
,
Yohei Kinugawa
,
Masayoshi Tabuse
Journal of Information Security
Vol.2 No.2
,April 8, 2011
DOI:
10.4236/jis.2011.22006
6,421
Downloads
14,029
Views
Citations
The Anti-Piracy Measure Using Encryption of Embedded Products May Mitigate the Security Strength
(Articles)
Zhilong Xiong
,
Rui Zhang
,
Xin Zhan
,
Zhenglin Liu
Communications and Network
Vol.5 No.3C
,October 4, 2013
DOI:
10.4236/cn.2013.53B2079
2,766
Downloads
4,616
Views
Citations
<
1
2
3
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top