Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Analytical Methods in the Quality Control of Scientific Publications Part III: Publishers’ Ethics and Editors’ Complicity
(Articles)
Ilia Brondz
Int'l J. of Analytical Mass Spectrometry and Chromatography
Vol.2 No.3
,September 25, 2014
DOI:
10.4236/ijamsc.2014.23008
3,230
Downloads
4,300
Views
Citations
Balance of Power between Copyright Owners and Music Teachers
(Articles)
Givewell Munyaradzi
,
Richard Makoni
Creative Education
Vol.3 No.2
,April 26, 2012
DOI:
10.4236/ce.2012.32032
3,799
Downloads
6,446
Views
Citations
On the Relationship between the Application of Actual Performance and Compensation for Damages in the Civil Code of the People’s Republic of China
(Articles)
Peng Xiao
Beijing Law Review
Vol.13 No.3
,September 1, 2022
DOI:
10.4236/blr.2022.133033
99
Downloads
765
Views
Citations
Opt-Out Clause Is Not a Blank Check under Good Faith Lens
(Articles)
Gabriel Soares dos Santos Machado
Beijing Law Review
Vol.10 No.4
,September 25, 2019
DOI:
10.4236/blr.2019.104057
583
Downloads
1,670
Views
Citations
This article belongs to the Special Issue on
Economic Law and Commercial Law
Cyberattack Ramifications, The Hidden Cost of a Security Breach
(Articles)
Meysam Tahmasebi
Journal of Information Security
Vol.15 No.2
,February 29, 2024
DOI:
10.4236/jis.2024.152007
65
Downloads
335
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
Research on Copyright Ownership Based on Template Writing Works
(Articles)
Rumin Wen
,
Yingbo Zhai
,
Jizhe Cui
Open Access Library Journal
Vol.11 No.1
,January 31, 2024
DOI:
10.4236/oalib.1111159
34
Downloads
169
Views
Citations
Accessible Copies of Copyright Work for Visually Impaired Persons in India
(Articles)
Priya R. Pillai
Creative Education
Vol.3 No.6A
,October 26, 2012
DOI:
10.4236/ce.2012.326159
5,538
Downloads
8,261
Views
Citations
This article belongs to the Special Issue on
Higher Education
Role of Copyright Institutions and Enforcement Agencies in the Digital and Online Dissemination of Copyright Works
(Articles)
Okubor Cecil Nwachukwu
,
Omonemu Edewor Tony
Beijing Law Review
Vol.13 No.3
,September 20, 2022
DOI:
10.4236/blr.2022.133038
138
Downloads
1,672
Views
Citations
Regulatory Response to Copyright Protection in an Online and Digital Environment: A Comparative Analysis
(Articles)
Okubor Cecil Nwachukwu
,
Kwubosu Ikechukwu
Beijing Law Review
Vol.13 No.4
,December 30, 2022
DOI:
10.4236/blr.2022.134063
145
Downloads
1,372
Views
Citations
The “Copyright Troll” of Photographic Works in the Internet Era: A Study of Countermeasures and Legal Regulation
(Articles)
Huiyu Zhang
Open Journal of Social Sciences
Vol.11 No.5
,May 25, 2023
DOI:
10.4236/jss.2023.115017
75
Downloads
325
Views
Citations
Breach Notification in the General Data Protection Regulation
(Articles)
M’Bia Hortense De-Yolande
,
Théo Doh-Djanhoundji
,
Gabo Yves Constant
Voice of the Publisher
Vol.9 No.4
,December 26, 2023
DOI:
10.4236/vp.2023.94026
54
Downloads
251
Views
Citations
Protection Model of Security Systems Based on Neyman-Person Criterion
(Articles)
Haitao Lv
,
Ruimin Hu
,
Jun Chen
,
Zheng He
Communications and Network
Vol.5 No.3C
,October 7, 2013
DOI:
10.4236/cn.2013.53B2104
2,817
Downloads
4,516
Views
Citations
An Overview of the Copyright Protection Laws in Bangladesh—A Critical Analysis of the Copyright Act, 2000 with Its Loopholes and Recommendations
(Articles)
Muhammad Farhad Hosen
Beijing Law Review
Vol.8 No.2
,June 29, 2017
DOI:
10.4236/blr.2017.82011
2,654
Downloads
21,258
Views
Citations
Copyright Protection of Digital Movies Using the Coalition of Technology and Law in China
(Articles)
Xia Liu
,
Yunfei Zha
Chinese Studies
Vol.7 No.4
,September 13, 2018
DOI:
10.4236/chnstd.2018.74023
1,384
Downloads
4,183
Views
Citations
Psychological Contract Breach and Turnover Intention: The Intermediary Role of Job Satisfaction
(Articles)
Xiaoqing Xie
,
Hanmin Liu
,
Huang Deng
Open Journal of Business and Management
Vol.3 No.4
,October 12, 2015
DOI:
10.4236/ojbm.2015.34036
3,440
Downloads
5,837
Views
Citations
Experiment and Simulation of Earthen Embankment Breach
(Articles)
Sanit Wongsa
Journal of Geoscience and Environment Protection
Vol.3 No.10
,December 18, 2015
DOI:
10.4236/gep.2015.310010
3,982
Downloads
4,708
Views
Citations
Dam Breach Analysis Using HEC-RAS and HEC-GeoRAS: The Case of Kesem Kebena Dam
(Articles)
Abimael Leoul
,
Nebiyou Kassahun
Open Journal of Modern Hydrology
Vol.9 No.4
,October 11, 2019
DOI:
10.4236/ojmh.2019.94007
1,305
Downloads
4,084
Views
Citations
A Review of Cybersecurity Challenges in Small Business: The Imperative for a Future Governance Framework
(Articles)
Binita Saha
,
Zahid Anwar
Journal of Information Security
Vol.15 No.1
,January 15, 2024
DOI:
10.4236/jis.2024.151003
158
Downloads
1,215
Views
Citations
An Authentication Method for Digital Audio Using a Discrete Wavelet Transform
(Articles)
Yasunari Yoshitomi
,
Taro Asada
,
Yohei Kinugawa
,
Masayoshi Tabuse
Journal of Information Security
Vol.2 No.2
,April 8, 2011
DOI:
10.4236/jis.2011.22006
6,413
Downloads
14,005
Views
Citations
The Anti-Piracy Measure Using Encryption of Embedded Products May Mitigate the Security Strength
(Articles)
Zhilong Xiong
,
Rui Zhang
,
Xin Zhan
,
Zhenglin Liu
Communications and Network
Vol.5 No.3C
,October 4, 2013
DOI:
10.4236/cn.2013.53B2079
2,764
Downloads
4,608
Views
Citations
<
1
2
3
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top