Let the Hackers Hack: Allowing the Reverse Engineering of Copyrighted Computer Programs to Achieve Compatibility
Many innovative and useful programs are kept from the market because of their inability to achieve compatibility with existing software. The problem of reverse engineering under current copyright law is addressed, and a "compatibility exemption" is proposed.
Gespeichert in:
Veröffentlicht in: | University of Pennsylvania law review 1992-05, Vol.140 (5), p.1999-2050 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2050 |
---|---|
container_issue | 5 |
container_start_page | 1999 |
container_title | University of Pennsylvania law review |
container_volume | 140 |
creator | Ignatin, Gary R. |
description | Many innovative and useful programs are kept from the market because of their inability to achieve compatibility with existing software. The problem of reverse engineering under current copyright law is addressed, and a "compatibility exemption" is proposed. |
doi_str_mv | 10.2307/3312440 |
format | Article |
fullrecord | <record><control><sourceid>gale_proqu</sourceid><recordid>TN_cdi_proquest_miscellaneous_60937701</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A12477328</galeid><jstor_id>3312440</jstor_id><sourcerecordid>A12477328</sourcerecordid><originalsourceid>FETCH-LOGICAL-c377t-6e7700399e722ff7992b7dbf7f2d77188c89b041c7aae4e28c6689e4e39611e3</originalsourceid><addsrcrecordid>eNp10Vtr2zAUAGAxVljWjv0FU8b6Uq-6uJa1NxPSphDYKHkXinLkKLUtV1Ja8u-rXKCjZOjhiHM-Hd0Q-k7wL8owv2GM0KLAn9CIiILm1S3jn9EI44LkQmD-BX0NYY0xLm-JGKFhBjGLK8imSj-BD_v4O6vb1r3avtmXHuElVSCb9I3tAfwu70w2dsPW22YVYZnm3bCJ4LO_3jVedSGLLqv1yqal-6KKdmFbG7cX6MyoNsC3YzxH87vJfDzNZ3_uH8b1LNeM85iXwDnGTAjglBrDhaALvlwYbuiSc1JVuhKLdCfNlYICaKXLshJpxkRJCLBz9PPQdvDueQMhys4GDW2renCbIEss0j6YJHj5Aa7dxvfpaJKIcocq_I4a1YK0vXHRK73rKOv02pwzWiV0fQI10INXrevB2JT-l-cneBpL6Kw-5a8OXnsXggcjB2875beSYLn7eXn8-SR_HOQ6ROf_y94A7JGo9Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>196937780</pqid></control><display><type>article</type><title>Let the Hackers Hack: Allowing the Reverse Engineering of Copyrighted Computer Programs to Achieve Compatibility</title><source>Jstor Complete Legacy</source><source>Worldwide Political Science Abstracts</source><source>HeinOnline Law Journal Library</source><creator>Ignatin, Gary R.</creator><creatorcontrib>Ignatin, Gary R.</creatorcontrib><description>Many innovative and useful programs are kept from the market because of their inability to achieve compatibility with existing software. The problem of reverse engineering under current copyright law is addressed, and a "compatibility exemption" is proposed.</description><identifier>ISSN: 0041-9907</identifier><identifier>EISSN: 1942-8537</identifier><identifier>DOI: 10.2307/3312440</identifier><language>eng</language><publisher>Philadelphia: University of Pennsylvania Law School</publisher><subject>Comments ; Compatible hardware ; Compatible software ; Computer hacking ; Computer programming ; Computer software ; Computer technology ; Computers ; Copy prevention techniques ; Copyright ; Copyright laws ; Copyrights ; Engineering ; Forward compatibility ; Law ; Laws, regulations and rules ; Piracy ; Reverse engineering ; Software ; Software industry ; Software protection ; Technological innovation ; Upward/downward compatibility</subject><ispartof>University of Pennsylvania law review, 1992-05, Vol.140 (5), p.1999-2050</ispartof><rights>Copyright 1992 The University of Pennsylvania</rights><rights>COPYRIGHT 1992 University of Pennsylvania, Law School</rights><rights>Copyright University of Pennsylvania Law School May 1992</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c377t-6e7700399e722ff7992b7dbf7f2d77188c89b041c7aae4e28c6689e4e39611e3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.jstor.org/stable/pdf/3312440$$EPDF$$P50$$Gjstor$$H</linktopdf><linktohtml>$$Uhttps://www.jstor.org/stable/3312440$$EHTML$$P50$$Gjstor$$H</linktohtml><link.rule.ids>314,776,780,799,27901,27902,57992,58225</link.rule.ids></links><search><creatorcontrib>Ignatin, Gary R.</creatorcontrib><title>Let the Hackers Hack: Allowing the Reverse Engineering of Copyrighted Computer Programs to Achieve Compatibility</title><title>University of Pennsylvania law review</title><description>Many innovative and useful programs are kept from the market because of their inability to achieve compatibility with existing software. The problem of reverse engineering under current copyright law is addressed, and a "compatibility exemption" is proposed.</description><subject>Comments</subject><subject>Compatible hardware</subject><subject>Compatible software</subject><subject>Computer hacking</subject><subject>Computer programming</subject><subject>Computer software</subject><subject>Computer technology</subject><subject>Computers</subject><subject>Copy prevention techniques</subject><subject>Copyright</subject><subject>Copyright laws</subject><subject>Copyrights</subject><subject>Engineering</subject><subject>Forward compatibility</subject><subject>Law</subject><subject>Laws, regulations and rules</subject><subject>Piracy</subject><subject>Reverse engineering</subject><subject>Software</subject><subject>Software industry</subject><subject>Software protection</subject><subject>Technological innovation</subject><subject>Upward/downward compatibility</subject><issn>0041-9907</issn><issn>1942-8537</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>1992</creationdate><recordtype>article</recordtype><sourceid>7UB</sourceid><recordid>eNp10Vtr2zAUAGAxVljWjv0FU8b6Uq-6uJa1NxPSphDYKHkXinLkKLUtV1Ja8u-rXKCjZOjhiHM-Hd0Q-k7wL8owv2GM0KLAn9CIiILm1S3jn9EI44LkQmD-BX0NYY0xLm-JGKFhBjGLK8imSj-BD_v4O6vb1r3avtmXHuElVSCb9I3tAfwu70w2dsPW22YVYZnm3bCJ4LO_3jVedSGLLqv1yqal-6KKdmFbG7cX6MyoNsC3YzxH87vJfDzNZ3_uH8b1LNeM85iXwDnGTAjglBrDhaALvlwYbuiSc1JVuhKLdCfNlYICaKXLshJpxkRJCLBz9PPQdvDueQMhys4GDW2renCbIEss0j6YJHj5Aa7dxvfpaJKIcocq_I4a1YK0vXHRK73rKOv02pwzWiV0fQI10INXrevB2JT-l-cneBpL6Kw-5a8OXnsXggcjB2875beSYLn7eXn8-SR_HOQ6ROf_y94A7JGo9Q</recordid><startdate>19920501</startdate><enddate>19920501</enddate><creator>Ignatin, Gary R.</creator><general>University of Pennsylvania Law School</general><general>University of Pennsylvania, Law School</general><scope>AAYXX</scope><scope>CITATION</scope><scope>ILT</scope><scope>7UB</scope></search><sort><creationdate>19920501</creationdate><title>Let the Hackers Hack: Allowing the Reverse Engineering of Copyrighted Computer Programs to Achieve Compatibility</title><author>Ignatin, Gary R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c377t-6e7700399e722ff7992b7dbf7f2d77188c89b041c7aae4e28c6689e4e39611e3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>1992</creationdate><topic>Comments</topic><topic>Compatible hardware</topic><topic>Compatible software</topic><topic>Computer hacking</topic><topic>Computer programming</topic><topic>Computer software</topic><topic>Computer technology</topic><topic>Computers</topic><topic>Copy prevention techniques</topic><topic>Copyright</topic><topic>Copyright laws</topic><topic>Copyrights</topic><topic>Engineering</topic><topic>Forward compatibility</topic><topic>Law</topic><topic>Laws, regulations and rules</topic><topic>Piracy</topic><topic>Reverse engineering</topic><topic>Software</topic><topic>Software industry</topic><topic>Software protection</topic><topic>Technological innovation</topic><topic>Upward/downward compatibility</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ignatin, Gary R.</creatorcontrib><collection>CrossRef</collection><collection>Gale OneFile: LegalTrac</collection><collection>Worldwide Political Science Abstracts</collection><jtitle>University of Pennsylvania law review</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ignatin, Gary R.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Let the Hackers Hack: Allowing the Reverse Engineering of Copyrighted Computer Programs to Achieve Compatibility</atitle><jtitle>University of Pennsylvania law review</jtitle><date>1992-05-01</date><risdate>1992</risdate><volume>140</volume><issue>5</issue><spage>1999</spage><epage>2050</epage><pages>1999-2050</pages><issn>0041-9907</issn><eissn>1942-8537</eissn><abstract>Many innovative and useful programs are kept from the market because of their inability to achieve compatibility with existing software. The problem of reverse engineering under current copyright law is addressed, and a "compatibility exemption" is proposed.</abstract><cop>Philadelphia</cop><pub>University of Pennsylvania Law School</pub><doi>10.2307/3312440</doi><tpages>52</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0041-9907 |
ispartof | University of Pennsylvania law review, 1992-05, Vol.140 (5), p.1999-2050 |
issn | 0041-9907 1942-8537 |
language | eng |
recordid | cdi_proquest_miscellaneous_60937701 |
source | Jstor Complete Legacy; Worldwide Political Science Abstracts; HeinOnline Law Journal Library |
subjects | Comments Compatible hardware Compatible software Computer hacking Computer programming Computer software Computer technology Computers Copy prevention techniques Copyright Copyright laws Copyrights Engineering Forward compatibility Law Laws, regulations and rules Piracy Reverse engineering Software Software industry Software protection Technological innovation Upward/downward compatibility |
title | Let the Hackers Hack: Allowing the Reverse Engineering of Copyrighted Computer Programs to Achieve Compatibility |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T04%3A11%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_proqu&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Let%20the%20Hackers%20Hack:%20Allowing%20the%20Reverse%20Engineering%20of%20Copyrighted%20Computer%20Programs%20to%20Achieve%20Compatibility&rft.jtitle=University%20of%20Pennsylvania%20law%20review&rft.au=Ignatin,%20Gary%20R.&rft.date=1992-05-01&rft.volume=140&rft.issue=5&rft.spage=1999&rft.epage=2050&rft.pages=1999-2050&rft.issn=0041-9907&rft.eissn=1942-8537&rft_id=info:doi/10.2307/3312440&rft_dat=%3Cgale_proqu%3EA12477328%3C/gale_proqu%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=196937780&rft_id=info:pmid/&rft_galeid=A12477328&rft_jstor_id=3312440&rfr_iscdi=true |