Can and should misappropriation also protect databases? A comparative approach
| Main Author: | |
|---|---|
| Other Authors: | |
| Format: | Book Section |
| Published: |
Edward Elgar
2007
|
| Online Access: | https://eprints.nottingham.ac.uk/1702/ |
| _version_ | 1848790658100232192 |
|---|---|
| author | Derclaye, Estelle |
| author2 | Torremans, Paul |
| author_facet | Torremans, Paul Derclaye, Estelle |
| author_sort | Derclaye, Estelle |
| building | Nottingham Research Data Repository |
| collection | Online Access |
| first_indexed | 2025-11-14T18:16:06Z |
| format | Book Section |
| id | nottingham-1702 |
| institution | University of Nottingham Malaysia Campus |
| institution_category | Local University |
| last_indexed | 2025-11-14T18:16:06Z |
| publishDate | 2007 |
| publisher | Edward Elgar |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | nottingham-17022020-05-04T20:28:44Z https://eprints.nottingham.ac.uk/1702/ Can and should misappropriation also protect databases? A comparative approach Derclaye, Estelle Edward Elgar Torremans, Paul 2007 Book Section PeerReviewed Derclaye, Estelle (2007) Can and should misappropriation also protect databases? A comparative approach. In: Copyright law: a handbook of contemporary research. Research handbooks in intellectual property . Edward Elgar, Cheltenham, pp. 83-108. ISBN 9781845424879 |
| spellingShingle | Derclaye, Estelle Can and should misappropriation also protect databases? A comparative approach |
| title | Can and should misappropriation also protect databases? A comparative approach |
| title_full | Can and should misappropriation also protect databases? A comparative approach |
| title_fullStr | Can and should misappropriation also protect databases? A comparative approach |
| title_full_unstemmed | Can and should misappropriation also protect databases? A comparative approach |
| title_short | Can and should misappropriation also protect databases? A comparative approach |
| title_sort | can and should misappropriation also protect databases? a comparative approach |
| url | https://eprints.nottingham.ac.uk/1702/ |