INTELLECTUAL PROPERTY RIGHTS, ETHICS AND VALUES IN NIGERIA: A CRITICAL INVESTIGATION

Felix Chukwuma Aguboshim, Obiokafor Ifeyinwa Nkemdilim

Abstract


Intellectual property (IP) right protection is of significant importance globally. However, Intellectual property rights (IPRs) protection in Nigeria hasbecome ineffective    partly    because    IP    laws    are    not    harmonized    locally    or internationally  due  to  varied  cultural  backgrounds,  and  partly  because  there are  no  uniformity  in  the  enforcement  of  IPRs,  ethics  and  values  to  protect against  IP  theft,  especially  in  Nigeria  where  IP  theft  or  piracy  is  prevalent. Thisstudy highlights the challenges created by poor IP laws, ethics and values in Nigeria. It also unravels the challenges that militate against IPRs of creators and inventors in Nigeria.In this study, the authors explored a narrative review of  prior  research  that  focused  on  the  theoretical  underpinnings  of  vast  works of  literature  that  revealed  significant  information  on  challenges  of  IPRsthat negatively  affect  the promotion  of  creative  innovation  by  inventors, and strategies  to  close  these  gaps.The  authors  identified  the  benefits  of  IPRs protection  and  the  challenges  contributing  to  poor  IPRs  enforcement  in Nigeria.Results  show  that IPRs,ethics  and  values  are  crippled  by  out-dated, non-sustainable  or  virtually  non-existent  policies,  and anti-piracysystem. Findingsfrom   this   study   may   encourage   proper   awareness   of   IPRs, implicationsofIPtheft,andeffectiveenforcementofIPRsof  creators  and inventors in Nigeria.

Full Text:

PDF

References


Adedej,A.(2011a).CombatingpiracythroughopticalDiscplantregulationinNigeria:Prospectsandchallenges.JournalofIntellectualProperty[NJIP],MaidenEdition,1-12.Adedej,A.(2011b).TheStrategicActionAgainstPiracy(STRAP)PolicyinNigeria,ResearchPapersfromtheWIPO-WTOColloquiumforTeachersofIntellectualPropertyLaw2010.(Geneva:WIPO-WTO,2011),107-118.Adewopo,A.A.(2008).TheGainisMorethanthePain:CostBenefitPerspectiveoftheRegulationandControlofCopyrightBasedIndustriesinNigeria?.Internationalsymposiumoneconomiccrimes.JesusCollegeUniversityofCambridgeUnitedKingdom.p.6http://www.nials-nigeria.org/journals/Wole%20Adedejinjip.pdfAfolayan, O. T. (2020). Intellectual Property Rights Protection in Nigeria.International Journal of Library and Information Services, 9(2), 51-57. https://doi.org/10.4018/ijlis.2020070103Appleyard,M.(2015).Corporateresponsestoonlinemusicpiracy:Strategiclessonsforthechallengeofadditivemanufacturing,BusinessHorizons,58(1),69-76.doi:10.1016/j.bushor.2014.09.007Bell,E.E.(2017).ANarrativeInquiry:ABlackMaleLookingtoTeach.TheQualitativeReport,22(4),1137-1150.Bennett, S. (2017). What is information governance and how does it differ from data governance? Governance Directions, 69(8), 462–467.Blakeney,M.(2005).GuidebookOnEnforcementOfIntellectualPropertyRights.QueenMaryIntellectualPropertyResearchInstituteQueenMary,UniversityofLondon.Retrievedfrom:http://trade.ec.europa.eu/doclib/docs/2005/april/tradoc_122641.pdf

Blakeney, M., &Mengistie, G. (2011). Intellectual Property and Economic Development in sub-Saharan Africa. Journal of World Intellectual Property 14(3/4): 238–264. doi: 10.111/j.1747-1796-00417.xBode, K. (2013). Hollywood Wants Right to Use Malware Against Pirates Retrieved fromhttp://www.dslreports.com/shownews/Hollywood-Wants-Right-to-Use-Malware-Against-Pirates-124388BusinessSoftwareAlliance(2011).ShadowMarket.In2011Globalsoftwarepiracystudy.NinthEdition,May,2012Carolan, E. (2016). The continuing problems with online consent under the EU's emerging data protectionprinciples. Research funded byIrish Research Council (R12963). ComputerLaw &SecurityReview, 32(2), 462-473. doi:10.1016/j.clsr.2016.02.004Chaudhry,P.E.,Zimmerman,A.,Peters,J.R.,&Cordell,V.V.(2009).Preservingintellectualpropertyrights:Managerialinsightintotheescalatingcounterfeitmarketquandary,BusinessHorizons,52(1),57-66.doi:10.1016/j.bushor.2008.04.003Chen, Y., &Puttitanun, P. (2005).Intellectual Property Rights and Innovation in Developing Countries.Journal of Development Economics, 78(1), 474-493. doi:10.1016/j.jdeveco.2004.11.005 Coronado, A. S. (2013). ComputerSecurity:PrinciplesandPractice, Second Edition. Journal of Information Privacy andSecurity, 9(2), 62-65. doi:10.1080/15536548.2013.10845680Deep, J. F., &Saradindu, B. (2017). Intellectual property rights, social values, and innovation: a cross-country simultaneous equations model. Economics of Innovation and New Technology, 1-22. https://doi.org/10.1080/10438599.2019.1700607FBI. (2013). It’s an age-old crime: stealing. Retrieved fromhttp://www.fbi.gov/about-us/investigate/white_collar/ipr/iprHill, C., & Burrows, G. (2017). New voices: Theusefulnessof a narrative approach to social work research. QualitativeSocialWork:Researchand Practice, 16(2), 273-288. doi:10.1177/1473325017689966Hoffman, D. D., Singh, M., &Prakash, C. (2015).The Interface Theory of Perception Psychonomic.Bulletin& Review, 22(6), 1480-1506.doi:10.3758/s13423-015-0890-8ITU (2017).Intellectual Property Rights (IPRs), International Telecommunication Union, Retrieved May 22, 2017, from http://www.itu.int/en/ITU-T/ipr/Pages/default.aspx.Komatsu, A., Takagi, D., &Takemura, T. (2013).Human aspects of information security.Information Management & Computer Security, 21(1), 5-15.doi:10.1108/09685221311314383

Narain, S. A., Gupta, M. P., &Ojha, A. (2014).Identifying factors of "organizational information security management. Journal of Enterprise Information Management, 27(5), 667-644.doi:10.1108/jeim-07-2013-0052Neba, A. (2013). IPR systems and technology transfer at research institutions in southern Africa.Regional and Thematic Papers on Research Management 2009–2013Ogutu, S. O., Okello, L. J., &Otieno, D. J. (2014). Impact of Information and Communication Technology-Based Market Information Services on Smallholder Farm Input Use and Productivity: The Case of Kenya. World Development, 64(1), 311–321. Oladimeji, T. T., &Foltyn, G. B. (2018). ICT and Its Impact on National Development In Nigeria: An Overview. Research & Reviews: Journal of Engineering and Technology, 7(1), 1-10.Olise, F. P. (2010). Information and Communication Technologies (ICTs) and Sustainable Development in Africa: Mainstreaming the Millennium Development Goals (MDGs) into Nigeria’s Development Agenda.Journal of Social Sciences, 24(3), 155-167.Olubiyi,I. A., Adaji,A. E., &Adetula,A.F.(2020).Increasing the commercial value of image rights in Nigeria: legal possibilities.JournalofIntellectualPropertyLaw&Practice, 15(3), 193–197. https://doi.org/10.1093/jiplp/jpz177Osunde, C. (2017). Small and Medium Enterprises: Management of Intellectual Property Rights in Nigeria. Intellectual Property Rights, 5(1), 1-12. https://doi.org/10.4172/2375-4516.100080Perez, R. G., Branch, R., &Kuofie, M. (2014).EOFISI Model as a Predictive Tool to Favor Smaller Gaps on the Information Security Implementations.Journal of Information Technology and Economic Development, 5(1), 1-20.Piquero, N. L. (2005). Causes and prevention of intellectual property crime.TrendsinOrganizedCrime,4(1),40-61.Reid, R. (2012).What to Do When Attacked By Pirates. Wall Street Journal.Retrieved fromhttp://www.wsj.com/articles/SB10001424052702303552104577438212250619458Sargolzaei, E., &Fateme , F. (2017). Examining software Intellectual Property rights. (IJACSA) International Journal of Advanced Computer Science and Applications, 8(11), 594-600.Scarnato,J.M.(2017).Thevalueofdigitalvideodataforqualitativesocialworkresearch:Anarrativereview.QualitativeSocialWork:ResearchandPractice,doi:10.1177/1473325017735885Stallings, W., & Brown, L. (2012).Computer security: Principles and practice(2nd ed.).Upper Saddle River, NJ: Prentice Hall.

Stanley, N. (2011). Intellectual Property Theft: Protecting Data Against Cyber Criminals. Retrieved fromhttp://www.bloorresearch.com/analysis/11762/intellectual-property-theft-protecting-data-cyber.htmlStewart,G.,&Lacey,D.(2012),"Deathbyathousandfacts",InformationManagement&ComputerSecurity,20(1),29-38.doi:10.1108/09685221211219182Tade, O., &Akinleye, B.(2012). ?We are Promoters not Pirates?: A Qualitative AnalysisofArtistesandPiratesonMusicPiracyinNigeria.InternationalJournalofCyberCriminology,6(2).Retrievedfrom:http://www.cybercrimejournal.com/Tade&Akenliye2012julyijcc.pdfTaylor, R. G., & Robinson, S. L. (2015). An information system security breach at First Freedom Credit Union 1: what goes in must come out. Journal of the International Academy for Case Studies, 21(1), 131-138.Toyo, O. D., &Ejedafiru, F. E. (2016).Utilization of Informationand Communication Technologies (ICTs) for Sustainable EconomicDevelopment in Nigerian. International Journal of Ergonomics and Human Factors, 12(2), 22-34. WIPO (2017), based on data from the World Bank (top), October 2011 and Pinkovskiy and Sala-i-Martin (2009).


Refbacks

  • There are currently no refbacks.