{"id":1936,"date":"2019-05-14T12:02:49","date_gmt":"2019-05-14T12:02:49","guid":{"rendered":"http:\/\/ishik.edu.iq\/conf\/ilic\/?page_id=1936"},"modified":"2019-05-20T08:50:49","modified_gmt":"2019-05-20T08:50:49","slug":"research-33-ilic-2019","status":"publish","type":"page","link":"https:\/\/conferences.tiu.edu.iq\/ilic\/research-33-ilic-2019\/","title":{"rendered":"Research 33 ILIC 2019"},"content":{"rendered":"<h3>Research Title:&nbsp;<strong>\u0627\u0644\u0646\u0638\u0627\u0645 \u0627\u0644\u0642\u0627\u0646\u0648\u0646\u064a \u0644\u062d\u0645\u0627\u064a\u0629 \u0627\u0644\u0645\u0635\u0646\u0641\u0627\u062a \u0627\u0644\u0631\u0642\u0645\u064a\u0629<\/strong><\/h3>\n<p><strong>Author: \u0645.\u0645. \u0625\u062e\u0644\u0627\u0635 \u0645\u062e\u0644\u0635 \u0623\u0628\u0631\u0627\u0647\u064a\u0645<\/strong><\/p>\n<div align=\"justify\"><strong><strong>Abstract:&nbsp;<\/strong><\/strong>     Saw Information Technology And communications has seen the emergence of new types of business and intellectual works that are handled and traded through the default middle, and this is what raised the issue of protection of the legal system, which is governed by, Intrusive used in the production and circulation of them approaching the industrial property, which means protection of industrial property system which governs inventions industrial, but the nature and presence within the center of technical does not make them enjoy the protection of inventions, but is in origin centered on the nature of personal innovation that makes them Manata for the protection of literary property, and this dispute, is what prompted us to discuss this topic, hoping to determine the legal framework for the protection of this the style of the works.\n<\/div>\n<p style=\"text-align: center;\">Download the PDF Document&nbsp;<a href=\"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-content\/uploads\/2019\/05\/\u0627\u0644\u0646\u0638\u0627\u0645-\u0627\u0644\u0642\u0627\u0646\u0648\u0646\u064a-\u0644\u062d\u0645\u0627\u064a\u0629-\u0627\u0644\u0645\u0635\u0646\u0641\u0627\u062a-\u0627\u0644\u0631\u0642\u0645\u064a\u0629.pdf\"><b>from here<\/b><\/a>.<\/p>\n<p style=\"text-align: center;\"><strong>doi:10.23918\/ilic2019.33<\/strong><\/p>\n<p style=\"text-align: center;\"><strong>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8211;<\/strong><\/p>\n<p style=\"text-align: center;\"><strong> PROCEEDINGS OF 4th iNTERNATIONAL LEGAL ISSUES CONFERENCE 2019<\/strong><\/p>\n<p style=\"text-align: center;\"><strong>Faculty of Law\/ Tishk International University<\/strong><\/p>\n<p style=\"text-align: center;\"><strong>Date: 30th April 2019<\/strong><\/p>\n<p style=\"text-align: center;\"><strong>Venue: Kurdistan Region_Erbil<\/strong><\/p>\n<p style=\"text-align: center;\"><strong>ISBN:9789922903620<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Research Title:&nbsp;\u0627\u0644\u0646\u0638\u0627\u0645 \u0627\u0644\u0642\u0627\u0646\u0648\u0646\u064a \u0644\u062d\u0645\u0627\u064a\u0629 \u0627\u0644\u0645\u0635\u0646\u0641\u0627\u062a \u0627\u0644\u0631\u0642\u0645\u064a\u0629 Author: \u0645.\u0645. \u0625\u062e\u0644\u0627\u0635 \u0645\u062e\u0644\u0635 \u0623\u0628\u0631\u0627\u0647\u064a\u0645 Abstract:&nbsp; Saw Information Technology And communications has seen the emergence of new types of business and intellectual works that are handled and traded through the default middle, and this is what raised the issue of protection of the legal system, which is governed by, &hellip; <\/p>\n","protected":false},"author":27,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1936","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Research 33 ILIC 2019 - ILIC TIU<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conferences.tiu.edu.iq\/ilic\/research-33-ilic-2019\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Research 33 ILIC 2019 - ILIC TIU\" \/>\n<meta property=\"og:description\" content=\"Research Title:&nbsp;\u0627\u0644\u0646\u0638\u0627\u0645 \u0627\u0644\u0642\u0627\u0646\u0648\u0646\u064a \u0644\u062d\u0645\u0627\u064a\u0629 \u0627\u0644\u0645\u0635\u0646\u0641\u0627\u062a \u0627\u0644\u0631\u0642\u0645\u064a\u0629 Author: \u0645.\u0645. \u0625\u062e\u0644\u0627\u0635 \u0645\u062e\u0644\u0635 \u0623\u0628\u0631\u0627\u0647\u064a\u0645 Abstract:&nbsp; Saw Information Technology And communications has seen the emergence of new types of business and intellectual works that are handled and traded through the default middle, and this is what raised the issue of protection of the legal system, which is governed by, &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conferences.tiu.edu.iq\/ilic\/research-33-ilic-2019\/\" \/>\n<meta property=\"og:site_name\" content=\"ILIC TIU\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-20T08:50:49+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/research-33-ilic-2019\/\",\"url\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/research-33-ilic-2019\/\",\"name\":\"Research 33 ILIC 2019 - ILIC TIU\",\"isPartOf\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/#website\"},\"datePublished\":\"2019-05-14T12:02:49+00:00\",\"dateModified\":\"2019-05-20T08:50:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/research-33-ilic-2019\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conferences.tiu.edu.iq\/ilic\/research-33-ilic-2019\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/research-33-ilic-2019\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research 33 ILIC 2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/#website\",\"url\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/\",\"name\":\"ILIC TIU\",\"description\":\"TIU Universsity\",\"publisher\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/#organization\",\"name\":\"TIU\",\"url\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-content\/uploads\/2022\/03\/cropped-0.png\",\"contentUrl\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-content\/uploads\/2022\/03\/cropped-0.png\",\"width\":512,\"height\":512,\"caption\":\"TIU\"},\"image\":{\"@id\":\"https:\/\/conferences.tiu.edu.iq\/ilic\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Research 33 ILIC 2019 - ILIC TIU","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conferences.tiu.edu.iq\/ilic\/research-33-ilic-2019\/","og_locale":"en_US","og_type":"article","og_title":"Research 33 ILIC 2019 - ILIC TIU","og_description":"Research Title:&nbsp;\u0627\u0644\u0646\u0638\u0627\u0645 \u0627\u0644\u0642\u0627\u0646\u0648\u0646\u064a \u0644\u062d\u0645\u0627\u064a\u0629 \u0627\u0644\u0645\u0635\u0646\u0641\u0627\u062a \u0627\u0644\u0631\u0642\u0645\u064a\u0629 Author: \u0645.\u0645. \u0625\u062e\u0644\u0627\u0635 \u0645\u062e\u0644\u0635 \u0623\u0628\u0631\u0627\u0647\u064a\u0645 Abstract:&nbsp; Saw Information Technology And communications has seen the emergence of new types of business and intellectual works that are handled and traded through the default middle, and this is what raised the issue of protection of the legal system, which is governed by, &hellip;","og_url":"https:\/\/conferences.tiu.edu.iq\/ilic\/research-33-ilic-2019\/","og_site_name":"ILIC TIU","article_modified_time":"2019-05-20T08:50:49+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conferences.tiu.edu.iq\/ilic\/research-33-ilic-2019\/","url":"https:\/\/conferences.tiu.edu.iq\/ilic\/research-33-ilic-2019\/","name":"Research 33 ILIC 2019 - ILIC TIU","isPartOf":{"@id":"https:\/\/conferences.tiu.edu.iq\/ilic\/#website"},"datePublished":"2019-05-14T12:02:49+00:00","dateModified":"2019-05-20T08:50:49+00:00","breadcrumb":{"@id":"https:\/\/conferences.tiu.edu.iq\/ilic\/research-33-ilic-2019\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conferences.tiu.edu.iq\/ilic\/research-33-ilic-2019\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/conferences.tiu.edu.iq\/ilic\/research-33-ilic-2019\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conferences.tiu.edu.iq\/ilic\/"},{"@type":"ListItem","position":2,"name":"Research 33 ILIC 2019"}]},{"@type":"WebSite","@id":"https:\/\/conferences.tiu.edu.iq\/ilic\/#website","url":"https:\/\/conferences.tiu.edu.iq\/ilic\/","name":"ILIC TIU","description":"TIU Universsity","publisher":{"@id":"https:\/\/conferences.tiu.edu.iq\/ilic\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conferences.tiu.edu.iq\/ilic\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/conferences.tiu.edu.iq\/ilic\/#organization","name":"TIU","url":"https:\/\/conferences.tiu.edu.iq\/ilic\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conferences.tiu.edu.iq\/ilic\/#\/schema\/logo\/image\/","url":"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-content\/uploads\/2022\/03\/cropped-0.png","contentUrl":"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-content\/uploads\/2022\/03\/cropped-0.png","width":512,"height":512,"caption":"TIU"},"image":{"@id":"https:\/\/conferences.tiu.edu.iq\/ilic\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-json\/wp\/v2\/pages\/1936","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-json\/wp\/v2\/comments?post=1936"}],"version-history":[{"count":2,"href":"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-json\/wp\/v2\/pages\/1936\/revisions"}],"predecessor-version":[{"id":2238,"href":"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-json\/wp\/v2\/pages\/1936\/revisions\/2238"}],"wp:attachment":[{"href":"https:\/\/conferences.tiu.edu.iq\/ilic\/wp-json\/wp\/v2\/media?parent=1936"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}