{"has_more":true,"total_items":38,"items":[{"vg_id":0,"authors":[{"author_name":". . . Sampling"}]},{"vg_id":0,"authors":[{"author_name":". . . Errata"}],"doi":"https://doi.org/10.1046/j.1468-2982.1995.015002158.x"},{"vg_id":0,"journal":"166 • Developing automated infringement detection and notice-sending policies and practices that better avoid inadvertently targeting noninfringing content"},{"vg_id":0,"journal":"• Avoiding inadvertently targeting noninfringing content requires limiting the definition of","title":"rogue\" site to those that truly exist to provide a platform for infringing file sharing, streaming, and download. One rightsholder, for example, described first contacting sites to see if \"you can find them and negotiate with them\"-which indicates an intention to operate legitimately-or if they \"operate in the shadows"}]}