Preview

CDPresent State and Emerging Scenarios of Digital Rights Management Systems

Powerful Essays
Open Document
Open Document
21022 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CDPresent State and Emerging Scenarios of Digital Rights Management Systems
Present State and Emerging Scenarios of Digital Rights Management Systems

The International Journal on Media Management

by Marc Fetscherin, University of Bern, Switzerland

Increasing need for controlling and securing digital content
Today’s wired and wireless world has yielded an increasing amount of digital content that demands protection from theft and prying eyes. This escalating need is driven by two trends.

Online Free Access to JMM

The first is the mass piracy and theft of intellectual property and proprietary information. Although the content

industry argues that piracy cost them several billions US dollars a year, there is no empirical evidence to support their claim. There is even contrary research from industry analysts, such as
Forrester, Media Matrix, and authors like Liebowitz (2002), Cave (2002), or
Hui (2002) that argues the exact cost of piracy is statistically unsupported and is unlikely to be as high as the content providers claim. What is known so far, that technology advances, such as CD-

This Journal is available on-line at http://www.mediajournal.org Abstract

Our journal is currently available on-line in PDF format through simple to use web interface provided by Netacademy.

This article focuses on technological solutions, such as Digital Rights Management
Systems (DRMS), which enable on one hand rights protection of intellectual property digital content, and on the other hand it should increase security and privacy of confidential and personal information exchange over semi open or open networks such as the Internet. First, this article will define and provide an overview of the key components of DRMS and respond to the questions of why such systems are needed, where they can be used, and how these systems work. Second, it will discuss the advantages and drawbacks of current DRMS. It will respond to the questions of what are the advantages and drawbacks when using such systems. Finally,



References: [Accessed 12 Dec. 2001]. Schaap, A. 2001, Metro & Sp!ts; Twee nieuwkomers op de Sjöwall, J. 2001, The Metro Concept [Online] clubmetro.com [Accessed 12 Dec. 2001]. Van der Veer, C. 2001, De substitutiefunctie van gratis dagbladen, doctoral thesis, University of Amsterdam. Verwimp, H. 2001, Free is not the right price, Ideas Magazine Vogel, A. 2001, ‘Die tägliche Gratispresse; Ein neues Geschäftsmodell für Zeitungen in Europa,’ Media Wadbring, I. & Weibull, L. 2000, Metro on the Swedish Newspaper [Accessed 13 Dec. 2001]. [Accessed 13 Dec. 2001]. Volume 16, 2003,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Over the past 30 years the cost of Electronics has steadily decreased. The cost of electronic storage has decreased greatly over the past 30 years as well. In this paper I will be talking about the decrease in the cost of RAM and Hard Drive Storage, how much will a 100TB HDD will cost when it becomes widely available in the future, and how much memory I will be able to buy with $100 in 10 years. In 1956, IBM created the first commercial Hard Drive called the IBM 305 RAMAC which held 5MB and cost a whopping 50 thousand dollars! Electronic storage started being more widespread during the early 1980’s, but it wasn’t until the 1990s that RAM and Hard Drive Storage begin to be cheap enough for the average person. Back in 1981 the price for one MB of Hard Drive storage space was $340! Most people couldn’t afford a computer back in the 1980’s because of the huge cost. Through the 1980’s the cost per MB fell from around $340 during 1981 then to $40 per MB in 1988, and finally to $9 per MB in 1990. The cost of one Bit of ram in 1981 was 0.000425 cents, in 1988 it was 0.000005 cents, in 1995 it was 0.000000158 cents, in 2000 the cost per Bit…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    | * OS level * Patch history * Resilient computing * Stateful inspection * Whitelists-Blacklists * DB encryption * Backups and archiving…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Microsoft, (2006), Knowledge base article 99588, Hardware abstraction layer (HAL), Retrieved July 21, 2007 from: http://support.microsoft.com/kb/99588…

    • 2709 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    robust hardware based firewall. Having an intranet is a key feature that will enable the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Good Essays

    Nt1330 Unit 7

    • 465 Words
    • 2 Pages

    a) Packaging b) Distribution c) Licensing d) Playback 2) List and explain five limitations that you can apply to a DRM license to control client access to a protected content file. a) Time limits – You can restrict the content to play back only between a specific start and end time or specify a license duration limit. b) Copy limit – Users can freely copy the content files to other computers, but each computer requires its own license. c) Multiple License – You can create licenses…

    • 465 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Resources: “Key Questions When Planning a Computer System” located in the Week Three Electronic Reserve Readings, and the technology guide link located in the Week Three Electronic Reserve Readings…

    • 489 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Piracy is a long debated issue, expressly in the entertainment industry. It is argued that encryption programs are necessary to prevent piracy, protecting the rights of artists as well as production agents. Yet, an important query on this matter still remains; the question of public benefit and free flowing ideas for purchasers wanting limited copies in digital form. Yet the rights of the artists and producers still remains leaving the question of copyright violation, the idea behind encryption is valid but only to a certain aspect. Piracy will not be able to be brought to an end so hastily as long as the motivation to do so still remains, that is the real problem behind this debate. The purchasers should be allowed to make a limited number of copies as a fair use policy. If a purchaser fairly buys rights to a product they should be allowed to make copies for themselves via modes of laptop and other digital other issues relating to the consumer as well, which may result in this idea to be more counterproductive instead of beneficial. Instead of using encryption it may be more productive in the long run to educate purchasers of a product about piracy. The costs of products such as DVD’s and BLU-RAY copies has steadily increased causing a lot of consumers to make do with cheaper and pirated versions…

    • 463 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ruby Training Guide

    • 6311 Words
    • 26 Pages

    No part of this publication may be copied, distributed, stored in a retrieval system, translated into any human or computer language, or transmitted in any form or by any means, without the prior written consent of VeriFone, Inc. The content of this document is subject to change without notice. The information contained herein does not represent a commitment on the part of VeriFone, Inc. Publications may not be stocked at the address given above. Requests for publications should be made to your VeriFone, Inc. Representative. GemCom, Ruby SuperSystem, Pearl, HPV-20, Sapphire, VeriPass, and Transaction SuperSystems are trademarks of VeriFone, Inc. All other products mentioned in this manual are trademarks or registered trademarks of their respective owners.…

    • 6311 Words
    • 26 Pages
    Satisfactory Essays
  • Powerful Essays

    References: Carroll, S. (2003, April 25). Site of the week: GetNetWise. Retrieved March 31, 2006, from http://www.pcmag.com/article2/0,4149,1042918,00.asp…

    • 4227 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Os Security

    • 369 Words
    • 2 Pages

    1. What are the relative advantages and disadvantages of at least three different measures used to protect operating systems?…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    During the years of the use of main frame systems data was stored and processed by large systems. As time progressed, similar data is being stored in a minuscule chip that can be carried with no effort. From the period of radios to the period of mobiles, from the dial up connections to Wi-Fi, technology provided many sophisticated solutions to problems. Telephone and internet eliminated the barriers to communication which were existent in the 20th century. Internet changed the world by providing services like online shopping, online banking, social networking and such. The leading technological advancement affecting the world in a globalized way is the WWW (World Wide Web). In the medical field many medicines and drugs have been developed that can inoculate a person thereby preventing any diseases. Technology has played an equivalent role in the transportation industry as well. Invention of automobiles and airplanes has completely transformed the way we travel. GPS (Global Positioning System) a satellite based navigation system that is developed mainly for military services, has also been used by the common man to meet the basic requirements such as finding the directions to a place and locating a lost car and such. Natural resources like water have been used to generate electricity and technology makes things such as these happen. Amazon, world’s largest internet retailer developed ‘Kindle’ (reading eBooks) with a goal to bring all of the world’s literature to Kindle. Similarly Apple has leveraged the technology in introducing iPad to the world with additional features such as being able to listen to music, check email, play games etc.…

    • 446 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Oops with Foxpro

    • 4336 Words
    • 18 Pages

    This article was written by Gregory L. Reichert and uploaded to the CompuServe Fox Forum on the 19th January 1995. The text remains unaltered although I have taken the liberty of tidying up the code samples. The casual Web surfer should be warned, there's some pretty complex stuff here.…

    • 4336 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    Digital Citizenship

    • 266 Words
    • 2 Pages

    Digital Etiquette is one of the areas where most problems occur. It is the electronic standards of conduct or procedure. The problem is not that no rules or protocols exist, but that they are constantly created and no one is teaching the digital citizens. Therefore, they are not responsible for their incorrect behavior. It is in equivalent to adding a new standard on a high school course and a teacher not teaching the new standard. The student then is not responsible for failing the ability to apply that…

    • 266 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    products or service or information over electronic systems such as the internet and the other…

    • 9469 Words
    • 65 Pages
    Powerful Essays
  • Good Essays

    Chapter 8 Computer

    • 2419 Words
    • 10 Pages

    • Describe the features of a firewall and how it can be used to protect against an attack.…

    • 2419 Words
    • 10 Pages
    Good Essays