Digital Rights Management
According to Arsenova (Technical aspects of Digital Tights Management) digital rights management (DRM) encompasses many technical functions for controlling accessibility. The major ones are summarized below.
DRM uses a cryptographic algorithm to encrypt content that needs a secret key - a particular phrase or string of numbers. Only the holder(s) of this key can unlock the content and read it. Often, a cryptographic system uses two keys -- a public key known to everyone and a private or secret key known only to the recipient of the message. For example, when Joe wants to send a secure message to Ann, he uses Anne's public key to encrypt the message and then Anne uses her private key to decrypt it. A digital certificate connects a person's identity with his/her public cryptographic key. The digital signatures are issued by certificate authorities that guarantee that a public key belongs to the person whose name is in the certificate.
Secure Sockets Layer and Transport Layer Security are cryptographic communication protocols for secure communications on the Internet. These protocols allow client/server applications to communicate in a way designed to prevent eavesdropping, tampering and message forgery. IPsec is a standard that provides security at the network layer by encrypting and/or authenticating IP packets.
Watermarking, Fingerprinting and Access control are other important DRM techniques. Watermarking is the process of embedding information into a data source in such a way its existence is hidden. It essentially serves as a copyright stamp. Another method to protect digital media is to fingerprint each copy with the purchaser's information. Thus, if the purchaser makes illegitimate copies, they will contain his or her name. Access control attempts to find ways for limiting the access to copyrighted material and/or inhibiting the copy process itself. Examples of copy protection include encrypted digital TV broadcast, access controls to copyrighted software through the use of license servers and technical copy protection mechanisms on the media.
Bibliography
Arsenova, E. Technical aspects of Digital Tights Management. http://wob.iai.uni-bonn.de/Wob/images/01212504.pdf
This did not end the matter, of course, and appeared to be addressed more at the copier than at sites facilitating sharing, which would become the next target. File Sharing Services Napster was the best known but hardly the only website devoted to facilitating file sharing among subscribers. After the courts caused Napster to shut down, at least in its original form, other sites emerged to take its place. A court
Digital Copyright problem of the Digital Age is that while information is easy and economical to publish and disseminate, exploitation of digital copyright and intellectual property rights remains a contentious issue. The question of who owns the right to digital information is one of the most hotly contested issues on the Web today. The subject of intellectual and digital copyright is fast becoming a topic that is expected to have
Management Principles Management Leadership Model Paper: Management Principles Research suggests that everyone is a manager in their own way. For instance, everyone manages his finances, time, careers and relationships. These examples of managing are simple and straightforward. However, when concepts of management apply in organizations, management becomes complex. At such a point, it calls for extensive studying in order to understand the theoretical basis of management. The application of management and the enunciation
Value Digital Privacy Information Technology The Value Digital Privacy in an Information Technology Age National security concerns in society and the continual investing in Internet, telephone, text and e-mail monitoring systems by enterprises are reshaping the individual citizen's rights to privacy. For U.S. citizens and employees, this is particularly challenging to accept and is often outright rejected as this nations' culture has been predicated on individual liberties and an assurance of privacy. The
Operations Management Report -- Community Bank of Perth The Community Bank of Perth has experienced tremendous growth in home loan refinancing in the past two years. This is due in part to continued growth of the Western Australian mining sector, as well as increased consumer interest in more innovative and economical loan terms. With rising competition in the market, more lenders are now aggressively working to boost their market share through
Managing All Stakeholders in the Context of a Merger Process Review of the Relevant Literature Types of Mergers Identifying All Stakeholders in a Given Business Strategic Market Factors Driving Merger Activity Selection Process for Merger Candidates Summary, Conclusion, and Recommendations The Challenge of Managing All Stakeholders in the Context of a Merger Process Mergers and acquisitions became central features of organizational life in the last part of the 20th century, particularly as organizations seek to establish and
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now