Free Essay

Digital Rights Management

In:

Submitted By askary
Words 2387
Pages 10
Digital Rights Management

12/1/2010

Digital Rights Management

1

Introduction
• Digital Rights Management (DRM) is a term used for systems that restrict the use of digital media • DRM defends against the illegal altering, sharing, copying, printing, viewing of digital media • Copyright owners claim DRM is needed to prevent revenue lost from illegal distribution of their copyrighted material

12/1/2010

Digital Rights Management

2

DRM Content and Actions
• There are many capabilities covered by DRM
Digital Rights Management Digital content: • Videos • Music • Audio books • Digital books • Software • Video games Possible Actions and Restrictions: • Play once • Play k times • Play for a set time period • Play an unlimited amount • Copy • Burn to physical media • Lend to a friend • Sell • Transfer to a different device

12/7/2010

Digital Rights Management

3

Early U.S. Copyright History
• US Constitution, Article 1, Section 8
– “The Congress shall have the Power … To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries”

• Copyright Act of 1790
– "the author and authors of any map, chart, book or books already printed within these United States, being a citizen or citizens thereof....shall have the sole right and liberty of printing, reprinting, publishing and vending such map, chart, book or books...." – Citizens could patent books, charts, or maps for a period of 14 years – Could renew for another 14 years if you were alive – Non-citizens and works form other countries not protected – Other laws followed to change the Act slightly
12/1/2010 Digital Rights Management 4

Copyright Act of 1976
• Could copyright literary works, musical works, dramatic works, choreographic works, graphical works, motion pictures, and sound recordings (architectural works added in 1990) • Copyright holders had exclusive right to reproduce, create derivative works of the original, sell, lease, or rent copies to the public, perform publicly, display publicly • Could hold copyright for 28 years with a possible 28 year extension • Rights of copyright holders are limited slightly by sections 107 through section 118 – Often referred to as Fair Use

12/1/2010

Digital Rights Management

5

Fair Use Doctrine
• Various purposes for which reproducing a particular work is considered fair use
– Criticism, comment, news reporting, teaching, scholarship and research

• Four factors are considered when determining if it is fair use [17 U.S.C. § 106]
1. 2. 3. 4. The purpose and character of the use, including whether such use is for commercial nature or is for nonprofit educational purposes; The nature of the copyrighted work; The amount and substantiality of the portion used in relation to the copyrighted work as a whole; and The effect of use upon the potential market for or value of the copyrighted work

12/1/2010

Digital Rights Management

6

Sony vs. Universal Studios
• In the 1970s, Sony invented Betamax, a video tape recording format similar to VHS • Could be used to record copyrighted broadcasts • At the same time, some movie studios created Discovision which was a large disk that would disintegrate after a few plays • In 1976 Universal Studios and Disney sued Sony for all the lost profits and tried to ban the use of Video Tape Recorders (VTR) • District Court for the Central District of California rejected the claim on the basis that noncommercial use of VTRs was considered fair use • Court of Appeals for the Ninth Circuit reversed the ruling and held Sony liable for aiding in copyright infringement
12/1/2010 Digital Rights Management 7

Sony vs. Universal Studios (cont.)
• In 1984, the Supreme Court had to decide on the issue – Is selling VTRs to the general public aid in copyright infringement of public broadcasts? • The Supreme Court eventually ruled that “the sale of the VTR’s to the general public does not constitute contributory infringement of copyrights”
– Concluded that most copyright holders who license there work for public broadcast would not mind having their broadcasts recorded on to a Betamax tape by viewers – Betamax was ruled that it fell under the Fair Use clause

• Case often referred to by future copyright lawsuits including the Napster case
12/1/2010 Digital Rights Management 8

Digital Millennium Copyright Act (DMCA)
• Signed into law by President Clinton on October 28th, 1998
– Illegal to circumvent anti-piracy measures built into software – Unlawful to create, sell, or distribute devices that illegally copy software – Legal to crack copyright protection to conduct encryption research, assess product interoperability, and test computer security systems – Provides exceptions to nonprofit libraries, archives, and educational institutions in some cases – ISPs are not held accountable for transmitting information resulting from their customers infringements – Service providers are required to remove material when found

• Congress passed the law with almost no opposition
– Congress held the impression that it was merely a technical issue and not one of impact to public policy – Highly lobbied by the industry
12/1/2010 Digital Rights Management 9

Dmitry Skylarov and Ed Felten
• Dmitry Skylarov
– Worked for Elcomsoft in Russia and created product that converts Adobe secure eBook to unprotected PDF (legal in Russia) – While in the US, Skylarov was arrested and placed in jail for DMCA violations – Eventually Elcomsoft was sued and Skylarov was released

• Professor Edward Felten of Princeton
– In 2000, the Secure Digital Music Initiative (SDMI) invited researchers to try and break their watermark technology – Felten and his team were able to remove the watermarks and wrote a paper to be presented at a conference – SDMI and RIAA threatened to take legal action against Felten – Felten withdrew from conference but talked about the threats – Felten with help of the Electronic Frontier Foundation sued RIAA and SDMI – SDMI and RIAA withdrew their threat – Felten eventually presented the paper at a different conference
12/1/2010 Digital Rights Management 10

Copy Protection Methods
• Dongle
– Pluggable hardware device that contains a secret value required to run the software

• Product key
– Required to be entered by installation software – Online check for duplicate use – Hardware and OS fingerprinting to bind license to machine

• Phone activation
– Human-to-human interaction servers as deterrent

12/1/2010

Digital Rights Management

11

The Analog Hole
• Every copy protection mechanism is open to the risk of the “analog hole”, that is, recording the content as it is being played

analog hole

12/7/2010

Digital Rights Management

12

DRM Media File Example
• Step 1:
– A media server sends to the player the media file encrypted with the file key and the file key encrypted with the player key
G
encrypted f ile key

Server C encrypted media f ile

Player

G

C

Unprotected Storage

12/7/2010

Digital Rights Management

13

DRM Media File Example
• Step 2: player key P F file key media file Decrypt M

– The player first decrypts the file key using the player key and then decrypts the media file with the file key.

Player

Decrypt

G

C

Unprotected Storage

Digital Rights Management

14

Traitors Tracing
• A controller distributes protected content to a collection of devices • The devices share a common symmetric key with the controller • Each content item is encrypted with the shared key and broadcast to all the devices • Some devices (traitors) are cloned or used to illegally copy and distribute protected content • Problems: – Identifying traitors – Revoking traitors
12/1/2010 Digital Rights Management 15

Logical Key Hierarchy
• Balanced binary tree of symmetric encryption keys • Devices associated with leaves, each holding the keys on the path to the root • Content encrypted with the key of a node v can be decrypted by all the devices in the subtree of v
K5 K4 K3 K2 K1
12/1/2010 Digital Rights Management 16

Revocation of a Device
• If a device needs to be revoked, the keys known to this device must be changed and the new keys must be distributed • The distribution of new keys can be done with a logarithmic number of encrypted broadcast messages

12/1/2010

Digital Rights Management

17

Encrypted Broadcasts
• Content hierarchy with various subscription packages • Each content item is encrypted with a single symmetric key before broadcasting • Subscriber authorized to view item must have the key to decrypt the item • Single key per node allows computation of keys of descendant nodes • Key distribution problem
All

Sport

Economy

News

Finance
12/1/2010

Business

US

World

Local
18

Digital Rights Management

CD/DVD Protection
• Most CD/DVDs are protected so they cannot be copied • CDs are not indestructible and backups are required • Legal to make backups of CDs you own in most countries – Not legal to sell • Most protection technologies encrypt the files using a key that is added to the disc as a digital signature • Almost every encryption technique has been cracked

12/1/2010

Digital Rights Management

19

CD/DVD Protection
• Technically, it is impossible to completely prevent users from copying media they purchase
– – – – Bit-by-bit copy of software Recording of music using microphones Recording of movies using cameras Scanning of text media

• Given enough time and resources, any media can be copied • Most companies realize they cannot stop “professionals” from duplicating but they try to stop the casual user from copying
12/1/2010 Digital Rights Management 20

SafeDisc V1 and V2
• Copy protection created by MacroVision

• Games starting in 1999 were protected • Based on having read errors on the original disc
– CD burners had to be able to copy the errors exactly as is

• Version 2Has bad sectors like version 1 but also has “weak” sectors
– Weak sectors often become bad sectors when copying – Uniform bit-patterns are hard to write for many CD writers – Some people allege hardware manufacturers may have done this on purpose to aid CD copy protection

• Easy to break
– 1:1 CD-Copy using several CD copy programs – SafeDisc Patches: Generic SafeDisc Patch, Daemon Tools – Executable UnWrappers: unSafeDisc, DumPlayerx
12/1/2010 Digital Rights Management 21

DVD copy protection
• Traditional recording media (e.g., audio tape, VHS tape) for audio and video are analog and used different standards NTSC, PAL, SECAM ... • Piracy is not too big of a concern because quality degrades with each copy generation. • With digital recording and high-resolution video, DVD copy protection was a big issue to the movie industry. • In fact, it took about 2 years after the invention of DVD to put DVD movies on the shelf. Part of it is due to the development of a reasonable copy protection scheme.
12/1/2010 Digital Rights Management 22

How Studios Split our Planet

DVD Region Code Symbol A region code byte is recorded on a disc
12/1/2010 Digital Rights Management 23

DRM Architecture
• Proposed by the Copy Protection Technical Working Group for DVD (CPTWG), IBM, Intel, Matsushita, Toshiba. • Idea:
– Alice sells Bob a video, in order for Alice to prevent Bob from re-disseminating the video to others, Alice tries to make sure that Bob only accesses the video data on a trusted (or compliant) device
12/1/2010 Digital Rights Management 24

Trusted Devices
• A trusted device is manufactured by a trusted manufacturer. • A manufacturer is trusted if it has joined the Copy Control Association (CCA) • A trusted device is given a (secret) player key • The trusted manufacturer has to sign an agreement with CCA, basically barring it from making devices that could undermine the copy protection mechanism. • Since 2000, manufacturers must produce DVD ROM drivers compliant with=RPC 2 (Region Playback Control)
12/2/2010 Digital Rights Management 25

CSS: Content Scrambling System
• In most cases, a DVD (video disk) is protected by the CSS scheme. Intuitively, the video content is encrypted using a disc key, k. • In the lead-in area of a CSS-protected DVD, the disk’s key k is encrypted about 400 times, each using a different player key. • A DVD player with the ith player key will read the ith entry of the key block. This entry is then decrypted using the player key ki to obtain the disk key k. • The video content is then decrypted on-the-fly while the movie is played. • Using a normal DVD writer the copy will not have the key block and disk will not be playable • if someone decrypts a video, with special tools (HW or SW), it is possible make pirated copies with the lead-in key block or without CSS (i.e., decrypted).

copy Lead-in with Key block
12/2/2010

decrypt and write
Digital Rights Management

unencrypted Lead-in without Key block
26

Viewing a DVD

Player Key Disc Key Title Key Encrypted Content Title Key Encrypted Content Decrypt Disc Key Decrypt Title Key Decrypt Content

(To Output Device)
12/2/2010 Digital Rights Management 27

CSS Keys
• Authentication Key
• Used for mutual authentication

• Disk Key
Used to decrypt the title key

• Session/Bus Key negotiated during authentication encrypt title and disk keys before sending them over the unprotected bus Prevent eavesdropping

• Title Key
This key is XORed with a persector key to encrypt the data within a sector

• Player Key
Licensed by the “DVD Copy Control Association” to the manufacturer of a DVD player Stored within the player Authenticates the player Used to decrypt disk key.
12/2/2010

• Sector Key
Each sector has a 128-byte plain-text header Bytes 80 - 84 of each sector’s header contain an additional key used to encode the data within the sector
28

Digital Rights Management

DeCSS
• • • • Created in 1999 by Jon Johansen Decrypts CSS and allows for copying files to hard drive At the time, little information known about CSS algorithm DeCSS came with the source code that showed how easy it was to crack CSS • Technique used for creating open source DVD players that could run on Linux • First in a long line of DVD decrypting programs • Johansen was sued by the DVD-CCA but case was dropped
– Mass pirating occurred far before DeCSS was published – DVD writers are unable to write to the region that CSS writes – Most DVD copies done using special equipment that copy bit by bit
12/2/2010 Digital Rights Management 29

Advanced Access Content System
• New standard for DRM that allows for limited sharing and copying of next generation DVDs
– Developed by Microsoft, Sony, Disney, IBM, Matsushita, and Warner Brothers – Used in Blu-Ray

• Method
– Based on broadcast encryption – Revocation of traitors

12/2/2010

Digital Rights Management

30

Similar Documents

Premium Essay

Digital Rights Management (Drm) Research Paper

...Digital Rights Management (DRM) Digital Rights Management, by definition, controls the purchase and distribution of material accessed on the Internet. The material may be in the form of text, images, videos, or software that is downloaded online; often there is a payment required by the user, in turn the provider compensates the creator for rights to dispense the material. This endless availability to material is made possible with modern technology and DRM protects the material from electronic copyright theft. Once the material is purchased by a user it is still under control of a DRM and may only be compatible with a particular device or service, creating an ethical dilemma. There are strengths and weaknesses, other than availability and ethical implications, associated with DRM that are still changing with new technologies. History, Evolution, and Current Status DRM has been in existence since material required copyright, controlling access to material and distribution. Creators of the material find that DRM protects their rights to compensation of ideas, products, or services. This is more difficult when the Internet became popular; programs and applications have replaced older methods of copyright protection but this decreases user control. The restrictions have evolved with advancements in technology that allow service providers to use DRM to limit what and how material is gained, used, or distributed. This has not been a benefit to the consumer because it limits what...

Words: 1037 - Pages: 5

Premium Essay

Threats In Digital Rights Management

...always been drawn by the developments in the technological world, the emergence of digital technologies towards the concluding decades of the twentieth century as defining paradigms of new age communication raised a whole new set of challenges to copyright regimes. The traditional notions of the basic concepts such as rights of reproduction and distribution have become inadequate and even irrelevant in the digital age. All works can now be digitalized whether they comprise texts, images, sound or diagrams and once digitalized the various elements such as images are all ‘equal’ and can be merged, transformed, manipulated or mixed to create an endless variety of new works. Earlier rights of reproduction...

Words: 812 - Pages: 4

Free Essay

E Commerce

...Association for Information Systems AIS Electronic Library (AISeL) ECIS 2005 Proceedings European Conference on Information Systems (ECIS) 1-1-2005 Analysis of eBusiness Models for Digital Media Content Michael Amberg University of Erlangen-Nuremberg, amberg@wiso.uni-erlangen.de Manuela Schroeder University of Erlangen-Nuremberg, manuela.schroeder@wiso.uni-erlangen.de Recommended Citation Amberg, Michael and Schroeder, Manuela, "Analysis of eBusiness Models for Digital Media Content" (2005). ECIS 2005 Proceedings. Paper 138. http://aisel.aisnet.org/ecis2005/138 This material is brought to you by the European Conference on Information Systems (ECIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in ECIS 2005 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact elibrary@aisnet.org. ANALYSIS OF E-BUSINESS MODELS FOR DIGITAL MEDIA CONTENT Amberg, Michael, University of Erlangen-Nuremberg, Lange Gasse 20, 90403 Nuremberg, Germany, amberg@wiso.uni-erlangen.de Schroeder, Manuela, University of Erlangen-Nuremberg, Lange Gasse 20, 90403 Nuremberg, Germany, manuela.schroeder@wiso.uni-erlangen.de Abstract The digitalization of media content and the development of new communication and distribution channels change the media sector and the business environment worldwide. Over the last ten years, technical advances have enabled the consumers to digitize, store...

Words: 6388 - Pages: 26

Premium Essay

Printed and Digital Books

...Printed Versus Digital Books Name: Course: Professor: Date: Introduction Books trace their history to 868 BC when a Chinese writer produced a book named Diamond Sutra. However, printed work never featured predominantly before the development of Gutenberg’s Bible. Before Gutenberg, humans preserved literary work through wood, metal, or stone paintings. Further, people started using paint as a mode of expressing and preserving ideas. As technology advanced, printing burgeoned and the world became filled with books. Today volumes of printed sheets may be found lying everywhere particularly in libraries. Everywhere you go, from private homes to libraries, you will find magazines, hard cover books, newspapers, journals, religious books, and many other forms of printed material carefully arranged waiting for readers. However, over the recent past, people have left the colorfully printed media for digitally downloaded and installed media made available by technological gadgets. This paper will assess the place for printed books in an era where technology presents myriad alternatives. Current Trends Today, students flock schools with the latest gadgets such as iPads, NOOK color, and Kindle Fire equipped with an array of books. These technological tools can handle simple digitized forms of books as well as enhanced books. Enhanced books have gained popularity over the recent past and prominent publishers reproduce their books in such versions. This sudden twist of events has...

Words: 649 - Pages: 3

Premium Essay

Plagiarism

...January 2014 Music Piracy Ever wondered how the music that you listen to probably every day of your life becomes the music that you love so much? Well there is a long and tedious process that goes into to making just one song. The artists does his or her best to make a song that he or she likes and also a song that all of the fans would enjoy too. It takes days, maybe even weeks to just make one single song; and there are so many components or people that go into its creation. To start, there are songwriters and audio engineers, computer technicians and also the actually artist or artists in the song, and all of those people profit off of that one song. So when a person goes online and decides to illegally download a song using either a digital storage locker or a peer-to-peer site you a basically stealing money from a people that worked really hard on making that song, and when not just one but thousands and millions of people start to do that, that takes a big toll and has a big impact on those people. This type of stealing is called music piracy and music piracy is a serious problem and affects the music industry in many different ways, from revenue loss, to a decline in jobs. Music piracy is the illegal copying or distributing of music that a company did not give permission to do. Music piracy has been on a rapid increase since the beginning of the 2000s. In 2005, the International Federation of the Phonographic Industry (IFPI) estimated that 20 billion songs were illegally...

Words: 2252 - Pages: 10

Free Essay

Dmca

...employees that manufacture the digital media, even you as the person downloading the content will have consequences. If the demand for a product is high the price for such product does not have to be high. Thus, if I along with many others download my favorite artist’s song the consequences ripple far past the wealthy record companies. The fans willing to pay will have a higher cost because demand is not reflected accurately. The companies that develop products to create this digital media will have fewer jobs to offer/may require terminating employees. I will feel the effects because my favorite artiest may not put out music due the demand not being accurate. This is a very interesting topic to discuss because here there are laws that protect copyrighted material, as well as technology that solely are used to uphold these laws. In fact, it seems that the technology are the laws regarding digital media and when avoided they are broken. “Once constrains on behavior are built into the technical standards governing a technology, the technical standards effectively become a new method for governing used of the technology- in essence, the technical standards become a type of law.”(Textbook) Lending a CD to a friend is ok. There isn’t infringement to copyrights, and the rights management system is not undermined when doing so. For instance manufactures decide the rules of with the digital media can be used. “In the Case of rights management systems, copyright owners determine...

Words: 1012 - Pages: 5

Free Essay

Virtual Reality in Education

...Learning Virtually Everything: VR in Education Virtual Reality has been one of this generation’s most promising technologies, with BBC labeling it as one of the most exciting technologies of 2015 as a result of its ubiquity in various different fields ranging from video games, education and even broadcasting. The current generation of virtual reality devices have been influenced by devices of the late 80s and early 90s, with similar head mounted-devices such as Virtuality and the Sega VR-1 headsets being particularly innovative in being able to deliver low latency, stereoscopic immersive experiences, though with the technology at that time these devices were only able to display low resolution, unrealistic graphics that were plagued with performance issues. Their high price tag has also made this technology relatively restrictive, and despite predictions dating back to 1992 stating that virtual reality would become affordable within the next two years, it took over two decades for devices like the technology I will be focusing on in this essay, the Oculus Rift, to largely solve issues pertaining to its graphics, performance and most importantly, the price is expected to be under 300 USD – a far cry from the 76000 USD price tag for a Virtuality system. This can largely be associated to the exponential increase in processing power as a result of Moore’s law, alongside the development of organic light emitting diode (OLED) technology that vastly improves upon contrast and color...

Words: 1797 - Pages: 8

Premium Essay

Digital Media Copyright in Developing Countries

...Digital Media Copyright in Developing Countries In the developing world, piracy is a serious problem. According to the report “Why Poor Countries Lead the World in Piracy”, “Trade reps from rich countries complaining loudly about copyright infringement and demanding that poor countries reorganize their domestic priorities around preventing unauthorized copying at any expense, threatening trade sanctions and worse for the recalcitrant." However, the copyright laws in many developing countries still give little consideration to copyright management issues for Digital Media Fields, such as software, E-book, music downloads, and digital cinema. As the biggest sources of illegal download in the world, developing countries’ digital media technology is seriously hindered. At the same time, some people argued that the tolerant digital media copyright law helps to bring culture and knowledge to people. I believe it is a mistake, as they may not understand Fair Use. In the case of China, according to Liu & Bates, “China copyright law focuses more on the regulations for traditional forms of creative content than the digital fields” (Liu & Bates, 2008). However, according to China Internet Network Information Center’s report, “the number of “netizens” in China has exceeded that of the United States” (2008). At the same time, China has become one of the biggest illegal downloads sources. As a result, China has responsibility to pay attention to digital rights management. A strong...

Words: 654 - Pages: 3

Premium Essay

Sample

...established esonic, a subsidiary exclusively designed to serve as an online music store. In the wake of mounting anti-piracy campaigns concerning music downloads, increased demand for digital technologies that offer greater access and mobility, and an overall increase in consumer demand for access to digital media, esonic has a more than favorable forecast of success in entering the digital music market. Despite fierce competition from established online music providers such as Apple’s iTunes and Napster, esonic will find more than enough room for growth. Through strategic alliances with software and hardware technology firms, esonic can further magnify its reach and appeal to become a digital music industry giant. A unique opportunity presents itself to esonic: it can learn from and avoid the mistakes of digital music industry pioneers, whilst simultaneously mimicking elements of successful strategies at the rapid pace that an online music store with relatively little operating costs can provide. Designing a competitive business strategy remains imperative, however, and the success of esonic will be dependent on its ability to adequately recognize opportunities for growth. Growth in global spending and a naturally expanding digital distribution market invites esonic to capitalize on the digital music industries in foreign markets. Studies have shown the most significant growth in that sector to occur in Europe and Asia-Pacific. While the US is the largest market, its growth...

Words: 5891 - Pages: 24

Premium Essay

Asdf

...successful i. A dedicated book reading device (Kindle, ii. Multipurpose device (tablets, iPads, etc) iii. General purpose computer (PC and Mac computers) iv. Smart phones (iPhone, Android) v. Other form (specify) I will focus on the multipurpose device. I think this factor will make it successful. Because students can read e-book anytime and everywhere. If I only focus on smart phones or general purpose computer or any other factors, students only can read by the factor I focused. It is inconvenient. a. Feature: Select the feature(s) that will help make it successful vi. Backlit display for low light reading (like iPad) vii. Daylight readable (like digital paper)...

Words: 713 - Pages: 3

Free Essay

Ethics in Information Security

...that will allow for an informed choice and in transparent language. There are reservations about a company's desire to do this. Health Insurance Portability and Accountability Act (HIPAA) The Health Insurance Portability and Accountability Act of 1996 protect the confidentiality and security of health care data by establishing and enforcing standards and by standardizing electronic data exchange. Strengths: * Allows patients the legal right to see, copy, and correct their personal medical information. Also it enabled patients with pre-existing conditions to change jobs without worrying that their conditions would not be covered under a new employer's health plan * Prevented employers from accessing and using personal health information to make employment decisions Weaknesses: * Now health care providers, insurance providers, and even the consumers are bombarded by overwhelming amounts of paperwork which consume time and money that could be better spent elsewhere.  Digital Millennium Copyright Act (DMCA) The Digital...

Words: 629 - Pages: 3

Free Essay

Revolution in Digital Music Distribution

...Revolution In Digital Music Distribution Introduction Thesis Statement: Technological advancement has made the music industry got transformed overnight with the invention of the MP3 format compression technology and the introduction of the Internet file sharing services like Napster, Gnutella, and Scour thus seeing the major music labels taking almost anyone that is into digital music to court. The potential fear that led to the court actions center on how the music labels can possibly make any money if music becomes available in digital format for free. The question therefore is that if music is available free of cost, why would anyone pay for it? Could Napster conveniently say that it is indeed the first technology development to provide access to music content for free? Purpose of Study: This paper establishes the following: the industry conditions that led to the revolution in audio distribution while identifying which stakeholders are benefiting most or least; the reasons that made the music stores to attract many subscribers and what if any the record labels should have done differently; determine, if Apple allows its iPods to play non-iTunes songs, how long the success of iPods and iTunes endures; why musicians should sign away their copyright privileges to their songs through creative commons; and how podcasting would likely impact the appropriability of recorded music, radio broadcasting or other types of audio transmission. Overview of the Paper In 1991,...

Words: 1854 - Pages: 8

Free Essay

Digital Rights

...Digital Rights Management (DRM) are techniques used to control the use of intellectual property in digital formats controlling unauthorized redistribution and restricting the ways consumers can copy content that they have purchased. 2 These controls started with copy preventative measures on software that was sold in diskette form. 1 Over the years DRM has improved to cover intellectual property such as movies, music and books. DRM is important to intellectual property owners. Without these improvements owners were reluctant about moving forward with sharing these items digitally. There is some controversy involved in the use of DRM as the techniques restrict some legitimate uses. DRMs that are now being utilized may restrict the ereader you use to read a book, prevent you from copying a DVD or Blue-Ray to your portable device or dictate which applications are available for your specific smart phone. 3 Corporations claim that these DRMs not only protect their intellectual property but also protect the consumer from viruses, malware and adware. Many consumers feel that these restrictions should not be in place, or should be less restrictive so that consumers can have some freedom over their personal use once they have paid a fair market price for digital property. Intellectual property needs to be protected.  Owners are rightfully concerned about unlawful copying and distribution, without compensation, of their works. As techniques and technologies improve and increase to...

Words: 773 - Pages: 4

Premium Essay

Bus 110 Writing Assignment 5

...1) In what ways does Bezo’s decision to develop and deliver the Kindle show systematic and intuitive thinking? I feel that the decision Bezo made to develop and deliver the Kindle to the market showed very forward thinking. Originally Amazon was known as a book retailer. As the music world went digital he knew that books would be the next thing to move forward also. To create device to load digital books made sense. This enable Amazon to continue to be competitive grow in his bookseller market. The Kindle was released to the market three years before the IPad. 2) Would you describe Amazon’s position in the digital entertainment market as certain, risky or uncertain? Why? I think that Amazon’s position in the digital entertainment market would be certain. I believe this because they keep improving on their products and adding to their website. They are making it easy for the consumer to do all their shopping at one online site. When it comes to the technology industry for the retail market they have been able to provide the consumer what they want before others could. I for see them to be able to continue beating the competition. 3) Which decision errors and traps are the greatest threats to the success of Bezo’s decision making as Amazon’s CEF and why? I believe one of the biggest traps is that a company tries to rest on their past history. If they want to continue to be competitive they will have to remember how...

Words: 573 - Pages: 3

Premium Essay

Piracy

...file sharing between the entertainment and software industries and the vast, online pirating community has been one of the most debated topics. Gripping public attention for the past decades. Napster, a website created by a college dropout became an empire. Used by hundreds of millions of people, that robs billions in revenue each year. Although these rogue websites claimed to only be hosts for illegal file sharing, the United States government took action to eliminate Internet piracy and protect copyright by implementing digital encryption technologies and strict laws that prohibit tampering with these encryptions. The trafficking of copyrighted goods must be put to an end because it promotes illegal transactions of an owner’s intellectual property, causing sales in the entertainment and software industries to plummet and thereby restricts the growth of the economy. Internet piracy is the unlawful reproduction and/or distribution of any copyrighted digital file without the permission from the owner. It is driven by the consumers demand for a desirable product that would otherwise be unobtainable, either because of financial limitations or cultural factors, such as the Chinese culture’s emphasis that the free sharing of knowledge creates and preserves both civilization and traditional values across generations (Lu 310). Consequently, such a mindset that has caused many people to believe piracy to be the solution to their individual economic problems has resulted in the slow,...

Words: 1422 - Pages: 6