Free

Failures of DRM and Digital content copyright - Essay Example

Comments (0) Cite this document
Summary
This exposes digital contents to various risks and threats such as theft and misuse, unauthorized distribution, plagiarism and…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
Failures of DRM and Digital content copyright
Read TextPreview

Extract of sample "Failures of DRM and Digital content copyright"

Computer Sciences and Information Technology Failures of DRM and Digital Content Copyright Lecturer’s Fundamental Problems with Digital Copyright Protection
The safety of digital contents has not been perfect because of the ability of people to produce their exact copies for very easy distribution. This exposes digital contents to various risks and threats such as theft and misuse, unauthorized distribution, plagiarism and impersonation (Coyle 2013, p. 51).
1.1. Theft and Subsequent Misuse
Once a person gains access to the digital contents, he or she steals and uses the contents for selfish gain without the owner’s approval.
1.2. Unauthorized Distribution
A person obtains digital contents and distributes in return for financial gain, denying the original owner the privilege of distribution and regulation of prices.
1.3. Plagiarism
A person reproduces copies of the digital contents under his or her own names instead of the names original owner (Campidoglio, Frattolillo & Landolfi 2009, p. 526). The end client therefore considers the products as original and genuine.
1.4. Impersonation
A person obtains digital content either legally or illegally, and then forges the identity of the original owner such that the clients consider the products as genuine.
2. Past Solutions for the Problems
2.1. Digital Rights Management (DRM)
The DRM strategy is to use encryption and restrictive License agreements.
2.1.1. Strengths and Successes
It prevents access and copying or conversion of data to various formats.
2.1.2. Weaknesses and Failures
There is a great risk of data loss of music and software in the absence of the playback media. Additionally, according to Hombal & Prasad (2012, p. 237), the media must keep changing from one data format to another.
2.2. License Agreements
Digital licensing operates in assumption that both the licensor and the licensee complies to the terms and conditions.
2.2.1. Strengths and Successes
It supports the dynamic exchange of information between the licensors and licensees for easy identification, delivery and payment.
2.2.2. Weaknesses and Failures
There is no control over the violation of the licenses over digitally copyrighted materials as they are distributed in diverse creative ways (Roettgers 2010, p. 9).
2.3. National Copyright Protection Law
The law is enforced by the state to deter copyright theft. Under the law, violation of copyright property ownership is subjected to prosecution.
2.3.1. Strengths and Successes
The state offers partnership in backing the law and prosecuting offenders.
2.3.2. Weaknesses and Failures
Compliance to the law is difficult to enforce.
3. Currently Proposed Solutions
Following the weaknesses of the three past laws, two solutions are proposed by this study including post-delivery licensing and dynamic auto sensing.
3.1. Post-delivery Licensing
3.1.1. Mechanism
Producers of digital materials ought to generate device-specific and product-specific licenses, which are only issued to the client after delivery, for use in specific devices. This implies that any reproduced copies only operate in the originally licensed device and the licensed product.
3.1.2. Possible Success
This process can eliminate the reproduction of digital products because licenses will not be reusable.
3.2. Dynamic Auto Sensing
3.2.1. Mechanism
Producers ought to collaborate with network experts such that if any attempt to reproduce digital materials in a device is sensed from any location. This requires a great deal of partnership, involving the hardware manufacturers who should install the electronic tracking units in the hardware devices. The devices can be configured to send information to central location for monitoring copyright reproduction.
3.2.2. Possible Success
It will be easier to locate the users of digital materials without valid licenses. This will discourage potential pirates of digital materials.
References
Roettgers, J 2010, DRM fail: five broken copy protection schemes Online. http://gigaom.com/2010/09/17/drm-fail-five-broken-copy-protection-schemes-2/
Coyle, K 2013, The technology of rights: Digital rights management. Based on a talk given at Library of Congress, p.51.
Hombal S G & Prasad K N, 2012, Digital Copyright Protection: Issues in the Digital Library Environment, DESIDOC Journal of Library & Information Technology, Vol. 32, No. 3, May 2012, pp. 233-239.
Campidoglio M., Frattolillo F & Landolfi F, 2009, "The Copyright Protection Problem: Challenges and Suggestions", ICIW, 2009, Internet and Web Applications and Services, International Conference on, Internet and Web Applications and Services, International Conference on 2009, pp. 522-526. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Failures of DRM and Digital content copyright Essay”, n.d.)
Failures of DRM and Digital content copyright Essay. Retrieved from https://studentshare.org/information-technology/1678308-failures-of-drm-and-digital-content-copyright
(Failures of DRM and Digital Content Copyright Essay)
Failures of DRM and Digital Content Copyright Essay. https://studentshare.org/information-technology/1678308-failures-of-drm-and-digital-content-copyright.
“Failures of DRM and Digital Content Copyright Essay”, n.d. https://studentshare.org/information-technology/1678308-failures-of-drm-and-digital-content-copyright.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Failures of DRM and Digital content copyright

Copyright enforcement - Digital Piracy

...policies in order to ensure that these strategies can effectively reduce the number of digital piracy events and provide creators with ample incentives to generate new things. The paper deals with understanding different issues regarding piracy in the digital environment. The major objective is to understand the attempts made through enforcement of law and also to provide certain solutions in order to avoid the detrimental occurrences of digital copyright piracy (Litman, 2006). Overview of Digital Piracy In present days, digital products have much demand in the market particularly for young consumers. The easy reproduction and sharing of...
12 Pages(3000 words)Essay

Copyright in digital media

...the legislative shift from treating various products as public resources to seeing them as corporate assets (Wright 83). DMCA was designed to give corporate content producers, “global protection from piracy in a digital age” (Wright 83). Different viewpoints on the ideology and goals of copyright laws are embedded in the history of copyright protection. Some support it for the interest of owners and publishers/producers, others oppose it because it breaches the First Amendment and lacks consideration for diverse stakeholders, while several people offer alterative ideologies and licensing solutions. For Tighter Regulations and Implementation of Copyright...
10 Pages(2500 words)Essay

QUESTIONS Thoroughly read Chapters 7 through 10 of the Policy Issues textbook, and then prepare an annotated bibliography for

...Protection”. June 12, 2007. http://www.cs.auckland.ac.nz/~pgut001/pubs/vista_cost.html#effect . Accessed September 8, 2009. Kee, T. 2008, “EA Admits Spore Launch Botched by DRM; Still, Financial Damage Already Done”. PaidContent.Org. September 19. Lee, T. 2005, “Circumventing Competition: The Perverse Consequences of the Digital Millenium Copyright Act”. CATO Institute. March 21. P2P.Net. 2007, “DRM 'violates Canadian privacy laws'”. September 18. Available at: www.p2pnet.net/story/13358\ Lehman, B. 2003, “The Pharmaceutical Industry and the Patent System”, Intellectual Property Institute. Palast, G. 2004, The Best Democracy Money Can Buy. Penguin Books: London. Sands,...
8 Pages(2000 words)Essay

Digital Millenium Copyright Act

... of the The Digital Millennium Copyright Act’s Effect on Downloading Music and Films The Digital Millennium Copyright Act (DMCA) was signed into law by President Clinton in October of 1998. It is a complicated bill, designed to protect copyright holders of software, music, and films in an increasing digital age. An important highlight of the DMCA is that it does not hold the Internet service providers libel for illegally downloaded material that their customers access, but it does require that service providers “remove material from users’ web sites that appears to constitute copyright infringement (“Digital”). Additionally, DMCA created fines for people violating the Act that include up to $25,000 per download in civil court... . What it did...
4 Pages(1000 words)Research Paper

The session of learning the digital content

...The session of learning the digital content Creating blogs and free web accounts was not as easy for me until I took up this course. The entire session of learning the digital content had been fun for all of us and especially for me. The class, since the beginning of my semester, had proven to be awesome for me throughout. There were many new things that I came across and learnt during the regular sessions of studies. These new things included creating digital content such as blogs, web accounts and learning their usage for productive works. Then, we came across different learning styles through visuals, and their application in the...
2 Pages(500 words)Essay

Digital Media Content Development - Ted-Ed.com

...except that there is an infallible method to recognize the sources and ascertain their authenticity. Data is just as important as its source, and when this source is suspicious, the data can be considered as insignificant. Therefore, except that the data can be verified to have created from authenticated sources, digital content does not have any significance. The data should be guarded by patents and copyrights so that it cannot be illegally used / plagiarized for other intentions. It is difficult to impose copyright issues with respect to digitized information such as that is presented on the Internet without any cost and can be shared by several...
5 Pages(1250 words)Speech or Presentation

Digital Content Management: Evolution, Application and Impact

...Research Proposal Digital Content Management: Evolution, Application and Impact Introduction: Digitization is the one of the most important facets ofthe present day society. The world is now living in the age of information and knowledge made accessible by the development and innovation in communication, computation and content management technologies. The digital environment has seen a lot of innovations over the last few years. Digitization made it possible to develop Internet as a source of information as a network of networks and communication channel. Around 11% of the world population is found to be online and the developing...
16 Pages(4000 words)Essay

DRM and digital media in the Cloud

...DRM AND DIGITAL MEDIA IN THE CLOUD Computer Science and Information Technology School The and 21 February2015 DRM AND DIGITAL MEDIA IN THE CLOUD According to Lawrence (2006), Digital Restrictions management (DRM) involves the imposition of technological restrictions that limit the user’s control relative to digital media. In effect, a DRM prevents one from copying a song or eBook. However, according to Steve Jobs in his essay “thoughts on music” he argued that DRMs lacked the capability to stop music piracy. In 2009, he provided DRM-free music through iTunes that later...
1 Pages(250 words)Essay

DRM and trusted computing

...DRM AND TRUSTED COMPUTING The setup in which trusted computing when used to enforce DRM is vulnerable to man in the middle attacks (MitM) because of the ARP spoofing. This occurs when an authorized user causes network traffic between computers communication over the internet (Lockhart 2007, p. 84). As a result, the trick user is able to monitor the data shared between the communicating victims. This is dangerous since it exposes confidential information to the trick user, which might lead to access to personal and important information (Reid & Caelli 2005, p. 127). This is because the attacker has the freedom to interrupt data frames on a system, adjust the traffic or discontinue all traffic...
1 Pages(250 words)Essay

Content Review 4: Digital Literacy Skills

...RESPONSE RESPONSE The aspect of digital literacy points to the direction and line of reasoning where the incorporate and encompass technology in the learning process of the students. It goes without mentioning or stressing the fact that the notion of technology is part and parcel of the human life and environment (Lankes, 2011). Thus, the moral imperative that ought to be undertaken and observed by the learning tutors is to ensure that the learners or the students are acquainted with skills and talents of technology. This is such that the tutors have embraced technology in different ways so as to encourage the students to have a critical and thorough outlook on the realities of life. It is important to note and mention...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Failures of DRM and Digital content copyright for FREE!

Contact Us