DRM: the basic framework and its motivation - Essay Example

Comments (0) Cite this document
The first generation of digital rights management aimed at controlling copying whereas the second generation scheme of DRM focused on…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.3% of users find it useful
DRM: the basic framework and its motivation
Read TextPreview

Extract of sample "DRM: the basic framework and its motivation"

DRM: the basic framework and its motivation By An ideal digital rights management system should beflexible and transparent to the user as well as being complex for the attackers to crack. The first generation of digital rights management aimed at controlling copying whereas the second generation scheme of DRM focused on controlling copying, viewing, altering, printing and anything else that can be done with digital content. A DRM approach operates on 3 levels; managing the distribution of that copyrighted content, creating a copyright for a portion of content and protecting what a user can do with that content (Lim & Lee, 2013).
Advances in technology and increased utilization of the internet have raised the need for mechanisms that can help control and protect the interests of digital media authors (Aweh & Chiemeke, 2014). This was mainly because of widespread migration from analogues and hard materials to digital media as well as exposure to attackers or pirates who take advantages of the struggles made by digital material owners to make financial gains. The advent of home computer machines coupled with digital media recorder and recordable digital media for the user or consumer has increased the spree for digital media exploits (Mishra & Mukhopadhyay, 2014).
Materials like sophisticated DVD/ CD rippers, DeCSS and internet P2P sites has made it easier to spread digital materials hence booming piracy. Piracy has impacted negatively on the efforts of digital media producers. The result has pushed software industries, film and movie catalysts to put pressure on the governments to create stringent laws that will protect intellectual property as well as their rights for loyalties and compensation on their work. Digital rights management is therefore politically motivated and several states have come up with strict laws aimed at copyright protection. However, the move has not been fully successful in controlling piracy (Hunter, 2006).
Aweh, O., & Chiemeke, S. (2014). Framework for a secure digital identity management system. IJITST, 5(2), 117. doi:10.1504/ijitst.2014.064512
Hunter, P. (2006). Bill of rights [digital rights management]. Engineering & Technology, 1(8), 36-40. doi:10.1049/et:20060802
Lim, K., & Lee, C. (2013). A framework for unified digital evidence management in security convergence. Electron Commer Res, 13(3), 379-398. doi:10.1007/s10660-013-9119-y
Mishra, D., & Mukhopadhyay, S. (2014). A privacy enabling content distribution framework for digital rights management. International Journal Of Trust Management In Computing And Communications, 2(1), 22. doi:10.1504/ijtmcc.2014.063271 Read More
Cite this document
  • APA
  • MLA
(“DRM: the basic framework and its motivation Essay”, n.d.)
DRM: the basic framework and its motivation Essay. Retrieved from
(DRM: The Basic Framework and Its Motivation Essay)
DRM: The Basic Framework and Its Motivation Essay.
“DRM: The Basic Framework and Its Motivation Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF DRM: the basic framework and its motivation

Motivation and its influence on employees satisfaction

...demands or requires it, and the monotony of the job, which increases job dissatisfaction. This situation is further compounded by other issues such as lack of time for leisure and managerial concerns. In the face of this rising concern, Mobily company, one of the leading telecommunications and internet service provider in the Kingdom of Saudi Arabia, has opened a contact centre the will offer quality and efficient customer care services for its growing clientele. At the core of Mobily’s working principle is the recognition of the truism that as customer satisfaction is more than 100% pursued, employees satisfaction is maintained and sustained more than 100 percent (Mobily Annual Report, 2010). As such, Mobily offers a...
43 Pages(10750 words)Dissertation

Conceptual Framework: What is Motivation

...?Conceptual Framework Conceptual Framework What is Motivation? Motivation is a driving force that initiates and directs behavior. Motivation can be viewed as an internal energy that drives a person to do something in order to achieve a certain goal (Schunk, Pintrich, & Meece, 2008). It is what causes an individual to take action, whether to eat a snack to decrease hunger or go in college to receive a degree. The powers that lie under motivation can be biological, social, emotional, or cognitive in nature (Ryan & Deci, 2000). Definitions of motivation differ because of the complexity of the concept. Many researchers...
16 Pages(4000 words)Essay

Atheism: Defending its Basic Principles

...? Atheism: Defending its Basic Principles Year Level, Section Academic – December 5, Atheism: Defending its Basic Principles In this essay, I wish to defend atheism on two basic principles: firstly, the problem on the concept of God; and secondly, the morality of existentialistic thinking. Through these principles, I intend to come up with a synthesis of my arguments that will set forth the value of atheism in upholding truth and freedom in society. A. The Problem on the Concept of God In order to maintain consistency and succinctness in my discussion, I like to begin this part by properly defining atheism. According to an online article of BBC entitled Atheism at a Glance, atheism is defined as the disbelief in God. The disbelief... is a...
4 Pages(1000 words)Essay

Operationalising the AMO (Ability, Motivation, Opportunity) framework

...measure its management, though the ability, motivation and opportunity (AMO) framework provides numerous situations that can help managers to apply its theories in order to effectively guide employees in increasing their performance. The AMO framework, also known as the people and performance model, is defined as the sum of the ability, motivation and opportunity of an employee (Raiden, Dainty, and Neale, 2006). Cox, Higgins and Speckesser (2011) further explain the AMO model as the following: ability “refers to the practices that ensure employees are equipped with the skills needed to undertake their jobs, with a presumption that jobs...
8 Pages(2000 words)Assignment


...individual and having this attribute could help me see unobvious opportunities and share it with the company aiming at creating an appropriate compliance and integrity framework to support innovation in solutions, processes, and products in a highly regulated world. I have a believe that all of these concepts will be tremendously useful in my CP (Uysal & Fesenmaier, 2001). However, I think I will not use the marketing plan concept since the organization has already put their marketing plan into action, but it will assist me to identify how it functions. The organization's culture centers on the workers wellbeing (Belch, G. E., & Belch, M.A., 2009). The organization strives to see that employees get secured, and contented...
3 Pages(750 words)Essay


...? FRAMEWORK Insert Introduction Since the early 1980’s, researchers in the field of computer science have went under the impression which the software production process involves a set of systematic and well-defined discrete procedures which brought to mind Management Information Systems (MIS) creation progressions which have evolved over time to discrete forms of advanced computing (International Conference on New Trends in Software Methodologies, Tools and Techniques, Fujita & Pisanelli 2007). Nevertheless, the established methods to software development are often the subject of incessant review. In line of this review, we examine the complexities of agile development and object oriented design in the development of a new system... are...
4 Pages(1000 words)Essay

Basic Statistics

...Basic Statistics Product B-17 Data & Statistical Calculations Prepare a Frequency Distribution Chart. Frequency Distribution chart of Product B-17 based on number of rejects. Rejects Frequency 6 2 7 6 8 7 9 8 10 9 11 3 12 2 13 1 F = 38 Does this approximate a normal curve? Upper Level Lower Level Frequency (f) Relative Frequency Percentage frequency 5.5 6.5 2 0.05 5 6.5 7.5 6 0.16 16 7.5 8.5 7 0.18 18 8.5 9.5 8 0.21 21 9.5 10.5 9 0.24 24 10.5 11.5 3 0.08 8 11.5 12.5 2 0.05 5 12.5 13.5 1 0.03 3 F = 38 Based upon the data we calculate the percent of relative frequency and prepare a chart. Does it approximate the normal curve, well it is negatively skewed than a normal curve, hence the frequency occurs towards the right of...
1 Pages(250 words)Assignment

Visual basic ditch Graphical User Interface Applications altogether(Rippee). The next example of applications that run on the console is the CenterICQ. This is an instant messaging software that runs on the console. It supports very many networks such as yahoo, icq2000, jabber, as well as IRC. The other powerful console application is the IPTraf. This console application enables users to be able to monitor internet TCP and UDP internet connections. Window Applications Are applications designed to run on forms? They are developed in thedotNET framework. Examples of this application include Dinner Now application, as well as another one for stock trading known as Stock Trader. The links to the screen shots of these applications...
4 Pages(1000 words)Essay

DRM and digital media in the Cloud

... (Dhamdhere, G, and Sangeeta, N, 2013, 15). Successful media services such as Netflix, Amazon, and Apple embrace modernized DRM systems in distribution their apps, music, and movies (The Verge, 2012). In effect, the widespread uses of the DRMs have resulted to erosion in its restrictive nature. For instance with iTunes sharing of apps, movies and books has become easy as long as the registration of the devices takes place with Home sharing. Therefore, the advanced and complicated DRMs have made no progress in countering media privacy since the users do not recognize their existence. They seemingly appear to be invisible yet the media companies spend a lot of time and money in building these DRM systems. The thief therefore ignores... ...
1 Pages(250 words)Essay

DRM and trusted computing

...DRM AND TRUSTED COMPUTING The setup in which trusted computing when used to enforce DRM is vulnerable to man in the middle attacks (MitM) because of the ARP spoofing. This occurs when an authorized user causes network traffic between computers communication over the internet (Lockhart 2007, p. 84). As a result, the trick user is able to monitor the data shared between the communicating victims. This is dangerous since it exposes confidential information to the trick user, which might lead to access to personal and important information (Reid & Caelli 2005, p. 127). This is because the attacker has the freedom to interrupt data frames on a system, adjust the traffic or discontinue all traffic...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic DRM: the basic framework and its motivation for FREE!

Contact Us