The Impossibility of Technology-Based DRM and a Modest Suggestion
نویسنده
چکیده
When I was a teenager in the late 1970s, there was no World-Wide Web, no Internet, and no IBM PC. But I, along with a small group of friends, became obsessed with computers: the TRS-80 and the Apple were the targets of our passion. Each time a new computer game was announced, we awaited its release with great anticipation: not because we wanted to kill the dragon or get to level 37, but because we wanted to see how hard it was this time to remove the copy protection from the software. In those early days of personal computing, game manufacturers made perhaps one million dollars per year, and there were only a handful of companies. Few had ever heard of Microsoft, and there were no such things as CD burners or high-speed networks. So trying to control illegal copying (or ‘‘pirating’’ as it was already called back then) was a concern limited to just a few small companies. Today there are software companies with tens of billions of dollars in gross revenues, each with a strong vested interest in overseeing the legal distribution of their products. Additionally, media companies (in particular, music and film producers and distributors) continue their fight to control illegal distribution of their content, especially now in the presence of the $50 CD burner. To address these problems, media companies have turned to technology such as Digital Rights Management (DRM) to prevent copying and enforce protection of copyright. In this paper I will argue that the media companies’ reliance on a technological solution is almost certainly doomed, and that a variety of motives will continue to drive people to circumvent any such technology. The best solution to the problem is not a technological one, but instead one of education. In Section I of this paper, I will discuss some historical and current examples where the media companies have relied on technology to
منابع مشابه
Advertising Keyword Suggestion Using Relevance-Based Language Models from Wikipedia Rich Articles
When emerging technologies such as Search Engine Marketing (SEM) face tasks that require human level intelligence, it is inevitable to use the knowledge repositories to endow the machine with the breadth of knowledge available to humans. Keyword suggestion for search engine advertising is an important problem for sponsored search and SEM that requires a goldmine repository of knowledge. A recen...
متن کاملComprehensive Disaster Risk Management Standards for Hospitals
Background and Objective: Hospitals play an important role in protecting the health and survival of people during disasters. Despite the development of risk management programs worldwide in recent years, hospital preparedness in disasters is low and one reason for that is the lack of hospital standards for disaster preparedness. This study aims to develop hospital accreditation standards for ho...
متن کاملOrganizational Silence, from Roots to Solutions: A Case Study in Iran Petroleum Industry
Organizational silence is defined as the lack of effective interactions among staff and it stands opposite to the concept of organizational voice. In the present research, the purpose is to measure the silence behavior among the Research Institute of Petroleum Industry (RIPI) staff before and after the implementation of a comprehensive suggestion system. A suggestion system is an internal struc...
متن کاملSuggestion System and Get Rid of Organizational Silence
The purpose of this study was to investigate the effect of implementing the suggestion system on reducing the silent behavior of employees of the Petroleum Industry Research Institute (RIPI). This research is consumed an applied research; based on the research method, quasi-experimental a pre-test and post-test with a group staff before and after the implementation of a comprehensive. To perfor...
متن کاملAnalysis of User query refinement behavior based on semantic features: user log analysis of Ganj database (IranDoc)
Background and Aim: Information systems cannot be well designed or developed without a clear understanding of needs of users, manner of their information seeking and evaluating. This research has been designed to analyze the Ganj (Iranian research institute of science and technology database) users’ query refinement behaviors via log analysis. Methods: The method of this research is log anal...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JTHTL
دوره 3 شماره
صفحات -
تاریخ انتشار 2005