Digital Rights Management: White Knight or Trojan Horse?

نویسندگان

  • Thierry Rayna
  • Ludmila Striukova
چکیده

Due to its ability to solve all main problems associated with digital goods, Digital Right Management is the favourite option used by companies to tackle piracy. The aim of this article is to discuss the consequences of DRM for consumers, firms and society. The rationales of DRM are discussed and the expected benefits for firms are presented. It is shown that the advantages brought by DRM to firms go beyond what would be needed for an efficient provision of digital goods. In contrast, consumers are likely to see few benefits in DRM. This article demonstrates that even a standard DRM system is unlikely to improve social welfare. The article concludes with some public policy and corporate strategy recommendations.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs

Digital signatures are a key technology for many Internet-based commercial and administrative applications and, therefore, an increasingly popular target of attacks. Due to their strong cryptographic properties an attacker is more likely to subvert them with malicious software, ie Trojan horse programs. We show that by fusing two techniques, our WORM-supported reliable input method and the Inte...

متن کامل

Guest Editors' Introduction: Confronting the Hardware Trustworthiness Problem

THE EMERGENCE OF a globalized, horizontal semiconductor business model raises concerns involving the security and trust of the information systems on which modern society is increasingly reliant for mission-critical functionality. Hardware security and trust issues span a broad spectrum of topics ranging from the malicious insertion of Trojan circuits designed to act as a silicon time bomb to d...

متن کامل

The Fairy Tale of 'What You See Is What You Sign' - Trojan Horse Attacks on Software for Digital Signatures

Software for the creation of digital signatures performs a delicate task. The signatory has to trust the manufacturer of the software that it will work in the intended way. Signing a document electronically will have legal consequences in a growing number of countries, therefore the security of the signing software is an important issue. In the past, Trojan horse programs have shown to be of gr...

متن کامل

UDC 621.395:004.491.23, DOI:10.2298/CSIS090330027F Trojan horses in mobile devices

This paper focuses on the behavior of Trojan horses in mobile devices. This malicious software tries to steal information from a mobile device while the user is unaware. We describe the communication links through a Trojan horse installed into a mobile device. To demonstrate the effects of a Trojan horse infection we present a practical example on a PDA. Via SMS, the malicious user can access a...

متن کامل

An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices

Users increasingly use their mobile devices to communicate, to conduct business transaction and access resources and services. In such a scenario, digital identity management (DIM) technology is fundamental in customizing user experience, protecting privacy, underpinning accountability in business transactions, and in complying with regulatory controls. Users identity consists of data, referred...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007