Skip to main content

Panorama of Digital Rights Management Systems

  • Chapter
  • First Online:
Regulatory Model for Digital Rights Management
  • 317 Accesses

Abstract

In the progress of human civilization, the emergence and development of copyright system stay closely with advanced technologies, especially the replica technique and communication technology. Each significant technology evolution, as it were, all remained historically recognizable imprints in the blossom of copyright scheme. Inherently, unique value existing in copyright law system has to be challenged by constant technologies development. Fortunately, they get along with each other well in the overwhelming majority of cases to promote copyright system’s value and technologies’ progress. Generally speaking, this harmony between copyright and technologies existed commonly in the past, at least, in the analogue technique times. The smoothing interaction of copyright system and technologies is not merely in favor of new techniques growth and the public’s interest, but also helpful to the development of copyright derivatives market.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://history-computer.com/ModernComputer/Electronic/ENIAC.html.

  2. 2.

    http://history-computer.com/ModernComputer/Electronic/ENIAC.html.

  3. 3.

    Lam [1].

  4. 4.

    Roemer [2].

  5. 5.

    Walker [3], pp. 24–77. Also see http://en.wikipedia.org/wiki/Digital_rights_management.

  6. 6.

    Stallman [4], pp. 85–87.

  7. 7.

    Whitehead [5].

  8. 8.

    Ibid 8.

  9. 9.

    Ibid 8.

  10. 10.

    Ibid 8.

  11. 11.

    http://www.vintageisthenewold.com/apple/.

  12. 12.

    Aditya Kapoor’s Blog, “Technology and Learning—The prehistory of the Internet”, https://adityakapoor1.wordpress.com/2010/11/12/the-prehistory-of-the-internet/.

  13. 13.

    “How Science Goes Wrong”, The Economist. Available at: http://www.economist.com/news/leaders/21588069-scientific-research-has-changed-world-now-it-needs-change-itself-how-science-goes-wrong. October/19th/2013, p. 11.

  14. 14.

    Will [6].

  15. 15.

    Samuelson [7], p. 519.

  16. 16.

    Steering Committee on the Role of Scientific and Technical Data and Information in the Public Domain, Office of International Scientific and Technical Information Programs, National Research Council, and National Academy of Sciences, ‘The Role of Scientific and Technical Data and Information in the Public Domain: Proceedings of a Symposium’, Aug, 2003.

  17. 17.

    Summer [8], p. 31.

  18. 18.

    McEwan [9].

  19. 19.

    Amen et al. [10].

  20. 20.

    Purnhagen and Rott [11], pp. 439–458.

  21. 21.

    Geiger [12], pp. 1–14.

  22. 22.

    Anderson and Rainie [13].

  23. 23.

    Liu et al. [14], pp. 49–58.

  24. 24.

    Limitations and Exceptions to Copyright and Neighbouring Rights in the Digital Environment: An International Library Perspective, IFLA CLM September, 2002, http://www.ifla.org/publications/limitations-and-exceptions-to-copyright-and-neighbouring-rights-in-the-digital-environm, 2004, access date: 11/08/2015.

  25. 25.

    Gordon and Bahls [15], p. 619.

  26. 26.

    Vathitphund [16], pp. 9–10.

  27. 27.

    Tuch [17], p. 107.

  28. 28.

    Fisher [18], p. 134.

  29. 29.

    “Music Industry News - as it happens”, http://www.musicdish.com/mag/print.php3?id=6337, access date: 26/01/2014.

  30. 30.

    Ibid.

  31. 31.

    Bonne [19].

  32. 32.

    Layton [20].

  33. 33.

    Bates [21].

  34. 34.

    Rooney et al. [22]. During the same period, Georg Hegel argues that intellectual property is recognition of individual’s sovereignty over their thoughts, while these two arguments are based on ethical concerns.

  35. 35.

    Ibid.

  36. 36.

    Ibid 16.

  37. 37.

    Ibid 23, pp. 25–26.

  38. 38.

    Melendez-Ortiz and Roffe [23].

  39. 39.

    Haskin [24].

  40. 40.

    Kerr [25], p. 13.

  41. 41.

    Cope and Freeman [26].

  42. 42.

    Kutter and Hartung [27], p. 98.

  43. 43.

    Petitcolas [28], p. 91.

  44. 44.

    Guo [29], p. 1.

  45. 45.

    Wang et al. [30], pp. 3–4.

  46. 46.

    Ibid 33.

  47. 47.

    Ibid 35, p. 4. Wang et al. [30], p. 4.

  48. 48.

    Morimoto [31], p. 108.

  49. 49.

    Ibid 37.

  50. 50.

    Ibid 32.

  51. 51.

    Liu et al. [32], p. 134.

  52. 52.

    Staff [33].

  53. 53.

    “Napster strikes filtering partnership with Loudeye”, San Francisco Business Times, 7, Jun, 2001. http://www.bizjournals.com/sanfrancisco/stories/2001/06/04/daily29.html.Access date: 21/11/2013.

  54. 54.

    Shuyu [34], p. 20.

  55. 55.

    Ramona and Peeters [35].

  56. 56.

    https://community.mcafee.com/community/business/data/blog/tags/usb, access date: 10/12/2013.

  57. 57.

    IPS Administration Guide McAfee® Network Security Platform 8.0. http://kb.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/24000/PD24730/en_US/NSP_8.0_IPS_Administration_revA_en-us.pdf, p. 277. Access date: 10/12/2013.

  58. 58.

    http://rental.signals.co.za/blogcomment.aspx?bid=14. Access date: 10/12/2013.

  59. 59.

    http://maliksadiq13.wordpress.com/2013/09/11/ultraviolet-outlier-in-the-telcos-online-video-ambitions/, access date: 10/12/2013.

  60. 60.

    Kerr et al. [25], p. 13. (Ibid).

  61. 61.

    Meléndez-Jubarbe [36], p. 192.

  62. 62.

    Ibid 49; Original source from Garnett [37].

  63. 63.

    Ibid 49, p. 14.

  64. 64.

    Meléndez-Jubarbe [36], p. 195.

  65. 65.

    Ibid 53, p. 16.

  66. 66.

    Digital Rights Background, Systems, Assessment, Commission Staff Working Paper. http://www.umic.pt/images/stories/publicacoes/drm_workingdoc.pdf. p. 18. Access date: 03/12/2013.

  67. 67.

    Ibid 49, p. 17.

  68. 68.

    Ibid.

  69. 69.

    Ibid 49, p. 19. 2003.

  70. 70.

    Ibid 49, p. 14. 2003. Original from de Werra [38].

  71. 71.

    Ibid 49, p. 20. 2003.

  72. 72.

    Ibid 49, p. 21. 2003.

  73. 73.

    Cunard [39].

  74. 74.

    Ibid 49, p. 22.

  75. 75.

    Ibid 49, p. 22.

  76. 76.

    Ibid 49, p. 22.

  77. 77.

    Digital Transmission Content Protection (DTCP), Technical and Licensing Overview. http://www.dtcp.com/documents/dtcp/dtcp-overview.pdf.

  78. 78.

    Ibid 49, p. 23.

  79. 79.

    ICT Regulation Toolkit, “New Technologies and Their Impact on Regulation”, http://www.ictregulationtoolkit.org/1.7.

  80. 80.

    Bechtold [40].

  81. 81.

    Iannella [41], p. 47.

  82. 82.

    Guo [42], p. 6.

  83. 83.

    “Content Guard, Inc. Marks Its Spinoff from Xerox with Microsoft Alliance”, Information Today, Volume 17, Number 6, June 2000, http://www.infotoday.com/it/jun00/news7.htm. Access date: 09/12/2013.

  84. 84.

    “Survey on XML-Based Policy Languages for Open Environments”, http://www.academia.edu/6269692/Survey_on_XML-Based_Policy_Languages_for_Open_Environments, access date: 15/08/2015.

  85. 85.

    Waupotitsch et al. [44].

  86. 86.

    Ibid 71.

  87. 87.

    Alvear [45].

  88. 88.

    Guth [46], p. 103.

  89. 89.

    Ibid 69, p. 48.

  90. 90.

    Guth [46], p. 112.

  91. 91.

    Ibid.

  92. 92.

    Ibid 69, p. 51.

  93. 93.

    De Capitani di Vimercatil et al. [47], p. 37.

  94. 94.

    Lorch et al. [48].

  95. 95.

    Ibid 81, p. 37.

  96. 96.

    Ardagna et al. [50], p. 41.

  97. 97.

    https://www.axiomatics.com/manufacturing.html, access date: 02/12/2013.

  98. 98.

    Han and Lei [51], p. 479.

  99. 99.

    https://www.axiomatics.com/manufacturing.html, access date: 02/12/2013.

  100. 100.

    Gell [52].

  101. 101.

    Thomas-Kerr et al. [53], p. 73.

  102. 102.

    Sander [54].

  103. 103.

    Ibid.

  104. 104.

    Prepaid Credit Card [55].

  105. 105.

    Cooperm [56].

  106. 106.

    Kwok [57], p. 23.

  107. 107.

    Ibid, p. 24.

  108. 108.

    Jeeny [58].

  109. 109.

    Ibid.

  110. 110.

    Roettgers [59].

  111. 111.

    Damouni [60].

  112. 112.

    Ibid.

  113. 113.

    Buhse [61], p. 209. Original from Picot et al. [62], p. 272.

  114. 114.

    Ibid.

  115. 115.

    “E-book Subscription Model: Is the Time Right?”, Comment from Publisher Weekly, 29/04/2013, http://www.publishersweekly.com/pw/by-topic/digital/content-and-e-books/article/56989-e-book-subscription-model-is-the-time-right.html, access date: 20/12/2013.

  116. 116.

    Ibid.

  117. 117.

    Ibid 99.

  118. 118.

    Ibid 99.

  119. 119.

    Subscription model is also named “specific limited purchase model” under digital rights management based usage business.

  120. 120.

    Lucchi [64], p. 79.

  121. 121.

    Ibid 99.

  122. 122.

    Andrea Gavosto, Bruno Lamborghini, Stefano Lamborghini, Peer-to-Peer Network and the Distribution in the EU, See Noam and Pupillo [65], p. 289.

  123. 123.

    A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 2001.

  124. 124.

    Lackman [66], p. 1161.

  125. 125.

    Einhorn and Rosenblatt [67], p. 1.

  126. 126.

    Ibid, p. 2.

  127. 127.

    Ibid.

  128. 128.

    Noam and Pupillo [65], p. 15.

  129. 129.

    Andrea Gavosto, Bruno Lamborghini, Stefano Lamborghini, “Peer-to-Peer Network and the Distribution in the EU”, See Noam and Pupillo [65], p. 275.

  130. 130.

    Ibid 111, p. 10.

  131. 131.

    Cox [68].

  132. 132.

    Ibid 111, p. 10.

  133. 133.

    Metz [70].

  134. 134.

    http://buzzsonic.com/category/online-radio/. Access date: 15/12/2013.

  135. 135.

    Ibid 120.

  136. 136.

    Ibid 120.

  137. 137.

    Tehranian [71], p. 45.

  138. 138.

    Geiger [72], p. 366.

  139. 139.

    Katz [73], pp. 245–284.

References

  1. Lam PH (1995) Copyright protection of foreign computer software in the People’s Republic of China: significant progress in two years. Loyola Los Angeles Int Comp Law Rev: 861. Available at: http://digitalcommons.lmu.edu/ilr/vol17/iss4/6

  2. Roemer R (2003) Locking down loose bits: trusted computing, digital rights management, and the fight for copyright control on your computer. UCLA J Law Technol (8). http://www.lawtechjournal.com/articles/2003/08_040223_roemer.pdf

  3. Walker J (2003) The Digital Imprimatur: how big brother and big media can put the Internet genie back in the bottle. Knowl Technol Policy 16(3):24–77. http://www.fourmilab.ch/documents/digital-imprimatur/

    Article  Google Scholar 

  4. Stallman RM (1997) The right to read. Commun ACM 40(2):85–87

    Article  Google Scholar 

  5. Whitehead D (2013) Banging the DRM, the history of anti-piracy. http://www.eurogamer.net/articles/banging-the-drm-article, 14/04/2013

  6. Will H (2014) Understanding net neutrality: we need a better analogy. The National Memo, November 17, 2014. Available at: http://www.nationalmemo.com/net-neutrality-better-analogy/

  7. Samuelson P (1999) Intellectual property and the digital economy: why the anti-circumvention regulations need to be revised. Berkeley Technol Law J 14:519. Available at: http://heinonline.org/HOL/LandingPage?collection=journals&handle=hein.journals/berktech14&div=35&id=&page=. Accessed 14 Aug 2015

    Google Scholar 

  8. Summer S (1999) Music on the Internet: can the present laws and treaties protect music copyright in cyberspace? Curr: Int Trade Law J 8:31. Available at: https://litigation-essentials.lexisnexis.com/webcd/app?action=DocumentDisplay&crawlid=1&crawlid=1&doctype=cite&docid=8+Currents+Int’l+Trade+L.J.+31&srctype=smi&srcid=3B15&key=990a1ea8c1eebf0c89d434e991010b0a. Accessed 14 Aug 2015

    Google Scholar 

  9. McEwan T (2001) Managing values and beliefs in organisations. Financial Times Management May, 2001

    Google Scholar 

  10. Amen K, Keogh T, Wolff N (2013) Digital copyright: a tale of domestic discord, presented in three acts. http://www.infotoday.com/cilmag/may02/Amen_Keogh_Wolff.htm. Accessed 14 Aug 2013

  11. Purnhagen K, Rott P (eds) (2014) Varieties of European economic law and regulation. In: Studies in European economic law and regulation, vol 3, pp 439–458. Competition law and consumer law: why we need a common consumer model, July, 2014

    Google Scholar 

  12. Geiger C (2010) The future of copyright in Europe: striking a fair balance between protection and access to information. Intellect Prop Q 14(1):1–14

    Google Scholar 

  13. Anderson A, Rainie L (2014) Digital Life in 2025. http://www.pewinternet.org/2014/03/11/digital-life-in-2025/, March 11, 2014. Accessed 26 Sep 2015

  14. Liu Q, Safavi-Naini R, Sheppard NP (2003) Digital rights management for content distribution. Conferences in Research and Practice in Information Technology Series, vol 34, pp 49–58

    Google Scholar 

  15. Gordon WJ, Bahls D (2007) Public’s right to fair use: amending Section 107 to avoid the fared use fallacy. Utah Law Rev: 619. Available at: http://heinonline.org/HOL/LandingPage?collection=journals&handle=hein.journals/utahlr2007&div=26&id=&page=. Accessed 14 Aug 2014

  16. Vathitphund T (2010) Access to knowledge difficulties in developing countries: a balanced access to copyrighted works in the digital environment. Int Rev Law Comput Technol 24(1):9–10

    Article  Google Scholar 

  17. Tuch A (2010) “Multiple Gatekeepers” John M. Olin Fellow and Fellow of the Program on Corporate Governance, Harvard Law School. Va Law Rev 96:107. http://www.law.harvard.edu/programs/olin_center/fellows_papers/pdf/Tuch_33.pdf

    Google Scholar 

  18. Fisher WW III (2004) Promises to keep, technology, law and the future of entertainment. Stanford Law and Politics, p 134

    Google Scholar 

  19. Bonne P (2003) Copyright protection and copy control when distributing and publishing digital information, GSEC Practical Version 1.4b, Option 1, 2003

    Google Scholar 

  20. Layton J (2014) How digital rights management works. Available at: http://computer.howstuffworks.com/drm.htm. Accessed 14 Aug 2014

  21. Bates BJ (2015) Value and digital rights management: a social economics approach. Paper to be presented to the Communication Technology division, Association for Education in Journalism & Mass Communication, for the 2006 annual convention, San Francisco, CA. Available at: http://www.cci.utk.edu/files/aej2006-DRMSocEcon.pdf. Accessed 16 Aug 2015

  22. Rooney D, Hearn G, Mandeville T, Joseph R (2003) Public policy in knowledge-based economies: foundations and frameworks-new horizons in public policy series. Elgar, Cheltenham [u.a.]

    Google Scholar 

  23. Melendez-Ortiz R, Roffe P (2009) Intellectual property and sustainable development: development agendas in a changing world. Edward Elgar Publishing Ltd

    Google Scholar 

  24. Haskin D (2007) Will DRM-free music threaten iTunes? Computerworld, Apr 30, 2007. http://www.infoworld.com/article/2663702/applications/will-drm-free-music-threaten-itunes-.html

  25. Kerr I, Maurushat A, Tacit C (2003) Technological protection measures: tilting at copyright’s windmill. Ottawa Law Rev 34(7):13. http://heinonline.org/HOL/LandingPage?collection=journals&handle=hein.journals/ottlr34&div=8&id=&page=. Accessed 15 Aug 2010

    Google Scholar 

  26. Cope B, Freeman R (2001) Digital rights management and content development: technology drivers across the book production supply chain, from creator to consumer. Oct 2001

    Google Scholar 

  27. Kutter M, Hartung F (1999) Introduction to watermarking techniques. In: Katzenbeisser S, Petitcolas FAP (eds) Chapter 5. Information hiding techniques for steganography and digital watermarking, p 98

    Google Scholar 

  28. Petitcolas FAP (2003) Digital watermarking. In: Becker E, Buhse W, Gunnewig D, Rump N (eds) Digital rights management: technological, economic, legal and political aspects. Springer, p 91

    Google Scholar 

  29. Guo XC (2008) Methodologies in digital watermarking: robust and reversible watermarking techniques for authentication, security and privacy protection. University of Toronto, p 1

    Google Scholar 

  30. Wang F-H, Pan J-S, Jain LC (2009) Innovations in digital watermarking techniques. Springer, pp 3–4

    Google Scholar 

  31. Morimoto N (1999) Digital watermarking technology with practical applications. Information Science, Special Issue on Multimedia Informing Technologies, vol 2(4), p 108

    Google Scholar 

  32. Liu Y, Sadeghi A-R, Ghosal D, Mukherjee B (2011) Video streaming forensic – content identification with traffic snooping. Information Security, Lecture Notes in Computer Science, vol 6531, p 134

    Google Scholar 

  33. Staff M (2001) Napster, Loudeye Strike Digital Fingerprinting Deal. http://www.macworld.com/article/1017876/napster.html. Jun 7, 2001. Accessed 21 Nov 2013

  34. Shuyu F (2007) Efficient and Robust Audio Fingerprinting. http://scholarbank.nus.edu.sg/bitstream/handle/10635/13438/FengSY.pdf?...1, p 20

  35. Ramona M, Peeters G (2013) Audioprint: an efficient audio fingerprint system based on a novel cost-less synchronization scheme. http://recherche.ircam.fr/anasyn/peeters/ARTICLES/Ramona_2013_ICASSP_AudioPrint.pdf. Accessed 21 Nov 2013

  36. Meléndez-Jubarbe H (2009) DRM interoperability. Boston Univ J Sci Technol Law 15:192

    Google Scholar 

  37. Garnett N (2001) Technological protection of copyright works, and copyright management systems (Paper presented to the ALAI Congress, June 2001) [unpublished], online: ALAI 2001 Congress Program and Presentation. http://www.law.columbia.edu/conferencesI2001/program_en.htm

  38. de Werra J (2001) The legal system of technological protection measures under the WIPO treaties, the DMCA, the European Union Directives and other National Laws (Japan, Australia). online: ALAI 2001 Congress Program and Presentation, http://www.law.columbia.edu/conferences/2001/program_en.htm

  39. Cunard JP (2001) Technological protection of copyrighted works and copyright management systems: a brief survey of the landscape. ALAI 2001 Congress Program and Presentation, http://www.law.columbia.edu/conferences/2001/program_en.htm. Accessed 03 Dec 2013

  40. Bechtold S (2001) From copyright to information law—implications of digital rights management. Available at: http://www.ip.ethz.ch/people/bechtold/publications/2002_DRM.pdf. Digital Rights Management Workshop

  41. Iannella R (2004) The open digital rights language: XML for digital rights management. Information Security Technical Report, vol 9(3), p 47

    Google Scholar 

  42. Guo H (2014) Digital Rights Management (DRM) Using XrML. http://www.tml.tkk.fi/Studies/Tik-110.501/2001/papers/guo.heng.pdf, p 6

  43. Xiaobin H, Shaokuan H (2003) Digital Rights Management and XrmL. Document, Information and Knowledge 4:49

    Google Scholar 

  44. Waupotitsch R, Eidenbenz S, Smith JP, Kroc L (2006) Multi-scale integrated information and telecommunications system (MIITS): first results from a large-scale end-to-end network simulator. Winter Simulation Conference 06, Proceedings of the 38th conference

    Google Scholar 

  45. Alvear J (2001) ContentGuard Speaks Digital Rights Language. http://www.streamingmedia.com/Articles/Editorial/Featured-Articles/ContentGuard-Speaks-Digital-Rights-Language-64450.aspx. November 28, 2001. Accessed 09 Dec 2014

  46. Guth S (2003) Rights Expression Languages. In: Becker E, Buhse W, Gunnewig D, Rump N (eds) Digital rights management: technological, economic, legal and political aspects. Springer, p 103

    Google Scholar 

  47. De Capitani di Vimercatil S, Foresti S, Jajodia S, Samarati P (2007) Access control policies and languages in open environments. “Secure Data Management in Decentralized Systems”. Springer, p 37

    Google Scholar 

  48. Lorch M, Kafura D, Shah S (2015) An XACML-based policy management and authorization service for Globus resources. Proceedings of the Fourth International Workshop on Grid Computing, http://www.computer.org/csdl/proceedings/grid/2003/2026/00/20260208.pdf.2003. Accessed 15 Aug 2015

  49. Steel C, Lai R, Nagappan R (2012) Core security patterns: identity management standards and technologies. Prentice Hall, Dec 14, 2012. http://www.informit.com/articles/article.aspx?p=1398625&seqNum=12. Accessed 06 Dec 2013

  50. Ardagna CA, Damiani E, De Capitani di Vimercati S, Samarati P (2004) XML-based access control languages. Information Security Technical Report, vol 9(3), p 41

    Google Scholar 

  51. Han W, Lei C (2012) A survey on policy languages in network and security management. Comput Netw 56:479

    Article  Google Scholar 

  52. Gell R (2014) How to play MPEG video with MPEG Player software? http://www.anymp4.com/blu-ray-player/play-mpeg-video-with-mpeg-player-software.html. Accessed 06 Dec 2014

  53. Thomas-Kerr J, Burnett I, Ritz CH, Devillers S, de Schrijever D, Van de Walle R (2007) Is that a fish in your ear? A universal metalanguage for multimedia. IEEE Multimedia 14(2): 73. http://ro.uow.edu.au/cgi/viewcontent.cgi?article=1522&context=infopapers. Accessed 09 Dec 2013

  54. Sander T (2002) Golden times for digital rights management? Financial Cryptography, Springer

    Google Scholar 

  55. Prepaid Credit Card: “Definition of ‘Prepaid Credit Card’”. http://www.investopedia.com/terms/p/prepaid-credit-card.asp. Accessed 23 Dec 2013

  56. Cooperm MN (2005) Time for the recording industry to face the music: the political, social and economic benefits of peer-to-peer communications networks. Consumer Federation of America, Consumers Union, Free Press, U.S. Public Interest Research Groups, March, 2005

    Google Scholar 

  57. Kwok SH (2002) Digital rights management for the online music business. ACM SIGecom Exchanges 3(3):23. http://www.sigecom.org/exchanges/volume_3/3.3-Kwok.pdf

    Article  Google Scholar 

  58. Jeeny (2012) Cheap DVD Rental. http://www.moneysavingexpert.com/shopping/cheap-dvd-rental. 28/08/2012. Accessed 23 Dec 2013

  59. Roettgers J (2013) Netflix may ditch DVDs sooner rather than later. Available at http://www.businessweek.com/articles/2013-10-21/netflix-may-ditch-dvds-sooner-rather-than-later#r=nav-r-story

  60. Damouni N (2011) In: Adler L (ed) Amazon in talks to launch digital book library: report. http://www.reuters.com/article/2011/09/12/us-amazon-media-library-idUSTRE78A3RL20110912. 12/09/2011

  61. Buhse W (2002) Implications of digital rights management for online music–a business perspective. Security and Privacy in Digital Rights Management, Lecture Notes in Computer Science, vol 2320. Springer, p 209

    Google Scholar 

  62. Picot A, Reichwald R, Wigand R (2001) Die grenzenlose Unternehmung, Wiesbaden, p 272

    Google Scholar 

  63. Bohn P (2005) Rent-A-Star: do you subscribe to digital music? Berlecon Research, 22/06/2005. http://www.indicare.org/tiki-read_article.php?articleId=112. Accessed 19 Dec 2013

  64. Lucchi N (2006) Digital media & intellectual property, management of rights and consumer protection in a comparative analysis. Springer, p 79

    Google Scholar 

  65. Noam EM, Pupillo LM (eds) (2008) Peer-to-peer video the economics, policy, and culture of today’s new mass medium. Springer

    Google Scholar 

  66. Lackman EM (2002–2003) Slowing down the speed of sound: a transatlantic race to head off digital copyright infringement. Fordham Intellect Prop Media Entertain Law J 13:1161. Available at: http://heinonline.org/HOL/LandingPage?collection=journals&handle=hein.journals/frdipm13&div=38&id=&page=. Accessed 14 Aug 2010

    Google Scholar 

  67. Einhorn MA, Rosenblatt B (2005) Peer-to-peer networking and digital rights management, how market tools can solve copyright problems. Policy Analysis, No. 534. February 17, 2005, p 1

    Google Scholar 

  68. Cox B (1995) Superdistribution: objects as property on the electronic frontier. Addison-Wesley

    Google Scholar 

  69. Xingdong Z (2006) The study and design of digital rights management system based on P2P technology, p 38

    Google Scholar 

  70. Metz C (2013) Mercora P2P Radio. http://www.pcmag.com/article2/0,2817,1755278,00.asp. Accessed 15 Dec 2013

  71. Tehranian J (2003–2004) All rights reserved - reassessing copyright and patent enforcement in the digital age. Univ Cincinnati Law Rev 72:45. Available at: http://heinonline.org/HOL/LandingPage?collection=journals&handle=hein.journals/ucinlr72&div=9&id=&page=. Accessed 14 Aug 2013

    Google Scholar 

  72. Geiger C (2006) Copyright and free access to information, for a fair balance of interests in a globalised world. Eur Intellect Prop Rev 7(28):366

    Google Scholar 

  73. Katz A (2006) The potential demise of another natural monopoly: new technologies and the administration of performing rights. J Competition Law Econ 2(2):245–284. http://jcle.oxfordjournals.org/cgi/content/abstract/2/2/245. Accessed 14 Aug 2015

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Xu, C. (2020). Panorama of Digital Rights Management Systems. In: Regulatory Model for Digital Rights Management. Springer, Singapore. https://doi.org/10.1007/978-981-15-1995-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-1995-6_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-1994-9

  • Online ISBN: 978-981-15-1995-6

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics