Abstract
In the progress of human civilization, the emergence and development of copyright system stay closely with advanced technologies, especially the replica technique and communication technology. Each significant technology evolution, as it were, all remained historically recognizable imprints in the blossom of copyright scheme. Inherently, unique value existing in copyright law system has to be challenged by constant technologies development. Fortunately, they get along with each other well in the overwhelming majority of cases to promote copyright system’s value and technologies’ progress. Generally speaking, this harmony between copyright and technologies existed commonly in the past, at least, in the analogue technique times. The smoothing interaction of copyright system and technologies is not merely in favor of new techniques growth and the public’s interest, but also helpful to the development of copyright derivatives market.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
Lam [1].
- 4.
Roemer [2].
- 5.
Walker [3], pp. 24–77. Also see http://en.wikipedia.org/wiki/Digital_rights_management.
- 6.
Stallman [4], pp. 85–87.
- 7.
Whitehead [5].
- 8.
Ibid 8.
- 9.
Ibid 8.
- 10.
Ibid 8.
- 11.
- 12.
Aditya Kapoor’s Blog, “Technology and Learning—The prehistory of the Internet”, https://adityakapoor1.wordpress.com/2010/11/12/the-prehistory-of-the-internet/.
- 13.
“How Science Goes Wrong”, The Economist. Available at: http://www.economist.com/news/leaders/21588069-scientific-research-has-changed-world-now-it-needs-change-itself-how-science-goes-wrong. October/19th/2013, p. 11.
- 14.
Will [6].
- 15.
Samuelson [7], p. 519.
- 16.
Steering Committee on the Role of Scientific and Technical Data and Information in the Public Domain, Office of International Scientific and Technical Information Programs, National Research Council, and National Academy of Sciences, ‘The Role of Scientific and Technical Data and Information in the Public Domain: Proceedings of a Symposium’, Aug, 2003.
- 17.
Summer [8], p. 31.
- 18.
McEwan [9].
- 19.
Amen et al. [10].
- 20.
Purnhagen and Rott [11], pp. 439–458.
- 21.
Geiger [12], pp. 1–14.
- 22.
Anderson and Rainie [13].
- 23.
Liu et al. [14], pp. 49–58.
- 24.
Limitations and Exceptions to Copyright and Neighbouring Rights in the Digital Environment: An International Library Perspective, IFLA CLM September, 2002, http://www.ifla.org/publications/limitations-and-exceptions-to-copyright-and-neighbouring-rights-in-the-digital-environm, 2004, access date: 11/08/2015.
- 25.
Gordon and Bahls [15], p. 619.
- 26.
Vathitphund [16], pp. 9–10.
- 27.
Tuch [17], p. 107.
- 28.
Fisher [18], p. 134.
- 29.
“Music Industry News - as it happens”, http://www.musicdish.com/mag/print.php3?id=6337, access date: 26/01/2014.
- 30.
Ibid.
- 31.
Bonne [19].
- 32.
Layton [20].
- 33.
Bates [21].
- 34.
Rooney et al. [22]. During the same period, Georg Hegel argues that intellectual property is recognition of individual’s sovereignty over their thoughts, while these two arguments are based on ethical concerns.
- 35.
Ibid.
- 36.
Ibid 16.
- 37.
Ibid 23, pp. 25–26.
- 38.
Melendez-Ortiz and Roffe [23].
- 39.
Haskin [24].
- 40.
Kerr [25], p. 13.
- 41.
Cope and Freeman [26].
- 42.
Kutter and Hartung [27], p. 98.
- 43.
Petitcolas [28], p. 91.
- 44.
Guo [29], p. 1.
- 45.
Wang et al. [30], pp. 3–4.
- 46.
Ibid 33.
- 47.
Ibid 35, p. 4. Wang et al. [30], p. 4.
- 48.
Morimoto [31], p. 108.
- 49.
Ibid 37.
- 50.
Ibid 32.
- 51.
Liu et al. [32], p. 134.
- 52.
Staff [33].
- 53.
“Napster strikes filtering partnership with Loudeye”, San Francisco Business Times, 7, Jun, 2001. http://www.bizjournals.com/sanfrancisco/stories/2001/06/04/daily29.html.Access date: 21/11/2013.
- 54.
Shuyu [34], p. 20.
- 55.
Ramona and Peeters [35].
- 56.
https://community.mcafee.com/community/business/data/blog/tags/usb, access date: 10/12/2013.
- 57.
IPS Administration Guide McAfee® Network Security Platform 8.0. http://kb.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/24000/PD24730/en_US/NSP_8.0_IPS_Administration_revA_en-us.pdf, p. 277. Access date: 10/12/2013.
- 58.
http://rental.signals.co.za/blogcomment.aspx?bid=14. Access date: 10/12/2013.
- 59.
http://maliksadiq13.wordpress.com/2013/09/11/ultraviolet-outlier-in-the-telcos-online-video-ambitions/, access date: 10/12/2013.
- 60.
Kerr et al. [25], p. 13. (Ibid).
- 61.
Meléndez-Jubarbe [36], p. 192.
- 62.
Ibid 49; Original source from Garnett [37].
- 63.
Ibid 49, p. 14.
- 64.
Meléndez-Jubarbe [36], p. 195.
- 65.
Ibid 53, p. 16.
- 66.
Digital Rights Background, Systems, Assessment, Commission Staff Working Paper. http://www.umic.pt/images/stories/publicacoes/drm_workingdoc.pdf. p. 18. Access date: 03/12/2013.
- 67.
Ibid 49, p. 17.
- 68.
Ibid.
- 69.
Ibid 49, p. 19. 2003.
- 70.
Ibid 49, p. 14. 2003. Original from de Werra [38].
- 71.
Ibid 49, p. 20. 2003.
- 72.
Ibid 49, p. 21. 2003.
- 73.
Cunard [39].
- 74.
Ibid 49, p. 22.
- 75.
Ibid 49, p. 22.
- 76.
Ibid 49, p. 22.
- 77.
Digital Transmission Content Protection (DTCP), Technical and Licensing Overview. http://www.dtcp.com/documents/dtcp/dtcp-overview.pdf.
- 78.
Ibid 49, p. 23.
- 79.
ICT Regulation Toolkit, “New Technologies and Their Impact on Regulation”, http://www.ictregulationtoolkit.org/1.7.
- 80.
Bechtold [40].
- 81.
Iannella [41], p. 47.
- 82.
Guo [42], p. 6.
- 83.
“Content Guard, Inc. Marks Its Spinoff from Xerox with Microsoft Alliance”, Information Today, Volume 17, Number 6, June 2000, http://www.infotoday.com/it/jun00/news7.htm. Access date: 09/12/2013.
- 84.
“Survey on XML-Based Policy Languages for Open Environments”, http://www.academia.edu/6269692/Survey_on_XML-Based_Policy_Languages_for_Open_Environments, access date: 15/08/2015.
- 85.
Waupotitsch et al. [44].
- 86.
Ibid 71.
- 87.
Alvear [45].
- 88.
Guth [46], p. 103.
- 89.
Ibid 69, p. 48.
- 90.
Guth [46], p. 112.
- 91.
Ibid.
- 92.
Ibid 69, p. 51.
- 93.
De Capitani di Vimercatil et al. [47], p. 37.
- 94.
Lorch et al. [48].
- 95.
Ibid 81, p. 37.
- 96.
Ardagna et al. [50], p. 41.
- 97.
https://www.axiomatics.com/manufacturing.html, access date: 02/12/2013.
- 98.
Han and Lei [51], p. 479.
- 99.
https://www.axiomatics.com/manufacturing.html, access date: 02/12/2013.
- 100.
Gell [52].
- 101.
Thomas-Kerr et al. [53], p. 73.
- 102.
Sander [54].
- 103.
Ibid.
- 104.
Prepaid Credit Card [55].
- 105.
Cooperm [56].
- 106.
Kwok [57], p. 23.
- 107.
Ibid, p. 24.
- 108.
Jeeny [58].
- 109.
Ibid.
- 110.
Roettgers [59].
- 111.
Damouni [60].
- 112.
Ibid.
- 113.
- 114.
Ibid.
- 115.
“E-book Subscription Model: Is the Time Right?”, Comment from Publisher Weekly, 29/04/2013, http://www.publishersweekly.com/pw/by-topic/digital/content-and-e-books/article/56989-e-book-subscription-model-is-the-time-right.html, access date: 20/12/2013.
- 116.
Ibid.
- 117.
Ibid 99.
- 118.
Ibid 99.
- 119.
Subscription model is also named “specific limited purchase model” under digital rights management based usage business.
- 120.
Lucchi [64], p. 79.
- 121.
Ibid 99.
- 122.
Andrea Gavosto, Bruno Lamborghini, Stefano Lamborghini, Peer-to-Peer Network and the Distribution in the EU, See Noam and Pupillo [65], p. 289.
- 123.
A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 2001.
- 124.
Lackman [66], p. 1161.
- 125.
Einhorn and Rosenblatt [67], p. 1.
- 126.
Ibid, p. 2.
- 127.
Ibid.
- 128.
Noam and Pupillo [65], p. 15.
- 129.
Andrea Gavosto, Bruno Lamborghini, Stefano Lamborghini, “Peer-to-Peer Network and the Distribution in the EU”, See Noam and Pupillo [65], p. 275.
- 130.
Ibid 111, p. 10.
- 131.
Cox [68].
- 132.
Ibid 111, p. 10.
- 133.
Metz [70].
- 134.
http://buzzsonic.com/category/online-radio/. Access date: 15/12/2013.
- 135.
Ibid 120.
- 136.
Ibid 120.
- 137.
Tehranian [71], p. 45.
- 138.
Geiger [72], p. 366.
- 139.
Katz [73], pp. 245–284.
References
Lam PH (1995) Copyright protection of foreign computer software in the People’s Republic of China: significant progress in two years. Loyola Los Angeles Int Comp Law Rev: 861. Available at: http://digitalcommons.lmu.edu/ilr/vol17/iss4/6
Roemer R (2003) Locking down loose bits: trusted computing, digital rights management, and the fight for copyright control on your computer. UCLA J Law Technol (8). http://www.lawtechjournal.com/articles/2003/08_040223_roemer.pdf
Walker J (2003) The Digital Imprimatur: how big brother and big media can put the Internet genie back in the bottle. Knowl Technol Policy 16(3):24–77. http://www.fourmilab.ch/documents/digital-imprimatur/
Stallman RM (1997) The right to read. Commun ACM 40(2):85–87
Whitehead D (2013) Banging the DRM, the history of anti-piracy. http://www.eurogamer.net/articles/banging-the-drm-article, 14/04/2013
Will H (2014) Understanding net neutrality: we need a better analogy. The National Memo, November 17, 2014. Available at: http://www.nationalmemo.com/net-neutrality-better-analogy/
Samuelson P (1999) Intellectual property and the digital economy: why the anti-circumvention regulations need to be revised. Berkeley Technol Law J 14:519. Available at: http://heinonline.org/HOL/LandingPage?collection=journals&handle=hein.journals/berktech14&div=35&id=&page=. Accessed 14 Aug 2015
Summer S (1999) Music on the Internet: can the present laws and treaties protect music copyright in cyberspace? Curr: Int Trade Law J 8:31. Available at: https://litigation-essentials.lexisnexis.com/webcd/app?action=DocumentDisplay&crawlid=1&crawlid=1&doctype=cite&docid=8+Currents+Int’l+Trade+L.J.+31&srctype=smi&srcid=3B15&key=990a1ea8c1eebf0c89d434e991010b0a. Accessed 14 Aug 2015
McEwan T (2001) Managing values and beliefs in organisations. Financial Times Management May, 2001
Amen K, Keogh T, Wolff N (2013) Digital copyright: a tale of domestic discord, presented in three acts. http://www.infotoday.com/cilmag/may02/Amen_Keogh_Wolff.htm. Accessed 14 Aug 2013
Purnhagen K, Rott P (eds) (2014) Varieties of European economic law and regulation. In: Studies in European economic law and regulation, vol 3, pp 439–458. Competition law and consumer law: why we need a common consumer model, July, 2014
Geiger C (2010) The future of copyright in Europe: striking a fair balance between protection and access to information. Intellect Prop Q 14(1):1–14
Anderson A, Rainie L (2014) Digital Life in 2025. http://www.pewinternet.org/2014/03/11/digital-life-in-2025/, March 11, 2014. Accessed 26 Sep 2015
Liu Q, Safavi-Naini R, Sheppard NP (2003) Digital rights management for content distribution. Conferences in Research and Practice in Information Technology Series, vol 34, pp 49–58
Gordon WJ, Bahls D (2007) Public’s right to fair use: amending Section 107 to avoid the fared use fallacy. Utah Law Rev: 619. Available at: http://heinonline.org/HOL/LandingPage?collection=journals&handle=hein.journals/utahlr2007&div=26&id=&page=. Accessed 14 Aug 2014
Vathitphund T (2010) Access to knowledge difficulties in developing countries: a balanced access to copyrighted works in the digital environment. Int Rev Law Comput Technol 24(1):9–10
Tuch A (2010) “Multiple Gatekeepers” John M. Olin Fellow and Fellow of the Program on Corporate Governance, Harvard Law School. Va Law Rev 96:107. http://www.law.harvard.edu/programs/olin_center/fellows_papers/pdf/Tuch_33.pdf
Fisher WW III (2004) Promises to keep, technology, law and the future of entertainment. Stanford Law and Politics, p 134
Bonne P (2003) Copyright protection and copy control when distributing and publishing digital information, GSEC Practical Version 1.4b, Option 1, 2003
Layton J (2014) How digital rights management works. Available at: http://computer.howstuffworks.com/drm.htm. Accessed 14 Aug 2014
Bates BJ (2015) Value and digital rights management: a social economics approach. Paper to be presented to the Communication Technology division, Association for Education in Journalism & Mass Communication, for the 2006 annual convention, San Francisco, CA. Available at: http://www.cci.utk.edu/files/aej2006-DRMSocEcon.pdf. Accessed 16 Aug 2015
Rooney D, Hearn G, Mandeville T, Joseph R (2003) Public policy in knowledge-based economies: foundations and frameworks-new horizons in public policy series. Elgar, Cheltenham [u.a.]
Melendez-Ortiz R, Roffe P (2009) Intellectual property and sustainable development: development agendas in a changing world. Edward Elgar Publishing Ltd
Haskin D (2007) Will DRM-free music threaten iTunes? Computerworld, Apr 30, 2007. http://www.infoworld.com/article/2663702/applications/will-drm-free-music-threaten-itunes-.html
Kerr I, Maurushat A, Tacit C (2003) Technological protection measures: tilting at copyright’s windmill. Ottawa Law Rev 34(7):13. http://heinonline.org/HOL/LandingPage?collection=journals&handle=hein.journals/ottlr34&div=8&id=&page=. Accessed 15 Aug 2010
Cope B, Freeman R (2001) Digital rights management and content development: technology drivers across the book production supply chain, from creator to consumer. Oct 2001
Kutter M, Hartung F (1999) Introduction to watermarking techniques. In: Katzenbeisser S, Petitcolas FAP (eds) Chapter 5. Information hiding techniques for steganography and digital watermarking, p 98
Petitcolas FAP (2003) Digital watermarking. In: Becker E, Buhse W, Gunnewig D, Rump N (eds) Digital rights management: technological, economic, legal and political aspects. Springer, p 91
Guo XC (2008) Methodologies in digital watermarking: robust and reversible watermarking techniques for authentication, security and privacy protection. University of Toronto, p 1
Wang F-H, Pan J-S, Jain LC (2009) Innovations in digital watermarking techniques. Springer, pp 3–4
Morimoto N (1999) Digital watermarking technology with practical applications. Information Science, Special Issue on Multimedia Informing Technologies, vol 2(4), p 108
Liu Y, Sadeghi A-R, Ghosal D, Mukherjee B (2011) Video streaming forensic – content identification with traffic snooping. Information Security, Lecture Notes in Computer Science, vol 6531, p 134
Staff M (2001) Napster, Loudeye Strike Digital Fingerprinting Deal. http://www.macworld.com/article/1017876/napster.html. Jun 7, 2001. Accessed 21 Nov 2013
Shuyu F (2007) Efficient and Robust Audio Fingerprinting. http://scholarbank.nus.edu.sg/bitstream/handle/10635/13438/FengSY.pdf?...1, p 20
Ramona M, Peeters G (2013) Audioprint: an efficient audio fingerprint system based on a novel cost-less synchronization scheme. http://recherche.ircam.fr/anasyn/peeters/ARTICLES/Ramona_2013_ICASSP_AudioPrint.pdf. Accessed 21 Nov 2013
Meléndez-Jubarbe H (2009) DRM interoperability. Boston Univ J Sci Technol Law 15:192
Garnett N (2001) Technological protection of copyright works, and copyright management systems (Paper presented to the ALAI Congress, June 2001) [unpublished], online: ALAI 2001 Congress Program and Presentation. http://www.law.columbia.edu/conferencesI2001/program_en.htm
de Werra J (2001) The legal system of technological protection measures under the WIPO treaties, the DMCA, the European Union Directives and other National Laws (Japan, Australia). online: ALAI 2001 Congress Program and Presentation, http://www.law.columbia.edu/conferences/2001/program_en.htm
Cunard JP (2001) Technological protection of copyrighted works and copyright management systems: a brief survey of the landscape. ALAI 2001 Congress Program and Presentation, http://www.law.columbia.edu/conferences/2001/program_en.htm. Accessed 03 Dec 2013
Bechtold S (2001) From copyright to information law—implications of digital rights management. Available at: http://www.ip.ethz.ch/people/bechtold/publications/2002_DRM.pdf. Digital Rights Management Workshop
Iannella R (2004) The open digital rights language: XML for digital rights management. Information Security Technical Report, vol 9(3), p 47
Guo H (2014) Digital Rights Management (DRM) Using XrML. http://www.tml.tkk.fi/Studies/Tik-110.501/2001/papers/guo.heng.pdf, p 6
Xiaobin H, Shaokuan H (2003) Digital Rights Management and XrmL. Document, Information and Knowledge 4:49
Waupotitsch R, Eidenbenz S, Smith JP, Kroc L (2006) Multi-scale integrated information and telecommunications system (MIITS): first results from a large-scale end-to-end network simulator. Winter Simulation Conference 06, Proceedings of the 38th conference
Alvear J (2001) ContentGuard Speaks Digital Rights Language. http://www.streamingmedia.com/Articles/Editorial/Featured-Articles/ContentGuard-Speaks-Digital-Rights-Language-64450.aspx. November 28, 2001. Accessed 09 Dec 2014
Guth S (2003) Rights Expression Languages. In: Becker E, Buhse W, Gunnewig D, Rump N (eds) Digital rights management: technological, economic, legal and political aspects. Springer, p 103
De Capitani di Vimercatil S, Foresti S, Jajodia S, Samarati P (2007) Access control policies and languages in open environments. “Secure Data Management in Decentralized Systems”. Springer, p 37
Lorch M, Kafura D, Shah S (2015) An XACML-based policy management and authorization service for Globus resources. Proceedings of the Fourth International Workshop on Grid Computing, http://www.computer.org/csdl/proceedings/grid/2003/2026/00/20260208.pdf.2003. Accessed 15 Aug 2015
Steel C, Lai R, Nagappan R (2012) Core security patterns: identity management standards and technologies. Prentice Hall, Dec 14, 2012. http://www.informit.com/articles/article.aspx?p=1398625&seqNum=12. Accessed 06 Dec 2013
Ardagna CA, Damiani E, De Capitani di Vimercati S, Samarati P (2004) XML-based access control languages. Information Security Technical Report, vol 9(3), p 41
Han W, Lei C (2012) A survey on policy languages in network and security management. Comput Netw 56:479
Gell R (2014) How to play MPEG video with MPEG Player software? http://www.anymp4.com/blu-ray-player/play-mpeg-video-with-mpeg-player-software.html. Accessed 06 Dec 2014
Thomas-Kerr J, Burnett I, Ritz CH, Devillers S, de Schrijever D, Van de Walle R (2007) Is that a fish in your ear? A universal metalanguage for multimedia. IEEE Multimedia 14(2): 73. http://ro.uow.edu.au/cgi/viewcontent.cgi?article=1522&context=infopapers. Accessed 09 Dec 2013
Sander T (2002) Golden times for digital rights management? Financial Cryptography, Springer
Prepaid Credit Card: “Definition of ‘Prepaid Credit Card’”. http://www.investopedia.com/terms/p/prepaid-credit-card.asp. Accessed 23 Dec 2013
Cooperm MN (2005) Time for the recording industry to face the music: the political, social and economic benefits of peer-to-peer communications networks. Consumer Federation of America, Consumers Union, Free Press, U.S. Public Interest Research Groups, March, 2005
Kwok SH (2002) Digital rights management for the online music business. ACM SIGecom Exchanges 3(3):23. http://www.sigecom.org/exchanges/volume_3/3.3-Kwok.pdf
Jeeny (2012) Cheap DVD Rental. http://www.moneysavingexpert.com/shopping/cheap-dvd-rental. 28/08/2012. Accessed 23 Dec 2013
Roettgers J (2013) Netflix may ditch DVDs sooner rather than later. Available at http://www.businessweek.com/articles/2013-10-21/netflix-may-ditch-dvds-sooner-rather-than-later#r=nav-r-story
Damouni N (2011) In: Adler L (ed) Amazon in talks to launch digital book library: report. http://www.reuters.com/article/2011/09/12/us-amazon-media-library-idUSTRE78A3RL20110912. 12/09/2011
Buhse W (2002) Implications of digital rights management for online music–a business perspective. Security and Privacy in Digital Rights Management, Lecture Notes in Computer Science, vol 2320. Springer, p 209
Picot A, Reichwald R, Wigand R (2001) Die grenzenlose Unternehmung, Wiesbaden, p 272
Bohn P (2005) Rent-A-Star: do you subscribe to digital music? Berlecon Research, 22/06/2005. http://www.indicare.org/tiki-read_article.php?articleId=112. Accessed 19 Dec 2013
Lucchi N (2006) Digital media & intellectual property, management of rights and consumer protection in a comparative analysis. Springer, p 79
Noam EM, Pupillo LM (eds) (2008) Peer-to-peer video the economics, policy, and culture of today’s new mass medium. Springer
Lackman EM (2002–2003) Slowing down the speed of sound: a transatlantic race to head off digital copyright infringement. Fordham Intellect Prop Media Entertain Law J 13:1161. Available at: http://heinonline.org/HOL/LandingPage?collection=journals&handle=hein.journals/frdipm13&div=38&id=&page=. Accessed 14 Aug 2010
Einhorn MA, Rosenblatt B (2005) Peer-to-peer networking and digital rights management, how market tools can solve copyright problems. Policy Analysis, No. 534. February 17, 2005, p 1
Cox B (1995) Superdistribution: objects as property on the electronic frontier. Addison-Wesley
Xingdong Z (2006) The study and design of digital rights management system based on P2P technology, p 38
Metz C (2013) Mercora P2P Radio. http://www.pcmag.com/article2/0,2817,1755278,00.asp. Accessed 15 Dec 2013
Tehranian J (2003–2004) All rights reserved - reassessing copyright and patent enforcement in the digital age. Univ Cincinnati Law Rev 72:45. Available at: http://heinonline.org/HOL/LandingPage?collection=journals&handle=hein.journals/ucinlr72&div=9&id=&page=. Accessed 14 Aug 2013
Geiger C (2006) Copyright and free access to information, for a fair balance of interests in a globalised world. Eur Intellect Prop Rev 7(28):366
Katz A (2006) The potential demise of another natural monopoly: new technologies and the administration of performing rights. J Competition Law Econ 2(2):245–284. http://jcle.oxfordjournals.org/cgi/content/abstract/2/2/245. Accessed 14 Aug 2015
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Xu, C. (2020). Panorama of Digital Rights Management Systems. In: Regulatory Model for Digital Rights Management. Springer, Singapore. https://doi.org/10.1007/978-981-15-1995-6_2
Download citation
DOI: https://doi.org/10.1007/978-981-15-1995-6_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1994-9
Online ISBN: 978-981-15-1995-6
eBook Packages: Law and CriminologyLaw and Criminology (R0)