83 resultados para DRM


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper deals with the security problems of DRM protected e-learning content. After a short review of the main DRM systems and methods used in e-learning, an examination is made of participators in DRM schemes (e-learning object author, content creator, content publisher, license creator and end user). Then a conceptual model of security related processes of DRM implementation is proposed which is improved afterwards to reflect some particularities in DRM protection of e-learning objects. A methodical way is used to describe the security related motives, responsibilities and goals of the main participators involved in the DRM system. Taken together with the process model, these security properties are used to establish a list of requirements to fulfill and a possibility for formal verification of real DRM systems compliance with these requirements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper represents a verification of a previously developed conceptual model of security related processes in DRM implementation. The applicability of established security requirements in practice is checked as well by comparing these requirements to four real DRM implementations (Microsoft Media DRM, Apple's iTunes, SunnComm Technologies’s MediaMax DRM and First4Internet’s XCP DRM). The exploited weaknesses of these systems resulting from the violation of specific security requirements are explained and the possibilities to avoid the attacks by implementing the requirements in designing step are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this paper is to introduce Digital Rights Management (DRM) and its implications for content producers, consumers, and libraries. Simply stated, DRM is a technology that allows copyright owners to regulate and manage their content when it is disseminated in a digital format, and it is the reason why some patrons cannot access some of the downloadable digital content provided by libraries. In the first part of this paper, we provide a short introduction to DRM by outlining the entities, the various technologies used as well as usage restrictions that come with DRM. In the second part of the paper are discussed the alternatives for the libraries, using DRM as a tool for library copyright policy and the main documents, which present the position of library organizations towards information legislation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper investigates the current turbulent state of copyright in the digital age, and explores the viability of alternative compensation systems that aim to achieve the same goals with fewer negative consequences for consumers and artists. To sustain existing business models associated with creative content, increased recourse to DRM (Digital Rights Management) technologies, designed to restrict access to and usage of digital content, is well underway. Considerable technical challenges associated with DRM systems necessitate increasingly aggressive recourse to the law. A number of controversial aspects of copyright enforcement are discussed and contrasted with those inherent in levy based compensation systems. Lateral exploration of the copyright dilemma may help prevent some undesirable societal impacts, but with powerful coalitions of creative, consumer electronics and information technology industries having enormous vested interest in current models, alternative schemes are frequently treated dismissively. This paper focuses on consideration of alternative models that better suit the digital era whilst achieving a more even balance in the copyright bargain.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A patient-centric DRM approach is proposed for protecting privacy of health records stored in a cloud storage based on the patient's preferences and without the need to trust the service provider. Contrary to the current server-side access control solutions, this approach protects the privacy of records from the service provider, and also controls the usage of data after it is released to an authorized user.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

ICT is becoming a prominent part of healthcare delivery but brings with it information privacy concerns for patients and competing concerns by the caregivers. A proper balance between these issues must be established in order to fully utilise ICT capabilities in healthcare. Information accountability is a fairly new concept to computer science which focuses on fair use of information. In this paper we investigate the different issues that need to be addressed when applying information accountability principles to manage healthcare information. We briefly introduce an information accountability framework for handling electronic health records (eHR). We focus more on digital rights management by considering data in eHRs as digital assets and how we can represent privacy policies and data usage policies as these are key factors in accountability systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we argue that rationalist ‘predict then act’ approaches to disaster risk management (DRM) policy promote unrealistic public expectations of DRM provisions, the avoidance of decision making by political elites, an over-reliance on technical expertise and engineering solutions to reducing exposure to natural events, and a reactive approach to DRM overall. We propose an alternative incrementalist approach that focuses on managing uncertainties rather than reducing them and building resilience not simply through the reduction of hazard exposure, but also through the ongoing reduction of community vulnerability, the explicit consideration of normative priorities, and more effective community engagement in climate risk debates.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Major disasters, such as bushfires or floods, place significant stress on scarce public resources. Climate change is likely to exacerbate this stress. An integrated approach to disaster risk management (DRM) and climate change adaptation (CCA) could reduce the stress by encouraging the more efficient use of pooled resources and expertise. A comparative analysis of three extreme climate-related events that occurred in Australia between 2009 and 2011 indicated that a strategy to improve interagency communication and collaboration would be a key factor in this type of policy/planning integration. These findings are in accord with the concepts of Joined-up Government and Network Governance. Five key reforms are proposed: developing a shared policy vision; adopting multi-level planning; integrating legislation; networking organisations; and establishing cooperative funding. These reforms are examined with reference to the related research literature in order to identify potential problems associated with their implementation. The findings are relevant for public policy generally but are particularly useful for CCA and DRM.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter analyses the copyright law framework needed to ensure open access to outputs of the Australian academic and research sector such as journal articles and theses. It overviews the new knowledge landscape, the principles of copyright law, the concept of open access to knowledge, the recently developed open content models of copyright licensing and the challenges faced in providing greater access to knowledge and research outputs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Väitöskirjassani tarkastelen informaatiohyödykkeiden ja tekijänoikeuksien taloustiedettä kahdesta eri perspektiivistä. Niistä ensimmäinen kuuluu endogeenisen kasvuteorian alaan. Väitöskirjassani yleistän ”pool of knowledge” -tyyppisen endogeenisen kasvumallin tilanteeseen, jossa patentoitavissa olevalla innovaatiolla on minimikoko, ja jossa uudenlaisen tuotteen patentoinut yritys voi menettää monopolinsa tuotteeseen jäljittelyn johdosta. Mallin kontekstissa voidaan analysoida jäljittelyn ja innovaatioilta vaaditun ”minimikoon” vaikutuksia hyvinvointiin ja talouskasvuun. Kasvun maksimoiva imitaation määrä on mallissa aina nolla, mutta hyvinvoinnin maksimoiva imitaation määrä voi olla positiivinen. Talouskasvun ja hyvinvoinnin maksimoivalla patentoitavissa olevan innovaation ”minimikoolla” voi olla mikä tahansa teoreettista maksimia pienempi arvo. Väitöskirjani kahdessa jälkimmäisessä pääluvussa tarkastelen informaatiohyödykkeiden kaupallista piratismia mikrotaloustieteellisen mallin avulla. Informaatiohyödykkeistä laittomasti tehtyjen kopioiden tuotantokustannukset ovat pienet, ja miltei olemattomat silloin kun niitä levitetään esimerkiksi Internetissä. Koska piraattikopioilla on monta eri tuottajaa, niiden hinnan voitaisiin mikrotaloustieteen teorian perusteella olettaa laskevan melkein nollaan, ja jos näin kävisi, kaupallinen piratismi olisi mahdotonta. Mallissani selitän kaupallisen piratismin olemassaolon olettamalla, että piratismista saatavan rangaistuksen uhka riippuu siitä, kuinka monille kuluttajille piraatti tarjoaa laittomia hyödykkeitä, ja että se siksi vaikuttaa piraattikopioiden markkinoihin mainonnan kustannuksen tavoin. Kaupallisten piraattien kiinteiden kustannusten lisääminen on mallissani aina tekijänoikeuksien haltijan etujen mukaista, mutta ”mainonnan kustannuksen” lisääminen ei välttämättä ole, vaan se saattaa myös alentaa laillisten kopioiden myynnistä saatavia voittoja. Tämä tulos poikkeaa vastaavista aiemmista tuloksista sikäli, että se pätee vaikka tarkasteltuihin informaatiohyödykkeisiin ei liittyisi verkkovaikutuksia. Aiemmin ei-kaupallisen piratismin malleista on usein johdettu tulos, jonka mukaan informaatiohyödykkeen laittomat kopiot voivat kasvattaa laillisten kopioiden myynnistä saatavia voittoja jos laillisten kopioiden arvo niiden käyttäjille riippuu siitä, kuinka monet muut kuluttajat käyttävät samanlaista hyödykettä ja jos piraattikopioiden saatavuus lisää riittävästi laillisten kopioiden arvoa. Väitöskirjan viimeisessä pääluvussa yleistän mallini verkkotoimialoille, ja tutkin yleistämäni mallin avulla sitä, missä tapauksissa vastaava tulos pätee myös kaupalliseen piratismiin.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Elucidating the structure and dynamics of lamellipodia and filopodia in response to different stimuli is a topic of continuing interest in cancer cells as these structures may be attractive targets for therapeutic purposes. Interestingly, a close functional relationship between these actin-rich protrusions and specialized membrane domains has been recently demonstrated. The aim of this study was therefore to investigate the fine organization of these actin-rich structures and examine how they structurally may relate to detergent-resistant membrane (DRM) domains in the MTLn3 EGF/serum starvation model. For this reason, we designed a straightforward and alternative method to study cytoskeleton arrays and their associated structures by means of correlative fluorescence (/laser)- and electron microscopy (CFEM). CFEM on whole mounted breast cancer cells revealed that a lamellipodium is composed of an intricate filamentous actin web organized in various patterns after different treatments. Both actin dots and DRM's were resolved, and were closely interconnected with the surrounding cytoskeleton. Long actin filaments were repeatedly observed extending beyond the leading edge and their density and length varied after different treatments. Furthermore, CFEM also allowed us to demonstrate the close structural association of DRMs with the cytoskeleton in general and the filamentous/dot-like structural complexes in particular, suggesting that they are all functionally linked and consequently may regulate the cell's fingertip dynamics. Finally, electron tomographic modelling on the same CFEM samples confirmed that these extensions are clearly embedded within the cytoskeletal matrix of the lamellipodium.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article will examine the legality of the digital rights management (‘DRM’) measures used by the major e-book publishers and device manufacturers in the United States, European Union and Australia not only to enforce their intellectual property rights but also to create monopolistic content silos, restrict interoperability and affect the ability for users to use the content they have bought in the way they wish. The analysis will then proceed to the recent competition investigations in the US and EU over price-fixing in e-book markets, and the current litigation against Amazon in the US for an alleged abuse of its dominant position. A final point will be made on possible responses in Australia to these issues taking into account the jurisprudence on DRM in other scenarios.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Avhandlingens syfte är att belysa hur porträtten av jagberättaren Arvid och hans mor växer fram i Per Pettersons roman Jeg forbanner tidens elv. Det paradigm jag utgår ifrån är det psykoanalytiska. Förutom texter av Sigmund Freud och Jacques Lacan stöder jag mig på texter av Peter Brooks och Terry Eagleton. För en tolkning av Arvids sätt att berätta sin historia använder jag mig av James Phelans tankar kring den opålitliga berättaren . Analysen bygger på en närläsning av romanen och några av de intertexter som förekommer i den. Av dessa är särskilt myten om kung Oidipus samt berättelsen om Zorro centrala för förståelsen av Arvids personlighet och hur den manliga identiteten byggs. Andra centrala intertexter som granskas närmare är Erich Maria Remarques roman Triumfbågen och Somerset Maughams roman Den vassa eggen. Porträttet av mor belyses indirekt via den funktion hon har i Arvids berättelse. Arvids porträtt analyseras ur två olika perspektiv. I uppsatsens första del, Romanbygget , undersöker jag hur romanen är uppbyggd och hur bilden av Arvid formas genom vad han berättar om sin mor, sitt liv, sin bakgrund och sina uppväxtår. Det perspektiv som Konung Oidipus i Freuds tolkning av det antika dramat ger, lyfter, som en nyckel in i romanen, fram dynamiken mellan Arvid, mor och den övriga familjen. I romanen dödas far i psykisk bemärkelse, han blir medvetet föraktad och förbisedd som manlig förebild och identifikationsobjekt. Arvids fixering vid mor gör att han ser sig själv med hennes ögon. Också bröderna får sin gestalt som rivaler i kampen om mor. I ljuset av den oidipala problematiken framhåller jag Arvids olösta relation till familjemedlemmarna som den avgörande orsaken till Arvids misslyckanden i livet och hans oförmåga att forma en fungerande och stabil vuxenidentitet. Men jag föreslår också en tidig, omedveten fadersidentifikation, symboliserad av Zorro och Zorros magiska märke, som i sublimeringen eventuellt finner sin lösning i en dröm om att bli författare. I uppsatsens andra del Berättarrösten undersöker jag Arvids sätt att berätta utgående ifrån Phelans tankar kring den opålitliga berättaren . Jag analyserar några centrala avsnitt i romanen med avseende på hur berättarröstens och den implicita författarens framställningar överensstämmer eller skiljer sig ifrån varandra. I min läsning är Arvid en komplext pålitlig och opålitlig berättare. Arvid framhåller i sin berättelse och i sina återblickar ett tillrättalagt och i någon mån förskönat porträtt av sig själv, en livslögn vars upplösning enligt min mening antyds i de avslutande kapitlen. För min förståelse av psykoanalysens teori och hur den kan tillämpas i litteraturforskningen är Ludwig Wittgensteins tankar om bildens användning centrala. I avsnittet om Zorro tar jag kortfattat upp frågan hur psykoanalytisk litteraturtolkning kan leda vilse i form av övertolkning, det vill säga att analysen övergår i fantasi. En annan möjlig felkälla som jag lyfter fram i analysen är att romanen tolkas av en svenskspråkig läsare som eventuellt läser in andra nyanser i den norska texten, än vad författaren avsett. Jag tar också upp frågan om Arvid i Pettersons tidigare produktion och huruvida det är frågan om en fortgående berättelse om Arvid Jansen under olika livsbetingelser. Mitt intryck är att det inte är fråga om ett enhetligt personporträtt utan olika frågeställningar som modelleras ur samma material.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The outer atmosphere of the sun called the corona has been observed during total solar eclipse for short periods (typically <6 min), from as early as the eighteenth century. In the recent past, space-based instruments have permitted us to study the corona uninterruptedly. In spite of these developments, the dynamic corona and its high temperature (1-2 million K) are yet to be Ally understood. It is conjectured that their dynamic nature and associated energetic events are possible reasons behind the high temperature. In order to study these in detail, a visible emission line space solar coronagraph is being proposed as a payload under the small-satellite programme of the Indian Space Research Organisation. The satellite is named as Aditya-1 and the scientific objectives of this payload are to study: (i) the existence of intensity oscillations for the study of wave-driven coronal heating; (ii) the dynamics and formation of coronal loops and temperature structure of the coronal features; (iii) the origin, cause and acceleration of coronal mass ejections (CMEs) and other solar active features, and (iv) coronal magnetic field topology and three-dimensional structures of CMEs using polarization information. The uniqueness of this payload compared to previously flown space instruments is as follows: (a) observations in the visible wavelength closer to the disk (down to 1.05 solar radii); (b) high time cadence capability (better than two-images per second), and (c) simultaneous observations of at least two spectral windows all the time and three spectral windows for short durations.

Relevância:

10.00% 10.00%

Publicador: