Open Access Research Article

DIGITAL RIGHTS MANAGEMENT: ADDRESSING COPYRIGHT PROTECTION IN THE DIGITAL ERA

Author(s):
GURUANSH JAGWANI
Journal IJLRA
ISSN 2582-6433
Published 2024/04/29
Access Open Access
Issue 7

Published Paper

PDF Preview

Article Details

DIGITAL RIGHTS MANAGEMENT: ADDRESSING COPYRIGHT PROTECTION IN THE DIGITAL ERA
 
AUTHORED BY - GURUANSH JAGWANI[1]
 
 
ABSTRACT
The sharp increase in the productivity of digital content and the ease with which it can be distributed on the Internet has presented significant challenges to copyright protection. Digital rights management (DRM) has emerged as an important mechanism to address these challenges, providing technical solutions to manage access to digital content and enforce copyright policies. The evolution of Digital Rights Management systems, their technologies and effectiveness in protecting digital content from unauthorized use and distribution are examined in the present paper. In addition, it examines the legal and ethical aspects of the implementation of DRMs, including issues relating to fair use, consumer rights and synergism.
 
This paper aims to analyze the strengths and limitations of digital rights management in order to provide an insight into the current debate on copyright protection in a digital age, as well as proposing possible future directions for developing more balanced and inclusive DRM strategies.
 
Keywords: Digital Rights Management, Copyright, Copyright Protection, Digital Age.
 
INTRODUCTION
In the digital age, copyright protection plays a crucial role in encouraging creativity, innovation, and economic growth by motivate creators to produce original works. However, with the rise of digital distribution and reproduction technologies, copyright holders face significant challenges in protecting their intellectual property from unauthorized copying, sharing, and distribution. Digital Rights Management (DRM) systems are designed to address these challenges by providing technical measures to control access to and usage of digital content. DRM technologies typically involve encryption, access controls, and digital rights expression languages to enforce copyright restrictions and protect against unauthorized copying and distribution[2].
 
However, DRM is not without its own set of challenges and controversies. Critics argue that DRM can restrict users' rights, hinder innovation, and create interoperability issues[3]. Moreover, DRM systems are not foolproof and can often get avoided by determined individuals, leading to a cat-and-mouse game between content creators and infringers.
 
Despite these challenges, DRM remains an important tool for copyright holders to protect their intellectual property in the digital age. As technology continues to evolve, the debate over the effectiveness and impact of DRM on creativity, access to information and users' rights will likely continue. Finding the right balance between copyright protection and users' interests remains a complex and ongoing challenge in the digital era.
 
HISTORY OF COPYRIGHT LAW AND ITS EVOLUTION
Copyright law has its origins in ancient civilizations, where rulers and authorities granted authors and creators limited monopolies to oversee the reproduction and dissemination of their works, although these early copyright measures were primarily about censorship and control rather than safeguarding creators' rights[4]. The 15th-century invention of the printing press sparked a revolution in the dissemination of books and printed materials, prompting governments to introduce regulations to govern the printing industry and uphold the rights of authors and publishers. A landmark moment occurred with the enactment of the Statute of Anne in 1710 in England, often considered the first modern copyright law, which afforded authors and creators of literary works exclusive rights to their creations for a finite period, signifying a pivotal shift towards acknowledging and safeguarding creators' rights. As global trade and communication expanded in the 19th century, there arose a need for international collaboration on copyright protection. This led to the establishment of the Berne Convention for the Protection of Literary and Artistic Works in 1886 and other international treaties, which laid down foundational principles for copyright protection and established mechanisms for reciprocal protection of works across national boundaries[5]. The 20th century brought significant technological advancements, such as radio, television, cinema, and eventually, digital technologies, each posing unique challenges to copyright law[6]. The Lawmakers struggles with issues like broadcasting rights, performance rights, and the reproduction and distribution of copyrighted works. However, the advent of the internet and digital technologies in the late 20th century presented unmatched challenges for copyright law. The ease of digital reproduction, distribution, and sharing of content raised concerns about piracy, unauthorized copying, and the disruption of traditional business models in the creative industries.
 
KEY LEGAL FRAMEWORKS AND REGULATIONS GOVERNING DRM AND COPYRIGHT PROTECTION
·         Digital Millennium Copyright Act (DMCA)[7]: Enacted in the United States in 1998, the DMCA introduced new provisions to address copyright issues in the digital age. It criminalized the avoiding of technological measures used to protect copyrighted works (e.g., DRM), while also providing safe harbors for online service providers.
·         World Intellectual Property Organization (WIPO) Copyright Treaties[8]: The WIPO Copyright Treaty and the WIPO Performances and Phonograms Treaty, both adopted in 1996, updated international copyright standards to address digital technologies and online distribution.
·         European Union Copyright Directive[9]: The EU Copyright Directive, adopted in 2001 and recently updated in 2019, harmonizes copyright laws across EU member states and includes provisions related to DRM, online platforms, and copyright enforcement.
·         Digital Rights Management (DRM) Regulations: Various countries have enacted laws and regulations specifically addressing DRM technologies and their use in protecting copyrighted works. These regulations often balance the rights of copyright holders with the rights of users, including provisions for interoperability and circumvention for lawful purposes (e.g., fair use).
·         Fair Use and Fair Dealing Provisions[10][11]: Many jurisdictions have exceptions and limitations to copyright protection, such as fair use (in the U.S.) and fair dealing (in other countries), which allow for certain uses of copyrighted works without the need for permission from or payment to the copyright holder.
Overall, legal frameworks and regulations governing DRM and copyright protection continue to evolve in response to technological advancements, changing business models, and societal norms, as lawmakers strive to strike a balance between protecting the rights of creators and promoting access to knowledge and cultural expression.
 
CHALLENGES AND ISSUES ASSOCIATED WITH DRM AND COPYRIGHT PROTECTION IN THE DIGITAL ERA
·         Interoperability[12]: DRM systems implemented by different content providers often lack interoperability, meaning that content purchased from one provider may not be compatible with devices or platforms from another provider. This can lead to a fragmented user experience and frustration for consumers who wish to access their purchased content across multiple devices or services.
·         Digital Piracy[13]: Despite the implementation of DRM technologies, digital piracy remains a significant challenge in the digital era. Pirates frequently find ways to circumvent DRM protections, leading to widespread unauthorized copying, sharing, and distribution of copyrighted works. This not only results in financial losses for content creators and rights holders but also undermines the integrity of the copyright system.
·         User Privacy Concerns: DRM technologies often require the collection and processing of personal data from users to enforce copyright protections. This raises concerns about user privacy and data security, particularly in light of recent data breaches and privacy scandals. Users may be hesitant to engage with DRM-protected content if they perceive it as a threat to their privacy rights.
·         Access to Knowledge and Cultural Heritage: Some argue that DRM can impede access to knowledge and cultural heritage by restricting the ability to freely share and distribute copyrighted works for educational, research, or archival purposes. This is particularly problematic in contexts where access to digital content is limited due to economic, geographic, or legal barriers.
·         Digital Divide: DRM technologies may exacerbate the digital divide by limiting access to digital content for marginalized communities who lack the resources or technical expertise to navigate DRM-protected platforms or devices. This can further widen existing inequalities in access to information and cultural expression.
·         Lock-in and Vendor Dependence: DRM-protected content is often tied to specific platforms or ecosystems, creating a lock-in effect that restricts consumer choice and competition. Users may become dependent on a single vendor for access to their purchased content, making it difficult to switch to alternative platforms or services in the future.
·         Legal Uncertainty and Anti-Circumvention Laws: The legal framework surrounding DRM and anti-circumvention laws can be complex and inconsistent across jurisdictions, leading to legal uncertainty for both content creators and users. Anti-circumvention laws may restrict legitimate uses of copyrighted works, such as fair use or interoperability, and limit users' ability to exercise their rights under copyright law.
·         Innovation and Creativity: Some argue that DRM can stifle innovation and creativity by imposing technical restrictions on how content can be accessed, shared, and modified. This may discourage experimentation and collaboration among creators and inhibit the development of new business models for distributing digital content.
Overall, addressing these challenges requires a careful balancing of the interests of content creators, rights holders, consumers, and society at large. Policymakers, industry stakeholders, and civil society organizations play a crucial role in shaping DRM policies and practices that promote both copyright protection and the public interest in access to knowledge and cultural heritage in the digital era.
 
TECHNOLOGICAL SOLUTION
Here are some technological solutions and strategies commonly used for implementing DRM:
·         Encryption: Encryption is a fundamental component of DRM systems, used to protect the confidentiality and integrity of digital content. Content is encrypted using cryptographic algorithms, and decryption keys are securely managed to restrict access to authorized users. Advanced encryption techniques, such as AES (Advanced Encryption Standard) and RSA (Rivest-Shamir-Adleman), are often employed to ensure robust protection against unauthorized access and piracy.
·         Watermarking[14]: Watermarking is a technique used to embed imperceptible or semi-perceptible marks, such as digital signatures or unique identifiers, into digital content. These watermarks can be used to trace the origin of content and deter unauthorized copying or distribution. Watermarking can be applied at various levels, including at the file level, the image or video frame level, or even the individual data packet level in streaming media.
·         Access Control Mechanisms: Access control mechanisms are used to manage and enforce permissions for accessing DRM-protected content. This may include user authentication mechanisms, such as username/password authentication or digital certificates, as well as access control lists (ACLs) that specify which users or devices are authorized to access specific content. Access control policies can be customized based on factors such as user roles, content types, and licensing agreements.
·         Digital Rights Expression Languages (DRMLs[15]): DRMLs are specialized languages used to express the rights associated with digital content in a machine-readable format. These languages define the permissions, restrictions, and usage rights for DRM-protected content, allowing content creators and rights holders to specify how their content can be accessed, used, and distributed. Examples of DRMLs include XrML (extensible Rights Markup Language), ODRL (Open Digital Rights Language), and MPEG-21 REL (Rights Expression Language).
·         Secure Authentication and Authorization Protocols[16]: Secure authentication and authorization protocols are essential for verifying the identity of users and devices accessing DRM-protected content and ensuring that they have the necessary rights and permissions. Protocols such as OAuth (Open Authorization) and Secure Remote Password (SRP) protocol are commonly used to facilitate secure authentication and authorization in DRM systems, protecting against unauthorized access and misuse of digital content.
·         Dynamic Watermarking and Forensic Tracking[17]: Dynamic watermarking techniques involve embedding unique identifiers or transactional information into digital content dynamically at the time of access or distribution. This allows content owners to track and trace the unauthorized distribution of content back to the source. Forensic tracking techniques, such as digital fingerprinting and content monitoring, are also used to detect and deter piracy in real-time by identifying unauthorized copies of content across various distribution channels.
These technological solutions and strategies are often combined and customized based on the specific requirements and objectives of DRM implementations, providing multiple layers of protection to safeguard digital content against unauthorized access, copying, and distribution.
 
LEGAL AND ETHICAL CONSIDERATION
·         Fair Use and User Rights: One of the primary concerns surrounding DRM is its potential impact on users' rights, particularly their ability to exercise fair use or fair dealing exceptions to copyright law. DRM may restrict users' ability to make legitimate uses of copyrighted works, such as criticism, commentary, parody, or educational purposes. This raises questions about whether DRM measures should accommodate and respect users' rights to access, use, and share copyrighted works within the bounds of copyright law.
·         Digital Rights Enforcement: DRM technologies are often used to enforce copyright restrictions and prevent unauthorized copying, sharing, and distribution of copyrighted works. However, the effectiveness of DRM enforcement measures can vary, and they may not always align with users' expectations or legal rights. Overly restrictive DRM measures can hinder legitimate uses of copyrighted works and lead to user frustration, while ineffective DRM may fail to adequately protect against piracy and copyright infringement.
·         Anti-Circumvention Laws[18]: Many countries have enacted anti-circumvention laws that prohibit the circumvention of technological protection measures (TPMs) used to control access to copyrighted works. While these laws are intended to deter piracy and protect the integrity of DRM systems, they can also restrict legitimate uses of copyrighted works, such as reverse engineering for interoperability or security research. Critics argue that anti-circumvention laws may unduly limit users' rights and stifle innovation and competition in the digital ecosystem.
·         Balance between Copyright Protection and Users' Rights[19]: Achieving a balance between protecting copyright holders' rights and promoting users' rights and interests is a central challenge in DRM policy and regulation. Policymakers, courts, and industry stakeholders must consider the competing interests at play and strive to develop DRM policies and practices that strike an appropriate balance between copyright protection, access to knowledge and cultural expression, and users' rights to privacy, freedom of speech, and innovation.
·         Ethical Considerations[20]: DRM raises broader ethical questions about the impact of technological measures on society, culture, and individual freedoms. Ethical concerns may include issues such as digital divide, cultural preservation, censorship, and the commoditization of knowledge and information. DRM policies and practices should be evaluated not only based on their legal implications but also their ethical implications for individuals, communities, and society as a whole.
Overall, navigating the legal and ethical implications of DRM requires careful consideration of the interests and rights of all stakeholders involved, including copyright holders, content creators, users, researchers, and the public. Finding the right balance between copyright protection and users' rights is essential to fostering a fair, equitable, and inclusive digital ecosystem that promotes creativity, innovation, and access to knowledge and cultural expression for all.
 
EXAMPLES OF DRM IMPLEMENTATIONS: in practice, showcasing both successful and problematic applications
Successful DRM Implementations:
a.       Amazon Kindle: Amazon's Kindle e-reader platform employs DRM to protect e-books purchased from its store. While the DRM restricts users from sharing or copying e-books, it has been relatively successful in preventing widespread piracy and unauthorized distribution of Kindle books[21].
b.      Netflix: Netflix utilizes DRM technologies to protect its streaming video content from unauthorized copying and distribution. By implementing DRM, Netflix can control access to its content and ensure that only paying subscribers can view its exclusive shows and movies[22].
c.       Microsoft Office: Microsoft Office applications use DRM to protect documents, spreadsheets, and presentations from unauthorized access and modification. Through encryption and access control mechanisms, Microsoft ensures that only authorized users with valid licenses can access and edit Office files[23].
 
Problematic DRM Implementations:
a.       SecuROM: SecuROM is a controversial DRM technology used in some PC games to prevent unauthorized copying and distribution. However, SecuROM has faced criticism for its intrusive nature, including reports of causing system instability, compatibility issues, and privacy concerns due to its use of rootkit-like behavior[24].
b.      Sony BMG Copy Protection Rootkit: In 2005, Sony BMG released several music CDs with copy protection software that installed a rootkit-like program on users' computers without their consent. This DRM implementation not only violated users' privacy rights but also exposed them to security vulnerabilities, leading to widespread criticism and legal action against Sony BMG[25].
c.       StarForce: StarForce is another DRM technology used in PC games, known for its aggressive anti-piracy measures. However, StarForce has been criticized for causing compatibility issues, system instability, and even damage to users' hardware due to its low-level access to system resources[26].
These examples illustrate the diverse range of DRM implementations in various industries, highlighting both successful strategies for protecting copyrighted content and problematic applications that have raised ethical, legal, and technical concerns. Finding the right balance between protecting copyright holders' rights and respecting users' rights and interests remains a complex challenge in the digital age.
 
FUTURE DIRECTIONS
Some future trends and directions in DRM and copyright protection:
Emerging Technologies[27]:
a.       Block chain: Block chain technology holds potential for revolutionizing DRM by providing a decentralized and tamper-proof ledger for tracking ownership and usage rights of digital assets. Blockchain-based DRM systems could enhance transparency, interoperability, and security while reducing reliance on centralized intermediaries.
b.      Artificial Intelligence (AI): AI-powered content recognition and fingerprinting technologies can enable more sophisticated DRM systems capable of identifying and tracking copyrighted content across various platforms and formats. AI could also facilitate automated content moderation and enforcement measures to combat piracy and copyright infringement more effectively.
c.       Encryption and Watermarking: Advances in encryption algorithms and digital watermarking techniques may lead to more robust and secure DRM solutions that can withstand increasingly sophisticated attacks from pirates and hackers.
 
Policy Developments[28]:
a.       International Cooperation: Continued efforts to strengthen international cooperation and harmonize copyright laws and enforcement mechanisms across jurisdictions are essential for addressing global challenges such as cross-border piracy and digital rights management.
b.      Reform of Copyright Laws: Policymakers may consider updating copyright laws to better accommodate digital technologies, user rights, and evolving business models. This could involve clarifying and expanding fair use/fair dealing exceptions, revising anti-circumvention laws, and promoting interoperability and consumer rights in DRM systems.
c.       Consumer Protection: Greater emphasis on consumer protection measures, such as transparency requirements, user consent mechanisms, and robust data privacy regulations, can help mitigate the risks and negative impacts associated with DRM technologies on user privacy and security.
 
Areas for Further Research[29]:
a)      User-Centric DRM: Research into user-centric DRM approaches that prioritize user rights, preferences, and experiences could lead to more equitable and user-friendly DRM systems that balance copyright protection with user freedoms and interests.
b)      Legal and Ethical Implications: Further exploration of the legal, ethical, and socio-cultural implications of DRM technologies, including their impact on access to knowledge, cultural expression, and digital rights, is needed to inform evidence-based policymaking and regulatory frameworks.
c)      Technological Innovation: Continued research and innovation in DRM technologies, such as advanced encryption schemes, distributed ledger technologies, and machine learning algorithms, can drive the development of more effective, secure, and user-friendly DRM solutions.
d)      Business Model Innovation: Research into alternative business models for content distribution and monetization, such as subscription-based models, micropayments, and devolved content marketplaces, can help reduce reliance on restrictive DRM measures while ensuring fair compensation for content creators and rights holders.
Overall, the future of DRM and copyright protection will be shaped by a combination of technological advancements, policy developments, and interdisciplinary research efforts aimed at promoting innovation, access to knowledge, and the protection of intellectual property rights in the digital age.
 
CONCLUSION
In Conclusion, DRM stands as a key tool in the ongoing efforts to protect copyright in digital times. As described in this paper, the evolution of copyright law over time from old civilizations to digital age reflects society's ongoing efforts for a balanced approach between creators' rights and citizens' interest in accessing and sharing information and cultural heritage.
 
Technical means for enforcing copyright policies and protecting digital content against unauthorized use and distribution have been provided by the introduction of DRM systems. However, its effectiveness is not without challenges and controversies, including concerns about the impact of DRM on fair use, consumers' rights or technological interoperability.
 
While DRM can offer solutions for fighting piracy and protecting IPR, due consideration must be given to the principles of inclusion, accessibility and user privacy in its implementation. In addition, ongoing dialogue and cooperation among stakeholders, including creators, consumers, policymakers as well as technology developers is needed in the light of legal and ethical considerations surrounding digital rights management.
 
Technology developments, changes in consumer behavior and the evolution of legal frameworks are expected to have an impact on the future of digital rights management. A delicate balance needs to be struck between protecting intellectual property rights and promoting innovation, creativity and free exchange of ideas, as digital ecosystems continue to evolve. DRM should ultimately aim at facilitating a vibrant and sustainable digital economy where creators are compensated fairly for their work, while ensuring that knowledge and culture remain accessible to the widest possible audience. DRM can play an important role in shaping a more equitable and strong digital future through ongoing research, cooperation and innovation.
 
REFERENCES (list of all the references used in paper)
·         Rosenblatt, B. (2001). Digital Rights Management: Business and Technology. IEEE Transactions on Consumer Electronics, 47(1), 167-171
·         Copyright, Designs and Patents Act, 1710
·         Berne Convention for the Protection of Literary and Artistic Works, 1886
·         Goldstein, P. 2001. Copyright's Highway: From Gutenberg to the Celestial Jukebox. Stanford University Press.
·         Digital Millennium Copyright Act, 1998
·         WIPO Copyright Treaty, 1996
·         European Union Copyright Directive, 2001
·         Copyright Law of the United States of America, 1976
·         Copyright, Designs and Patents Act, 1988
·         Huang, H., & Fang, Y. 2008. DRM Interoperability in the Digital Library. Library Hi Tech.
·         Tang, Q., Zhao, Z., & Xu, J. 2008. The Economic Analysis of DRM and Unauthorized Copying. Information Systems Research.
·         Barni, M., Bartolini, F., & Piva, A. 2001. Improved Wavelet-Based Watermarking Through Pixel-Wise Masking. IEEE Transactions on Image Processing
·         Horbach, M., & Rust, C. 2003. A General Digital Rights Management Architecture. Proceedings of the 6th International Workshop for Database Programming Languages.
·         Hardt, D. 2012. The OAuth 2.0 Authorization Framework. RFC 6749.
·         Cox, I. J., Miller, M. L., & Bloom, J. A. 2002. Digital Watermarking and Steganography. Morgan Kaufmann.
·         Varian, H. R. 2005. Copying and Copyright. The Journal of Economic Perspectives, 19(2), 121-138
·         Lessig, L. 2004. Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity. Penguin Press
·         Huang, X., & Joseph, D. 2013. Analyzing the Kindle Ecosystem Through Library Data. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), 9(1), 4.
·         Goldberg, I., Wagner, D., Thomas, R., & Brewer, E. 1996. A Secure Environment for Untrusted Helper Applications. Proceedings of the 6th USENIX Security Symposium.
·         Furnell, S., & Warren, M. 2007. Secure Digital Rights Management: Protecting Digital Content. Gower Publishing Ltd.
·         Russinovich, M., & Solomon, D. 2006. Sony, Rootkits and Digital Rights Management Gone Too Far. IEEE Security & Privacy, 4(1), 76-79.
·         Alexander, J. 2007. The Effect of DRM on the Sales of Console Games. Journal of Law and Economics, 50(2), 341-364.
·         Russell, S., & Norvig, P. 2016. Artificial Intelligence: A Modern Approach. Pearson Education.
·         Drahos, P., & Braithwaite, J. 2003. Information Feudalism: Who Owns the Knowledge Economy? Earthscan.
·         Lessig, L. 2004. Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity. Penguin Press.
·         Secker, J., & Morrison, C. (2018). Copyright education and training: Developing a framework for digital literacy. Journal of Information Science, 44(1), 34-54.
·         Dusollier, S. (2019). A DRM policy compliance mechanism: the use of standard setting to regulate technological measures protecting copyright. International Journal of Law and Information Technology, 27(3), 237-265.


[1] Auhtor, Student at Manav Rachna University
[2] Rosenblatt, B. (2001). Digital Rights Management: Business and Technology. IEEE Transactions on Consumer Electronics, 47(1), 167-171
[3] Samuelson, P. (2003). DRM {and, or, vs.} the Law. Communications of the ACM, 46(4), 41-45
[4] Copyright, Designs and Patents Act, 1710
[5] Berne Convention for the Protection of Literary and Artistic Works, 1886
[6] Goldstein, P. 2001. Copyright's Highway: From Gutenberg to the Celestial Jukebox. Stanford University Press.
[7] Digital Millennium Copyright Act, 1998
[8] WIPO Copyright Treaty, 1996
[9] European Union Copyright Directive, 2001
[10] Copyright Law of the United States of America, 1976
[11] Copyright, Designs and Patents Act, 1988
[12]Huang, H., & Fang, Y. 2008. DRM Interoperability in the Digital Library. Library Hi Tech.
[13] Tang, Q., Zhao, Z., & Xu, J. 2008. The Economic Analysis of DRM and Unauthorized Copying. Information Systems Research.
[14] Barni, M., Bartolini, F., & Piva, A. 2001. Improved Wavelet-Based Watermarking Through Pixel-Wise Masking. IEEE Transactions on Image Processing
[15] Horbach, M., & Rust, C. 2003. A General Digital Rights Management Architecture. Proceedings of the 6th International Workshop for Database Programming Languages.
[16] Hardt, D. 2012. The OAuth 2.0 Authorization Framework. RFC 6749.
[17] Cox, I. J., Miller, M. L., & Bloom, J. A. 2002. Digital Watermarking and Steganography. Morgan Kaufmann.
[18] Rosenblatt, B. 2001. Digital Rights Management: Business and Technology. IEEE Transactions on Consumer Electronics.
[19] Varian, H. R. 2005. Copying and Copyright. The Journal of Economic Perspectives, 19(2), 121-138
[20] Lessig, L. 2004. Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity. Penguin Press
[21] Huang, X., & Joseph, D. 2013. Analyzing the Kindle Ecosystem Through Library Data. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), 9(1), 4.
[22] Rosenblatt, B. 2001. Digital Rights Management: Business and Technology. IEEE Transactions on Consumer Electronics.
[23] Goldberg, I., Wagner, D., Thomas, R., & Brewer, E. 1996. A Secure Environment for Untrusted Helper Applications. Proceedings of the 6th USENIX Security Symposium.
[24] Furnell, S., & Warren, M. 2007. Secure Digital Rights Management: Protecting Digital Content. Gower Publishing Ltd.
[25] Russinovich, M., & Solomon, D. 2006. Sony, Rootkits and Digital Rights Management Gone Too Far. IEEE Security & Privacy, 4(1), 76-79.
[26] Alexander, J. 2007. The Effect of DRM on the Sales of Console Games. Journal of Law and Economics, 50(2), 341-364.
[27] Russell, S., & Norvig, P. 2016. Artificial Intelligence: A Modern Approach. Pearson Education.
[28] Drahos, P., & Braithwaite, J. 2003. Information Feudalism: Who Owns the Knowledge Economy? Earthscan.
[29] Lessig, L. 2004. Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity. Penguin Press.

About Journal

International Journal for Legal Research and Analysis

  • Abbreviation IJLRA
  • ISSN 2582-6433
  • Access Open Access
  • License CC 4.0

All research articles published in International Journal for Legal Research and Analysis are open access and available to read, download and share, subject to proper citation of the original work.

Creative Commons

Disclaimer: The opinions expressed in this publication are those of the authors and do not necessarily reflect the views of International Journal for Legal Research and Analysis.