Digital Rights Management (DRM)



| |

| (DRM) Digital Rights Management |

|An Annotated Bibliography |

| |

| |

| |

| |

| |

| |

| |

| |

| |

| |

| |

| |

| |

| |

| |

| |

| |

| |

| |

| |

| |

| |

|Carol DeFroscia |

|INFO 522: Information Access & Resources |

|Linda Marion,Instructor |

|August 29, 2010 |

| |

| |

| |

Introduction and Scope

The following bibliography contains information regarding Digital Rights Management, also known as DRM. Eighteen articles/case studies are discussed covering areas of DRM such as: music/the entertainment industries, verification, algorithms, mobile phones, distance learning/academic society, and other various issues. The articles were published from 2002-2010, and covered various countries throughout the world such as the United States, the UK, Italy, Taiwan, and Germany. I did limit the search to a more recent time period as technology is constantly changing. However, I did not want to limit the sources only to the United States as I wanted to show the importance of DRM and the impact it has upon everyone in the world. To locate my information, I utilized various databases such as: Library Lit. and Information Science (Full Text), Library and Info. Science Abstracts (LISA), Literature and Information Science (LISTA), Web of Science, and Dialog (File 15: AB/INFORM and File 99: Wilson Applied Science and Tech Abstracts) limited to Full Text articles only.

Description of Digital Rights Management (DRM)

“The term ‘digital rights management’ (DRM) was discussed at the Conference on Technological Strategies for Protecting Intellectual Property in the Networked Multimedia Environment in January 1994 (Graham, 1994). From the copyright perspective, the definition of DRM is to protect digital content (encryption), to control specific operations on the content (play, print, copy, save), and to limit the number of times a particular operation may be exercised on the content (e.g. view three times) (Davis and Lafferty, 2002). DRM consists of purchasing procedure, policy, rights attributes, utility, and rights management. Rights are described digitally, operated by an information system and authorized for use under a reasonable scope,”(Yu,2002).

Digital Rights Management Systems are contained within operating systems, program software, or the actual hardware of a device. With the use of some form of customized encryption, it allows the distributors of the electronic content to control the viewing access. DRM’s consist of two elements: 1). The enforcement of usage restrictions, and 2). The identification of intellectual property.

With the increase of computers in households, it made it convenient for consumers to convert original works and copy them illegally. Along with the Internet and file sharing tools, this made piracy much easier to achieve. The Digital Millennium Copyright Act of 1998 (DMCA) was an important milestone regarding digital content. However, it didn’t become highly addressed until the year 2000. In Gartner Group’s Timetable for DRM (adapted from Weintraub, 2001), it states that DRM follows a certain timetable: 2000: Education, 2001-2002: Early Adoption, 2003: Production of DRM Launches, 2004-2005: Growth and Maturity of DRM, 2006: Market Consolidation.

A recent article dated June 23, 2010, titled: U.S. to Target Music,Movie Piracy, found at , states: “ U.S. businesses alone estimate losses of billions of dollars annually due to piracy and counterfeiting of films, music, and consumer goods, and blame the illegal trade for U.S. job losses as well. The U.S. Trade Representative’s office has battled to close websites in Russia, China and other countries that sell pirated American music and films.”

Obviously, this is a global problem that is not going away.

The year 2002, with the DMCA not being enough to protect digital rights, was monumental in regards to Digital Rights Management developments. That year alone the FCC enacted Digital Broadcast Copy Protection, Representative Howard Berman created H.R. 5211 P2P Anti-Piracy Bill, Microsoft announced Palladium Project that would allow DRM into software and hardware, and Sen. Hollings introduced the Consumer Broadband and Digital Television Promotion Act (CBDTPA).

With all of the acts and progress DRM has made, there are still many problems that need to be solved regarding Digital Rights Management.

Literature Review

Although Digital Rights Management is quite a popular topic, “Studies devoted to DRM and Copyright Exceptions have noted, theoretically, its legal implications,” (Akester, 2009). A lot more research has been conducted on a similar topic “Fair Use” as opposed to Digital Rights Management; in terms of fair use, a digital copy is the same as a hard copy. Lastly, most studies regarding Digital Rights Management are devoted to the issues regarding it.

Most research in areas of Social Science tend to be Empirical (observational where one observes or tests real-life data: (i.e. Use of Case/Case Study) - both qualitative and quantitative and case study research is usually the most appropriate methodology to use in library studies. However, in my findings, most of the research regarding DRM has been more qualitative: subjective and data is less concrete. Two studies, Entries 8 and 17, are based on the Empirical Method. Two studies (Entries 2 and 11) used an Anthropological Method, which is also known as Participant-Observer Method. Entry 1 takes a Critical Information Studies Stance. Entry 9 takes an Efficient Methodology based in computational algorithm. Entry 10 uses a Semantic Web Otology which is also known as User-Driven Modeling, and Entry 14 is based on a Literature Review. The remainder is based on Case Studies/Use of Case Methodology.

In conducting my research, I found that most studies were conducted in aims to find a solution to a problem regarding Digital Rights Management. I also found that most of the research focused on the Music Industry with the invention of sites such as Napster and iTunes. However, Digital Rights Management affects so many categories, that I wanted to include various arenas of DRM as this is really a Global Concern. Research topics regarding Digital Rights Management in this bibliography include: Digital Rights Management & Film, Digital Rights Management & Music, Digital Rights Management & E-Books, Digital Rights Management & Documents (Enterprise Digital Rights Management), Digital Rights Management in the Academic World, Digital Rights Management & the Mobile Internet, Digital Rights Management & Archives, International Digital Rights Management, and Issues and/or Controversies/Digital Rights Management Opposition.

Anything multimedia- television, to web pages, to magazines, to movies- has become a major part of our lives. According to , multimedia is the integration of multiple forms of media. This includes text, graphics, audio, video, etc. An example would be a presentation involving audio and video. Software that includes sound, text, and animation is considered multimedia. CD’s and DVD’s are considered to be “multimedia formats”. Large volumes, real-time transmission, and peer-to-peer sharing, brings new requirements to Digital Rights Management systems. “DRM for transmission of multimedia contents is being regarded as the most severe and important issue among the wireless digital content distributors,” (Gunhee, Dongkyoo, Dongil, 2004). Even with the DMCA enacted in 1998, December 1999, was not a favorable year in regards to this matter. Over 500 people and 11 nations were sued by the DVD CCA (Content Control Association) due to misappropriation of trade secrets. Multimedia piracy is a problem for everyone and involves interdisciplinary collaboration involving consumer electronic industries, scientists and entertainment industry, and the information technology industry, to name a few.

“The role of DRM systems in the use of digital content is to enable business models where the creation, distribution, and consumption content are controlled. As such DRM permits the governance of multimedia content throughout the complete digital value chain,” (Rodriguez & Delgado, 2007). This sounds great in theory. However, the “older” DRM systems are failing and new systems are being put into effect. You can go online and access hundreds of sites dedicated to the removal of DRM systems. In a study done by Rodriguez and Delgado, 2007, computational algorithms were used to cease the encryption of current DRM systems.

. Although piracy and DRM failure and encryption are concerns in many multimedia arenas, most of the research focuses solely on the entertainment industry.

“According to the Distributed Computing Industry Association, the average number of users worldwide peer-to-peer networks has steadily increased from 4.32 million in September ’03 to 6.78 million in September ’04 to 9.28 million in September ’05, and estimated that it accounts for over one-third of total internet traffic.” (Currah, 2006).

This leads to one of the main problems in the film industry regarding Digital Rights Management, pirates. When I speak of pirates, I am not referring to the many characters of the Disney movie Pirates of the Caribbean. The website, defines pirates in the following ways:

–noun

1. a person who robs or commits illegal violence at sea or on the shores of the sea.

2. a ship used by such persons.

3. any plunderer, predator, etc.: confidence men, slumlords, and other pirates.

4. a person who uses or reproduces the work or invention of another without authorization.

5. Also called pirate stream . Geology . a stream that diverts into its own flow the headwaters of another stream, river, etc.

–verb (used with object)

6. to commit piracy upon; plunder; rob.

7. to take by piracy: to pirate gold.

8. to use or reproduce (a book, an invention, etc.) without authorization or legal right: to pirate hit records.

9. to take or entice away for one's own use: Our competitor is trying to pirate our best salesman.

–verb (used without object)

10. to commit or practice piracy.

To my surprise, the pirate I am referring to here was addressed and would be used #4 as a noun and used as a verb in numbers 6, 8 and 10.

The Digital Millennium Copyright Act (DMCA) established in 1998 is a Federal Law. This act makes it criminal to disseminate copyrighted materials. “For the last 10 years, the Entertainment Industry has been demanding an efficient mechanism for digital content protection,” (Damiani & Fugazza, 2007). However, there seems that no matter what the case, the industry cannot fight piracy and is leaning towards being more “DRM Free”. A major recording label, Warner Brothers gave anyone the right to use their recordings to make short videos or movies, and most likely other labels will be following suit. According to Currah, at least 2 billion Hollywood Films are acquired over peer-to-peer networks each year, and in the view of Hollywood Studios, every free download represents a lost transaction which results in theft of expensive creative property (2006). The amount of revenues actually lost due to piracy is inconsistent with each other. However, they do have one thing in common- the studies show they all have a loss of profits. Those in the industry agree, that the business model of the film industry needs to change to one that embraces the Internet and web-based technologies in order to deter pirates, as consumers demand cheap, easy, and fast access.

Another area of concern that is also part of the multimedia world , is Digital Rights Management in the music industry.

“The Recording Industry Association of America (RIAA) (2009) estimates that music sales declined from $13.7 billion in 1998 to $8.5 billion in 2008. The music industry has been unequivocal in blaming this trend on online piracy,” (Minha,Machado,&Sellman,2010).

Most will agree that DRM has failed to prevent piracy and protect content, but also pushed away consumers. In the 90’s, CD sales were at an all time high, ranging from approximately $500 million in 1995 to over $750 million in 1999. It seemed from this point , the music industry was not prepared for the 21st Century. Digital music sales were non-existent until 2002, and even then, were a little slow to start.”Cumbersome restrictions imposed by DRM have contributed to the slow growth in digital music sales,” (2010, page 41). The first portable MP3 player was the Diamond Rio. The RIAA filed suit and stated:

“We filed this lawsuit because of unchecked piracy on the Internet threatens the development of a legitimate marketplace that consumers want.”

Consumers wanted digital music, and in 2001 we had the introduction of the Apple iPod. At this point, lawsuits were running rampant, and a lawsuit was even filed on a 12-year-old girl who was sued for illegal music downloading. From that point on things went from bad to worse. Piracy, it seems, will never have an end. The problem isn’t going away, but the research concludes that DRM in the music industry needs to take on a different, more compatible, sophisticated format.

“We find that the recent trend toward reducing DRM controls may actually increase overall revenues for digital music while reducing the number of consumers that might be classified as hardcore pirates,” (2010, page 51).

Another area of concern that is part of the multimedia family is Digital Rights Management and E-Books.

“E-Books have encouraged many major book publishers to put more resources into the area of protecting content. The issues relate not only to technology and the law, but also to issues of social acceptance and creating a system that is so acceptable to users, so that there is little incentive to cheat,” (Heather, 2005).

Digital Rights management in this arena was initially created to create a trust between the authors and consumers. Although E-Books, in theory, seemed to be a stupendous idea, it seems it has been tainted by aggressive DRM. A new restriction in the Digital Millennium Copyright Act states that it will now be LEGAL in the USA to remove the DRM from an E-book to allow read-aloud functions. The trend has been one similar to other entertainment industries- offer DRM free products. In fact, one bookseller- - states,

“When you buy an E-book through , you get lifetime access to the book, and whenever possible we provide it to you in four, DRM-free file formats — PDF, .epub, Kindle-compatible .mobi, and Android .apk — that you can use on the devices of your choice. Our E-book files are fully searchable, and you can cut-and-paste and print them. We also alert you when we've updated the files with corrections and additions.”

And wouldn’t you know that Oreilly’s sales increased by an astounding 104% when they decided to drop its DRM! In addition to use restrictions, another major issue is that there is no open book format. Meaning with all of the E-Readers available out there, the formats are not all compatible with each other, and each E-book purchased is limited to one reader. Therefore, through the research, one can thus conclude,

“For the E-book industry to thrive, the industry itself needs to address many difficult and complex problems from DRM to content to standards,” (Heather, 2005).

Manager of Apple collects $1 million for stealing trade secrets from Apple and selling them to Chinese companies; the world’s largest toy company, Mattel, was accused of sneaking into trade shows to steal rival toy company, MCA’s, secrets regarding the Bratz doll as Mattel believes the doll was created by a former employee (during his employment with Mattel) who is now working for MCA; HP hit with a lawsuit for allegedly stealing trade secrets about used printer cartridges from Turbon International; Motorola sues Huewai of allegedly stealing cellular networking gear trade secrets. All of these situations have something in common which lead to yet another issue in regards to Digital Rights Management- Enterprise DRM- also known as E-DRM, ERM, or IRM (Information Rights Management); this area relates to corporate documents and/or “trade secrets” such as (but not limited to) Microsoft Word, PDF, e-mails, contracts, and intranet documents.

“Enterprise DRM is currently being used, for example, in inter-enterprise exchange with modest security requirements. We believe that such applications can and will drive the need for more sophisticated Enterprise DRM solutions,” (Sebes & Stamp, 2007).

Those few examples I provided of lawsuits involving the theft of “trade secrets” are just a small percentage of the many that are out there. However, because there has never been any system in place to secure these documents or systems that offer very little security, there is little research done on E-DRM.

In April 2008, a lawsuit was filed against Georgia State University by three academic publishers who alleged that the university is not licensing its course readings proves that Digital Rights Management seems to be an issue in the Academic World as well. However, most studies conducted in this area seem to focus on the lack of consistency throughout the universities in terms of guidelines as to who owns the online course materials. Kelley, Bonner, & Pomea pointed out this issue when they stated in their research, “One of the reasons why the issue of copyright ownership of web based materials, most notably online courses, has been debated is because the legal basis for claiming ownership is somewhat unclear,” (2002).

According to Waters, 1998, “Digital libraries are organizations that provide the resources, including the specialized staff, to select, structure, offer intellectual access to, interpret, distribute, preserve the integrity of, and ensure the persistence over time of collections of digital works so that they are readily and economically available for use by a defined community or set of communities.”

Undeniably, it is much travail to create a digital library. The collection must first be digitized. Then the acquisition of the original digital work by publishers and scholars must be gathered. Copyright seems to be the largest barrier to the development of digital libraries and a task that one cannot take on solely. Bertot stated in his research, “When creating a digital library, DRM is of concern but additional outside sources will be needed to assist as the task would be too arduous for one to take on,” (2002). Research has shown that most DRM is indeed outsourced.

According to Tom Grubber, 1993,” ontology is a specification of a conceptualization.” They are social contracts that have explicit, agreed semantics that is understandable to outsiders. Semantic digital libraries integrate information using various metadata, operate with other systems (not just digital libraries), and empowered by semantics, makes searching and browsing more user-friendly. They extend digital libraries by exposing its resources to a ‘machine-readable’ format using Web Ontology Language. The idea behind semantic digital libraries is that the knowledge space is dynamic and collaborative.

“The OWL implementation of the Copyright Ontology integrates the legal and DRM aspects. Moreover, its particular approach makes an extensive use of OWL classes as patterns for rights, licenses and usages modeling. With this approach, it is possible to reduce checking uses against rights and licenses to computing class subsumption and instance classification. These computations are tractable and decidable in the context of Description Logics, a family of logics that includes OWL-DL, the OWL sublanguage employed during the implementation,” (Gonzalez & Gil, 2008).

Mobile Digital Rights Management, also known as MDRM, is another area of major concern. Just recently, on June 30, 2010, Google added DRM to the Android marketplace due to piracy. In addition, over a million iPhone owners have “jail broken” their phones which allows them to change wireless providers and download songs from sources other than iTunes. Obviously this is a problem that must be addressed. “The future information products will be increasingly protected by DRM systems and other technical measures,” (Pitkanen, Mantyla, Vialimaki, & Kemmpinen, 2003). As research has shown, more efforts are being made to include MDRM with wireless technologies.

In the area of Archiving, Digital Rights Management is yet another burden. The documents are usually older, and the key to unlock the DRM most likely no longer exists. Even though a library or archive has the copyright access to a piece of work, it still may be protected by copy control. Yu makes an excellent point when stated in the research:

“In order to avoid rights tort leading to lost profit and to manage the scope of authorized online processes, the content of digital archives must consider its relationship with rights management. From the physical material to the digital object, copyright is not the only category of rights,” (2007).

Many people maintain, actually, that copyright and DRM is creating a barrier in preserving history. In one study of a small sample of 30 licenses, only two publishers allowed archiving of the material.

International standardization and piracy are other areas of contention regarding Digital Rights Management. In 2001, an International case involving the arrest of a Russian programmer, Dmitry Sklyarov, was a highly publicized example of the consequences of anti-DRM measures. Nonetheless, it is still an issue as just this week, scene servers known as “Darkside” were arrested in Sweden due to piracy relating to Swedish and foreign movies. Lastly, different Intellectual Freedom Laws and Rights exist in different countries thereby causing issues between the exchanges of documents internationally. However, problems existed and exchange of documents was even ceased at some point between Germany and the United States as laws between countries do not exist homogeneously.

“Nothing in the U.S. statutes restrict U.S. libraries from sending or receiving articles from libraries in other countries, as long as other restrictions are observed.” (Seadle,2007).

Websites dedicated to abolish DRM exist throughout the Internet such as: , , , and - to name a few. Furthermore, the popular site YouTube has a plethora of videos regarding Anti-DRM demonstrations. Many feel DRM is a violation of our First Amendment Rights and privacy issues. Others feel that companies use it as a means to make more money by locking the competition. Just like anything, Digital Rights Management has it pros and cons, and it seems it will always have its issues. As Seadle stated in his research, “The technology race between infringers and rights holders will continue to evolve and provide interesting issues,” (2008).

Take use restrictions, for example, A major concern among students and researchers alike are use restrictions found in licensed scholarly journals. On one hand you have soft restrictions that discourage use, and on the other, you have hard restrictions that strictly prevent use. More often, soft restrictions exist and cause problems for many as well as cause the user much frustration. According to Eschenfelder, “If the user cannot ‘take’ the information in the form they want (print, save, e-mail), it has a negative impact on them,” (2008). Similarly, Foroughi, Albin, and Gillard states, “As DRM technologies evolve and develop, so does end user concern about restrictions to their access to and use of information,” (2002).

Much apprehension exists in regards to Privacy and Digital Rights Management. Many DRM systems track what users buy and force users to disclose personal information. This proves true as Pitkanen, Vitranen, and Kemppinen’s research states, “Although DRM is meant to ensure copyright protection, it often manages information about end users, their behavior, and their preferences. In addition, DRM technologies cannot completely protect data. It is always possible to circumvent the protection.” (2008).

We all use copyrighted materials, and therefore DRM affects us all in one way or another. With new technology such as Blu-Ray, E-Readers, Smart Phones, and the like, issues regarding DRM become more abundant. There seems to be a need for Digital Rights Management to become utilized where the abuse of copyright infringement needs to exist. Some solutions may be more lenient use restrictions, International digital “trade” laws, and perhaps more enforcement of piracy. It does not seem like there are any particular measures put into place, worldwide, to achieve this goal. The trend seems to be leaning towards “Free-DRM” products and services in hopes to achieve less infringement. As of yet, no research has been done on this trend, so we can only look towards the future to see the results.

Entry 1:

Eschenfelder, K. (2008). Every library's nightmare? digital rights management, use restrictions, and licensed scholarly digital resources. College & Research Libraries, 69(3), 205-25.

Search Method: Keyword and Controlled Vocabulary (thesaurus)

Database Searched: Library Literature & Information Science (Full Text)

Search Strategy: I selected this database first for several reasons. To begin with, this is one of the largest and oldest running indexes devoted to the field of libraries. In addition, this database has full text records of journals that are indexed and selected by an advisory committee.

A strength of this database is the thesaurus (controlled vocabulary) that has been custom built and is a guide to subject headings found throughout the database that produces the records using a hierarchy approach. Therefore, I used the thesaurus as my starting point.

In the thesaurus I used the phrase “Digital Rights Management”, which produced 303 records that I then limited to peer-reviewed journals, sorted by relevance- which it then narrowed to 31 records.

Abstract: This study explored use restrictions found in licensed scholarly resources from the fields of history/art history, engineering, and health sciences. The analysis developed a framework of use restrictions that distinguishes between soft restrictions -- which discourage use -- and hard restrictions -- which strictly prevent use. Soft restrictions include: extent of use, obfuscation, omission, amalgamation, frustration, and warning. The study concludes that these soft restrictions are relatively common in licensed scholarly resources. Further, while hard restrictions are less common, they are not unknown. The study questions whether librarians should be doing more to challenge use restrictions. (Author Abstract)

Critical Annotation: This study, employing a critical information studies stance, is based on whether or not “technological protection measures” (TPM) are necessary in networked environments to protect digital works- “hard restrictions” in particular. Furthermore, the study argues that academic librarians are overlooking existing use restrictions in licensed scholarly journals. The methodology of the study was un-biased, but did incur some limitations and issues. The author, Kristin R. Eschenfelder is Associate Professor in the school of Library and Information Studies at the University of Wisconsin-Madison.

Entry 2:

Seadle, M. (2007). Copyright in the networked world; international document delivery. Library Hi Tech, 25(2), 298-304.

Search Method: Keyword

Database Searched: LISA, Library & Information Science Abstracts

Search Strategy: Utilizing this database, I conducted an advanced search using the keyword= digital rights management. I chose keyword search because it searches the Abstract (AB), Descriptors (DE), Title (TI), and Identifier (ID) fields, which would produce more results. In addition, I searched all of the Social Science databases within LISA, and then limited the results to Peer-Reviewed Journals, sorted by Relevance Rank- which resulted in 125 records

Abstract: Purpose – This column seeks to look at the case of a long-standing project to arrange document delivery between US and German libraries. This case represents the broader problem of international document delivery. Design/methodology/approach – The primary methodology is anthropological. The column considers cultural and economic differences and assumptions, as well as differences between the law codes that enable document delivery. Findings – Document delivery is at least temporarily impossible from Germany to the USA owing to lawsuits and agreements within Germany. The introduction of Digital Rights Management (DRM) software into new agreements may lead to programs with seriously abbreviated rights for users. Originality/value – The case of US-German document delivery has particular importance because of the amount of research contact between the two countries and because of the substantial differences in their legal systems and their copyright laws. (Author Abstract)

Critical Annotation: This article analyzes the vast differences in Copyright laws between the United States and Germany and proves, by example that International exchanges need to be a higher priority, despite domestic issues. The German-North American Resources Partnership, experimented with International document exchange between the United States and German libraries, and several problems were encountered- accounting issues due to procedural differences and communication issues which led to a lawsuit that ceased document retrieval from Germany to the US. Agreements have been attempted since 2004, but the final agreement contained troubling language regarding Digital Rights Management that would hinder a user’s ability. I found this case study to be extremely biased as the author was a citizen of the United States and favored the United States “opinion” through various assumptions. Nonetheless, it exemplifies the International role and importance of Digital Rights Management. The author has written 42 published articles in the field of Library and Information Science, and 36 out of the 42 were published in scholarly journals.

Entry 3:

Yu, S. (2007). Constructing a drm framework for historical newspaper archives. The Electronic Library, 25(6), 778-779.

Search Method: Keyword

Database Searched: LISA, Library & Information Science Abstracts

Search Strategy: Utilizing this database, I conducted an advanced search using the keyword= digital rights management. I chose keyword search because it searches the Abstract (AB), Descriptors (DE), Title (TI), and Identifier (ID) fields, which would produce more results. In addition, I searched all of the Social Science databases within LISA, and then limited the results to Peer-Reviewed Journals, sorted by Relevance Rank; which resulted in 125 records.

Abstract: Purpose – The purpose of this study is to discuss the concepts of digital rights management (DRM) of archives of historical newspapers and the design of a DRM framework to render the content of historical news under the rights of authority. Design/methodology/approach – The paper takes the form of a literature review and system analysis. Findings – The rights management of digital objects involves various levels of application techniques and standards which are more complex than physical ones. This study combines the advantages of both tethered and untethered models to manage the digital rights of historical newspapers. It not only simplifies the management system, but also guarantees the rights when users use different platforms to present these digital objects. Originality/value – This study designs a simplified DRM framework to protect the rights of digitized contents and to practice the rights scope of online grant for a historical newspaper. (Author Abstract)

Critical Annotation: This study was conducted under a grant partially sponsored by The National Science Council of Taiwan and ascertains the importance of the International role of Digital Rights Management (DRM). The grant was to be used to create a database and design a framework for Digital Rights Management in regards to digitizing historical newspapers. The study’s findings seemed accurate as it was based on facts and laws and it provided supporting evidence through figures, examples, and definitions. The author, Shien-Chiang Yu received a MS degree in Library and Information Science from Fu-Jen Catholic University in 1997 and a PhD in Information Management from National Chiao-Tung University in 2003. He joined the Department of Information & Communications, Shih-Hsin University as an Associate Professor in 2003. He has also served as Director of Shih-Hsin University Library since 2004. His research interests include spatial databases, electronic commerce, information retrieval, and metadata.

Entry 4:

Andrew Currah.  (2006). Hollywood versus the Internet: the media and entertainment industries in a digital and networked economy. Journal of Economic Geography, 6(4), 439.

Search Method: Keyword

Database Searched: LISA, Library & Information Science Abstracts

Search Strategy: Utilizing this database, I conducted an advanced search using the keyword= digital rights management. I chose keyword search because it searches the Abstract (AB), Descriptors (DE), Title (TI), and Identifier (ID) fields, which would produce more results. In addition, I searched all of the Social Science databases within LISA, and then limited the results to Peer-Reviewed Journals, sorted by Relevance Rank; which resulted in 125 records.

Abstract: The behavior of oligopolistic firms is a source of considerable debate and concern, given their market power and ability to shape the development of new markets. A key area of debate concerns the scope for strategic adaptation in oligopolies; and in particular, the extent to which such large and otherwise successful firms ignore or marginalize important shifts in the

Marketplace. In this article, I critically evaluate these general theoretical issues through the lens of a specific, geographically bounded case study: the collision between Hollywood, a mature oligopoly comprising six studios, and the Internet, a decentralized architecture that has made possible peer-to-peer (P2P) file sharing between networked computers. I argue that in a

secure form (enforced by ‘digital rights management’ software), file sharing has considerable promise for all copyright owners, including the studios. I examine the oligopolistic behavior of the studios in response to the Internet, and in particular, their response to an alternative mode of peer based film distribution, oriented around legal, paid-for file sharing. I argue that

the studios are trying to preserve the oligopolistic structure of the industry in a digital age by promoting an inefficient and restrictive ‘design’ for Internet distribution, oriented around centralized server-client architectures, which provides tight control over digital commodities and minimizes the disruptive impact of the Internet. This behavior must be understood in

light of the social and economic incentives that influence executives, as well as the context in which decision-making takes place. Nonetheless, their response also raises some worrying questions about the future shape of creativity, distribution and consumption in the

Film industry (and in the broader realm of media and entertainment) in a digital and networked economy. The article is based on over 150 interviews with elites in the studios and other related firms in the Los Angeles region. (Author Abstract)

Critical Annotation: This article is based on a geographically bounded study between Hollywood, CA and the Internet. The sample is limited as it only meets with a specific population of a company (the studios) that does not represent the company as a whole. What about the shareholders who hold interest in that specific studio? The author argues that Peer-to-Peer (P2P) sharing via the Internet can prove to be a lucrative business for the media oligopolies (the studios) and that these oligopolies are trying to preserve control of the limited access of digital commodities by utilizing “overly protective” digital rights management technology. The arguments are justifiable but not well-supported as the author uses non-specific examples and biases towards his own opinion. However, there is significant, research- based information regarding the role of Digital Rights Management and its effects on consumers, the economy, and the film industry. The author, Andrew Currah is a Research Associate, Oxford Internet Institute, Faculty of Law, Social Sciences Division, University of Oxford and published 11 other articles, in which 7 are published in peer reviewed journals.

Entry 5:

Kelley, K., Bonner, K., McMichael, J.S., & Pomea, N. (2002). Intellectual property, ownership and digital course materials. Libraries and the Academy, 2(2), 255-266.

Search Method: Keyword

Database Searched: LISA, Library & Information Science Abstracts

Search Strategy: For this database, I conducted an advanced search using the keyword= digital rights management. I chose keyword search because it searches the Abstract (AB), Descriptors (DE), Title (TI), and Identifier (ID) fields, which would produce more results. In addition, I searched all of the Social Science databases within LISA, and then limited the results to Peer-Reviewed Journals, sorted by Relevance Rank; which resulted in 125 records.

Abstract: The Center for Intellectual Property (CIP) at the University of Maryland University College (UMUC) conducted a study of the intellectual property policies of seventy-nine two- and four-year academic institutions to identify their copyright ownership policies for digital course materials (sometimes referred to as "courseware"). The purpose of the study was to determine: 1) how copyright ownership rights were distributed between the faculty and their institutions, 2) whether separate or subordinate policies were used to clarify copyright ownership for digital course materials, 3) whether institutions used contracts and, if so to what extent, and 4) which policies were considered exemplary for the purpose of identifying "best practices" in the field.

Sixty-eight institutional representatives responded for a response rate of 86 percent. The study results indicate that most institutions have one overarching policy, contracts are in use at many institutions, policies are typically rather recent but are still considered inadequate by respondents, and separate or subordinate policies are rare although they do provide excellent information on how to address the ownership question successfully. (Author Abstract)

 Critical Annotation: This article is based on a study of digital course materials and the role of Digital Rights Management/Intellectual Property Rights in the academic world, mainly distance education. The survey sample was appropriate as it selected colleges with similar amounts of students enrolled in distance education courses. The same survey was given to all the samples, and the results are written and analyzed in a clear, concise, accurate manner- free from bias.. The survey results reveal that most institutions only have one Intellectual Property Policy and that policy is not solely based on coursework for Distance Education. The authors are all recognized in their field, and with the exception of James S. McMichael (who is a visiting scholar) hold positions at The Center for Intellectual Property (CIP) at the University of Maryland University College (UMUC), and they all have published 1 or more articles in scholarly journals.

Entry 6:

Fouroughi ,A., Albin, M., and Gillard, S. (2002). Digital rights management: a delicate balance between protection and accessibility. Journal of Information Science, 28(5), 389-395.

Search Method: Boolean/Phrase; Field Searching; Limiters; Expanders

Database Searched: Literature and Information Science (LISTA)

Search Strategy: I began this search by going to the Index Search Link. I then browsed using the author- supplied keywords field. I used Boolean Searching with the recommended terms: (ZW "digital rights management") or (ZW "digital rights management (drm)") or (ZW "digital rights management software"). That retrieved 43 results. I then limited the search to Scholarly (Peer-Reviewed) Journals and articles published between 2000-2010. The Library Literature and Information Science Database allows your searches to be limited to only scholarly journals, dates, and is provides the availability to many journals relating specifically to Library and Information Science.

Abstract: In the wake of the Digital Millennium Copyright Act of 1998, Digital Rights Management (DRM) systems are beginning to provide copyright protection for digital content placed software and game producers and business-to-business companies. Creators and providers of digital content are increasingly able to control end users’ use of, and accessibility to, their products, and stand to gain huge profits from this capability. However, as DRM technologies evolve and develop, so does end user concern about restrictions to their access to, and use of, information. The DRM industry must provide a balance between fair compensation for the creators of digital content and the rights of end users to access and use information (actual published abstract).

Critical Annotation: Written in 2002- eight years ago- not much has changed as far as the opinions of DRM are concerned. End user’s opinion then and now see it as a hindrance to accessibility and usability, yet copyright owners feel it is a necessity to ensure Intellectual Property Rights and fair compensation, regardless of the ease of access. Content analyses was used and the study aimed at providing approaches for a balance between the end user’s and the copyrighter’s needs. The authors are all professors of Computer Information Systems at the University of Southern Indiana and have written other articles in several publications and scholarly journals related to the field.

Entry 7:

Bertot, J. (2003). Building a statewide digital public library: a case study. Public Library Quarterly, 21(2), 5-33.

Search Method: Boolean/Phrase; Field Searching; Limiters; Expanders

Database Searched: Literature and Information Science (LISTA)

Search Strategy: I began this search by going to the Index Search Link. I then browsed using the author- supplied keywords field. I used Boolean Searching with the recommended terms: (ZW "digital rights management") or (ZW "digital rights management (drm)") or (ZW "digital rights management software"). That retrieved 43 results. I then limited the search to Scholarly (Peer-Reviewed) Journals and articles published between 2000-2010. The Library Literature and Information Science Database allows your searches to be limited to only scholarly journals, dates, and is provides the availability to many journals relating specifically to Library and Information Science.

Abstract: This article presents the results of a study undertaken for the state library of Maryland to develop a process, identify approaches, and identify considerations for the development of a Maryland Digital Public Library (MDPL). The article provides insights into the planning, management, and implementation requirements for such an undertaking that can apply to both individual public library digitization projects as well as regional and statewide digitization efforts. The article offers a framework for creating a statewide digital public library, identifies issues, and makes recommendations that public libraries, state library agencies, and others should consider when considering the development of digital public library content and services. (Author Abstract)

Critical Annotation- This article touched on digital rights management, a key issue planning the collection development process in relation to copyright, in a real-world environment (a statewide (Maryland), digital public library). The methodology was a case study approach using qualitative and quantitative data techniques such as focus groups, group interviews, and surveys that gave way to multiple perspectives; all results were tested and found reliable. In the case of digital rights management, the study proved that additional outside sources will be needed to assist in the area of copyright/ digital rights management as the task would be too arduous for current employees. The author, John Carlo Bertot, PhD, is Associate Professor and Associate Director, Information Use Management and Policy Institute, School of Information Studies at Florida State University.

Entry 8:

Akester,P. The impact of digital rights management on freedom of expression- the first empirical assessment. (2010). ILC-International Review of Intellectual Property and Competition Law, (41)1, 31-58.

Search Method: Boolean/Phrase (Topic); Field Searching; Limiters

Database Searched: Web of Science

Search Strategy: Web of Science is a database mainly used for citation searching. To start with, I utilized this database to conduct a search using the topic/phrase “digital rights management” or drm. I retrieved 1271 documents. From there, I refined the search by excluding anything in relations to psychology, as drm also has something to do with memory/fields of psychology. I also refined the search to exclude meeting abstracts, letters, book reviews, news items, and corrections or reviews. Furthermore, I limited the years to only include documents from 1998-present. Being Web of Science cannot be limited to only Scholarly Journals, I utilized Ulrich’s database to ensure the article was indeed from “peer-reviewed” source.

Abstract: The author was awarded a Leverhulme Research Fellowship (in association with funding from Emmanuel College, University of Cambridge) to undertake a project looking at the impact of digital rights management (DRM) on the ability of users to take advantage of certain statutory exceptions to copyright. The research filled an existing gap by unveiling, through empirical lines of enquiry, (1) whether certain acts which are permitted by law are being adversely affected by the use of DRM, in the United Kingdom, and (2) whether technology can accommodate conflicts between freedom of expression and DRM - linking, thus, policy recommendations to empirical findings. The survey concluded that although DRM has not impacted on many acts permitted by law, some beneficiaries of privileged exceptions are being adversely affected by the use of DRM and practical solutions are required. This article summarizes the findings of the project.(Article Abstract)

Critical Annotation: Through empirical research, a gap in research regarding drm (in the UK) has unveiled through a survey which concluded that technology can create conflicts between freedom of expression and DRM. The study focused on two groups- the educational community involved in distance learning and the visually impaired; the main question being: “is DRM preventing librarians, the visually impaired, private users, lecturers, students and researchers from carrying out certain acts that are permitted by law?” Which proved to be true through the study which used qualitative methods: interviews, surveys, and questionnaires? The sampling was random but relevant to the research questions. Since 2009, the author, Patricia Akester, is a member of the World Copyright Law updating team, a member of the Editorial Board of the Computer Law and Security Review, The International journal of Technology Law & Practice, President of the Portuguese group of the International Literary and Artistic Copyright Association. In 2006 she was awarded a Leverhulme Early Career Fellowship, and she is now a freelance researcher attached to the Centre for Intellectual Property and Information Law, Faculty of Law, University of Cambridge, where she also teaches.

| | | |

| |

| | | | | |

| |

| | | | | |

| |

| | | | | |

Entry 9:

Kim, G., Shin, D., & Shin, D. (2004). An Efficient methodology for multimedia digital rights management on mobile handset. IEEE Transactions on Consumer Electronics , 50(4), 1130-1134.

Search Method: Boolean/Phrase; Field Searching; Limiters; Citation Searching

Database Searched: Web of Science

Search Strategy: Web of Science is a database mainly used for citation searching. To start with, I utilized this database to conduct a search using the topic/phrase “digital rights management” or drm. I retrieved 1271 documents. From there, I refined the search by excluding anything in relations to psychology, as drm also has something to do with memory/fields of psychology. I also refined the search to exclude meeting abstracts, letters, book reviews, news items, and corrections or reviews. Furthermore, I limited the years to only include documents from 1998-present. Being Web of Science cannot be limited to only Scholarly Journals, I utilized Ulrich’s database to ensure the article was indeed from “peer-reviewed” source. The article in Entry 8, led me to this source which was found when I clicked on related records.

Abstract: Wireless multimedia streaming applications have been widely propagated with the rapid evolution of mobile handsets and wireless Internet technologies, especially

MPEG-4 video streams over wireless communication. We propose an efficient methodology for

Multimedia DRM which is applicable to the mobile terminal software. The methodology is comprised of the encryption methods on the media data that are encoded with MPEG-4

Video format. We constructed 3 methods, one is the way we can encrypt macro blocks(MBs) of I-VOP(Video Object Plane), another is P-VOP’s MBs encryption and the other is the

combination of these two methods. They are designed to DRM services for a wireless video streaming system without performance degradation that could be a burden to a mobile

handset, where there is inherently preferred system that costs for low-power, low-network bandwidth. We report competitiveness of these methods on the perspective of

performance evaluation with respect to the plain MPEG-4 files. (Author Abstract)

Critical Annotation: This paper experiments with solutions to the most prominent issues regarding the use of wireless technologies and the implications these technologies have on digital rights management, especially with VOP’s (video object planes)/MPEG-4 which have been widely propagated with the rapid evolution of handsets such as smartphones and the like. With the expansion of wireless bandwidths, more secure encryption is needed. Out of the four methods used, method 4 (combination of both I-,P- and B-VOPs encryption) proved to be the best method in regards to encryption but would also cost a lot to implement. The experiment, however, did not take into account how much memory it would use and the time it would take to implement. The study is un-biased as it focused on a technological aspect of DRM, which is based on the results of how the technology works. The authors are with the Department of Computer Science and Engineering in Seoul, Korea and are all experts in this area.

Entry 10:

Gonzalez, R.G., & Gil, R. (2008). Semantic copyright management for internet-wide knowledge sharing and reuse. Online Information Review, 32(5), 585-595.

Search Method: Boolean/Phrase; Field Searching; Limiters; Citation Searching

Database Searched: Web of Science

Search Strategy: Web of Science is a database mainly used for citation searching. To start with, I utilized this database to conduct a search using the topic/phrase “digital rights management” or drm. I retrieved 1271 documents. From there, I refined the search by excluding anything in relations to psychology, as drm also has something to do with memory/fields of psychology. I also refined the search to exclude meeting abstracts, letters, book reviews, news items, and corrections or reviews. Furthermore, I limited the years to only include documents from 1998-present. Being Web of Science cannot be limited to only Scholarly Journals, I utilized Ulrich’s database to ensure the article was indeed from “peer-reviewed” source. The article in Entry 8, led me to this source which was found when I clicked on related records.

Abstract: Purpose – To extract the full potential from internet-wide knowledge sharing and reuse, the underlying copyright issues must be taken into account and managed using digital rights management (DRM) tools. The paper aims to focus on the issues involved.

Design/methodology/approach – Traditional DRM and open licensing initiatives lack the required computerized support and flexibility to scale to internet-wide copyright management. Our approach is based on a semantic web ontology that conceptualizes the copyright domain.

Findings – The Copyright Ontology facilitates interoperation while providing a rich framework that accommodates copyright law and copes with custom licensing schemes.

Research limitations/implications – The ontology is based on the description logic variant of the

Web Ontology Language. Despite its scalability, this variant has some limitations on expression that will be overcome with the help of semantic web rules in future versions of the ontology.

Practical implications – The ontology provides the building blocks for flexible

machine-understandable licenses and facilitates implementation because existing semantic web

tools can be easily reused. Moreover, existing initiatives can be mapped to the ontology to make it an interoperability hub. Originality/value – The paper contributes a novel approach to DRM, based on semantic web technologies, that takes into account the underlying copyright legal framework. This is possible thanks to the greater expressiveness of semantic web knowledge representation tools. (Author Abstract)

Critical Annotation: When building an internet based, knowledge sharing network, copyright must be considered. This paper aims to explain the importance in classic and standard DRM as well as open access proposals, such as Creative Commons, through a semantic-web approach. The article is not only informative, but it also gives links to the websites they utilized to create their vision as well as facts and figures to give a better understanding of the concept, Copyright Oncology. With this, open access can be to meet the needs of reusable share-alike content, commercial or non-commercial, open or closed access, and more. Again, this study was based on technological results which are un-biased in nature. Both authors are professors at the University of Lliad, Spain, researchers in the field of Computer and Information Science, and have written several other articles on related topics in scholarly journals.

Entry 11:

Seadle, M. (2008). Copyright in the networked world: the technology of enforcement. Library Hi Tech, 26(3), 498-504.

Search Method: Boolean/Phrase; Field Searching; Limiters; Citation Searching

Database Searched: Web of Science

Search Strategy: Web of Science is a database mainly used for citation searching. To start with, I utilized this database to conduct a search using the topic/phrase “digital rights management” or drm. I retrieved 1271 documents. From there, I refined the search by excluding anything in relations to psychology, as drm also has something to do with memory/fields of psychology. I also refined the search to exclude meeting abstracts, letters, book reviews, news items, and corrections or reviews. Furthermore, I limited the years to only include documents from 1998-present. Being Web of Science cannot be limited to only Scholarly Journals, I utilized Ulrich’s database to ensure the article was indeed from “peer-reviewed” source. The article in Entry 8, led me to this source which was found when I clicked on related records.

Abstract: Purpose – This column aims to examine the influence of technology on copyright infringement and looks at the contemporary technology race between tools for rights enforcement and tools for copying and sharing.

Design/methodology/approach – The method is fundamentally anthropological with strong

consideration given to reports contemporary behaviors in law cases and news reports.

Findings – The findings suggest that rights-holder organizations like the Recording Industry

Association of America are learning how to apply technology more effectively to their policing efforts. This could significantly alter the risk of infringement.

Originality/value – Technology has long been recognized as a key factor in enabling copyright

infringement. Some new technologies attempt to restrict copying (e.g. Digital Rights Management software). Now internet software is being used systematically for discovery and policing. (Author Abstract)

Critical Annotation: This article looks at three factors: copyright, distribution, and sales technologies, in regards to public infringement, and how the copyright holders are concerned about the negative economic consequences. Again, this is especially troubling as far as multimedia (movies and music, in particular) is concerned. The article also touches on the history of copyright and how technologies have caused many changes, but copyright has almost stayed the same as it was originated for written text. This papers findings focus on facts- reports, law cases, and news reports. The findings state that companies such as the Recording Industry Association of America, are finding the means to restrict copying- such as Digital Rights Management- and utilizing tools for detection and policing. The author, Michael Seadle, is the Editor of Library Hi Tech and a professor/director at Humboldt University in Berlin, Germany, at the Institute for Library and Information Science.

Entry 12:

Rodriguez, E., & Delgado, J. (2007). Verification algorithms for governed use of multimedia content. Online Information Review, 31(1), 38-58.

Search Method: Boolean/Phrase; Field Searching; Limiters; Citation Searching

Database Searched: Web of Science

Search Strategy: Web of Science is a database mainly used for citation searching. To start with, I utilized this database to conduct a search using the topic/phrase “digital rights management” or drm. I retrieved 1271 documents. From there, I refined the search by excluding anything in relations to psychology, as drm also has something to do with memory/fields of psychology. I also refined the search to exclude meeting abstracts, letters, book reviews, news items, and corrections or reviews. Furthermore, I limited the years to only include documents from 1998-present. Being Web of Science cannot be limited to only Scholarly Journals, I utilized Ulrich’s database to ensure the article was indeed from “peer-reviewed” source. The article in Entry 8, led me to this source which was found when I clicked on related records.

Abstract: Purpose – The purpose of this paper is to present different verification algorithms that will be used by digital rights management (DRM) systems to enable the governed distribution, super-distribution and offers of multimedia content. An issue of increased interest in DRM systems is the control of the creation, distribution and consumption of multimedia content through the complete digital value chain.

Design/methodology/approach – The design and implementation of verification algorithms

based on licenses is described. Tools implementing these algorithms are used by DRM systems in B2B and B2C models where the distribution, offer and consumption of digital assets are controlled. Some use cases regarding the distribution, super-distribution and offer models are presented.

Findings – It has been demonstrated that DRM systems governing the use of multimedia content

through the complete distribution chain can use the verification algorithms proposed in this paper to enable governed distribution of multimedia content. By using these algorithms, they can determine whether the rights have been passed in a proper way from parent to child licenses. Moreover, these systems can also enforce the rights when distributing multimedia content.

Originality/value – The algorithms proposed can be used by DRM systems that control the use of

multimedia content through the complete digital value chain. These algorithms have been designed to ensure that the permissions and constraints passed from parent to child licenses have been done according to the terms determined by content creators or distributors. (Author Abstract)

Critical Annotation: Three different ways of sharing governed multimedia content are addressed in this paper: algorithms that are used with Digital Rights Management programs that will allow it to be seen if the rights have been passed from parent to child in the proper way as well as enforce the rights during the distribution of multimedia content, infinite re-distribution and offers, and distribution. Use cases were the methodology used to prove the researchers’ hypothesis. The findings were all proven and accurate using facts, figures, demonstrations, and case scenarios. The authors, Eva Rodriguez and Jamie Delgado are professors at the University of Barcelona, Spain in the Department of Computers and Architecture. They have both also written other valuable articles in the subject of DRM in other scholarly journals.

.

Entry 13:

Damiani, E., & Fugazza, C. (2007). Toward Semantics-aware management of intellectual property rights. Online Information Review, 31(1), 59-72

Search Method: Proximity, Keyword, Boolean, Controlled Vocabulary (Descriptors), and Field Searching

Database Searched: Dialog, File 15: ABI/INFORM

Search String: = S Digital(w)Rights(w)Management/AB and studies/DE (Descriptor).

Search Strategy: This search in Dialog consisted of utilizing the Search Options Tab, and then searching all databases that included an Abstract (AB). Again, I used this database in hopes of finding something different as I had already searched many of the other databases individually. Once I found an article that met the research criteria, I used to ensure the information was from a peer-reviewed (scholarly) journal.

Abstract: Purpose – The purpose of this paper is to introduce the advantages of semantics-aware representation formalisms in the integration of digital rights management (DRM) infrastructures grounded on heterogeneous formats.

Design/methodology/approach – After discussing the notion of semantics-aware IPR and its

relationship with Semantic Web-style metadata, we exemplify the advantages of adopting it by

providing two different use cases. XML-based DRMLs are mapped with a shared ontology-based representation in such a way that dependencies between elements can be drawn.

Findings – Individual formalisms may take advantage of a semantics-aware infrastructure to check consistency of DRM policies according to dependencies not explicit in the specification language. On the other hand, distinct formalisms can be integrated with each other according to fine-grained translation mechanisms.

Originality/value – Inference procedures can pre-process this knowledge base and derive implicit

knowledge that can be used by programming logic in the actual enforcement of DRM policies. (Author Abstract)

Critical Annotation: In this article, two cases were presented and studied regarding the advantages of a more efficient means for digital rights management and protection. The Internet causes information to be highly vulnerable and the use of information to be unauthorized. These case studies were put into place due to piracy, forgery, defacement, and distribution of any content in digital form has become a major problem. With this study’s findings, new policies for DRM environments are currently being developed. These studies took on a technological piece of DRM, and therefore are based on the results of the use of the technology. The authors are both professors of the University of Milan, Italy and work in the Department of Information Technology and have both written several other peer-reviewed papers on similar topics.

Entry 14:

Heather, NK. (2005). The E-book industry today: a bumpy road becomes an evolutionary path to market maturity. Electronic Library, 23(1), 45-53.

Search Method: Boolean/Phrase; Field Searching; Limiters; Citation Searching

Database Searched: Web of Science

Search Strategy: Web of Science is a database mainly used for citation searching. To start with, I utilized this database to conduct a search using the topic/phrase “digital rights management” or drm. I retrieved 1271 documents. From there, I refined the search by excluding anything in relations to psychology, as drm also has something to do with memory/fields of psychology. I also refined the search to exclude meeting abstracts, letters, book reviews, news items, and corrections or reviews. Furthermore, I limited the years to only include documents from 1998-present. Being Web of Science cannot be limited to only Scholarly Journals, I utilized Ulrich’s database to ensure the article was indeed from “peer-reviewed” source. The article in Entry 8, led me to this source which was found when I clicked on related records.

Abstract: Purpose – To provide a snapshot picture of the current e-book industry from the perspectives of various key individuals in the industry.

Design/methodology/approach – Over 20 interviews were conducted following an extensive

review of the published literature and examination of product/technical information.

Findings – The interviews revealed varying opinions on the current state of the industry and even on the definition of the e-book industry itself. Key issues identified include: standards, digital rights management, content availability, pricing, device/reader technology, integration and market development.

Research limitations/implications – This industry is still relatively young, generally marking its

beginnings in 2000; however, its early years have been marked by market hype, investor fallout and slow market development. Today’s industry is at a pivotal point: can obstacles to maturity be

overcome or will the industry be either subsumed by the larger consumer electronics or web-based industries?

Practical implications – Information professionals may find these perspectives useful in framing

their own applications of e-book technology in their planning for future technology, collections and services.

Originality/value – The interviews, generally conducted with the understanding that comments

and other key competitive information would remain unattributed, provide an insider’s look at a

technology and industry developing in a larger arena of rapid technological and market change.(Author Abstract)

Critical Annotation: This article/study can really make one realize how much technology can advance in such a short period of time. This article written only five years ago, obviously did not see that advancement that e-books would have in just five short years. It seems in 2005, many e-books were not available as nothing was really in place as far as digital rights are concerned. This study conducted 20 interviews that had varying results regarding the future of e-books which focused on qualitative data? However, this article omits the type of sample- random or non-random? What were the question forms and wording the interviewees were asked? Were the results reliable? Were all the interviewers asking the same questions in the same way? Too much information has been left out to truly reveal the research findings. The author, Nancy K. Herther, is a writer, consultant, and a librarian at the University of Minnesota and has 25 years experience in the library/information and computer fields.

Entry 15:

Pitkanen, I., Mantyla, M., Valimaki, M., & Kemppinen, J. (2003). Assessing legal challenges on the mobile internet. International Journal of Electronic Commerce, 8(1), 101-120.

Search Method: Boolean/Phrase; Field Searching; Limiters; Citation Searching

Database Searched: Web of Science

Search Strategy: Web of Science is a database mainly used for citation searching. To start with, I utilized this database to conduct a search using the topic/phrase “digital rights management” or drm. I retrieved 1271 documents. From there, I refined the search by excluding anything in relations to psychology, as drm also has something to do with memory/fields of psychology. I also refined the search to exclude meeting abstracts, letters, book reviews, news items, and corrections or reviews. Furthermore, I limited the years to only include documents from 1998-present. Being Web of Science cannot be limited to only Scholarly Journals, I utilized Ulrich’s database to ensure the article was indeed from “peer-reviewed” source. The article in Entry 8, led me to this source which was found when I clicked on related records.

Abstract: This article describes some legal challenges related to information products

and services on the mobile Internet and the World Wide Web. Using a scenario-based

methodology, it describes the future mobile Internet and explains how information products

and services would be used on it. A systematic method is used to build the scenarios.

As the problems likely to emerge are very complex, the scenarios take into account several

major factors that delineate the mobile Internet and its use—not just technological

changes and economic factors, but societal issues and how individuals feel and behave.

The scenarios make it possible to identify the kinds of legal challenges that are likely to

emerge. Analysis of the scenarios indicates that intellectual property rights, privacy, and

contracts are the legal areas most likely to involve challenges on the mobile Internet. (Author Abstract)

Critical Annotation: This is another study based on technological, systematic results built upon factual data regarding legal challenges-such as digital rights- via the mobile internet. In addition, it used scenario-based methods to determine areas for future research. The challenges in this article come from the point-of view of content providers, device vendors, operators, and end-users. In each scenario various aspects, including intellectual property/digital rights, were studied and discussed. The results did not provide a formal validity, but rather a means for the stakeholders to understand the operational relevance. All four authors hold various library and information science positions at the Helsinki Institute for Information Technology and have written other articles on similar subjects in peer-reviewed journals.

Entry 16:

Pitkanen, I, Virtanen,P., & Kemppinen, J. (2008). Legal research topics in user-centric services. IBM Systems Journal, 47(1), 143-152.

Search Method: Proximity, Keyword

Database Searched: Dialog, File 99:Wilson Appl. Sci & Tech Abs 1983-2010/May

Search String: SS Digital(w)Rights(w)Management

Search Strategy: I started my search in Dialog using the Dialog Database Subject Categories: Science- Engineering and Technology (File 99). I started with this database as opposed to a Library and Science Database because I had previously utilized most of the databases found in Dialog on an individual basis. Once I found an article that met the research criteria, I used to ensure the information was from a peer-reviewed (scholarly) journal.

Abstract: There are several essential legal topics that must be included in the research agenda of service science. In this paper, we discuss these topics, beginning with an analysis of the definition of a service and a categorization of some of the actors in service systems, with their diverse interests. A set of case studies and scenarios is presented to illustrate the kinds of legal challenges that are involved in providing user-centric and customer-oriented services. We conclude by suggesting the most important legal topics that should be studied further in relation to service science.

Critical Annotation: In this article, case studies and scenarios are presented to assist in the analyzing the legal challenges service systems have. The examples provided focus on user profiles and personal data. Intellectual Property Law and Data Protection Law pose legal issues in regards to DRM and copyright. It used four real-life scenarios and ensured that their DRM complied with data protection laws. Surprisingly most did; however, being that European Laws differ from U.S. laws, some modifications needed to be made to ensure compliance. Two of the same authors that wrote Entry 15 also wrote this article as well, again making them a valid source of information in the area of Digital Rights Management. The third author, is also an expert in the field and is a professor at the Helsinki Institute for Information Technology.

Entry 17:

Sinha, R.K, Machado, F.S., & Sellman, C. (2010). Don't think twice, it's all right: music piracy

and pricing in a drm-free environment . Journal of Marketing, 74(2), 40-54.

Search Method: Proximity, Keyword, Boolean, Controlled Vocabulary (Descriptors), and Field Searching

Database Searched: Dialog, File 15: ABI/INFORM

Search String: = SS Digital(w)Rights(w)Management/AB and studies/DE

Search Strategy: This search in Dialog consisted of utilizing the Search Options Tab, and then searching all databases that included an Abstract (AB). Again, I used this database in hopes of finding something different as I had already searched many of the other databases individually. Once I found an article that met the research criteria, I used to ensure the information was from a peer-reviewed (scholarly) journal.

Abstract: The music industry has widely viewed digital rights management (DRM) as an

effective strategy for reducing digital piracy. Digital rights management systems aim to prevent unauthorized copying and to reduce the overall rate of piracy. Therefore, the recent move toward offering DRM-free music by some major online music sellers appears paradoxical. In this article, the authors propose a model that conceptualizes and estimates the concept of hardcore piracy in an attempt to resolve this apparent paradox. Based on two large empirical studies and a validation exercise with a large sample of more 2000 college students, the model results indicate that the music industry can benefit from removing DRM because such a strategy has the

potential to convert some pirates into paying consumers. In addition, a DRM-free environment enhances both consumer and producer welfare by increasing the demand for legitimate products as well as consumers' willingness to pay for these products. The authors find that producers

could benefit by lowering prices from currently observed levels. The article concludes with a discussion of the practical implications of the findings for managers within the music industry. (PUBLICATION ABSTRACT)

 

Critical Annotation: The main reason I chose this article is its recent publication date, March 2010. In fields that are technology related, it is important to find recent information as technology is constantly changing. This article was very well written, based on facts from the data collected. The article contained 1 diagram, 6 charts, and 1 graph to assist in understanding the study’s results. Each sample population was analyzed, and the statistics proved that the populations surveyed were prone to purchasing music via digital means. There were two parts of this study. In both studies, each participant was given a paper and pencil questionnaire and an experimental task. However, the first study only pertained to favorite songs, and Study 2 consumers’ willingness to pay and piracy tendencies for favorite songs and songs that were not as preferred were assessed. The author Rajiv Sinha is Professor of Marketing and Leadership Board Advisor at the W.P. Carey School of Business at Arizona State University, holds a PhD from Pennsylvania State University, and has written several other related articles in scholarly journals. Fernando Machado is a Professor of Marketing at eh Universidad Catolica Portuguesa, holds a PhD in Agricultural Economics, and has also written several related articles in peer-reviewed journals. Collin Sellman is a doctoral candidate, holds an MBA from Arizona State University, and has similar research interests.

Entry 18:

Sebes, J.E., & Stamp, M. (2007). Solvable problems in enterprise digital rights management.

Information Management & Computer Security, 15(1), 33-45.

Search Method: Proximity, Keyword, Boolean, Controlled Vocabulary (Descriptors), and Field Searching

Database Searched: Dialog, File 15: ABI/INFORM

Search String: = S Digital(w)Rights(w)Management/AB and studies/DE

Search Strategy: This search in Dialog consisted of utilizing the Search Options Tab, and then searching all databases that included an Abstract (AB). Again, I used this database in hopes of finding something different as I had already searched many of the other databases individually. Once I found an article that met the research criteria, I used to ensure the information was from a peer-reviewed (scholarly) journal.

Abstract: Purpose - Digital rights management (DRM) is often promoted as the technical basis for solutions to enterprise security problems requiring persistent protection. Yet to date, DRM has failed to take hold within the enterprise sphere. This paper aims to examine some possible reasons for the slow adoption of enterprise DRM. Design/methodology/approach - It is argued that contrary to the common perception current DRM technology is sufficiently robust for use in enterprise applications. Then three problems that may serve as barriers to enterprise DRM adoption, namely, trustworthy authentication, access policy management and the lack of compelling enterprise applications that require DRM are discussed. Finally, brief examples are presented drawn from the real world that illustrate that the first two barriers can be overcome, and it is argued that regulatory compliance is the "killer app" that will drive enterprise DRM adoption. Findings - Finds, amongst other things, that technical weakness in enterprise DRM systems, especially regarding authentication and authorization, can be addressed with relatively simple mechanisms. Originality/value - This paper points up the need for more sophisticated enterprise DRM solutions. (PUBLICATION ABSTRACT)

 

Critical Annotation: Some significant barriers seem to exist in regards to enterprise data management. In this article three barriers are discussed, and the authors give real life scenarios of how two of the three barriers can be overcome. The authors had previously thought the consensus was that there was little in regards to enterprise data management due to technical constraints. However, they find that the barriers are mostly practical issues. In my opinion, this article is very biased. There is little data to understand how they concluded their findings. Nonetheless, it does give another area of study in regards to Digital Rights Management, as this article focuses on enterprise. John E. Sebes works for Integral Security Counseling, and Mark Stamp is a Professor at the Department of Computer and Information Science at San Jose State University and has written several other related articles in peer-reviewed journals.

Personal Statement

Research conducted regarding Digital Rights Management seems to evolve around the fundamental issues and challenges concerning it. In addition, very little research is conducted in a cross-disciplinary approach and this area of research could benefit from an integrated research framework since it involves so many different fields. Furthermore, more research needs to be done on harmonizing DRM technologies. Being we had to provide research only found in scholarly journals, it was difficult to obtain the point-of-view of average end-users, which would have provided a different, more realistic perspective.

Nonetheless, researching Digital Rights Management broadened my knowledge to the major issues surrounding it globally. I knew piracy existed, but I did not know to what extent. The amount of information regarding methods of circumvention and websites banning DRM was overwhelming. However, through this research, I was able to understand the perspective of those committing the act of piracy and those who are in the business to “earn a dollar”.

Besides gaining an abundance of knowledge in the subject area of Digital Rights Management, I gathered an agglomeration of information regarding searching. Working in a Middle School Library has not exposed me to databases such as Dialog, Web of Science, LISTA, LISA, Library Literature and Information Science, World Cat, and Ulrich. In addition, I was unaware of Controlled Vocabulary, Proximity, and Truncation. In order to excel in the field of Library and Information Science, I am aware of the importance of possessing this knowledge.

In writing the annotations, I realized that it is more than an abstract, which is just really a summary of the article and/or the findings. It takes the author and his/her point-of-view in to consideration. Using a scholarly journal, therefore, is of utmost importance as to ensure the author or authors are experts in the area they are researching about and/ or other scholars in that field have reviewed the article- which as a result, make it valid.

An annotated bibliography is often in list format with citations and short descriptions whereas the Literature review takes more of a holistic approach and is written like an essay. In writing the literature review, you are synthesizing and grouping the information you found in your research and placing a comparative/analytical approach on the research as a whole.

I have to be honest in saying that this was a very challenging assignment for me. Being it was mostly based on newly acquired knowledge (from the subject area content-DRM-to the searching methods and databases-to the format and style of writing), this paper literally took me the ten weeks of the semester to complete. I often sat up many, many evenings in attempts to find just the right article to include, often times finding-through Ulrich- that it was not published in a scholarly journal. Furthermore, I had a technological situation where I was a third the way through the paper, and my computer crashed, and I lost it all. This taught me an additional lesson- ALWAYS back up your data! In summary, I can say that I have obtained a wealth of knowledge and information that will be useful in the field, and I have a deep appreciation for the experience.

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download