Human aspects of digital rights management: the perspective of content developers. [Conference Paper]
Favale, Marcelle; McDonald, Neil; Faily, Shamal; Gatzidis, Christos
Dr Shamal Faily email@example.com
Legal norms and social behaviours are some of the human aspects surrounding the effectiveness and future of DRM security. Further exploration of these aspects would help unravel the complexities of the interaction between rights protection security and law. Most importantly, understanding the perspectives behind the circumvention of content security may have a significant impact on DRM effectiveness and acceptance at the same time. While there has been valuable research on consumer acceptability (The INDICARE project, Bohle 2008, Akester 2009), there is hardly any work on the human perspective of content creators. Taking video games as a case study, this paper employs qualitative socio-legal analysis and an interdisciplinary approach to explore this particular aspect of content protection.
FAVALE, M., MCDONALD, N., FAILY, S. and GATZIDIS, C. 2015. Human aspects of digital rights management: the perspective of content developers. Presented at the 4th International workshop on artificial intelligence and IP law (AIIP 2015): the story(s) of copyright, 9 December 2015, Braga, Portugal.
|Presentation Conference Type||Conference Paper (unpublished)|
|Conference Name||4th International workshop on artificial intelligence and IP law (AIIP 2015): the story(s) of copyright|
|Conference Location||Braga, Portugal|
|Start Date||Dec 9, 2015|
|Deposit Date||Dec 8, 2021|
|Publicly Available Date||Dec 8, 2021|
|Keywords||Digital rights management (DRM); Video games; Computer games; User behaviour; User perspectives; Systems security; Access and authorisation|
FAVALE 2015 Human aspects of digital rights (CONFERENCE)
You might also like
Use-case informed task analysis for secure and usable design solutions in rail.
Visualising personas as goal models to find security tensions.
Evaluating privacy: determining user privacy expectations on the web.
Identifying implicit vulnerabilities through personas as goal models.
Contextualisation of data flow diagrams for security analysis.