Human aspects of digital rights management: the perspective of content developers. [Conference Paper]
Favale, Marcelle; McDonald, Neil; Faily, Shamal; Gatzidis, Christos
Legal norms and social behaviours are some of the human aspects surrounding the effectiveness and future of DRM security. Further exploration of these aspects would help unravel the complexities of the interaction between rights protection security and law. Most importantly, understanding the perspectives behind the circumvention of content security may have a significant impact on DRM effectiveness and acceptance at the same time. While there has been valuable research on consumer acceptability (The INDICARE project, Bohle 2008, Akester 2009), there is hardly any work on the human perspective of content creators. Taking video games as a case study, this paper employs qualitative socio-legal analysis and an interdisciplinary approach to explore this particular aspect of content protection.
FAVALE, M., MCDONALD, N., FAILY, S. and GATZIDIS, C. 2015. Human aspects of digital rights management: the perspective of content developers. Presented at the 4th International workshop on artificial intelligence and IP law (AIIP 2015): the story(s) of copyright, 9 December 2015, Braga, Portugal.
|Presentation Conference Type||Conference Paper (unpublished)|
|Conference Name||4th International workshop on artificial intelligence and IP law (AIIP 2015): the story(s) of copyright|
|Conference Location||Braga, Portugal|
|Start Date||Dec 9, 2015|
|Deposit Date||Dec 8, 2021|
|Publicly Available Date||Dec 8, 2021|
|Keywords||Digital rights management (DRM); Video games; Computer games; User behaviour; User perspectives; Systems security; Access and authorisation|
FAVALE 2015 Human aspects of digital rights (CONFERENCE)
You might also like
Privacy goals for the data lifecycle.
Automation and cyber security risks on the railways: the human factors implications.
Presentation / Conference
Assessing system of systems information security risk with OASoSIS.
Integrated design framework for facilitating systems-theoretic process analysis.
Cybersecurity user requirements analysis: the ECHO approach.