Neil McDonald
Digital rights management: the four perspectives of developers, distributors, users and lawyers.
McDonald, Neil; Faily, Shamal; Favale, Marcella; Gatzidis, Christos
Authors
Shamal Faily
Marcella Favale
Christos Gatzidis
Contributors
Steven M. Furnell
Editor
Nathan L. Clarke
Editor
Abstract
Digital Rights Management (DRM) refers to a collection of security mechanisms that are widely deployed on a number of copyright-protected digital assets. However, despite the existence of a number of studies of the technical architectures of rights management security systems, there is little scholarly/academic literature dedicated to the human aspects associated with circumvention of DRM security. Using videogames as a case study, this paper discusses how DRM is perceived differently depending on where one's stake in the use of DRM security lies. This paper concludes by proposing questions that could be used to aid content distributors and security practitioners in the creation of a fairer DRM framework.
Citation
MCDONALD, N., FAILY, S., FAVALE, M. and GATZIDIS, C. 2015. Digital rights management: the four perspectives of developers, distributors, users and lawyers. In Furnell, S.M. and Clarke, N.L. (eds.) Proceedings of the 9th International symposium on human aspects of information security and assurance (HAISA 2015), 1-3 July 2015, Mytilene, Greece. Plymouth: Plymouth University, pages 276-285.
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 9th International symposium on human aspects of information security and assurance (HAISA 2015) |
Start Date | Jul 1, 2015 |
End Date | Jul 3, 2015 |
Acceptance Date | May 11, 2015 |
Publication Date | Dec 31, 2015 |
Deposit Date | Dec 6, 2021 |
Publicly Available Date | Dec 6, 2021 |
Publisher | University of Plymouth |
Peer Reviewed | Peer Reviewed |
Pages | 276-285 |
ISBN | 9781841023885 |
Keywords | Digital rights management (DRM); Human computer interaction; Computer games; Video games; Systems security; Privacy; User perspectives |
Public URL | https://rgu-repository.worktribe.com/output/1446667 |
Files
MCDONALD 2015 Digital rights management
(298 Kb)
PDF
Copyright Statement
© Plymouth University
You might also like
Here's Johnny: a methodology for developing attacker personas.
(2011)
Presentation / Conference Contribution
Visualising personas as goal models to find security tensions.
(2021)
Journal Article
Eliciting policy requirements for critical national infrastructure using the IRIS framework.
(2011)
Journal Article
Assessing system of systems information security risk with OASoSIS.
(2022)
Journal Article
Towards tool-support for usable secure requirements engineering with CAIRIS.
(2010)
Journal Article
Downloadable Citations
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search