Home Random Page



Digital Rights Management

Suppose you purchase a music CD of your favorite recording group. Now you want to transfer the file to your computer, rip the best tracks, and transfer them to your portable audio player. But wait! That CD is copy protected and your computer CD drive won’t read it. You purchased the disk. Can’t you listen to the music on any device you choose? The answer is “yes” and “no”. Yes, copyright law gives you the right to make copies for your personal use and transfer works into a format that works on your equipment. However, the growing pervasiveness of digital rights management may curtail your ability to exercise these rights.

It is easy to copy digital material. Before the dawn of the digital age, copies produced by analog equipment, such as photocopiers and audio tape dubbing machines, were of considerably poorer quality than the originals. Copies of digital materials, however, are indistinguishable from the originals, and that factor has encouraged an alarming increase in software, music, and movie piracy.

The battle against piracy took shape as a concept called digital rights management (DRM), vigorously supported by Microsoft and backed by a host of industry leaders.

Today, digital rights management encompasses a variety of technologies implemented by copyright holders, such as record companies and software publishers, which restrict the usage of digital material. DRM systems address piracy by using a variety of technologies for manipulating data, media, devices, and transactions.

Software copy protection techniques include reading data written to places on a disk or CD-ROM that the drive cannot normally access, using hardware that must be plugged into the computer when the software is run, requiring a serial number during the installation process, and using Internet product activation that checks the validity of an installation. Most software copy protection schemes have proved to be costly for publishers or inconvenient for consumers.

Many consumers are not aware that they pay a surcharge for every blank audio tape or CD they purchase. Collected revenues from this surcharge go to music publishers to compensate recording artists for the fact that many people duplicate works without authorization.

Most of today’s music download sites encrypt music files and embed codes that limit the number of times they can be copied and the devices on which they can be played. Various formats used by different sites are not compatible with each other and require different players. Music from several different download sites cannot be compiled into a single playlist. It is becoming more common for music CDs to use play-protection technology designed to make the CD unusable in devices, such as computer CD-R drives, that can also be conveniently used for duplicating CDs. Consumers who purchase these protected CDs find that they cannot be copied to a computer hard disk, then ripped to produce an MP3 file for a portable audio player.

Commercial movie DVDs use CSS (Content-Scrambling System) encryption to make DVDs playable only on authorized DVD players equipped with decryption key circuitry. Movies purchases in the United States and Canada cannot be played on devices manufactured for the European or Asian markets.

Despite DRM technologies and the inconveniences imposed on consumers, digital piracy remains rampant. According to an article about digital rights management posted on Wikipedia, “To date, all DRM systems have failed to meet the challenge of protecting the rights of the rights holder while also allowing the use of the rights of the purchaser. None have succeeded in preventing criminal copyright infringement by organized, unlicensed, commercial pirates.”

Current DRM technologies do not seem able to distinguish between pirates and legitimate consumers. As a result, DRM technologies essentially pose restrictions on consumers that go beyond the intended limitations of copyright law.

The current status of DRM seems to conflict with the original intent of copyright law to allow consumers to manipulate and copy works for their own use. Can technology eventually offer a solution that prevents piracy, but allows individuals to exercise their rights to fair use of copyrighted materials?

What do you think?


1. Have you had trouble using software or music CDs because of copy protection?

2. In your opinion, do sites like the iTunes Music Store provide consumers with enough flexibility for copying files and creating playlists?

3. Are DRM technologies justified because of the high rate of piracy?


Final Test. Do the tasks in the following test.


1. The process of transferring a file from a remote computer to your personal computer is called ___.

2. Personal computer systems typically include the following devices EXCEPT ___.

a) a mouse b) a hard disk drive c) a CD-ROM d) a PDA

3. The stored program concept on a computer is the single most important characteristic that distinguishes a computer from other simpler devices such as a calculator. (True/False)

4. Which of the following tasks might you perform with application software?

a) locating data b) starting programs c) both a) and b)

d) creating and editing documents

5. Most computer systems use a(n) ___ as the primary input device.

a) monitor b) keyboard c) mouse d) floppy disk drive

6. Computers can be categorized by type, such as personal computers, handhelds and supercomputers. (True/False)

7. The computer system unit is the case that holds the main circuit boards, microprocessor, power supply and ___ devices.

8. A floppy disk drive is not considered a storage device. (True/False)

9. The __ is often referred to as the “brain” of the computer.

a) keyboard b) monitor c) central processing unit d) software

10. ___ refers to the symbols that represent facts, objects and ideas.


Projects. Choose and perform one of the projects given.

1. Although the Internet provides a global communications network, communication between people still depends on finding a common language. For this project, explore the Web and experiment with ways in which technology is being used to close the language gap. You might start at Google or Wikipedia and look at the selection of languages they offer. Chronicle your exploration, making sure to document the sites you visited. Present your conclusions about Internet use by non-English speakers in writing.


2. Whether you’re taking this course to fulfill a graduation requirement or to improve your career options take a few minutes to evaluate what you expect to gain from this course. Look though the units of this textbook and select the section that you think will be the most useful, interesting and the section that seams to be the least relevant to you. Incorporate your thoughts in two or three paragraphs.

Date: 2016-01-03; view: 715

<== previous page | next page ==>
doclecture.net - lectures - 2014-2021 year. Copyright infringement or personal data (0.002 sec.)