You are previewing Digital Rights Management.
O'Reilly logo
Digital Rights Management

Book Description

With the continuing growth of the digital media, digital rights management is essential to control the unauthorized distribution or use of digital files typically used by hardware manufacturers, publishers, and copyright holders.Digital Rights Management: Concepts, Methodologies, Tools, and Applications is a comprehensive volume of recent case studies, theories, research on digital rights management and its place in the world today. Its widespread research fields and areas of expertise serve as a reference source for practitioners and academics alike.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editor-in-Chief
    2. Associate Editors
    3. Editorial Advisory Board
  5. Preface
  6. Section 1: Fundamental Concepts and Theories
    1. Chapter 1: Legal Protection of the Web Page
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. DEFINITION OF DATABASE AND WEB PAGE
      5. FUTURE TRENDS
      6. CONCLUSION
    2. Chapter 2: Intellectual Property Systems in Software
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND: COPYRIGHTS AND PATENTS, TWO DIFFERENT SYSTEMS TO PROTECT SOFTWARE
      4. 3. TOWARD AN EUROPEAN PATENT-BASED SYSTEM?
      5. 4. FUTURE TRENDS
      6. 5. CONCLUSION
    3. Chapter 3: Legal Ontologies in ICT and Law
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FUTURE TRENDS
      5. CONCLUSION
    4. Chapter 4: Security in Service Oriented Architectures
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND
      4. 3. SOA SECURITY STANDARDS
      5. 4. SOA SECURITY: CHALLENGES AND MITIGATION STRATEGIES
      6. 5. FUTURE RESEARCH DIRECTIONS IN SOA SECURITY
      7. 6. CONCLUSION
      8. ACKNOWLEDGMENT
    5. Chapter 5: Digital Preservation Challenges, Infrastructures and Evaluations
      1. ABSTRACT
      2. 1 INTRODUCTION
      3. 2 OAIS REFERENCE MODEL
      4. 3. THREATS AND CHALLENGES
      5. 4. EFFECTIVENESS OF PRESERVATION EFFORTS
      6. 5. REQUIREMENTS FOR A SCIENCE DATA INFRASTRUCTURE
      7. 6. ROADMAP OF SOLUTIONS
      8. 7. CASPAR/DCC APPROACH
      9. 8. CASPAR CONCEPTUAL MODEL
      10. 9. PRESERVATION WORKFLOWS
      11. 10 CONCLUSION
    6. Chapter 6: DRM Protection Technologies
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SOLUTIONS, RECOMMENDATIONS, AND FUTURE DIRECTIONS
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    7. Chapter 7: Copyright and Digital Libraries
      1. ABSTRACT
      2. INTRODUCTION: COPYRIGHT LAW AS THE RESULT OF A RECONCILIATION BETWEEN DIVERGING INTERESTS
      3. CONCLUSION AND RECOMMENDATIONS
    8. Chapter 8: Law, Architecture, Gameplay, and Marketing1
      1. ABSTRACT
      2. PURPOSE
      3. GENERAL BACKGROUND
      4. HOW TO USE COUNSEL
      5. BUSINESS FORMS
      6. STATE REGULATION
      7. FEDERAL REGULATION
      8. GAME ACCESSIBILITY
      9. INTELLECTUAL PROPERTY
      10. REVERSE ENGINEERING AND DRM
      11. EMPLOYMENT CONSIDERATIONS
      12. END USER LICENSE AGREEMENTS
      13. ALTERNATE DISPUTE RESOLUTION
      14. USER GENERATED CONTENT AND THE PRINCIPLE OF SEVERABILITY
      15. SOFTWARE ARCHITECTURE AND LITIGATION SAVVY DEVELOPMENT
      16. THE MAGIC CIRCLE AND LUSORY ATTITUDE: DRAWING THE LINE BETWEEN LIFE AND PLAY
      17. PLAYER-ON-PLAYER CRIMES AND TORTS
      18. VIRTUAL PROPERTY
      19. TAX CONSIDERATIONS
      20. CONCLUSION
  7. Section 2: Development and Design Methodologies
    1. Chapter 9: EduPMO
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. LARGE SCALE MULTIMEDIA PRODUCTION
      5. FRAMEWORK PROPOSAL
      6. FUTURE TRENDS
      7. CONCLUSION
    2. Chapter 10: Hardware Implementations of Image/Video Watermarking Algorithms
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. DESIGN AND IMPLEMENTATION CHALLENGES
      5. HARDWARE IMPLEMENTATIONS OF IMAGE WATERMARKING
      6. HARDWARE IMPLEMENTATIONS OF VIDEO WATERMARKING
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    3. Chapter 11: Management, Monitoring and QoS in Multi-Cell Centralized WLANs
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FUTURE RESEARCH DIRECTIONS
      5. CONCLUSION
    4. Chapter 12: Ontology-Based Authorization Model for XML Data in Distributed Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. RESEARCH PROBLEM DESCRIPTION
      5. RELATED WORK
      6. SYSTEM ARCHITECTURE
      7. XML TO RDF MAPPING PROPERTIES
      8. DERIVATION OF XML ACCESS CONTROL POLICIES FROM RDF ONTOLOGIES
      9. FUTURE WORK
      10. CONCLUSION
      11. ACKNOWLEDGMENT
    5. Chapter 13: Geometric Distortions-Invariant Digital Watermarking Using Scale-Invariant Feature Transform and Discrete Orthogonal Image Moments
      1. ABSTRACT
      2. INTRODUCTION
      3. SOME SYSTEM PRELIMINARIES
      4. ORTHOGONAL POLYNOMIALS AND DISCRETE ORTHOGONAL MOMENTS FOR DIGITAL IMAGES
      5. WATERMARK EMBEDDING AND DETECTION METHODOLOGY
      6. RESULTS AND DISCUSSIONS
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    6. Chapter 14: Copyright and Ethical Issues in Emerging Models for the Digital Media Reporting of Sports News in Australia
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SPORTS NEWS REPORTING AND DIGITAL MEDIA
      5. SOLUTIONS AND RECOMMENDATIONS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    7. Chapter 15: An Access Control Framework for WS-BPEL Processes
      1. ABSTRACT
      2. INTRODUCTION
      3. INTRODUCTION TO WS-BPEL
      4. RBAC-WS-BPEL: AN AUTHORIZATION MODEL FOR WS-BPEL
      5. RBAC-XACML-AUTHORIZATION SCHEMA
      6. BCPL-BUSINESS PROCESS CONSTRAINT LANGUAGE
      7. RBAC-WS-BPEL AUTHORIZATION SPECIFICATION
      8. RBAC-WS-BPEL ENFORCEMENT
      9. RBAC-WS-BPEL SYSTEM ARCHITECTURE
      10. HANDLING <HUMANACTIVITY> ACTIVITY EXECUTION AND RBAC-WS-BPEL ENFORCEMENT
      11. RELATED WORKS
      12. CONCLUSION
      13. APPENDIX
    8. Chapter 16: Unravelling Intellectual Property in a Specialist Social Networking Site
      1. ABSTRACT
      2. INTRODUCTION
      3. RAVELRY
      4. INTELLECTUAL PROPERTY AND NETWORKED PRODUCTION
      5. MARKETS AND MECHANISMS WITHIN SPECIALIST SOCIAL NETWORKING SITES
      6. RAVELRY AND THE PARTICULAR CHARACTERISTICS OF ITS SPECIALTY AREA
      7. THE RAVELRY DISCUSSION BOARDS
      8. WHAT GOVERNS CONSUMER CHOICES
      9. CONCLUSION
    9. Chapter 17: Medium Access Protocols for Cooperative Collision Avoidance in Vehicular Ad-Hoc Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. PERFORMANCE ANALYSIS
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    10. Chapter 18: A Unified Approach towards Multimedia Watermarking
      1. ABSTRACT
      2. INTRODUCTION
      3. THE DWT AND SVD TRANSFORMS
      4. IMAGE WATERMARKING
      5. VIDEO WATERMARKING
      6. AUDIO WATERMARKING
      7. CONCLUSION
    11. Chapter 19: Data Hiding Schemes Based on Singular Value Decomposition
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. APPLICATION OF THE SVD TRANSFORM
      5. FUTURE RESEARCH DIRECTIONS AND CONCLUSION
  8. Section 3: Tools and Technologies
    1. Chapter 20: Advancement on Damage-Less Watermark Extraction Using Non-Linear Feature Extraction Scheme Trained on Frequency Domain
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. PROPOSED METHOD
      5. EXPERIMENTS AND FUTURE WORKS
      6. DISCUSSION AND FUTURE WORKS
      7. CONCLUSION
    2. Chapter 21: Improving the Information Security of Collaborative Web Portals via Fine-Grained Role-Based Access Control
      1. ABSTRACT
      2. INTRODUCTION
      3. SECURITY AND ITS LIMITATIONS
      4. BACKGROUND CONCEPTS
      5. SECURITY CAPABILITIES OF AXON
      6. RELATED WORK/FUTURE TRENDS
      7. CONCLUSION
    3. Chapter 22: Exploiting P2P in New Media Distribution
      1. ABSTRACT
      2. INTRODUCTION
      3. FRAMEWORK FOR ANALYSIS
    4. Chapter 23: Massively Threaded Digital Forensics Tools
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. TOWARD MASSIVELY THREADED TOOLS
      5. DETAILED CASE STUDIES
      6. FUTURE TRENDS
      7. CONCLUSION
    5. Chapter 24: Codec Adaptation for Wireless Multimedia Streaming
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FER BASED CODEC ADAPTATION
      5. SYSTEM MODEL
      6. CODEC ADAPTATION ALGORITHM
      7. PSNR ANALYSIS
      8. NUMERICAL RESULTS
      9. RSSI AND BANDWIDTH BASED CODEC ADAPTATION
      10. CODEC ADAPTATION BASED ON PHYSICAL LAYER INFORMATION
      11. CODEC ADAPTATION BASED ON NETWORK LAYER INFORMATION
      12. FURTHER RESEARCH DIRECTIONS
      13. CONCLUSION
    6. Chapter 25: Fednets
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. FEDERATION OF PERSONAL NETWORKS
      4. 3. LIFECYCLE AND ARCHITECTURE OF FEDNETS
      5. 4. ACCESS CONTROL AND MANAGEMENT FRAMEWORK FOR FEDNETS
      6. 5. OPERATION OF THE ACM FRAMEWORK
      7. 6. RELATED TECHNOLOGIES
      8. 7. CONCLUSION AND FUTURE TRENDS
    7. Chapter 26: Spread Spectrum Watermarking
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SPECIAL REQUIREMENTS OF HARDWARE DESIGN AND COMPLEXITY
      5. VLSI ARCHITECTURE OF SPATIAL DOMAIN SPREAD SPECTRUM WATERMARKING
      6. VLSI ARCHITECTURE OF FWT BASED SS WATERMARKING
      7. DIGITAL DESIGN OF BIORTHOGONAL WAVELET BASED HILBERT TRANSFORM
      8. HARDWARE DESIGN ASPECTS: CHALLENGES FOR WATERMARKING ALGORITHMS
      9. FUTURE RESEARCH DIRECTIONS
      10. CONCLUSION
    8. Chapter 27: Delay Constrained Admission Control and Scheduling Policy for IEEE 802.11e HCCA Method
      1. ABSTRACT
      2. INTRODUCTION
      3. THE REFERENCE DESIGN IN IEEE 802.11E HCCA METHOD
      4. BACKGROUND
      5. THE PROPOSED SCHEME
      6. MEAN QUEUEING DELAY ANALYSIS
      7. PERFORMANCE EVALUATION
      8. FUTURE RESEARCH DIRECTIONS
      9. CONCLUSION
    9. Chapter 28: Deterring Text Document Piracy with Text Watermarking
      1. ABSTRACT
      2. INTRODUCTION
      3. DIGITAL RIGHTS MANAGEMENT
      4. DIGITAL WATERMARKING
      5. WATERMARK COMPOSITION AND CLASSIFICATION
      6. DOCUMENT STRUCTURE AND COMPOSITION
      7. TEXT WATERMARKING ISSUES AND CHALLENGES
      8. BACKGROUND: WATERMARKING ALGORITHMS AND TECHNIQUES
      9. CLASSIFICATION OF TEXT WATERMARKING TECHNIQUES
      10. FUTURE RESEARCH DIRECTIONS
      11. CONCLUSION
    10. Chapter 29: QoS and Energy Saving Routing and MAC Mechanisms for Wireless Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. ENERGY AWARE PROTOCOLS FOR WIRELESS AD HOC NETWORKS
      5. PERFORMANCE RESULTS
      6. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
    11. Chapter 30: Two Spatial Watermarking Techniques for Digital Images
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. WATERMARKING TECHNIQUE FOR 2D IMAGES
      5. WATERMARKING TECHNIQUE FOR 3D IMAGES
      6. DISCUSSON AND CONCLUSION
  9. Section 4: Utilization and Application
    1. Chapter 31: Research on Open Innovation in China
      1. ABSTRACT
      2. 1. OPEN INNOVATION
      3. 2. THE THEORETICAL SUPPORT OF INTELLECTUAL PROPERTY RIGHT AND ITS OPERATION IN OPEN INNOVATION
      4. 3. OPEN INNOVATION AND COORDINATION MECHANISM OF INTELLECTUAL PROPERTY RIGHT AND ITS OPERATION IN CHINA
      5. 4. CONCLUSION
    2. Chapter 32: Internet-Based Protest in European Policymaking
      1. ABSTRACT
      2. INTRODUCTION
      3. HACKING EU POLICYMAKING
      4. INFORMATIONAL POLITICS
      5. ACCOUNTABILITY POLITICS
      6. DISCUSSION
      7. CONCLUSION
    3. Chapter 33: The Hellenic Framework for Computer Program Copyright Protection Following the Implementation of the Relative European Union Directives
      1. ABSTRACT
      2. INTRODUCTION
      3. THE RIGHT HOLDER
      4. THE FIELD OF PROTECTION
      5. THE RIGHTS OF THE RIGHT HOLDER
      6. CONSEQUENCES OF COPYRIGHT INFRINGEMENT (SANCTIONS)
      7. DURATION OF PROTECTION
      8. FINAL THOUGHTS: RECOMMENDATIONS
    4. Chapter 34: Practical Experiences and Design Considerations on Medium Access Control Protocols for Wireless Sensor Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. MEDIUM ACCESS CONTROL TRENDS AND SOLUTIONS
      4. TRAFFIC AWARENESS IN MEDIUM ACCESS CONTROL PROTOCOLS
      5. SPECTRUM AGILITY
      6. COEXISTENCE OF MEDIUM ACCESS CONTROL PROTOCOLS
      7. MULTI-RADIO MEDIUM ACCESS CONTROL PROTOCOLS
      8. WAKE-UP RADIO BASED SOLUTIONS
      9. CROSS-LAYER DESIGN ASPECTS
      10. PORTABLE MEDIUM ACCESS CONTROL DESIGN
      11. CONCLUSION
    5. Chapter 35: Computer Games and Intellectual Property Law
      1. ABSTRACT
      2. INTRODUCTION
      3. COPYRIGHT, COPYLEFT AND TRANSFORMATIVE USES OF SOFTWARE
      4. FREE USES AS COPYRIGHT INTERNAL LIMITATIONS
      5. SOME COMPUTER GAMES’ USER GENERATED DERIVATIVE WORKS THAT STRESS COPYRIGHT
      6. FUTURE TRENDS: WHICH (AND HOW) TRANSFORMATIVE USES MAY BE CONSIDERED LAWFUL?
    6. Chapter 36: Considering the Role of E-Government in Cybercrime Awareness and Prevention
      1. ABSTRACT
      2. INTRODUCTION
      3. A BRIEF OVERVIEW OF CYBERCRIME
      4. THE GOVERNMENT ROLE IN ADDRESSING CYBERCRIME
      5. E-GOVERNMENT IN THE WORKS: A THEORETICAL RESEARCH PROGRAM FOR THE 21ST CENTURY
    7. Chapter 37: Assessing Empirical Relations of Music Piracy Behaviors with Lifestyle and Internet Self-Efficacy of Taiwan’s Web Users
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. RESEARCH METHODOLOGY
      5. RESEARCH FINDINGS
      6. DISCUSSION AND CONCLUSION
      7. SUGGESTED FUTURE RESEARCH
    8. Chapter 38: Facilitating Access to Indian Cultural Heritage
      1. ABSTRACT
      2. INTRODUCTION
      3. INDIAN CULTURAL HERITAGE
      4. THE COPYRIGHT ACT 1957 AND CULTURAL HERITAGE
      5. DIGITAL PRESERVATION- LEGAL ISSUES
      6. BARRIERS TO ACCESS TO CULTURAL HERITAGE
      7. CULTURE HERITAGE IGNCA
      8. WHAT NEED TO BE DONE AT GOVERNMENT LEVEL
      9. OPEN ACCESS TO CULTURAL HERITAGE
      10. CONCLUSION
    9. Chapter 39: Indonesian Legal Perspectives on Biotechnology and Intellectual Property Rights
      1. ABSTRACT
      2. INTRODUCTION
      3. INDONESIAN LAW AND POLICIES ON BIODIVERSITY, BIOSAFETY, AND BIOTECHNOLOGY
      4. INTELLECTUAL PROPERTY RIGHTS ISSUES
      5. BIOPROSPECTING AND BIOPIRACY
      6. CONCLUSION
    10. Chapter 40: Biopharma Drugs Innovation in India and Foreign Investment and Technology Transfer in the Changed Patent Regime
      1. ABSTRACT
      2. 1 INTRODUCTION
      3. 2 RESEARCH QUESTIONS
      4. 3 METHODOLOGY
      5. 4 CASE STUDY
      6. 5 CONCLUSION
    11. Chapter 41: The Project of the Ancient Spanish Cartography E-Library
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. THE COPYRIGHT ENVIRONMENT IN THE ONLINE WORLD
      5. PROBLEMS AND SOLUTIONS
      6. FUTURE TRENDS
      7. CONCLUSION
    12. Chapter 42: Application of Error Control Coding for Multimedia Watermarking Technologies
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. CURRENT ART OF CHANNEL CODING WITH PERSPECTIVE TO WATERMARKING
      5. CONCLUSION
  10. Section 5: Organizational and Social Implications
    1. Chapter 43: Trustworthiness of Pervasive Healthcare Folders
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. A SECURE, PORTABLE MEDICAL FOLDER
      5. A SECURE, PERVASIVE MEDICAL FOLDER
      6. EXPRESSING PATIENT'S CONSENT
      7. EBAC: AN EVENT-BASED ACCESS CONTROL MODEL
      8. FUTURE WORK
      9. CONCLUSION
    2. Chapter 44: Fair Use, Copyright, and Academic Integrity in an Online Academic Environment
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FAIR USE IN ONLINE INSTRUCTION
      5. FUTURE TRENDS
      6. CONCLUSION
    3. Chapter 45: ELATEwiki
      1. ABSTRACT
      2. ELATE: EVOLVING AN E-LEARNING FACULTY WIKI
      3. INTRODUCTION
      4. AN ENVIRONMENTAL SCAN
      5. SOME OF THE RESEARCH LITERATURE
      6. METHODS
      7. WIKI MASTER METHOD AND ONTOLOGY
      8. RESULTS
      9. DISCUSSION
      10. FUTURE ELATION
      11. CONCLUSION
      12. APPENDIX: SUPPORTING MATERIAL
    4. Chapter 46: College Students, Piracy, and Ethics
      1. ABSTRACT
      2. INTRODUCTION
      3. REVIEW OF THE LITERATURE
      4. IDENTIFYING ETHICS AND MOTIVES
      5. SOFTWARE DETERRENTS TO PIRACY
      6. ETHICS AND COMPUTERS
      7. COMPUTER ETHICS
      8. STUDENT ETHICS STUDIES
      9. DESIGN OF THE STUDY
      10. INSTRUMENTATION
      11. DATA ANALYSIS AND FINDINGS
      12. DISCUSSION
      13. SIGNIFICANT FINDINGS
      14. IMPLICATIONS FOR PRACTICE AND POLICY
      15. CONCLUSION
    5. Chapter 47: An Evaluation of User Password Practice
      1. ABSTRACT
      2. INTRODUCTION
      3. PASSWORD SECURITY ISSUES
      4. A SURVEY OF EMAIL PASSWORD SECURITY
      5. DISCUSSION
      6. CONCLUSION
    6. Chapter 48: Digital Rights Management in Peer To Peer Cultural Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. THEORETICAL BACKGROUND
      4. THE PROPOSED DRM P2P INFRASTRUCTURE
      5. CONTRIBUTION TO THE LITERATURE: EXPERIMENTAL EVALUATION
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    7. Chapter 49: Library Photocopy Policies
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. METHODS OF PHOTOCOPYING
      5. FUTURE TRENDS
      6. CONCLUSION
    8. Chapter 50: Open Content in Libraries
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. OPEN CONTENT LICENSES PHILOSOPHY IN THE FRAMEWORK OF COPYRIGHT
      4. 3. THE (POSSIBLE?) COEXISTENCE WITH THE COPYRIGHT SYSTEM
      5. 4. CONCLUSION
    9. Chapter 51: Opening the Content Pipeline for OpenSim-Based Virtual Worlds
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. CONTENT LICENSING AND DISTRIBUTION
      5. TOWARDS A WORKING LEXICOGRAPHY
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    10. Chapter 52: Intellectual Property Issues for Digital Libraries at the Intersection of Law, Technology, and the Public Interest
      1. ABSTRACT
      2. INTRODUCTION
      3. THE MYOPIC ASSAULT ON P2P
  11. Section 6: Managerial Impact
    1. Chapter 53: The Management System of Enterprises’ Intellectual Property Rights
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. THE CASE: NST’S MANAGEMENT SYSTEM OF IPRS
      4. 3. THE CONCEPT OF IPRS MANAGEMENT SYSTEM
      5. 4. THE COMPOSITION OF IPRS’ MANAGEMENT SYSTEM
    2. Chapter 54: Trust Calculation and Management in P2P and Grid Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. TRUST FUNCTIONS FOR P2P AND GRID SYSTEMS
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    3. Chapter 55: Analyzing Software Piracy from Supply and Demand Factors
      1. ABSTRACT
      2. INTRODUCTION
      3. RESULTS
      4. DISCUSSION
      5. CONCLUSION
    4. Chapter 56: Policing of Movie and Music Piracy
      1. ABSTRACT
      2. INTRODUCTION
      3. STUDY
      4. STUDY FINDINGS: ANALYZING SECURITY IN THE INTERNET GEOGRAPHY
      5. THE NATURE OF INTER-NODAL RELATIONSHIPS, OR GAPS
      6. CONCLUSION
    5. Chapter 57: Collaborative Production, the Knowledge Commons and the Application of Open Content Licenses
      1. ABSTRACT
      2. INTRODUCTION
      3. RES PRIVATÆ, RES PUBLICÆ AND RES COMMUNES IN MODERN SOCIETY
      4. COPY: RIGHT AND LEFT LICENSES
      5. THE CONTEMPORARY MEDIA ENVIRONMENT
      6. THE CASE FOR OPEN CONTENT LICENSES
      7. A BRIEF GUIDE TO OPEN CONTENT LICENSES
      8. FUTURE TRENDS
      9. CONCLUSION
    6. Chapter 58: The Protection of Digital Libraries as Databases
      1. ABSTRACT
      2. INTRODUCTION
      3. THE PROTECTION OF THE STRUCTURE OF A DIGITAL LIBRARY
      4. THE AUTONOMOUS PROPRIETARY LEGAL PROTECTION OF THE CONTENTS OF A DIGITAL LIBRARY IN EUROPE
      5. CONCLUSION
    7. Chapter 59: Intellectual Property and Licensing Strategies in Open Collaborative Innovation
      1. ABSTRACT
      2. INTRODUCTION
      3. KNOWLEDGE PROTECTION AND INTELLECTUAL PROPERTY
      4. PROPERTIES OF KNOWLEDGE AND TECHNOLOGY
      5. A STRATEGIC PERSPECTIVE ON INTELLECTUAL PROPERTY
      6. GOVERNANCE AND LICENSING STRATEGIES IN OPEN COLLABORATIVE INNOVATION
      7. CONCLUSION
    8. Chapter 60: Patent Infringement Risk Analysis Using Rough Set Theory
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAIN FOCUS OF THE CHAPTER
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    9. Chapter 61: Knowledge Worker Faire Compensation
      1. ABSTRACT
      2. INTRODUCTION
      3. THE RESEARCH QUESTIONS
      4. KNOWLEDGE WORKER
      5. LINKING THE THEORETICAL BASIS
      6. EMPIRICAL RESULTS
      7. CONCLUSION
    10. Chapter 62: Digital Copyright Enforcement
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. PRIVACY AND THE RIGHT TO INFORMATIONAL SELF-DETERMINATION
      5. DIGITAL COPYRIGHT ENFORCEMENT SURVEILLANCE MECHANISMS
      6. THE GRADUATED RESPONSE: AN ALTERNATIVE ENFORCEMENT MECHANISM
      7. AN OPEN CONCLUSION
    11. Chapter 63: The Effect of Business Characteristics on the Methods of Knowledge Protections
      1. ABSTRACT
      2. INTRODUCTION
      3. DISCUSSION
  12. Section 7: Critical Issues
    1. Chapter 64: Knowledge and Intellectual Property Rights
      1. INTRODUCTION
      2. BACKGROUND
      3. ROLE OF KNOWLEDGE IN THE MARKET ECONOMY
      4. ROLE OF INTELLECTUAL PROPERTY RIGHTS
      5. FUTURE TRENDS
      6. CONCLUSION
    2. Chapter 65: Ethics and Social Issues Related to Information Communication Technology (ICT)
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. INFORMATION RIGHTS: CLAIM TO PRIVACY
      5. THE NIGERIAN FREEDOM OF INFORMATION BILL
      6. INTELLECTUAL PROPERTY
      7. NATIONAL INTELLECTUAL PROPERTY RIGHTS LAWS AND WTO/TRIPS COMPLIANCE IN NIGERIA
      8. PROPOSAL FOR POLICY MAKERS: IPR AND TRIPS
      9. ETHICAL POLICY FRAMEWORK
      10. FUTURE TRENDS
      11. CONCLUSION
    3. Chapter 66: Legal Issues Facing Companies with Products in a Digital Format
      1. ABSTRACT
      2. INTRODUCTION
      3. FUTURE RESEARCH DIRECTIONS
      4. CONCLUSION
    4. Chapter 67: Between Scylla and Charybdis
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. A HUMAN RIGHTS FRAMEWORK FOR COPYRIGHT
      5. COPYRIGHT AS AN INSTRUMENT TO LOCK-UP ACCESS TO INFORMATION
      6. FREEDOM OF EXPRESSION AS AN EXTERNAL LIMITATION ON COPYRIGHT
      7. RECASTING THE BALANCE: FUTURE TRENDS
    5. Chapter 68: Ethical and Legal Issues in Teaching and Learning in Second Life in a Graduate Online Course
      1. EXECUTIVE SUMMARY
      2. BACKGROUND
      3. SETTING THE STAGE
      4. CASE DESCRIPTION
      5. FINDINGS
      6. CURRENT CHALLENGES IN GRADUATE ONLINE TEACHING
    6. Chapter 69: The Trouble with Digital Copies
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FROM COPYRIGHT TO PRIVACY AND DATA PROTECTION
      5. A MATTER OF BALANCE
      6. ORGANISING INNOVATION VIA P2P SYSTEMS
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    7. Chapter 70: Legal and Ethical Aspects of Teaching in Selected Social Virtual Worlds
      1. ABSTRACT
      2. THE NETWORKED “iGENERATION” AND VIRTUAL WORLDS
      3. CHAPTER TOPICS
      4. APPENDIX
    8. Chapter 71: Biotechnological Patents and Morality
      1. ABSTRACT
      2. INTRODUCTION
      3. PROBLEMS OF BIOTECH PATENTING
      4. PUBLIC ORDER AND MORALITY UNDER PATENT LAW
      5. CONCLUSION
    9. Chapter 72: Preservation of Cultural and Scientific Heritage by Means of Digital Libraries
      1. ABSTRACT
      2. INTRODUCTION
      3. PRESERVATION FROM THE ANALOGUE AGE TO THE DIGITAL ERA: STATUS, CHALLENGES AND FUTURE PERSPECTIVES
      4. CONCLUSION
  13. Section 8: Emerging Trends
    1. Chapter 73: Information Agents, Social Web and Intellectual Property
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND: INTELLECTUAL PROPERTY AS A BARRIER TO KNOWLEDGE USE
      4. 3. INTELLECTUAL PROPERTY AND COPYRIGHT IN DATABASES, SERVICES, AND AGENTS
      5. 4. FUTURE TRENDS-NEW AND MORE FLEXIBLE IDEAS: CREATIVE COMMONS LICENSES
      6. 5. CONCLUSION
    2. Chapter 74: Review of the Virtual World Community
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. LOOKING DEEPER INTO THE VIRTUAL WORLD ECONOMY
      5. SOLUTIONS AND RECOMMENDATIONS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    3. Chapter 75: Challenges to Intellectual Property Rights from Information and Communication Technologies, Nanotechnologies and Microelectronics
      1. ABSTRACT
      2. INTRODUCTION
      3. CURRENT TRENDS IN INNOVATION AND NEW ADVANCED TECHNOLOGIES
      4. CHALLENGING FEATURES OF NEW TECHNOLOGIES TO IPRS
      5. CONCLUSION
    4. Chapter 76: Optimization in Digital Watermarking Techniques
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. ZERO-RATE OPTIMIZED SS WATERMARK SYSTEM: REDUCTION IN HSI
      5. ZERO-RATE OPTIMIZED SS WATERMARK SYSTEM: INCREASE IN WHC
      6. OPTIMIZATION IN QUANTIZATION INDEX MODULATION WATERMARKING
      7. SPREAD TRANSFORM WATERMARKING
      8. SOFT COMPUTING BASED OPTIMIZED WATERMARKING
      9. SOFT COMPUTING BASED ADVANCED SPATIAL/ORIGINAL DOMAIN OPTIMIZED WATERMARKING
      10. SOFT COMPUTING BASED OPTIMIZED WATERMARKING USING UNITRARY TRANSFORM
      11. WAVELETS AND SOFT COMPUTING TECHNIQUES IN OPTIMIZED WATERMARKING
      12. FUTURE RESEARCH DIRECTIONS
      13. CONCLUSION
    5. Chapter 77: Emerging Challenges of the Digital Information
      1. ABSTRACT
      2. 1. DIGITAL LIBRARY BASICS
      3. 2. METADATA IN DIGITAL LIBRARIES
      4. 3. CREATION AND INTEROPERATION OF DIGITAL LIBRARIES
      5. 4. SEARCHING IN DIGITAL LIBRARIES
      6. 5. THE NEW LANDSCAPE
      7. 6. EMERGING CONSIDERATIONS
      8. 7. FORESEEING THE FUTURE
    6. Chapter 78: The Private Copy Issue
      1. ABSTRACT
      2. DIGITAL COPYRIGHT MANAGEMENT AND CONSUMERS CONCERNS
      3. PROBLEMS CONCERNING THE DIGITAL PRIVATE COPY
      4. NEW PERSPECTIVES OVER THE PRIVATE COPY ISSUE
    7. Chapter 79: Blind Watermarking of Three-Dimensional Meshes
      1. ABSTRACT
      2. INTRODUCTION
      3. REVIEW ON BLIND MESH WATERMARKING
      4. HIERARCHICAL WATERMARKING OF SEMI-REGULAR MESHES
      5. FUTURE WORKING DIRECTIONS AND CONCLUSION
    8. Chapter 80: Challenges and Solutions in Multimedia Document Authentication
      1. ABSTRACT
      2. MOTIVATION
      3. STATE OF THE ART
      4. COMPARISON OF TOOLS
      5. CHALLENGES
      6. EXAMPLE USE CASE
      7. CONCLUSION
    9. Chapter 81: Is DRM the Great Spoiler in the IDM Marketplace?
      1. ABSTRACT
      2. INTRODUCTION
      3. DIGITAL RIGHTS MANAGEMENT
      4. ANALYSIS OF DRM’s IMPACT ON IDM THROUGH VISOR FRAMEWORK
      5. CONCLUSION
    10. Chapter 82: Innovation or Imitation
      1. ABSTRACT
      2. INTRODUCTION
      3. ASSUMPTIONS OF THE MODEL
      4. MATHEMATICAL MODEL
      5. MODEL SIMULATION AND THE ANALYSIS OF THE RESULTS
      6. EXAMINING THE POLICIES ON THE MODEL
      7. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
      8. APPENDIX A
      9. APPENDIX B