Copyright and the Shape of Digital Culture (Index)

Total Page:16

File Type:pdf, Size:1020Kb

Copyright and the Shape of Digital Culture (Index) Index Abbate, Janet, 32 Anderson, Geoffrey, 150 Access controls, technical Apache HTTP server, 234 as a means to subsequently regulate Apple Computer, Inc., 5–6, 157, 225, use, 7, 11, 51, 54, 171, 178–182, 267, 280. See also iPod; iTunes 185–186, 190, 217–218, 227, 248, Arbitrage, 263–264, 267, 275 262, 265, 267, 270 Aris Technologies, 160 as a new site for copyright Association of American Publishers enforcement, 102, 137–139, 169–170, (AAP), 343n61 171–173, 188, 191, 215 ARPANET, 32–33, 173 as also the point of purchase, AT&T Inc., 152, 159, 240 171–173, 248, 267 Audio Home Recording Act (AHRA), Active Internet, 268 146, 195, 221, 321n17 Advanced Access Content System (AACS) encryption, 269, 340n32 Baker, C. Edwin, 273 Advanced Research Projects Agency Barbrook, Richard, 42 (ARPA), 32 Barlow, John Perry, 35–36 Advanced Television Standard (ATV), Bell, Tom, 62 198 Benkler, Yochai, 126, 234, 275 Advanced Television Systems Bentham, Jeremy, 92 Committee (ATSC)), 202, 211, 231 Berman, Howard, 131 “Affordances” (Gibson), 86 Bertelsmann, 49, 151 AIFF music format, 145 Bettig, Ronald. 22 Akrich, Madeleine, 80 Bijker, Weibe, 66, 84, 87, 106 Amateurs, 233 Bitmusic, 151 American Library Association (ALA), “Black box” (Latour), 53, 239, 243 215–216 Blanford, Lawrence, 209 American Library Association, et al. v. Blogs, 280 Federal Communications Commission Blu-Ray DVD, encryption of, 340n32 and United States of America, 215–218 Bolter, Jay David, 284nn7–8 Analog hole, 159–160, 197, 219, Borland, John, 164 323n44 Boucher, Rick, 275–276 384 Index Boyle, James, 28, 276 Commodification of culture, 11, 55–57, Broadcast flag, 201–219, 227, 230–231, 244, 247–248, 270–272, 275–278, 235–236, 241–242, 274 287n21 disagreement about, 205–210 Compliance rules, 227–230 and “downstream devices,” 207–208, Compression, 40, 294n64 211, 216 Computer and Communications FCC mandate of, 210–214, 227, 230 Industry Association (CCIA), 209 origins of, 202–204 Concentration of ownership in production of consensus around, entertainment industry, 31, 139, 199, 203–210 221 robustness rules in, 227, 230–231, Congress, United States 233, 235–236, 241–242 and copyright law, 22 scope of, 206–207 and digital television, 198–205, 209, and Table A, 208–211 212–213, 218 Broadcast Protection Discussion Group and the DMCA, 175–177, 189–190, (BPDG), 203–212, 217, 230, 233 275–276 BPDG Final Report, 203–205, Congressional Budget Office, 271 209–210, 212 Consortia, industry, 58, 140–144, 157. Brown, Janelle, 157 See also Standard-setting Bruckman, Amy, 233 organizations (SSOs) Bundling, 268 and antitrust, 142–144 Burk, Dan, 329n56 and intellectual property, 142 Bush, George W., 256 Constitution, United States, 22–24, 28, Bush doctrine, 256 57, 105, 177, 180, 187–188, 273, 283n5 Carey, James, 3, 91 Consumer Broadband and Digital “Celestial jukebox” (Goldstein), 126, Television Promotion Act (also 267, 317n85 Hollings Bill), 195–196, 242 Center for Democracy and Technology Consumer Electronics Association (CDT), 220 (CEA), 197 Chiariglione, Leonardo, 41, 149–154, Consumers, as configured in the 158 debates about copyright. See also Circumvention, 101–102 Users and the DMCA, 174–182 as a justification for stronger as a political act, 258 copyright protection, 109, 117, 123, and robustness rules, 184–188, 223 126–127, 130–131, 134 Clinton-Gore administration, 36–39, as opposed to citizens, 189 47, 108, 174 passive, as opposed to users, 126, CNet News, 150 226–227, 241, 275, 277, 279–280 “Code” (Lessig), 54, 57–58, 92–94. See Content Generation Management also Technology, as regulation System-Analog (CGMS-A), 197 Codec, 41, 294n64 Content Protection System Architecture Cohen, Julie, 28, 60 (CSPA), 170 Index 385 Content Scramble System (CSS), and the inducement of infringement, 170–172, 175, 178, 181–182, 49–50 185–187, 227–230, 262, 265–266 and the Internet, 5–9, 11, 31, 34–40, DVD-CCA license that enforces, 105, 174 181–182, 185–187, 227–230, 262–263 for a limited duration, 28, 276, robustness rules in, 228–230 290n19 workings of, 170–172 limits built into, 28–29, 63, 274, 278 Convergence, 211, 213, 221 as a monopoly, 27–28, 38, 274 Cooper, Geoff, 72 as a natural right, 22 Copps, Michael, 211 and the preemption doctrine, Copyleft, 224 184–185 Copy Protection Technology Working principles of, 21–29, 57, 137, 273 Group (CPTWG), 141, 170, 175, “to promote progress in science and 202–203 the useful arts,” 22, 24, 27, 289n10 Copyright, 5–9, 21–31, 34–40, 137, and the property metaphor, 24–28, 183–184, 288n3 30, 35 as a balance of public and private and the public domain, 28, 47, 276 interests, 21–22, 27–31, 38, 53, 63, as a reward for authors, 23–24 105, 180, 183–184, 187–189, 191, and the rhetoric of authorship, 22–24, 225, 244, 257, 260, 283n5 116, 134, 314n35 and the “capable of substantial and a shift from use to access, 6, 54, noninfringing uses” standard, 170–171, 173, 177–180, 188, 217 48–50 and technical solutions, 6–12, 21–22, and the commodification of culture, 50–63, 92–95, 105–107, 137–139, 5, 12, 25, 47, 325n17 167–168 (see also Digital rights and contract, 182–185 management [DRM]) and contributory and vicarious as a “technology neutral” rule, 177 infringement, 48–49, 327n30 utilitarian aims of, 22, 105, 273 constitutional mandate of, 22–24, 57, Copyright Act of 1790, 290n19 105, 177, 188, 191, 273, 278, 283n5, Copyright Act of 1909, 290n19 289n10 Copyright Act of 1976, 30, 173, and the “copyright wars,” 5–7, 40, 290n19 280 Copyright Term Extension Act (CTEA), “death” of, predicted, 5, 35–36 290n19 and democracy, 24, 28, 57, 273, Coral Consortium, 154 276–278 Court of Appeals, District of Columbia, and digital rights management (see 202 Digital rights management [DRM]) Court of Appeals, Ninth Circuit, 6 and the economics of information, Crawford, Susan, 219, 235 25–28 Creative Commons, 132, 224, 280 and fair use (see Fair use) “Creative destruction” (Schumpeter), history of, 11–12, 22–24, 57, 177 105 incentive logic, 22–23, 38, 134 Crichter, Chas, 130 386 Index Cryptanalysis. See Encryption, and 170–171, 193–198, 223–231, code-breaking 247–261, 270, 278–281, 297n87 Cryptography. See Encryption and the “analog hole,” 159–160 Cultural policy, 10, 286n21 as an access rule, 137–139, 177–178 arrangements necessary for, 106–109, “Darknet” (Biddle et al.), 225 139, 168–169, 193–195, 226–229, DeCSS, 172–173, 178–181, 185–187, 254, 279–280 228, 230, 243, 325n16 and commerce, 248, 262–270, 274, Department of Defense (DoD), 32, 36 278–280 Demodulation, of digital television as “curb-high,” 51, 225, 231, 298n90 signals, 203–204 debate about, 223–225, 243, 254, Diamond Multimedia, 42, 145–146, 279–281 150, 157, 321n18 and fair use, 57–63, 178–180 Dick, Philip K., 255–256 implications of, 55–63, 74, 178–180, “Minority Report,” 255 219–221, 225–227, 234–236, Digital Audio Tape (DAT), 195, 221, 241–242, 247–248, 257–263, 270–274 321n17 inflexibility of, 60–61 Digital culture, 6, 10–13, 31, 244, justification for, 106–109, 127–128, 277–281 130 participation in, 10–11, 280 as “leakproof,” 159, 204, 225, 231 Digital Future Coalition (DFC), 176 limitations of, 160–161, 228, 254, 258 Digital Millennium Copyright Act as part of a heterogeneous strategy, (DMCA), 168, 173–190, 193, 228, 99–102, 187–188, 213 236, 262, 265, 274–276 as a political accomplishment, 139, as backing for private licenses, 145, 193–194, 201–202 185–188, 191, 265 as a preemptive rule, 256–261 constitutionality of, 173, 178–180, and privacy, 268–273 187 in proprietary formats, 146, 149, 154, exceptions to, 173, 275 158–159, 164 and fair use, 176, 178–180, 185–187, providers of, 151, 205, 221, 268, 272, 328n38 279 history of, 174–177, 189–190 as a regulation on manufacturers not as “paracopyright,” 177 users, 167–168, 171–172, 185, 227, and its prohibition on circumvention 262–263 for access, 168, 178–179, 181, 184 robustness rules (see Robustness rules) and its prohibition on circumvention and state authority, 193–198, 201, 214 tools, 168, 176, 179, 181 uses other than entertainment media two-dimensional structure of, for, 56 179–181 workings of, 51–54, 297n87 Digital Music Access technology Digital television (DTV), 197–201 (DMAT), 152 regulation of (see Broadcast flag) Digital rights management (DRM), transition to, 197–201, 203 50–63, 79, 99–102, 137–139, technical advantages of, 198–199 Index 387 Digital Transition Content Security Act 181–182, 187–188, 207–208, 262, (DTCSA), 197 265 Digital Transmission Licensing military uses of, 249, 251 Administrator (DTLA), 202, 206 and new technologies, 249 DIVX, 269 principles of, 247, 252–254 “Domestication” (Silverstone), 85 public key cryptography, 252–253 “Double articulation” (Silverstone), 80 techniques of, 248–250, 252–253 Down-rezzing, 196 Engeström, Yrjö, 335n30 Dr. Dre, 47 European Telecommunications Duguid, Paul, 2, 34 Standards Institute (ETSI), 58 DVD, development of, 169–172 DVD Copy Control Association (DVD- Fair use, 29–30, 59–63, 169, 178, 157, CCA), 181–182, 325n16 271 DVD Forum, 141, 145 and access controls, 179–180, 186, Dyer, Richard, 73, 75 217 Dyson, Esther, 35 ambiguity in, 59–62, 257 and the costs of clearing copyright, Economics of information, 25–28 29–30, 61 economy of scale, 26–27, 273 and criticism, 29, 59–60 network effects, 140 , 273 and democracy, 29 nonexcludable goods, 25–26 and digital rights management, nonrivalrous goods, 25–26 59–63, 169, 178–180, 184–185, 217, public goods, 25, 28, 23 241, 261, 275, 300n122 Economy of scale, 26–27, 273 and education, 29–30, 59, 179 Eglash, Ron, 243 vs.
Recommended publications
  • Download Symposium Brochure Incl. Programme
    DEUTSCHE TV-PLATTFORM: HYBRID TV - BETTER TV HBBTV AND MUCH, MUCH MORE Deutsche TV Platform (DTVP) was founded more than 25 years ago to introduce and develop digital media tech- nologies based on open standards. Consequently, DTVP was also involved in the introduction of HbbTV. When the HbbTV initiative started at the end of 2008, three of the four participating companies were members of the DTVP: IRT, Philips, SES Astra. Since then, HbbTV has played an important role in the work of DTVP. For example, DTVP did achieve the activation of HbbTV by default on TV sets in Germany; currently, HbbTV 2.0 is the subject of a ded- icated DTVP task force within the Working Group Smart Media. HbbTV is a perfect blueprint for the way DTVP works by promoting the exchange of information and opinions between market participants, stakeholders and social groups, coordinating their various interests. In addition, DTVP informs the public about technological develop- ments and the introduction of new standards. In order to HYBRID BROADCAST BROADBAND TV (OR “HbbTV”) IS A GLOBAL INITIATIVE AIMED achieve these goals, the German TV Platform sets up ded- AT HARMONIZING THE BROADCAST AND BROADBAND DELIVERY OF ENTERTAIN- icated Working Groups (currently: WG Mobile Media, WG Smart Media, WG Ultra HD). In addition to classic media MENT SERVICES TO CONSUMERS THROUGH CONNECTED TVs, SET-TOP BOXES AND technology, DTVP is increasingly focusing on the conver- MULTISCREEN DEVICES. gence of consumer electronics, information technology as well as mobile communication. HbbTV specifications are developed by industry leaders opportunities and enhancements for participants of the To date, DTVP is the only institution for media topics in to improve the video user experience for consumers by content distribution value chain – from content owner to Germany with such a broad interdisciplinary membership enabling innovative, interactive services over broadcast consumer.
    [Show full text]
  • An Overview of Multimedia Content Protection in Consumer Electronics Devices
    An overview of multimedia content protection in consumer electronics devices Ahmet M. Eskicioglu* and Edward J. Delp‡ *Thomson Consumer Electronics Corporate Research 101 W. 103rd Street Indianapolis, Indiana 46290-1102 USA ‡ Video and Image Processing Laboratory (VIPER) School of Electrical and Computer Engineering Purdue University West Lafayette, Indiana 47907-1285 USA ABSTRACT A digital home network is a cluster of digital audio/visual (A/V) devices including set-top boxes, TVs, VCRs, DVD players, and general-purpose computing devices such as personal computers. The network may receive copyrighted digital multimedia content from a number of sources. This content may be broadcast via satellite or terrestrial systems, transmitted by cable operators, or made available as prepackaged media (e.g., a digital tape or a digital video disc). Before releasing their content for distribution, the content owners may require protection by specifying access conditions. Once the content is delivered to the consumer, it moves across home the network until it reaches its destination where it is stored or displayed. A copy protection system is needed to prevent unauthorized access to bit streams in transmission from one A/V device to another or while it is in storage on magnetic or optical media. Recently, two fundamental groups of technologies, encryption and watermarking, have been identified for protecting copyrighted digital multimedia content. This paper is an overview of the work done for protecting content owners’ investment in intellectual property. Keywords: multimedia, copy protection, cryptography, watermarking, consumer electronics, digital television, digital video disc, digital video cassette, home networks. 1. INTRODUCTION In the entertainment world, original multimedia content (e.g., text, audio, video and still images) is made available for consumers through a variety of channels.
    [Show full text]
  • Copy Protection
    Content Protection / DRM Content Protection / Digital Rights Management Douglas Dixon November 2006 Manifest Technology® LLC www.manifest-tech.com 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 1 Content Protection / DRM Content Goes Digital Analog -> Digital for Content Owners • Digital Threat – No impediment to casual copying – Perfect digital copies – Instant copies – Worldwide distribution over Internet – And now High-Def content … • Digital Promise – Can protect – Encrypt content – Associate rights – Control usage 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 2 1 Content Protection / DRM Conflict: Open vs. Controlled Managed Content • Avoid Morality: Applications & Technology – How DRM is impacting consumer use of media – Awareness, Implications • Consumers: “Bits want to be free” – Enjoy purchased content: Any time, anywhere, anyhow – Fair Use: Academic, educational, personal • Content owners: “Protect artist copyrights” – RIAA / MPAA : Rampant piracy (physical and electronic) – BSA: Software piracy, shareware – Inhibit indiscriminate casual copying: “Speed bump” • “Copy protection” -> “Content management” (DRM) 11/2006 Copyright 2005-2006 Douglas Dixon, All Rights Reserved – www.manifest-tech.com Page 3 Content Protection / DRM Content Protection / DRM How DRM is being applied • Consumer Scenarios: Impact of DRM – Music CD Playback on PC – Archive Digital Music – Play and Record DVDs – Record and Edit Personal Content • Industry Model: Content
    [Show full text]
  • DAT330 – Principles of Digital Audio Cogswell Polytechnical College Spring 2009
    DAT330 – Principles of Digital Audio Cogswell Polytechnical College Spring 2009 Week 6 – Class Notes Optical Disc Media: CD and DVD Optical Disc Media Design of Optical Media Most optical storage systems store data across the surface of a flat disc. This allows random access of data, as well as ease of manufacturing replication. Because the data is written and read via optical means, there is no physical contact between the media and the pickup. This ensures long media and pickup life and minimizes damage through head crashes or other failures. In addition, a protective layer can be used to protect the data from damages or contamination. Also, multiple data layers can be places within one substrate. Nonetheless, stored data must undergo both modulation and error correction. Data can be stored either along a spiral or concentric tracks. Most optical disc pickups shine a laser on the medium, and the reflected light is detected by a sensor and decoded to recover the carried data. The medium must have two states so that the change between them varies with the reflected light. Data can be represented as a phase change, polarization change, or change in the intensity of reflected light. The resulting variations picked up from the media can be converted into a varying electrical signal for data recovery. Laser beams, having a short wavelength, allow for high information data density and a high SNR needed for a high bit rate. Optical media must be supported by a sophisticated servo system to provide positioning, tracking, focusing of the pickup, and accurate rotation.
    [Show full text]
  • DRM Trends and Development
    CONTENT FOREWORD 2 EXECUTIVE SUMMARY 3 DRM TRENDS AND DEVELOPMENT – AN ONGOING AFFAIR 5 Changing Digital Content Management Scene 5 DRM Market Landscape 6 CONTRASTS OF CONTENT CONTROL MECHANISMS 7 Copyright 7 Digital Rights Management (DRM) 7 Conditional Access 8 DRM OFFERINGS 9 Changes in Media Environment 9 Digitisation – Changing Media, Communications and Commerce 9 Digital Media Ecosystem 11 Piracy 11 Diversified Forms of Piracy 11 Losses to Piracy - Music Industry 13 DRM DEVELOPMENT 15 Revenue from Digital Watermarking (DWM) and Fingerprinting 15 Distribution Network and Protection Mechanism 16 Trends Leading to Enhanced Usage DRM “System” 17 Selected DRM Applications in Context 19 Music 19 Video 19 Publishing 20 Games 20 BASIC DRM COMPONENTS 21 DRM-based Business Models 22 The Process of DRM 22 DRM Value Chain Activities 23 WORLDWIDE DRM WORKING GROUPS 25 DRM Movement and Focus 25 DRM Technology Vendors 27 Major Vendors (Conventional DRM) 27 Major Vendors (DWM and Fingerprinting) 27 COPYRIGHT AND THE DEVELOPING LEGAL FRAMEWORK 31 Copyright and DRM 31 Copyright Provisions in Digital Environment 31 Exceptions in Copyright Acts 32 Concept of Fair Use 32 DRM Emphasis in the EU 34 DRM AND ITS IMPLEMENTATION 36 Alternative Business Models 36 Ideal DRM Implementation 36 DRM Challenges 37 CONCLUSION 38 A Word of Caution 38 ACRONYMS 39 CONTACT US 2 Digital Right Management (DRM) Trends and Development - An Ongoing Affair FOREWORD On behalf of the Malaysian Communications and Multimedia Commission (SKMM), it is my pleasure to present to our readers the report on “Digital Right Management (DRM) Trends and Development – An Ongoing Affair”. The report features the basics of Digital Rights Management (DRM) and its growing importance in an increasingly digitised communications services environment that is indeed showing nascent convergence.
    [Show full text]
  • DVD CCA and AACS LA
    David Taylor for DVD CCA and AACS LA Please submit a separate comment for each proposed class. [ ] Check here if multimedia evidence is being provided in connection with this comment ITEM A. COMMENTER INFORMATION DVD Copy Control Association The DVD Copy Control Association (“DVD CCA”), a not-for-profit corporation with its principal office in Morgan Hill, California, licenses the Content Scramble System (“CSS”) for use in protecting against unauthorized access to or use of prerecorded video content distributed on DVD discs. Its licensees include the owners of such content and the related authoring and disc replicating companies; producers of encryption engines, hardware and software decrypters; and manufacturers of DVD players and DVD-ROM drives. Advanced Access Content System Licensing Administrator The Advanced Access Content System Licensing Administrator, LLC (“AACS LA”), is a cross-industry limited liability company with its principal offices in Beaverton, Oregon. The Founders of AACS LA are Warner Bros., Disney, Microsoft, Intel, Toshiba, Panasonic, Sony, and IBM. AACS LA licenses the Advanced Access Content System (“AACS”) technology that it developed for the protection of high-definition audiovisual content distributed on optical media. That technology is associated with Blu-ray Discs. AACS LA’s licensees include the owners of such content and the related authoring and disc replicating companies; producers of encryption engines, hardware and software decrypters; and manufacturers of Blu-ray disc players and Blu-ray disc drives. i As ultra-high-definition products are entering the marketplace, AACS LA has developeD a separate technology for the distribution of audiovisual content in ultra-high definition digital format.
    [Show full text]
  • DVD for “Not-So” Dummies
    DVDDVD forfor ““NotNot--so”so” DummiesDummies YourYour DVDDVD TechnicalTechnical ReferenceReference GuideGuide January 2001 Technicolor has evolved as the number one processor of motion picture film to become the world’s largest manufacturer and distributor of pre-recorded videocassettes and a leading global replicator of optical media including DVD, DVD- ROM, CD and CD-ROM. Offering worldwide manufacturing and distribution capabilities, Technicolor’s Home Entertainment Services serves an international base of customers with its facilities in California, Michigan, Tennessee, Virginia, Canada, Mexico, Denmark, Holland, Italy, Spain, Luxembourg and the United Kingdom. Part 1: DVD A Description of the Technology How Does a DVD Differ from a CD? • A DVD looks like a CD • A DVD is two “half-discs” bonded together • A DVD contains data on one or both sides • A DVD has a “dual-layer” feature • 1 DVD disc has 1-4 data “layers” • A DVD has 7-25x the capacity of a CD • DVD data read-rate is 8-9x faster than CD-ROM • DVD players play CDs 5 DVD Disc Types The DVD formats are documented in a group of five books Pre-recorded formats • Book A: DVD-ROM Specification • Book B: DVD-Video Specification • Book C: DVD-Audio Specification Recordable formats • Book D: DVD-R Specification (write-once) • Book E: DVD-RAM Specification (erasable) Storage Capacity of DVD Note: A CD is 0.7 Gbytes Pre-recorded DVD • DVD-5 4.7 Gbytes (1 side, 1 layer) • DVD-9 8.5 Gbytes (1 side, 2 layers) • DVD-10 9.4 Gbytes (2 sides, 1 layer) • DVD-18 17.0 Gbytes (2 sides, 2 layers) Recordable DVD • DVD-R = 4.7 Gbytes (billion bytes) per side • DVD-RAM = 4.7 Gbytes per side •DVD-RW • DVD-R+W DVD and CD • DVDs are similar in principle to CDs.
    [Show full text]
  • Blu-Ray Disctm/ DVD Home Theatre System
    Blu-ray DiscTM/ DVD Home Theatre System CLASS 1 LASER PRODUCT LASER KLASSE 1 Do not install the appliance in a confined LUOKAN 1 LASERLAITE space, such as a bookcase or built-in cabinet. KLASS 1 LASERAPPARAT To reduce the risk of fire, do not cover the ventilation opening of the appliance with newspapers, tablecloths, curtains, etc. This appliance is classified as a CLASS 1 Do not expose the appliance to naked flame LASER product. This marking is located on sources (for example, lighted candles). the bottom exterior. Do not expose batteries or appliances with For the main unit battery-installed to excessive heat, such as sunshine and fire. The nameplate is located on the bottom exterior. To prevent in iury, this apparatus must be securely attached to the floor/wall in For the customers in the accordance with the installation instructions. U,S,A, Indoor use only. To reduce the risk of fire or CAUTION electric shock, do not expose this The use of optical instruments with this apparatus to rain or moisture. product will increase eye hazard. These t_llowing indications are located on the As the laser beam used in this Blu-ray Disc/ bottom exterior. DVD Home Theatre System is harmtul to eyes, do not attempt to disassemble the This symbol is intended to alert the cabinet. user to the presence of uninsulated Refer servicing to qualified personnel only. "dangerous voltage" within the product's enclosure that may be of sufficient CAUTION c ASSSRVISI8EANDINVISIgLEASEI_RAI}IA_ION magnitude to constitute a risk of electric shock WIEN OPEN AVOIDDI£_OT _YE XPOSU££ to persons.
    [Show full text]
  • Information Und Recht ______
    Information und Recht ___________ Band 33 Schriftenreihe Information und Recht Herausgegeben von Prof. Dr. Thomas Hoeren Prof. Dr. Gerald Spindler Prof. Dr. Bernd Holznagel, LL.M. Prof. Dr. Georgios Gounalakis PD Dr. Herbert Burkert Band 33 Verlag C.H. Beck München 2002 Vom Urheber- zum Informationsrecht Implikationen des Digital Rights Management von Dr. jur. Stefan Bechtold Verlag C.H. Beck München 2002 ISBN 3 406 48717 3 © 2002 Verlag C. H. Beck oHG Wilhelmstraße 9, 80801 München Druck: Nomos Verlagsgesellschaft In den Lissen 12, 76547 Sinzheim Gedruckt auf säurefreiem, alterungsbeständigem Papier (hergestellt aus chlorfrei gebleichtem Zellstoff) We shape our tools, and thereafter our tools shape us. Marshall McLuhan, Understanding Media, 1964 Vorwort Vorwort Die vorliegende Arbeit ist zwischen Oktober 1999 und Juni 2001 entstan- den und wurde im Sommersemester 2001 von der Juristischen Fakultät der Eberhard-Karls-Universität Tübingen als Dissertation angenommen. Bei der Untersuchung der neuen EU-Richtlinie zum Urheberrecht in der Informationsgesellschaft legt die Arbeit die endgültige, Ende Juni 2001 im Amtsblatt veröffentlichte Fassung zugrunde. Mein besonderer Dank gilt meinem verehrten Doktorvater, Herrn Prof. Dr. Wernhard Möschel. Er hat meinen Blick für ordnungspolitische Grundprobleme und übergreifende Fragestellungen geschärft und mir als Mitarbeiter an seinem Lehrstuhl große Freiräume und optimale Arbeits- bedingungen gewährt. Für die vorliegende Arbeit hat er mich immer er- mutigt, einmal eingeschlagene Pfade konsequent zu beschreiten und vor ungewohnten Analyseansätzen und Ergebnissen nicht zurückzu- schrecken. Ohne diese Rahmenbedingungen wäre die Arbeit in der vorlie- genden Form niemals entstanden. Ihm und Herrn Prof. Dr. Ulrich Bälz danke ich weiterhin für die überaus sachkundige Erstellung der beiden Gutachten.
    [Show full text]
  • Applied Cryptography
    2/26/2019 L06 – Applied Cryptography APPLIED CRYPTOGRAPHY © Robert F. Kelly, 2012-2019 ISE331 – Computer Security 2 Reading • Chapter 6 • Wiki pages for various attack strategies http://en.wikipedia.org/wiki/Rainbow_table http://en.wikipedia.org/wiki/Trusted_Platform_Module 1 2/26/2019 L06 – Applied Cryptography © Robert F. Kelly, 2012-2019 ISE331 – Computer Security 3 Objectives • Learn the elements involved in the correct use of cryptography • Understand cryptography attack methods © Robert F. Kelly, 2012-2019 ISE331 – Computer Security 4 Cryptography in Use • Confidentiality – keep data a secret • Integrity – message not altered in transmission • Authentication – match a user to an account through previously shared credentials • Nonrepudiation – message sender cannot deny that they sent the message Availability (an important security concept is not addressed through cryptography 2 2/26/2019 L06 – Applied Cryptography © Robert F. Kelly, 2012-2019 ISE331 – Computer Security 5 Two Way Communication Public Key B Private KeyB Plaintext Ciphertext Plaintext Encryption Decryption Ciphertext Plaintext Decryption Encryption Public Key Private KeyA A © Robert F. Kelly, 2012-2019 ISE331 – Computer Security 6 Hybrid Techniques We cover TLS and SSL in the “Standards & Protocols” session Message Encrypted message Symmetric Symmetric encryption decryption Symmetric key symmetric key Public Key Encryption Public key decryption Message Recipient’s public key Private key 3 2/26/2019 L06 – Applied Cryptography © Robert F. Kelly, 2012-2019 ISE331 – Computer
    [Show full text]
  • Ultra HD Blu-Ray™ / DVD Player
    masterpage:Right 4-687-312-11(1) Ultra HD Blu-ray™ / Getting Started DVD Player Playback Settings and Adjustments Operating Instructions Additional Information Thank you for your purchase. Before using this player, please read this operating instructions carefully. The software of this player may be updated in the future. Please visit the following website: http://www.sony.com/bluraysupport/ TM VIDEO/AUDIO UBP-X1000ES UBP-X1000ES 4-687-312-11(1) D:\JOB\SONY master page=left DVD\2016\SD160014\4687312111_US\010COVTOC.f m Contents Owner’s Record The model and serial numbers are located at the rear of the unit. Record the serial number in the WARNING . 2 space provided below. Refer to them whenever PRECAUTIONS . 3 you call upon your Sony dealer regarding this product. Getting Started Model No.______________ Supplied Accessories . 7 Serial No.______________ Guide to Parts and Controls . 8 For Customers in the USA Step 1: Connecting the Player . 11 If this product is not working properly, please Step 2: Network Connection . .13 call 1-800-222-SONY(7669). Step 3: Easy Setup . .14 For Customers in Canada If this product is not working properly, please Playback contact our Customer Information Service Center at 1-877-899-7669 or write to us at: Playing a Disc . .15 Customer Information Service 115 Gordon Baker Playing from a USB Device . .15 Road, Toronto, Ontario, M2H 3R6 Playing via a Network . .16 Listening to Audio through a Bluetooth® Device . .17 Available Options . .18 WARNING To reduce the risk of fire or electric shock, do not Settings and Adjustments expose this apparatus to rain or moisture.
    [Show full text]
  • Índice General
    AUTOR Javier Ferrer Aguilar DIRECTOR DE PROYECTO Carles Padró UPC Abril 2009 Índice general 1 Introducción.................................................................................................. 1 1.1 Contexto................................................................................................... 1 1.2 Propósitos y objetivos.............................................................................. 2 1.3 Limitaciones ............................................................................................ 3 1.4 Estructura de la memoria......................................................................... 4 2 Sistemas de Acceso Condicional (CAS)...................................................... 6 2.1 Arquitectura común de los CAS.............................................................. 7 2.1.1 Jerarquía de claves............................................................................................. 9 2.1.2 Distribución de claves ...................................................................................... 10 2.1.3 Interoperabilidad CA........................................................................................ 11 2.1.3.1 SimulCrypt.............................................................................................................. 11 2.1.3.2 MultiCrypt .............................................................................................................. 12 2.1.3.3 Comparación..........................................................................................................
    [Show full text]