Can hyperlinks and digital rights management secure affordable access to information?

被引:0
|
作者
Deveci, Hasan A. [1 ]
机构
[1] MA LLM, Dipin Intellectual Property, Barrister, England
关键词
Hyperlinks; Digital rights management; Circumvention of technological measures; Trans-Pacific Partnership; Anti-Counterfeiting Trade Agreement; EU Copyright Directive (2001/29/EC);
D O I
10.1016/j.clsr.2012.09.002
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
Digital Rights Management Systems (DRMs) related control mechanism, which are analogous to and augment the exclusive rights, have been the subject of debate since the early 1980s. DRMs, which function like an electronic security guard that 'never leaves its post, never takes a break and never sleeps,(1) can invade the privacy of individuals, prevent competition and/or control access to a work that is not or is no longer copyright protected. Hyper links are citations of an electronic address, but when clicked they navigate the user to the source of further information, including codes circumventing DRMs. This article accepts that the excesses of DRMs can outreach copyright and/or contract law, but argues that DRMs provide an opportunity for innovative business models, which can both protect digital works and promote free use of hyperlinks. Part 1 outlines the background and legislative provisions related to DRMs. It contrasts the WIPO Copyright Treaty (WCT) 1996,2 Articles 11 and 12, with corresponding provisions found in the implementing legislation of the US Digital Millennium Copyright Act (DMCA) 1998,(3) and the EU Copyright Directive (EUCD) 2001.(4) It also examines the intellectual property aspects of the Trans-Pacific Partnership (TPP) and Europe's Anti-counterfeiting Trade Agreement (ACTA).(5) Part 2 debates opposing academic opinion and comments on case law relating to DRMs, including the use of hyperlinks as a way of trafficking circumvention technology and/or facilitating unauthorised access to a copyright work. It assesses the extent to which DRMs might inhibits the development of new products, prevents competition, or invades the privacy of individuals, and points to the opportunities a consumer group-rightholder negotiated model end user licence can offer. Part 3 concludes that DRMs bolsters the clutches of the right-holder, but reduce unauthorised access to information thus minimising revenue loss, which can make hyperlinked 'consumer' access to information 'affordable,' or even free. (C) 2012 Hasan Deveci. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:651 / 661
页数:11
相关论文
共 50 条
  • [1] A distributed digital rights management model for secure information-distribution systems
    Habtamu Abie
    Pål Spilling
    Bent Foyn
    International Journal of Information Security, 2004, 3 (2) : 113 - 128
  • [2] Digital Rights Management and Access to Information: a developing country's perspective
    Nicholson, Denise Rosemary
    LIBRES-LIBRARY AND INFORMATION SCIENCE RESEARCH ELECTRONIC JOURNAL, 2009, 19 (01):
  • [3] Digital access rights management in the information systems of e-libraries and digital archives
    Timoshenko, Igor, V
    NAUCHNYE I TEKHNICHESKIE BIBLIOTEKI-SCIENTIFIC AND TECHNICAL LIBRARIES, 2021, (11): : 85 - 104
  • [4] Secure platform for digital rights management distribution
    Ivan, Ion
    Toma, Cristian
    Popa, Marius
    Boja, CǍtǍlin
    WSEAS Transactions on Computers, 2007, 6 (03): : 478 - 485
  • [5] Digital rights management: The future is secure hardware
    Sibert, O
    ELECTRONIC DESIGN, 2000, 48 (10) : 56 - 56
  • [6] Secure content collaboration with information rights management
    Levy, C
    ECONTENT, 2003, 26 (10) : 36 - 41
  • [7] Can digital rights management be standardized?
    Rump, N
    IEEE SIGNAL PROCESSING MAGAZINE, 2004, 21 (02) : 63 - 70
  • [8] Secure multimedia streaming with trusted digital rights management
    Zhao, JZ
    Qi, Y
    Ma, ZF
    LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2005, : 817 - 821
  • [9] The Research of Access Control in Digital Rights Management
    Luo, Yang-Xia
    Fang, Ding-Yi
    2008 INTERNATIONAL WORKSHOP ON INFORMATION TECHNOLOGY AND SECURITY, 2008, : 196 - 200
  • [10] Secure Role and Rights Management for Automotive Access and Feature Activation
    Plappert, Christian
    Jaeger, Lukas
    Fuchs, Andreas
    ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 227 - 241