SlideShare a Scribd company logo
1 of 20
DRM:  Evolution & E-books
DRM: Basic Info ,[object Object],[object Object],[object Object],[object Object]
DRM: Now
   
:58-1:14
DRM: Privacy Violations ,[object Object],[object Object],[object Object],[object Object]
Reaction:  Digital Consumers Bill of Rights 1. Users have the right to "time-shift" content that they have legally acquired. 2. Users have the right to "space-shift" content that they have legally acquired. 3. Users have the right to make backup copies of their content. 4. Users have the right to use legally acquired content on the platform of their choice. 5. Users have the right to translate legally acquired content into comparable formats. 6. Users have the right to use technology in order to achieve the rights previously mentioned.
DRM: Non E-books ,[object Object],[object Object]
Interoperability: E-books ,[object Object]
Ipod & Kindle
  Kindle Scandal ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Nook and Sony Reader ,[object Object],[object Object],[object Object],[object Object],[object Object]
Epub ,[object Object],[object Object],[object Object],[object Object]
Adobe Epub ,[object Object],[object Object],[object Object],[object Object]
Social DRM What kind of information should a social DRM system embed in a book-buyer’s file, besides someone’s name?     1. Use “Customized for…” with the user’s name and e-mail address.    2. Encrypt order or customer number, library-account or credit card information or mixes of them; and don’t require “unlocking” the way eReader does. With the order or customer number approach used instead of the direct credit card one, the chance of identify theft based on decryption of the actual files would be zero.               
Social DRM in Practice “ For eBooks, I really like the ’social DRM’ approach of The Pragmatic Programmers, who ’stamp’ PDF eBooks with a ‘For the Exclusive Use of …’ and the name of the purchaser. Given that they are making more than 30% of their total sales on eBooks, far more than any other traditional publisher, it’s hard to argue that this approach is infeasible.” Adobe’s Bill McCoy      According to an old Palm press release, “All eBooks from Palm are encrypted to prevent the unauthorized distribution of books. Using a credit card to make the purchase, a copy of the book is created in real time and is unique to an individual. When the book is opened for the first time on the person’s handheld computer, he/she is required to enter his/her name and credit card number in order to unlock his/her personal copy of the book. This unlock operation only happens the first time the book is opened.”   Every iTunes Plus file that you download from the iTunes store carries a bit of personal information: your iTunes username.    
Back Lash ,[object Object],[object Object],[object Object],[object Object]
Author’s Take ,[object Object],[object Object],[object Object]
Author’s Take Naomi Novik, who has written a five-book fantasy series called Temeraire, worries that the DRM component of eBooks will make her fans unhappy. After her own bad experience. She wants her readers to be able to use electronic versions of her books without struggling with the software.    "You don't have to make it hard," says Novik. "It's incredibly useful for [readers] to be able to search an electronic version of the files, to be able to copy and paste excerpts from it. When you have a DRM'd version that prevents people from doing that, it's really quite frustrating for a fan who has bought all the books."    Novik mirrors Doctorow's sentiment "The biggest danger to most authors, to most storytellers, is not that somebody is going to steal your work and pass it along — it is that nobody is ever going to see your work."  
DRM=Piracy

More Related Content

Viewers also liked

Papagayo • Guanacaste
Papagayo • GuanacastePapagayo • Guanacaste
Papagayo • GuanacasteSilvia Pacheco
 
Projecte F2G1
Projecte F2G1Projecte F2G1
Projecte F2G1F2G1
 
Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009
Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009
Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009Harold Smits
 
Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009
Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009
Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009Harold Smits
 
Curriculum And Sample Lesson Planpowerpoint
Curriculum And Sample Lesson PlanpowerpointCurriculum And Sample Lesson Planpowerpoint
Curriculum And Sample Lesson Planpowerpointguest67c25f
 

Viewers also liked (9)

Papagayo • Guanacaste
Papagayo • GuanacastePapagayo • Guanacaste
Papagayo • Guanacaste
 
P2
P2P2
P2
 
Projecte F2G1
Projecte F2G1Projecte F2G1
Projecte F2G1
 
Edificio buen campo
Edificio buen campoEdificio buen campo
Edificio buen campo
 
Some Projects
Some ProjectsSome Projects
Some Projects
 
Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009
Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009
Tijdreizen > New Knowledge Club > Erasmus Universiteit > december 2009
 
Michelangelo
MichelangeloMichelangelo
Michelangelo
 
Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009
Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009
Nieuwe Oude Dag > Innovatieve Voorbeelden > Den Haag > December 2009
 
Curriculum And Sample Lesson Planpowerpoint
Curriculum And Sample Lesson PlanpowerpointCurriculum And Sample Lesson Planpowerpoint
Curriculum And Sample Lesson Planpowerpoint
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Burstyn Ccc

  • 2.
  • 6.
  • 7. Reaction: Digital Consumers Bill of Rights 1. Users have the right to "time-shift" content that they have legally acquired. 2. Users have the right to "space-shift" content that they have legally acquired. 3. Users have the right to make backup copies of their content. 4. Users have the right to use legally acquired content on the platform of their choice. 5. Users have the right to translate legally acquired content into comparable formats. 6. Users have the right to use technology in order to achieve the rights previously mentioned.
  • 8.
  • 9.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Social DRM What kind of information should a social DRM system embed in a book-buyer’s file, besides someone’s name?    1. Use “Customized for…” with the user’s name and e-mail address.   2. Encrypt order or customer number, library-account or credit card information or mixes of them; and don’t require “unlocking” the way eReader does. With the order or customer number approach used instead of the direct credit card one, the chance of identify theft based on decryption of the actual files would be zero.               
  • 16. Social DRM in Practice “ For eBooks, I really like the ’social DRM’ approach of The Pragmatic Programmers, who ’stamp’ PDF eBooks with a ‘For the Exclusive Use of …’ and the name of the purchaser. Given that they are making more than 30% of their total sales on eBooks, far more than any other traditional publisher, it’s hard to argue that this approach is infeasible.” Adobe’s Bill McCoy     According to an old Palm press release, “All eBooks from Palm are encrypted to prevent the unauthorized distribution of books. Using a credit card to make the purchase, a copy of the book is created in real time and is unique to an individual. When the book is opened for the first time on the person’s handheld computer, he/she is required to enter his/her name and credit card number in order to unlock his/her personal copy of the book. This unlock operation only happens the first time the book is opened.”   Every iTunes Plus file that you download from the iTunes store carries a bit of personal information: your iTunes username.   
  • 17.
  • 18.
  • 19. Author’s Take Naomi Novik, who has written a five-book fantasy series called Temeraire, worries that the DRM component of eBooks will make her fans unhappy. After her own bad experience. She wants her readers to be able to use electronic versions of her books without struggling with the software.   "You don't have to make it hard," says Novik. "It's incredibly useful for [readers] to be able to search an electronic version of the files, to be able to copy and paste excerpts from it. When you have a DRM'd version that prevents people from doing that, it's really quite frustrating for a fan who has bought all the books."   Novik mirrors Doctorow's sentiment "The biggest danger to most authors, to most storytellers, is not that somebody is going to steal your work and pass it along — it is that nobody is ever going to see your work."  

Editor's Notes

  1. The current DRM system is nothing more than a usage license, that use-based DRM systems are contracts of adhesion between the consumer and the copyright holder in which the consumer is restricted to agreeing with draconian DRM policies.  
  2. Step 1: The consumer makes a request from the license server for a valid, unique set of rights. Step 2: The license server evaluates the request from the consumer. The server then compares these requests to a standard of rules and policies. It then determines what rights can be granted and then that set of rights is granted to the consumer. Step 3: The license server presents the consumer with a set of rights that closely matches the request. Step 4: The consumer obtains a satisfactory set of rights or can choose to go back to step I.
  3. Similar to iTunes content, you can share eBooks between up to six Kindles on the same account     No one but Apple is allowed to make players for iTunes Music Store songs, and no one but Apple can sell you proprietary file-format music that will play on the iPod. Yay DMCA They were able to create an eBook ecosystem where their customers purchased content solely through Amazon. As Apple had done with digital music, Amazon was now doing with eBooks.     Amazon’s proprietary AZW format, as well as support for PDF, HTML, DOC, JPEG, GIF, PNG, BMP through conversion.   I'm not going to lie to you: some stuff just isn't coming with you. Your DRM-ed AAC audio files, iTunes movies and TV shows, and even those iTunes audiobooks, just can't survive outside of the iTunes/iPod universe. So quell those fantasies of uninstalling iTunes, because you'll still need it to play your protected iTunes purchases.    The good news is, most everything else from iTunes is fair game, including your unprotected AAC and MP3 files, podcasts, unprotected videos, and playlists. Even your iTunes Smart Playlists can be reconstructed with a decent resemblance.     based on its DRM system, not all Kindle books can be re-downloaded, a sticking point even with some fans. For those that can, all Kindle eBooks include limits on the number of re-downloads and those limits vary per book.