SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
GET YOUR WORK DONE BY
                   www.TopGradePapers.com




 University Name




                                rs
                             pe
        E-Commerce Economic Essay

                   Pa
                   IPR-Case Study
                      Your Name
        de
 ra
pG
To




                                            09

                                            1

                   GET YOUR WORK DONE BY
                   www.TopGradePapers.com
GET YOUR WORK DONE BY
                                        www.TopGradePapers.com




 During past decades, it has been seen that most of the economies are moving towards capitalist
 economies, but now the trend has transformed its pace and it has taken turn to move to the new
 system which is intellectual capitalism. In broad terms, intellectual capitalism (Article 2) can be




                                                      rs
 interpreted as resulting from a confluence of a capitalist economy and a knowledge or
 information economy in which intellectual capital (Non Tangible Capitalized Assets) in some




                                                   pe
 sense is dominant. This industry, these days especially, has become the most important and vital
 for all the developed economies, on the whole, because this is the most growing and feasible
 industry; as it has highest potential for growth both domestically and internationally, as well. The
 Intellectual capital industry, with its highest growth prospects, is also prone to many important




                                    Pa
 issues related to creation, use, and distribution of the digital content through e-commerce
 channels.
                  de
 Intellectual Capital needs Intellectual Property Rights (IPRs), to motivate and secure the return
 of the person behind the innovation of the product or producing a valuable document or coming
 up with amusing sound tracks. The argument goes with the discussion that intellectual property
 rights are causing harm to the society as a whole because they restrict the flow of products which
     ra

 are representation of our culture so they restrict the flow of sharing the culture (Article 2). On the
 contrary, it is argued that IPRs are the baseline for motivating the individuals to come up with
pG


 the innovative products and hence they contribute to the well being of whole of the society in the
 form of growth and newer technologies (Article 2).



 This issue is apart, initially the main problem is discussed which is the protection of this industry
To




 and safety from the malpractices which surpass the security barriers and misuse or steal the
 material from online libraries or wherever they are stored (Form: B2C or B2B). This has been
 done with the use of technology, as technology provides opportunities for convenience and
 growth, at the same time it also pose threats because new technology brings new methods of
 malpractice with it. The Digital media in the form of still images, video, sound, and multimedia
 shows potential for growth and improvements in their use because of higher enhance human
 machine interaction in almost all the form of business. E-commerce (B2C and B2B) channels



                                        GET YOUR WORK DONE BY
                                        www.TopGradePapers.com
GET YOUR WORK DONE BY
                                         www.TopGradePapers.com




 have become a primary distribution channel for the digital media market, which in turn has seen
 a dramatic growth in the last few years or so (Article 2). Keeping in view the growth and
 challenges of Intellectual Capital market, the international intellectual property alliance
 estimated the annual loss of revenue in the U.S. motion picture industry due to piracy amounting




                                                      rs
 to US$1.5 billion, and in the record and music industries amounting to US$2.3 billion for the
 financial year of 2003 (IPR, 2005). It is also worth discussing that a large portion of Internet
 bandwidth (approximately 30%) is consumed by users exchanging illegal copies of digital media




                                                   pe
 (Article 2).



 To save the market and materialize the challenges in the form of profits, IPRs has been emerging




                                     Pa
 as safety measures of the intellectual capital from all malpractice activities and it is worth to
 discuss the safety procedures here (Article 1). Two major categories of IPR protection are: copy
 prevention and copy detection. Copy prevention methods include software techniques such as
                  de
 cryptography, password authentication, and physical media protection techniques such as
 CD/DVD copy prevention systems. Copy detection methods, such as digital watermarking are
 becoming extremely popular (Article 2). They do not directly avert theft but rather discourage it
 by supporting detection of stolen copyrighted material. Complete solutions to IPR protection and
      ra

 management in e-business such as digital rights management (DRM) systems have been
 proposed for the efficient and complete protection of digital content and management of licenses
 throughout its lifecycle (Article 2).
pG



 The protection techniques for different aspects are shown in a figure of the article which is
 shown below; through the pyramid whole of the procedure of protection is described and which
To




 comprises of whole of the DRM process of Intellectual Property Protection. According to this
 table the first stage self protecting level comes then metadata protection that includes MPEG1
 and MPEG2. At the third stage it takes us to the level of the watermarking in which data hiding
 is used. The fourth level emphasizes upon the encryption level of the digital signatures and the
 hash functions. At the final stage and in the bottom the physical level comes that means the CD,
 DVD and other physical equipment protections.




                                         GET YOUR WORK DONE BY
                                         www.TopGradePapers.com
GET YOUR WORK DONE BY
                                        www.TopGradePapers.com




 The initial stage of pyramid is associated with the IPR protection techniques associated with the
 storage mediums. Next level is related to encryption techniques; here the digital signature of
 hash functions or both of the techniques are used for data security and protection. Next level is
 data hiding level which is the most important because the relevant technique of watermarking is




                                                      rs
 most reliable, efficient and convenient to use. Next level is the metadata level; it is relatively new
 method to overcome the problems related to the protection of data having protection rights to be
 protected. The final stage on the pyramid is the self protecting level of the content (Article 2).




                                                   pe
 This includes special logic and it offers solution for ever increasing problem of immature
 economy. All of the methods on the pyramid collaborate to offer an effective solution for the
 protection of digital content available on internet and accessible by almost everyone in the world.




                                    Pa
 (Article 1)


 Digital Rights Management Systems (DRM)
                  de
 A new and complete system to protect the content online, offers opportunities and a complete
 solution set to manage IPR (Article 2). The benefit of this system is that it can be used with the
 software a company uses to manage its online selling business, so the DRM system integrates
     ra

 with the current corporate system easily offering opportunities for growth and increasing
 efficiency. This is also very cost effective because to implement this software, there is no need
 for process reengineering, current system is well integrated and the software costs less; payments
pG


 for the software are paid according to the usage of the service like the content which is saved for
 the company, instigate cost savings of the company in the form of saved content misuse and steal
 of the product available online, further distribute costs for the usage of the software; the cost
 incurred for safety is minimal compared to the costs and misuse saved.
To




 DRM woks as independent software, because the DRM service provider authority gets the data
 from the company to be sold on net and then takes on the responsibility of safety and proper
 distribution with the usage of tailored business model. According to Rossenbalt (2002),
 explained in the Article 2, there are two major definitions of DRM systems: one encompasses the
 encryption techniques mainly, which is referred as narrow technique, and the other one is




                                        GET YOUR WORK DONE BY
                                        www.TopGradePapers.com
GET YOUR WORK DONE BY
                                        www.TopGradePapers.com




 broader one which extends to the rights management by using the techniques shown above in the
 pyramid.


 Digital Watermarking: A promising solution




                                                      rs
 The relatively new technique related to the image processing is also seen as a perfect solution for
 images and videos related content on the web (Article 1). This can be used to stop the illegal




                                                   pe
 attempts to access the digital content available on net. Sometimes watermarks are visible to the
 humans and sometimes they are hidden and not brought on screen but the software confirms its
 authentic source and access the site which initiates the illegal usage.




                                    Pa
 Security is naturally one of the main concerns of each company in a decision to adopt DRM
 system. There is no DRM system which can offer perfect security from the misuse and
 malpractice of the content available online, especially because of the reason that perfection asks
                  de
 for more and higher costs. Some technologies either prevent the illegal use and other the reuse of
 digital Content, so total protection is a challenge most of the time with the usage of one selective
 technology keeping in view the cost constrains (Article 2).
      ra

 Watermarks offering the advantage by offering multiple watermarks which run check more than
 once, but they are not always reliable alone. It is necessary to work with other procedures, and
pG


 companies’ business model must adapt and check for durability. The major problem with
 security and protection is related to the deadlock, when a fake watermark is inserted and it
 becomes difficult to track the true ownership (Article 2).
To




 The extensive growth of digital media usage has offered a lot of challenges for security
 problems, related to distribution and sales, most of the time. This need has given birth to the
 extensive need of the development of new security methods, which extensively adapt to the
 current business model and reduce the costs to its optimum level. The major challenges are
 offered in the B2C model, where human interaction is more frequent than B2B, that’s why
 companies are more concerned about the source and reliability of the model and software used
 (Article 1,2).



                                        GET YOUR WORK DONE BY
                                        www.TopGradePapers.com
GET YOUR WORK DONE BY
                                      www.TopGradePapers.com




                                          References:




                                                    rs
 Article 1:




                                                 pe
 Rick Carnes & Coley Hudgins, (August 2009), COPYRIGHT IS CRUCIAL FOR CULTURE;
 Strong Intellectual-Property Rights Have Helped The Arts And The Economy, Nielsen Business
 Media.




 Article 2:

                                   Pa
                  de
 Bill Vassiliadis & Vassilis Fotopoulos, (2007), IPR Protection for digital media distribution:
 Trends and solutions in the E-Business domain, Hellenic Open University, Greece.
     ra
pG
To




                                      GET YOUR WORK DONE BY
                                      www.TopGradePapers.com

Más contenido relacionado

La actualidad más candente

Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodmanjonneiditz
 
2013 global security report
2013 global security report2013 global security report
2013 global security reportYury Chemerkin
 
21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs21st Century Airport Transportation Hubs
21st Century Airport Transportation HubsMestizo Enterprises
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepapergenasun
 
Revolution Or Evolution Exec Summary
Revolution Or Evolution Exec SummaryRevolution Or Evolution Exec Summary
Revolution Or Evolution Exec SummaryWilliam Beer
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 
Big data and big content
Big data and big contentBig data and big content
Big data and big contentJohn Mancini
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_finalChristopher Wang
 
In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...John Mancini
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Ageglobal
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019Ulf Mattsson
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017Craig Devlin
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2olambel
 

La actualidad más candente (17)

Cloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell GoodmanCloud Webinar Neiditz Weitz Mitchell Goodman
Cloud Webinar Neiditz Weitz Mitchell Goodman
 
2013 global security report
2013 global security report2013 global security report
2013 global security report
 
21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs
 
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
A Study on the Security Warning Algorithmfor Copyright Protectionin Network E...
 
Good Security Whitepaper
Good Security WhitepaperGood Security Whitepaper
Good Security Whitepaper
 
Revolution Or Evolution Exec Summary
Revolution Or Evolution Exec SummaryRevolution Or Evolution Exec Summary
Revolution Or Evolution Exec Summary
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
Big data and big content
Big data and big contentBig data and big content
Big data and big content
 
Telefónica security io_t_final
Telefónica security io_t_finalTelefónica security io_t_final
Telefónica security io_t_final
 
In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Age
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
Security Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – NetmagicSecurity Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – Netmagic
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2
 

Similar a E commerce economic essay assignment - www.topgradepapers.com

Digital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital eraDigital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital eraKishor Satpathy
 
Software Piracy Protection
Software Piracy ProtectionSoftware Piracy Protection
Software Piracy Protectionijtsrd
 
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp
 
One page business summary - cryptsonic technologies incorporated
One page business summary - cryptsonic technologies incorporatedOne page business summary - cryptsonic technologies incorporated
One page business summary - cryptsonic technologies incorporatedSeiji Eto
 
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...AIRCC Publishing Corporation
 
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...ijcsit
 
What is Digital Property Rights by fluidscapes
What is Digital Property Rights by fluidscapesWhat is Digital Property Rights by fluidscapes
What is Digital Property Rights by fluidscapesFluidscapes
 
Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Alexander Decker
 
A Digital Rights Management System Based on Cloud
A Digital Rights Management System Based on CloudA Digital Rights Management System Based on Cloud
A Digital Rights Management System Based on CloudTELKOMNIKA JOURNAL
 
Cryptsonic pitch deck
Cryptsonic   pitch deckCryptsonic   pitch deck
Cryptsonic pitch deckSeiji Eto
 
the world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docxthe world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docxpelise1
 
Introduction to new technologies
Introduction to new technologiesIntroduction to new technologies
Introduction to new technologiesTracey Roberts
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chainVanya Vladeva
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesIRJET Journal
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
Information Technology
Information TechnologyInformation Technology
Information TechnologyDivyank Jindal
 

Similar a E commerce economic essay assignment - www.topgradepapers.com (20)

Digital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital eraDigital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital era
 
Software Piracy Protection
Software Piracy ProtectionSoftware Piracy Protection
Software Piracy Protection
 
MIS ppt 1
MIS ppt 1MIS ppt 1
MIS ppt 1
 
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
 
One page business summary - cryptsonic technologies incorporated
One page business summary - cryptsonic technologies incorporatedOne page business summary - cryptsonic technologies incorporated
One page business summary - cryptsonic technologies incorporated
 
Digital Rights Management
Digital Rights Management Digital Rights Management
Digital Rights Management
 
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
Robust Watermarking Method for Secure Transmission of Medical Images in EHR S...
 
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
ROBUST WATERMARKING METHOD FOR SECURE TRANSMISSION OF MEDICAL IMAGES IN EHR S...
 
What is Digital Property Rights by fluidscapes
What is Digital Property Rights by fluidscapesWhat is Digital Property Rights by fluidscapes
What is Digital Property Rights by fluidscapes
 
Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...Protecting legitimate software users’ interest in designing a piracy preventi...
Protecting legitimate software users’ interest in designing a piracy preventi...
 
Digital rights management
Digital rights managementDigital rights management
Digital rights management
 
A Digital Rights Management System Based on Cloud
A Digital Rights Management System Based on CloudA Digital Rights Management System Based on Cloud
A Digital Rights Management System Based on Cloud
 
Cryptsonic pitch deck
Cryptsonic   pitch deckCryptsonic   pitch deck
Cryptsonic pitch deck
 
the world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docxthe world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docx
 
Case Study.pdf
Case Study.pdfCase Study.pdf
Case Study.pdf
 
Introduction to new technologies
Introduction to new technologiesIntroduction to new technologies
Introduction to new technologies
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
 
Cyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest TechnologiesCyber Security Challenges on Latest Technologies
Cyber Security Challenges on Latest Technologies
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 

Más de Top Grade Papers

Strategy schools academic literature essay - www.topgradepapers.com
Strategy schools   academic literature essay - www.topgradepapers.comStrategy schools   academic literature essay - www.topgradepapers.com
Strategy schools academic literature essay - www.topgradepapers.comTop Grade Papers
 
School teacher compensation effect on performance academic essay assignment...
School teacher compensation effect on performance   academic essay assignment...School teacher compensation effect on performance   academic essay assignment...
School teacher compensation effect on performance academic essay assignment...Top Grade Papers
 
Resourcing academic assignment essay - www.topgradepapers.com
Resourcing   academic assignment essay - www.topgradepapers.comResourcing   academic assignment essay - www.topgradepapers.com
Resourcing academic assignment essay - www.topgradepapers.comTop Grade Papers
 
Organisational diagnosis for effective functionality academic essay assignm...
Organisational diagnosis for effective functionality   academic essay assignm...Organisational diagnosis for effective functionality   academic essay assignm...
Organisational diagnosis for effective functionality academic essay assignm...Top Grade Papers
 
Nanotechnology academic essay assignment - www.topgradepapers.com
Nanotechnology   academic essay assignment - www.topgradepapers.comNanotechnology   academic essay assignment - www.topgradepapers.com
Nanotechnology academic essay assignment - www.topgradepapers.comTop Grade Papers
 
Memorandum writing how to write memo - academic assignment - www.topgradepa...
Memorandum writing   how to write memo - academic assignment - www.topgradepa...Memorandum writing   how to write memo - academic assignment - www.topgradepa...
Memorandum writing how to write memo - academic assignment - www.topgradepa...Top Grade Papers
 
Literature analysis of sudia arabia companies - assignment - www.topgradepa...
Literature   analysis of sudia arabia companies - assignment - www.topgradepa...Literature   analysis of sudia arabia companies - assignment - www.topgradepa...
Literature analysis of sudia arabia companies - assignment - www.topgradepa...Top Grade Papers
 
Knowledge of occupational safety and health in the workplace academic essay...
Knowledge of occupational safety and health in the workplace   academic essay...Knowledge of occupational safety and health in the workplace   academic essay...
Knowledge of occupational safety and health in the workplace academic essay...Top Grade Papers
 
Introduction to project management academic essay assignment - www.topgrade...
Introduction to project management   academic essay assignment - www.topgrade...Introduction to project management   academic essay assignment - www.topgrade...
Introduction to project management academic essay assignment - www.topgrade...Top Grade Papers
 
International tourism dissertation academic ph.d - www.topgradepapers.com
International tourism   dissertation academic ph.d - www.topgradepapers.comInternational tourism   dissertation academic ph.d - www.topgradepapers.com
International tourism dissertation academic ph.d - www.topgradepapers.comTop Grade Papers
 
Global business environment feasibility report for expansion - academic ass...
Global business environment   feasibility report for expansion - academic ass...Global business environment   feasibility report for expansion - academic ass...
Global business environment feasibility report for expansion - academic ass...Top Grade Papers
 
Essay the relevance of basel ii capital adequacy framework in the aftermath o...
Essay the relevance of basel ii capital adequacy framework in the aftermath o...Essay the relevance of basel ii capital adequacy framework in the aftermath o...
Essay the relevance of basel ii capital adequacy framework in the aftermath o...Top Grade Papers
 
Essay assignment research paper on afirmative actions - www.topgradepapers.com
Essay assignment   research paper on afirmative actions - www.topgradepapers.comEssay assignment   research paper on afirmative actions - www.topgradepapers.com
Essay assignment research paper on afirmative actions - www.topgradepapers.comTop Grade Papers
 
Cultural considerations in international business academic essay assignment...
Cultural considerations in international business   academic essay assignment...Cultural considerations in international business   academic essay assignment...
Cultural considerations in international business academic essay assignment...Top Grade Papers
 
Corporate finance academic assignment - www.topgradepapers.com
Corporate finance   academic assignment - www.topgradepapers.comCorporate finance   academic assignment - www.topgradepapers.com
Corporate finance academic assignment - www.topgradepapers.comTop Grade Papers
 
Classical and contemporary schools academic assignment essay - www.topgrade...
Classical and contemporary schools   academic assignment essay - www.topgrade...Classical and contemporary schools   academic assignment essay - www.topgrade...
Classical and contemporary schools academic assignment essay - www.topgrade...Top Grade Papers
 
Case study for it strategic planning academic assignment - www.topgradepape...
Case study for it strategic planning   academic assignment - www.topgradepape...Case study for it strategic planning   academic assignment - www.topgradepape...
Case study for it strategic planning academic assignment - www.topgradepape...Top Grade Papers
 
Assignment gu pudding brand campaign www.topgradepapers.com
Assignment gu pudding brand campaign   www.topgradepapers.comAssignment gu pudding brand campaign   www.topgradepapers.com
Assignment gu pudding brand campaign www.topgradepapers.comTop Grade Papers
 
Analysis of more proffered way of communication academic essay assignment -...
Analysis of more proffered way of communication   academic essay assignment -...Analysis of more proffered way of communication   academic essay assignment -...
Analysis of more proffered way of communication academic essay assignment -...Top Grade Papers
 
Age discrimination academic essay assignment - www.topgradepapers.com
Age discrimination   academic essay assignment - www.topgradepapers.comAge discrimination   academic essay assignment - www.topgradepapers.com
Age discrimination academic essay assignment - www.topgradepapers.comTop Grade Papers
 

Más de Top Grade Papers (20)

Strategy schools academic literature essay - www.topgradepapers.com
Strategy schools   academic literature essay - www.topgradepapers.comStrategy schools   academic literature essay - www.topgradepapers.com
Strategy schools academic literature essay - www.topgradepapers.com
 
School teacher compensation effect on performance academic essay assignment...
School teacher compensation effect on performance   academic essay assignment...School teacher compensation effect on performance   academic essay assignment...
School teacher compensation effect on performance academic essay assignment...
 
Resourcing academic assignment essay - www.topgradepapers.com
Resourcing   academic assignment essay - www.topgradepapers.comResourcing   academic assignment essay - www.topgradepapers.com
Resourcing academic assignment essay - www.topgradepapers.com
 
Organisational diagnosis for effective functionality academic essay assignm...
Organisational diagnosis for effective functionality   academic essay assignm...Organisational diagnosis for effective functionality   academic essay assignm...
Organisational diagnosis for effective functionality academic essay assignm...
 
Nanotechnology academic essay assignment - www.topgradepapers.com
Nanotechnology   academic essay assignment - www.topgradepapers.comNanotechnology   academic essay assignment - www.topgradepapers.com
Nanotechnology academic essay assignment - www.topgradepapers.com
 
Memorandum writing how to write memo - academic assignment - www.topgradepa...
Memorandum writing   how to write memo - academic assignment - www.topgradepa...Memorandum writing   how to write memo - academic assignment - www.topgradepa...
Memorandum writing how to write memo - academic assignment - www.topgradepa...
 
Literature analysis of sudia arabia companies - assignment - www.topgradepa...
Literature   analysis of sudia arabia companies - assignment - www.topgradepa...Literature   analysis of sudia arabia companies - assignment - www.topgradepa...
Literature analysis of sudia arabia companies - assignment - www.topgradepa...
 
Knowledge of occupational safety and health in the workplace academic essay...
Knowledge of occupational safety and health in the workplace   academic essay...Knowledge of occupational safety and health in the workplace   academic essay...
Knowledge of occupational safety and health in the workplace academic essay...
 
Introduction to project management academic essay assignment - www.topgrade...
Introduction to project management   academic essay assignment - www.topgrade...Introduction to project management   academic essay assignment - www.topgrade...
Introduction to project management academic essay assignment - www.topgrade...
 
International tourism dissertation academic ph.d - www.topgradepapers.com
International tourism   dissertation academic ph.d - www.topgradepapers.comInternational tourism   dissertation academic ph.d - www.topgradepapers.com
International tourism dissertation academic ph.d - www.topgradepapers.com
 
Global business environment feasibility report for expansion - academic ass...
Global business environment   feasibility report for expansion - academic ass...Global business environment   feasibility report for expansion - academic ass...
Global business environment feasibility report for expansion - academic ass...
 
Essay the relevance of basel ii capital adequacy framework in the aftermath o...
Essay the relevance of basel ii capital adequacy framework in the aftermath o...Essay the relevance of basel ii capital adequacy framework in the aftermath o...
Essay the relevance of basel ii capital adequacy framework in the aftermath o...
 
Essay assignment research paper on afirmative actions - www.topgradepapers.com
Essay assignment   research paper on afirmative actions - www.topgradepapers.comEssay assignment   research paper on afirmative actions - www.topgradepapers.com
Essay assignment research paper on afirmative actions - www.topgradepapers.com
 
Cultural considerations in international business academic essay assignment...
Cultural considerations in international business   academic essay assignment...Cultural considerations in international business   academic essay assignment...
Cultural considerations in international business academic essay assignment...
 
Corporate finance academic assignment - www.topgradepapers.com
Corporate finance   academic assignment - www.topgradepapers.comCorporate finance   academic assignment - www.topgradepapers.com
Corporate finance academic assignment - www.topgradepapers.com
 
Classical and contemporary schools academic assignment essay - www.topgrade...
Classical and contemporary schools   academic assignment essay - www.topgrade...Classical and contemporary schools   academic assignment essay - www.topgrade...
Classical and contemporary schools academic assignment essay - www.topgrade...
 
Case study for it strategic planning academic assignment - www.topgradepape...
Case study for it strategic planning   academic assignment - www.topgradepape...Case study for it strategic planning   academic assignment - www.topgradepape...
Case study for it strategic planning academic assignment - www.topgradepape...
 
Assignment gu pudding brand campaign www.topgradepapers.com
Assignment gu pudding brand campaign   www.topgradepapers.comAssignment gu pudding brand campaign   www.topgradepapers.com
Assignment gu pudding brand campaign www.topgradepapers.com
 
Analysis of more proffered way of communication academic essay assignment -...
Analysis of more proffered way of communication   academic essay assignment -...Analysis of more proffered way of communication   academic essay assignment -...
Analysis of more proffered way of communication academic essay assignment -...
 
Age discrimination academic essay assignment - www.topgradepapers.com
Age discrimination   academic essay assignment - www.topgradepapers.comAge discrimination   academic essay assignment - www.topgradepapers.com
Age discrimination academic essay assignment - www.topgradepapers.com
 

Último

All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 

Último (20)

All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 

E commerce economic essay assignment - www.topgradepapers.com

  • 1. GET YOUR WORK DONE BY www.TopGradePapers.com University Name rs pe E-Commerce Economic Essay Pa IPR-Case Study Your Name de ra pG To 09 1 GET YOUR WORK DONE BY www.TopGradePapers.com
  • 2. GET YOUR WORK DONE BY www.TopGradePapers.com During past decades, it has been seen that most of the economies are moving towards capitalist economies, but now the trend has transformed its pace and it has taken turn to move to the new system which is intellectual capitalism. In broad terms, intellectual capitalism (Article 2) can be rs interpreted as resulting from a confluence of a capitalist economy and a knowledge or information economy in which intellectual capital (Non Tangible Capitalized Assets) in some pe sense is dominant. This industry, these days especially, has become the most important and vital for all the developed economies, on the whole, because this is the most growing and feasible industry; as it has highest potential for growth both domestically and internationally, as well. The Intellectual capital industry, with its highest growth prospects, is also prone to many important Pa issues related to creation, use, and distribution of the digital content through e-commerce channels. de Intellectual Capital needs Intellectual Property Rights (IPRs), to motivate and secure the return of the person behind the innovation of the product or producing a valuable document or coming up with amusing sound tracks. The argument goes with the discussion that intellectual property rights are causing harm to the society as a whole because they restrict the flow of products which ra are representation of our culture so they restrict the flow of sharing the culture (Article 2). On the contrary, it is argued that IPRs are the baseline for motivating the individuals to come up with pG the innovative products and hence they contribute to the well being of whole of the society in the form of growth and newer technologies (Article 2). This issue is apart, initially the main problem is discussed which is the protection of this industry To and safety from the malpractices which surpass the security barriers and misuse or steal the material from online libraries or wherever they are stored (Form: B2C or B2B). This has been done with the use of technology, as technology provides opportunities for convenience and growth, at the same time it also pose threats because new technology brings new methods of malpractice with it. The Digital media in the form of still images, video, sound, and multimedia shows potential for growth and improvements in their use because of higher enhance human machine interaction in almost all the form of business. E-commerce (B2C and B2B) channels GET YOUR WORK DONE BY www.TopGradePapers.com
  • 3. GET YOUR WORK DONE BY www.TopGradePapers.com have become a primary distribution channel for the digital media market, which in turn has seen a dramatic growth in the last few years or so (Article 2). Keeping in view the growth and challenges of Intellectual Capital market, the international intellectual property alliance estimated the annual loss of revenue in the U.S. motion picture industry due to piracy amounting rs to US$1.5 billion, and in the record and music industries amounting to US$2.3 billion for the financial year of 2003 (IPR, 2005). It is also worth discussing that a large portion of Internet bandwidth (approximately 30%) is consumed by users exchanging illegal copies of digital media pe (Article 2). To save the market and materialize the challenges in the form of profits, IPRs has been emerging Pa as safety measures of the intellectual capital from all malpractice activities and it is worth to discuss the safety procedures here (Article 1). Two major categories of IPR protection are: copy prevention and copy detection. Copy prevention methods include software techniques such as de cryptography, password authentication, and physical media protection techniques such as CD/DVD copy prevention systems. Copy detection methods, such as digital watermarking are becoming extremely popular (Article 2). They do not directly avert theft but rather discourage it by supporting detection of stolen copyrighted material. Complete solutions to IPR protection and ra management in e-business such as digital rights management (DRM) systems have been proposed for the efficient and complete protection of digital content and management of licenses throughout its lifecycle (Article 2). pG The protection techniques for different aspects are shown in a figure of the article which is shown below; through the pyramid whole of the procedure of protection is described and which To comprises of whole of the DRM process of Intellectual Property Protection. According to this table the first stage self protecting level comes then metadata protection that includes MPEG1 and MPEG2. At the third stage it takes us to the level of the watermarking in which data hiding is used. The fourth level emphasizes upon the encryption level of the digital signatures and the hash functions. At the final stage and in the bottom the physical level comes that means the CD, DVD and other physical equipment protections. GET YOUR WORK DONE BY www.TopGradePapers.com
  • 4. GET YOUR WORK DONE BY www.TopGradePapers.com The initial stage of pyramid is associated with the IPR protection techniques associated with the storage mediums. Next level is related to encryption techniques; here the digital signature of hash functions or both of the techniques are used for data security and protection. Next level is data hiding level which is the most important because the relevant technique of watermarking is rs most reliable, efficient and convenient to use. Next level is the metadata level; it is relatively new method to overcome the problems related to the protection of data having protection rights to be protected. The final stage on the pyramid is the self protecting level of the content (Article 2). pe This includes special logic and it offers solution for ever increasing problem of immature economy. All of the methods on the pyramid collaborate to offer an effective solution for the protection of digital content available on internet and accessible by almost everyone in the world. Pa (Article 1) Digital Rights Management Systems (DRM) de A new and complete system to protect the content online, offers opportunities and a complete solution set to manage IPR (Article 2). The benefit of this system is that it can be used with the software a company uses to manage its online selling business, so the DRM system integrates ra with the current corporate system easily offering opportunities for growth and increasing efficiency. This is also very cost effective because to implement this software, there is no need for process reengineering, current system is well integrated and the software costs less; payments pG for the software are paid according to the usage of the service like the content which is saved for the company, instigate cost savings of the company in the form of saved content misuse and steal of the product available online, further distribute costs for the usage of the software; the cost incurred for safety is minimal compared to the costs and misuse saved. To DRM woks as independent software, because the DRM service provider authority gets the data from the company to be sold on net and then takes on the responsibility of safety and proper distribution with the usage of tailored business model. According to Rossenbalt (2002), explained in the Article 2, there are two major definitions of DRM systems: one encompasses the encryption techniques mainly, which is referred as narrow technique, and the other one is GET YOUR WORK DONE BY www.TopGradePapers.com
  • 5. GET YOUR WORK DONE BY www.TopGradePapers.com broader one which extends to the rights management by using the techniques shown above in the pyramid. Digital Watermarking: A promising solution rs The relatively new technique related to the image processing is also seen as a perfect solution for images and videos related content on the web (Article 1). This can be used to stop the illegal pe attempts to access the digital content available on net. Sometimes watermarks are visible to the humans and sometimes they are hidden and not brought on screen but the software confirms its authentic source and access the site which initiates the illegal usage. Pa Security is naturally one of the main concerns of each company in a decision to adopt DRM system. There is no DRM system which can offer perfect security from the misuse and malpractice of the content available online, especially because of the reason that perfection asks de for more and higher costs. Some technologies either prevent the illegal use and other the reuse of digital Content, so total protection is a challenge most of the time with the usage of one selective technology keeping in view the cost constrains (Article 2). ra Watermarks offering the advantage by offering multiple watermarks which run check more than once, but they are not always reliable alone. It is necessary to work with other procedures, and pG companies’ business model must adapt and check for durability. The major problem with security and protection is related to the deadlock, when a fake watermark is inserted and it becomes difficult to track the true ownership (Article 2). To The extensive growth of digital media usage has offered a lot of challenges for security problems, related to distribution and sales, most of the time. This need has given birth to the extensive need of the development of new security methods, which extensively adapt to the current business model and reduce the costs to its optimum level. The major challenges are offered in the B2C model, where human interaction is more frequent than B2B, that’s why companies are more concerned about the source and reliability of the model and software used (Article 1,2). GET YOUR WORK DONE BY www.TopGradePapers.com
  • 6. GET YOUR WORK DONE BY www.TopGradePapers.com References: rs Article 1: pe Rick Carnes & Coley Hudgins, (August 2009), COPYRIGHT IS CRUCIAL FOR CULTURE; Strong Intellectual-Property Rights Have Helped The Arts And The Economy, Nielsen Business Media. Article 2: Pa de Bill Vassiliadis & Vassilis Fotopoulos, (2007), IPR Protection for digital media distribution: Trends and solutions in the E-Business domain, Hellenic Open University, Greece. ra pG To GET YOUR WORK DONE BY www.TopGradePapers.com