Code and Other Laws of Cyberspace
Code and Other Laws of Cyberspace
Analysis of security vulnerabilities in the movie production and distribution process
Proceedings of the 3rd ACM workshop on Digital rights management
How DRM-based content delivery systems disrupt expectations of "personal use"
Proceedings of the 3rd ACM workshop on Digital rights management
Proceedings of the 4th ACM workshop on Digital rights management
Fairer usage contracts for DRM
Proceedings of the 5th ACM workshop on Digital rights management
Who posts DeCSS and why?: a content analysis of web sites posting DVD circumvention software
Journal of the American Society for Information Science and Technology
Protecting fair use from digital rights management in china
Proceedings of the 2007 ACM workshop on Digital Rights Management
An analytical framework for evaluating peer-to-peer business models
Electronic Commerce Research and Applications
Parameters for Software Piracy Research
The Information Society
Assessing privacy criteria for drm using eu privacy legislation
Proceedings of the 8th ACM workshop on Digital rights management
Flow-net methodology for accountability in wireless networks
IEEE Network: The Magazine of Global Internetworking
Electronic Commerce Research and Applications
Towards multilateral-secure DRM platforms
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Functional Modelling and Analysis of IDM E-Tailer Platforms
International Journal of E-Business Research
Accountability and Q-Accountable Logging in Wireless Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
The main purpose of DRM is not to prevent copyright infringement but to change consumer expectations about what they are entitled to do with digital content.