Listing 1 - 8 of 8 |
Sort by
|
Choose an application
Digital Rights Management (DRM) is a topic of interest to a wide range of people from various backgrounds: engineers and technicians, legal academics and lawyers, economists and business practitioners. The two conferences on the issue held in 2000 and 2002 in Berlin, Germany, brought these people together for fruitful discussions. This book continues this process by providing insights into the three main areas that DRM in?uences and that DRM is influenced by: technology, economics, and law and politics. Looking at the first results of the two conferences we would like to emphasize three aspects. Firstly, DRM is a fairly young topic with many issues still - resolved. Secondly, there is still an acute lack of objective information about DRM and the consequences of using (or not using) DRM in our Information Society. And, finally, only open discussions amongst all the interested parties and people from different scientific and practical backgrounds can help to create a foundation on which DRM can actually become useful.
Computer security --- -Data protection --- -Copyright and electronic data processing --- -Internet --- 005.8 --- Electronic data processing and copyright --- Copyright infringement --- Fair use (Copyright) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Security measures --- Copyright and electronic data processing --- Internet --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- Computer science. --- Information technology. --- Business --- Computer communication systems. --- Operating systems (Computers). --- Data encryption (Computer science). --- Information storage and retrieval. --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Operating Systems. --- Information Storage and Retrieval. --- Management of Computing and Information Systems. --- IT in Business. --- Data processing. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Informatics --- Science --- Communication systems --- Operating systems --- Distributed processing --- Information storage and retrieva. --- Information Systems. --- Cryptology. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Business—Data processing. --- Computer security - United States --- Data protection - United States --- Copyright and electronic data processing - United States --- Internet - United States --- Data encryption (Computer science) --- Computer networks. --- Operating systems (Computers)
Choose an application
Choose an application
Law of civil procedure --- Compensation (Law) --- Costs (Law)
Choose an application
Choose an application
Law of real property --- Law of obligations. Law of contract
Choose an application
Executions (Law) --- -Executions (Law) --- -Executions (Law) -
Choose an application
Choose an application
Listing 1 - 8 of 8 |
Sort by
|