CHAPTER 42
PROTECTING DIGITAL RIGHTS: TECHNICAL APPROACHES
Robert Guess, Jennifer Hadley, Steven Lovaas, and Diane E. Levine
42.1.2 Patent, Copyright, and Trademark Laws
42.2 SOFTWARE-BASED ANTIPIRACY TECHNIQUES
42.2.2 Software Usage Counters
42.3 HARDWARE-BASED ANTIPIRACY TECHNIQUES
42.4 DIGITAL RIGHTS MANAGEMENT
42.5 PRIVACY-ENHANCING TECHNOLOGIES
42.5.2 Hidden Operating Systems
42.1 INTRODUCTION.
Ever since publishing and commerce were introduced to the digital world, the risks to intellectual property and to personal privacy in cyberspace have steadily escalated on comparable but separate paths. These paths have now converged. Unfortunately, many times, antipiracy efforts lead to possible breaches in personal privacy.
Efforts to stem the flow of pirated software worldwide remain mediocre in efficacy; piracy is still proving to be big business in the new millennium. According to the Business Software Alliance (BSA), a 2006 study shows that “thirty-five percent of the packaged software installed on personal computers (PC) worldwide in 2005 was illegal, amounting to $34 billion in global losses due to software piracy.”1 This single-year loss ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.