Results 21 to 30 of about 923,748 (286)

Digital Rights Management and Technological Tying [PDF]

open access: yes, 2008
This paper analyzes DRM-based technological tying, where the content and hardware form a system. A closed DRM system makes the legal content incompatible with a rival's hardware, whose users must then obtain illegal copies.
Kim, Jin-Hyuk - University of Cambridge
core   +1 more source

Human Rights Implications of the Digital Revolution in Health Care in India [PDF]

open access: yesHealth and Human Rights, 2022
The COVID-19 pandemic has ushered in rapidly evolving developments in digital health, and governments around the world are experimenting with different ways of introducing technological tools in the management and delivery of health care services. India,
Deekshitha Ganesan
doaj  

Construct on Digital Rights Management for Historical Newspaper Archives [PDF]

open access: yesJournal of Library and Information Studies, 2004
Newspaper is one of the most important media as it contains the records that input the cultural data and social events, progress of national and international economical and political developments, the world's circumstances of the time, so as ...
Shien-Chiang Yu
doaj   +1 more source

A Digital Rights Management Model Under Social Network Environment [PDF]

open access: yesJisuanji gongcheng, 2018
Due to the lack of expressive power,flexibility,update and interaction capability of current Digital Rights Management(DRM) languages,a DRM model named SociDRM which based on social network is proposed.On the basis of the distributed logic language ...
HUO Yingyu,MA Li,LIU Ying,ZHONG Yong
doaj   +1 more source

Digital Rights Management

open access: yes, 2023
AbstractEssentially, digital rights management refers to “trusted exchange of digital information over the Internet in which the user is granted only those privileges granted by the document sender”. Digital rights management systems serve multiple functions, such as access control, usage control, billing, and the pursuit of legal infringements.
openaire   +1 more source

Robust Watermarking Technology in Digital Rights Management: A Comprehensive Analysis [PDF]

open access: yesITM Web of Conferences
The rapid advancement of information technology has made the massive creation, distribution, and consumption of digital content more convenient than ever. However, this convenience has also led to challenges in digital copyright protection.
He Hongze
doaj   +1 more source

TINJAUAN YURIDIS PENGATURAN RIGHTS MANAGEMENT INFORMATION DALAM KETENTUAN HAK MORAL PADA UNDANG-UNDANG NO. 19 TAHUN 2002 TENTANG HAK CIPTA DI INDONESIA

open access: yesArena Hukum, 2014
Thedigital technological advancement and internet technology urges the new forms of  works protection against new model of piracy and copyright infringement. Technological Protection Measures (TPM) and Rights Management Information (RMI) seeks to answer
M. Zairul Alam
doaj   +1 more source

Longitudinal circulating tumor DNA profiling in patients with advanced endometrial cancer using an off‐the‐shelf targeted NGS panel

open access: yesMolecular Oncology, EarlyView.
Intratumour heterogeneity complicates precision management of advanced endometrial cancer. Circulating tumor DNA (ctDNA) offers a minimally invasive strategy to capture tumor evolution and therapeutic resistance. Here, we compare tumor‐agnostic NGS with tumor‐informed ddPCR, outlining their relative sensitivity, concordance, and clinical implications ...
Carlos Casas‐Arozamena   +15 more
wiley   +1 more source

Applying general risk management principles to library administration [PDF]

open access: yes, 2007
Recent areas of digital library innovation, such as digital rights management, have led librarians to apply risk management (RM) principles to certain circumscribed areas of library management.
Joint, Nicholas
core   +1 more source

Blockchain-Based Multimedia Content Protection: Review and Open Challenges

open access: yesApplied Sciences, 2020
In this paper, we provide a holistic survey of multimedia content protection applications in which blockchain technology is being used. A taxonomy is developed to classify these applications with reference to the technical aspects of blockchain ...
Amna Qureshi, David Megías Jiménez
doaj   +1 more source

Home - About - Disclaimer - Privacy