Results 331 to 340 of about 1,216,231 (401)
Some of the next articles are maybe not open access.
Information Technology and People, 2020
PurposeEmployee compliance with information system security policies (ISSPs) has been emphasized as a key factor in protecting information assets against insider threats.
Soohyun Jeon, Insoo Son, Jinyoung Han
semanticscholar +1 more source
PurposeEmployee compliance with information system security policies (ISSPs) has been emphasized as a key factor in protecting information assets against insider threats.
Soohyun Jeon, Insoo Son, Jinyoung Han
semanticscholar +1 more source
LWEDM: Learning with error based secure mobile digital rights management system
Transactions on Emerging Telecommunications Technologies, 2020Mobile multimedia security is essential to ensure a secure communication in industries, businesses, and organizations. Mobile multimedia is a new concept for an enterprise, where organizations need to be secure.
Dharminder Dharminder
semanticscholar +1 more source
Blockchain for Digital Rights Management of Design Works
2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS), 2019A design work not only has a complex functional composition, but also has special trading needs. These all result in the difficulties in content protection, copyright protection and the trading of works.
Zihao Lu+3 more
semanticscholar +1 more source
Digital Right Management for IP Protection
2015 IEEE Computer Society Annual Symposium on VLSI, 2015The Digital Rights Management (DRM) principle is generally well known for the exchange of files (music, video), or software management. Specialized solutions concerning vprofessional software are behind a business called "Software License Managemen". The concept of DRM can be transposed to other areas, in particular to the design of hardware devices ...
Rampon, Jerome+5 more
openaire +3 more sources
Digital rights management (DRM) in libraries of public universities in Jordan
Library Management, 2019Purpose The purpose of this paper is to illustrate some methods to protect digital libraries using digital rights management (DRM) technologies and specifically the methods applied at the digital libraries of Jordan universities.
Afaf Abu Sirhan+4 more
semanticscholar +1 more source
Digital Rights Management System in China: Challenges and Opportunities
J. Cases Inf. Technol., 2018In the era of technology, the Chinese government wants to adopt the latest technologies and interlink their processes to secure information of all stakeholders.
Asad Abbas+4 more
semanticscholar +1 more source
Digital Rights Management for Paper-Based Microfluidic Biochips
Asian Test Symposium, 2018Paper-based digital microfluidic biochips (PB-DMFBs) provide a promising solution for microfluidic bioassays. Due to the low-cost substrate material and low demand for complicated manufacturing equipment, PB-DMFBs can be fabricated without foundry.
Jian-De Li+3 more
semanticscholar +1 more source
Legal Information Management, 2001
It was only three years ago that I was told that publishing valuable digital content on the Internet would not take off for 10 years. Today it is happening all around us with MP3 music files being swapped by our children and market research reports openly passed between business colleagues.
openaire +2 more sources
It was only three years ago that I was told that publishing valuable digital content on the Internet would not take off for 10 years. Today it is happening all around us with MP3 music files being swapped by our children and market research reports openly passed between business colleagues.
openaire +2 more sources
Enhancing Privacy for Digital Rights Management
2007This chapter addresses privacy issues in DRM systems. These systems provide a means of protecting digital content, but may violate the privacy of users in that the content they purchase and their actions in the system can be linked to specific users.
Milan Petkovic+3 more
openaire +2 more sources
Digital rights management scheme based on redactable blockchain and perceptual hash
Peer-to-Peer Networking and Applications, 2023Xinyu Yi+5 more
semanticscholar +1 more source