IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 2- Issue 4, April 2013 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



A Survey Of Contemporary Protection Mechanism For Preventing Piracy Of Digital Discs

[Full Text]

 

AUTHOR(S)

Brijesh Rajput

 

KEYWORDS

Index Terms: - Anti piracy, Digital watermarking, File encryption, Illegal copying, Sony xcp scandal,

 

ABSTRACT

Abstract: - Digital piracy is a major challenge faced by content publishers and software vendors today. The ease of copying and sharing digital content has resulted in piracy. In this paper we examined some recent protection mechanism based on structure of digital disc and other modern technology includes watermark. The objective of this paper is to analyzing the existing technology and some loopholes. Moreover this paper aims at reducing piracy in liaison with the educated user and not with a hacker since the hackers posses special skills as there is no absolute way to prevent copying.

 

REFERENCES

[1]. Xiao Zhang. A Survey of Digital Rights Management Technologies. Available: http://www.cse.wustl.edu/~jain/cse571-11/ftp/drm/index.html. Last accessed 16th Mar 2013.

[2]. Content Scramble System (CSS). Available: http://www.dvdcca.org/css.aspx. Last accessed 16th Mar 2013.

[3]. TECHNOLOGIES. Available: http://www.4centity.com/technologies.aspx. Last accessed 16th Mar 2013

[4]. Global Software Piracy. 2010 Available: http://portal.bsa.org/globalpiracy2010/. Last accessed 16th Mar 2013.

[5]. Johnson, D.G., 2000. Computer Ethics. Upper Saddle River, New Jersey: Prentice Hall.

[6]. Kallman, E., Grillo, J., 1993. Ethical Decision Making and Information Technology. New York: McGraw-Hill.

[7]. Mason, R.O., 1986. Four ethical issues of the information age. MIS Quarterly, 10 (1) 5-12.

[8]. Moor, J.H., 1985. What is computer ethics? Metaphilosophy, 16, 266-275.

[9]. Weckert, J., 1997. Intellectual Property Rights and Computer Software. Journal of Business Ethics. 6 (2) 101-109.

[10]. Weckert, J., Adeney, D., 1997. Computer and Information Ethics. Westport, Connecticut: Greenwood Press.

[11]. Siponen, M.T., 2001. The Relevance of Software Rights: An Anthology of the Divergence of Sociopolitical Doctrines. AI & Society, 15 (1&2), 128-148

[12]. Gattiker, U.E., Kelley, H., 1999. Morality and Computers: Attitudes and Differences in Mora Judgements. Information Systems Research, 10 (3) 233-254.

[13]. Gopal, R.D., Sanders, G.L., 1998. International Software Piracy: Analysis of Key Issues and Impacts. Information Systems Research, 9 (4) 380-395

[14]. Vitell, S.J., Davis, D.L., 1990. Ethical beliefs of MIS professionals: The frequency and opportunity for unethical behaviour. Journal of Business Ethics, 9 (1) 63-70.

[15]. Traphagan, M., Griffith, A., 1998. Software Piracy and Global Competitiveness: Report on Global Software Piracy. International Review of Law, Computers & Technology, 12 (3) 431-451

[16]. Bowyer, K.K., 2001. Ethics and Computing - Living Responsibility in a Computerized World. Los Alamitos, California: IEEE Computer Society Press

[17]. Forester, T., Morrison, P., 1993. Computer Ethics: Cautionary Tales and Ethical Dilemmas in computing, MIT Press.

[18]. Kuflik, A., 1995. Moral Foundations of Intellectual Property Rights. In: D.G. Johnson, H. Nissenbaum, eds., Computers, Ethics & Social Values. New Jersey: Prentice Hall. 169-180.

[19]. Ladd, J., 1997. Ethics and the Computer World: a New Challenge for Philosophers. Computers & Society, 27 (3)8-13

[20]. Langford, D., 1995. Practical Computer Ethics. Guildford, Surrey: McGraw-Hill.

[21]. Nissenbaum, H., 1995. Should I copy my neighbours’ software. In D.G. Johnson, H. Nissenbaum, eds, Computers, Ethics & Social Values. New Jersey: Prentice Hall.

[22]. Cheng, H.K., Sims, R.R., Teegen, H., 1997. To purchase or to pirate software: an empirical study. Journal of Management Information Systems, 13 (4), 49-51

[23]. Kris Kaspersky (2004). CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

[24]. http://www.ecma-international.org/publications/files/ECMA-ST/Ecma-130.pdf

[25]. Xiao Zhang. (2011). A Survey of Digital Rights Management Technologies. Available: http://www.cse.wustl.edu/~jain/cse571-11/ftp/drm/index.html. Last accessed 11th Apr 2012

[26]. SecuROM09 "CD Protection - SecuROM," 2009, http://www.encrypt.ro/cd-encryption/cd-protectionsecurom.html Last accessed 11th Apr 2012.

[27]. William Ku and Chi-Hung Chi. (-). Survey on the technological aspects of Digital Rights Management. Available: http://www.cs.bham.ac.uk/~mdr/teaching/modules04/security/etc/ku-drm.pdf. Last accessed 11th Apr 2012.

[28]. Dukhi, R.G. Watermarking: A copyright protection tool .Vol5 36-41 IEEE 2011

[29]. BBC NEWS. (2006). Anti-piracy CD problems vex Sony . Available: http://news.bbc.co.uk/1/hi/technology/4511042.stm. Last accessed 15 Apr 2012

[30]. spyware information(2005). Available: http://gsa.ca.com/pest/pest.aspx?ID=453096362. Last accessed 15 Apr 2012.

[31]. Neda Ulaby. (2005). Sony Music CDs Under Fire from Privacy Advocates. Available: http://www.npr.org/templates/story/story.php?storyId=4989260. Last accessed 15 Apr 2012.