The document discusses the future of digital rights management (DRM) and presents three potential scenarios: deceptive, dystopian, or hopeful. It argues that current DRM approaches are unrealistic, legally inapplicable globally, and undermine user experience and creativity. The document proposes rethinking DRM from first principles to focus on user experience through an "exception management model" that shifts the focus from distrust to user empowerment through credential-based exceptions and monitoring for abuse. The goal is to enable both secure content and positive user experiences.
Towards Socially-Responsible Management of Personal Information in Social Net...University of Geneva
Slide deck for presentation at BlogTalk 2009 in Jeju. Co-located with Lift Asia 09
6th International Conference on Social Software Jeju, Korea, 15-16 September 2009
Our digital society has undergone profound transformations in the way we work, learn, live and participate. Having transformed our world into a great co-creation Wiki challenges many assumptions and models that need to be revisited. Based on several examples in the area of security drawn from the industry and our research, we argue there is an emerging notion of Digital Responsibility paving the way to further significant societal changes. A new world order or incremental changes ? One thing is sure, ICT has and will continue to challenge our historical assumptions requiring major mindset changes and more transparency.
CyberSecurity: Intellectual Property dispute fuels CyberwarElyssa Durant
deep links! Firetown run by Michael Dammann is an illegal operation registered in the United States of America by a known disinformation agent and FRAUD. The Firetown News Network is farce. INTELLECTUAL PROPERTY 101. I want my shit back! Let the record show, you can delete a post but there is a always a trace. #InfoSec
A short introduction to multimedia forensics the science discovering the hist...Sebastiano Battiato
Thematic Meeting on MULTIMEDIA TRUTHFULNESS VERIFICATION IN LEGAL ENVIRONMENT AND SOCIAL MEDIA
Co-located with WIFS 2015, Roma - Italy, 16 November 2015
Towards Socially-Responsible Management of Personal Information in Social Net...University of Geneva
Slide deck for presentation at BlogTalk 2009 in Jeju. Co-located with Lift Asia 09
6th International Conference on Social Software Jeju, Korea, 15-16 September 2009
Our digital society has undergone profound transformations in the way we work, learn, live and participate. Having transformed our world into a great co-creation Wiki challenges many assumptions and models that need to be revisited. Based on several examples in the area of security drawn from the industry and our research, we argue there is an emerging notion of Digital Responsibility paving the way to further significant societal changes. A new world order or incremental changes ? One thing is sure, ICT has and will continue to challenge our historical assumptions requiring major mindset changes and more transparency.
CyberSecurity: Intellectual Property dispute fuels CyberwarElyssa Durant
deep links! Firetown run by Michael Dammann is an illegal operation registered in the United States of America by a known disinformation agent and FRAUD. The Firetown News Network is farce. INTELLECTUAL PROPERTY 101. I want my shit back! Let the record show, you can delete a post but there is a always a trace. #InfoSec
A short introduction to multimedia forensics the science discovering the hist...Sebastiano Battiato
Thematic Meeting on MULTIMEDIA TRUTHFULNESS VERIFICATION IN LEGAL ENVIRONMENT AND SOCIAL MEDIA
Co-located with WIFS 2015, Roma - Italy, 16 November 2015
Panel on the Future of DRM at the FTC Town Hall meeting. University of Washington School of Law, Technology Law and Public Policy Clinic, March 25, 2009.
Full webcast and transcript available at : http://www.ftc.gov/bcp/workshops/drm/
Motivation behind software piracy and its usage. Mostly the users of the low developed countries are practising software piracy for survival. This presentation reveals the reasons of it.
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
The ability for everyday devices to connect with each other and with people is a hot topic.
The Nigerian Communications Commission identified a need for the Nigerian legal system to be aware of present and future possibilities, grey areas and learnings from other countries that have taken proactive steps to prepare for this inevitable future.
Learnings from the EU, USA, China etc are considered. It is comforting to know that no country claims to have its legislation ahead of the tech innovations curve, but the catchup game needs to be at a pace that dragnets the present effectively and constantly repositions for the unknown future.
Regulation should also be smart. Rather than get bogged down regulating aluminium weight for car use, fuel grades for combustion, rather regulate speed (protect lives) and drive regulation by principles that outlive wherever tech wants to go next.
The session was eye-opening for a good number of the aged and candid judges, but it was gladdening to see the mindset: mobile tech is not "that thing", it has to be used, understood and admitted as evidence.
The nerds and more tech savvy should help these 'learned ones' to better embrace tech and help them do their work better for joint good!
Attendee/delegate feedback was candid and NCC hopes to build on this in the coming years.
Protecting assets on social media. The example of trademarksCedric Manara
Presentation of a paper co-authored with Christophe Roquilly on the protection of brand image on social media, University of Strathclyde, Center for Internet Law and Policy, March 1, 2012
Ethics of Computing in Pharmaceutical ResearchAshwani Dhingra
Computing ethics is a set of moral principles that regulate the use of computers. In pharmaceutical research computers, computing technology, and consequent information system has produced ethical challenges and conflicts.
Tutorial for ACM Multimedia 2016, given together with Gerald Friedland, with contributions from Julia Bernd and Yiannis Kompatsiaris. The presentation covered an introduction to the problem of disclosing personal information through multimedia sharing, the associated security risks, methods for conducting multimodla inferences and technical frameworks that could help alleviate such risks.
George konstantakis iot and product design360mnbsu
The Internet of Things (IoT) may be at the core of the next Industrial Revolution! The socioeconomic implications of IoT, in general, are astounding. As with all disruptive technology, there are threats and opportunities that must be understood by business leaders. How do these implications relate to the needs of manufacturing businesses and the human resources that are intertwined with them? How can Product Design address those needs? This closing session will explore these questions and offer solutions.
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to ComeMercatus Center
Successful innovation, which is essential to better health, safety and security, requires freedom to experiment and develop. But there is an array of government rules and processes that increasingly prohibit “permissionless” innovation.
Keynote Presentation given at US Patent and Trademark Office conference on Developing the Digital Marketplace for Copyrighted Works, January 25, 2018, Washington, DC
Guest lecture given at Carnegie-Mellon University April 29. 2014. Describes the history of digital technology in book publishing and six aspects of disruption: the retail market, interoperability, self-publishing, content forms, revenue models, and copyright.
Panel on the Future of DRM at the FTC Town Hall meeting. University of Washington School of Law, Technology Law and Public Policy Clinic, March 25, 2009.
Full webcast and transcript available at : http://www.ftc.gov/bcp/workshops/drm/
Motivation behind software piracy and its usage. Mostly the users of the low developed countries are practising software piracy for survival. This presentation reveals the reasons of it.
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
The ability for everyday devices to connect with each other and with people is a hot topic.
The Nigerian Communications Commission identified a need for the Nigerian legal system to be aware of present and future possibilities, grey areas and learnings from other countries that have taken proactive steps to prepare for this inevitable future.
Learnings from the EU, USA, China etc are considered. It is comforting to know that no country claims to have its legislation ahead of the tech innovations curve, but the catchup game needs to be at a pace that dragnets the present effectively and constantly repositions for the unknown future.
Regulation should also be smart. Rather than get bogged down regulating aluminium weight for car use, fuel grades for combustion, rather regulate speed (protect lives) and drive regulation by principles that outlive wherever tech wants to go next.
The session was eye-opening for a good number of the aged and candid judges, but it was gladdening to see the mindset: mobile tech is not "that thing", it has to be used, understood and admitted as evidence.
The nerds and more tech savvy should help these 'learned ones' to better embrace tech and help them do their work better for joint good!
Attendee/delegate feedback was candid and NCC hopes to build on this in the coming years.
Protecting assets on social media. The example of trademarksCedric Manara
Presentation of a paper co-authored with Christophe Roquilly on the protection of brand image on social media, University of Strathclyde, Center for Internet Law and Policy, March 1, 2012
Ethics of Computing in Pharmaceutical ResearchAshwani Dhingra
Computing ethics is a set of moral principles that regulate the use of computers. In pharmaceutical research computers, computing technology, and consequent information system has produced ethical challenges and conflicts.
Tutorial for ACM Multimedia 2016, given together with Gerald Friedland, with contributions from Julia Bernd and Yiannis Kompatsiaris. The presentation covered an introduction to the problem of disclosing personal information through multimedia sharing, the associated security risks, methods for conducting multimodla inferences and technical frameworks that could help alleviate such risks.
George konstantakis iot and product design360mnbsu
The Internet of Things (IoT) may be at the core of the next Industrial Revolution! The socioeconomic implications of IoT, in general, are astounding. As with all disruptive technology, there are threats and opportunities that must be understood by business leaders. How do these implications relate to the needs of manufacturing businesses and the human resources that are intertwined with them? How can Product Design address those needs? This closing session will explore these questions and offer solutions.
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to ComeMercatus Center
Successful innovation, which is essential to better health, safety and security, requires freedom to experiment and develop. But there is an array of government rules and processes that increasingly prohibit “permissionless” innovation.
Keynote Presentation given at US Patent and Trademark Office conference on Developing the Digital Marketplace for Copyrighted Works, January 25, 2018, Washington, DC
Guest lecture given at Carnegie-Mellon University April 29. 2014. Describes the history of digital technology in book publishing and six aspects of disruption: the retail market, interoperability, self-publishing, content forms, revenue models, and copyright.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
1. The Future of DRM :
How would you like it “served” ?
Deceptive, Dystopian or Hopeful
Copyright & Technology 2010
Technology Track
New York
Jean-Henry Morin
University of Geneva – CUI
Dept. of Information Systems
Jean-Henry.Morin@unige.ch
http://jean-henry.com/
June 17, 2010
2. How did we get here…
… a dystopian scenario ?
http://www.flickr.com/search/?q=DRM
J.-H. Morin
3. Extremism
• Larry Lessig Speech at Italian
Parliament: Internet is Freedom
http://blip.tv/file/3332375/
VS 2 M iPads sold in 60 days !!!
3
J.-H. Morin
5. Legal Complexity vs Global
eServices led Economy
• Total Control and Anticipation :
• Unrealistic, impossible and undesirable
Rules & Policies
Content
100 kb
1 Mb
J.-H. Morin
6. Deceptive and Inapplicable Laws
French HADOPI Three-
Strikes invites itself to the
land of Shakespeare
UK Digital Economy Act (June 12, 2010)
Regulatory
Humility
French Three-Strikes Graduated Response HADOPI Law
• See also : Larry Lessig Speech at Italian Parliament:
Internet is Freedom
http://blip.tv/file/3332375/
6
J.-H. Morin
7. Doomed initiatives !
• Fundamental Rights:
• Internet access has been recognized as a fundamental
right, EU Parliament massively rejects three strikes
graduated responses (481 votes against 25)
• Technically inapplicable:
• Deep Packet Inspection and false positives
http://dmca.cs.washington.edu/
• Legally inapplicable:
• Territorial nature of such laws VS global media
• Germany rejects Three-Strikes approach (June, 2010)
• ACTA : removed Three-Strikes provision from
public draft
7
J.-H. Morin
8. Where did we go wrong?
• Where did User Experience go ?
• Where did Superdistribution go ?
• Where are the innovative Business Models, the
Real-time Marketers, etc. ?
• Did DRM curb those that it meant ?
• Wasn’t DRM supposed to be an enabler ?
J.-H. Morin
9. Can we finally make DRM
“FUN” (i.e., User Friendly ;-) ?
• Assuming :
• DRM is likely to stay and be needed (managed content)
• Absolute security is neither achievable nor desirable
• Given the right User Experience and Business Models
most users smoothly comply (e.g., iTunes)
• Most users aren’t criminals
• We needed to take a step back to :
• Critically re-think DRM
• Reconsider the debate outside the either/or extremes of
total vs. no security
• Re-design DRM from ground up
9
J.-H. Morin
10. Rethinking & Redesigning DRM
• Acknowledge the Central role of the User and User
Experience
• Reinstate Users in their roles & rights
• Presumption of innocence & the burden of proof
• Fundamental guiding principle to Rethink and Redesign
DRM : Feltens’ “Copyright Balance” principle (Felten,
2005)
“Since lawful use, including fair use, of copyrighted works is in the
public interest, a user wishing to make lawful use of
copyrighted material should not be prevented from doing so
by any DRM system.”
• Claim and Proposition :
• Put the trust back into the hands of the users
• Reverse the distrust assumption
• Requires a major paradigm shift & change of mindset
10
J.-H. Morin
12. Rethinking & Redesigning DRM
(cont.)
• Exception Management in DRM environments, mixing
water with fire ? Not necessarily !
• Reversing the distrust assumption puts the user “in
charge”, facing his responsibilities
• Allow users to make Exception Claims, granting them
Short Lived Licenses based on some form of logging and
monitoring
• Use Credentials as tokens for logging to detect and
monitor abuses
• Credential are Revocable in order to deal with abuse and
misuse situations
• Mutually acknowledged need for managed content while
allowing all actors a smooth usability experience
(Morin and Pawlak, 2007, 2008); (Morin 2008, 2009) 12
J.-H. Morin
13. Exception Management in DRM
Environments
• What is an Exception ?
• A claim made by a user wishing to rightfully access /
use content
• Based on « real world » credential patterns
• Delegation model based on chained authorities
• Credential authorities closer to the users
• Locally managed and held (credential store)
• Short lived or fixed life time
• Revocable
• Late binding (enforcement point)
• Model is auditable for abuse and includes
revocation capabilities
• Burden of proof on the party having a justifiable reason
to claim abuse (presumption of innocence)
• Monitoring in near real time of security policies 13
J.-H. Morin
14. Conclusion
• Can DRM “go green” before we all “go dark” ?
• If so, we might be able to address some
“Serious” societal issues while restoring User
Experience along the way !
• Moving forward : A Call For ACTION !
• Critically re-think and re-design DRM out of the box
• Involve equally all stakeholders
• Find new innovative Business Models
• Limit law to a “justifiable” level
• Remember technology is just the means
• What Information Society do we want to
live in ? 14
J.-H. Morin
15. Security is bypassed not
attacked
Inspired by Adi Shamir, Turing Award lecture, 2002
Thank you
Join the
Conversation…
Jean-Henry Morin
University of Geneva – CUI
Dept. of Information Systems
Jean-Henry.Morin@unige.ch
http://jean-henry.com/
15
J.-H. Morin