An Introduction to the Management and Protection of Intellectual Property Rights

An Introduction to the Management and Protection of Intellectual Property Rights

Bill Vassiliadis (Hellenic Open University, Greece)
DOI: 10.4018/978-1-60566-154-4.ch015
OnDemand PDF Download:


Copyright protection is becoming an important issue for organizations that create, use, and distribute digital content through e-commerce channels. As online corruption increases, new technical and business requirements are posed for protecting Intellectual Property Rights, such as watermarking, use of metadata, self-protection, and self-authentication. This chapter gives a review of the most important of these methods and analyses of their potential use in Digital Rights Management systems. We focus especially on watermarking, and argue that it has a true potential in e-business because it is possible to embed and detect multiple watermarks to a single digital artifact without decreasing its quality. In conjunction with parallel linking of content to metadata there is true potential for real life copyright-protection systems. Furthermore we attack the problem of DRM systems’ interoperability with Distributed License Catalogues (DLCs). The DLC concept, borrowed from Web engineering, makes available (‘advertises’) content or services concerning DRM functionalities, enabling multiparty DRM eco-systems.
Chapter Preview


The wealth of information provided by digitization devices and sensors has grown dramatically while the available communication channels for faithfully transmitting that data face serious security threats. Digital media in the form of still images, video, sound and multimedia (digital artifacts) offer many advantages in their use since they enhance human-machine interaction in numerous areas. E-commerce (B2C and B2B) channels are becoming a primary distribution channel for the digital media market which in turn has seen a dramatic growth in the last few years (Eskicioglu, 2003). However, where there is profit there is also a big chance for corruption. The ease with which perfect digital copies are produced by virtually any user, creates great concern to content providers and on-line resellers.

The discussion behind copyright violation in e-commerce (especially B2C) is of course justified by the considerable financial losses of content providers and legal distributors. The International Intellectual Property Alliance estimated the annual loss of revenue in the U.S. copyright–based industries due to piracy of at least USD 30 billion, for the financial year of 2006-2007 (IPR, 2008). It is also worth noting that a large portion of Internet bandwidth (approximately 30%) is consumed by users exchanging illegal copies of digital media (mainly video). The recent legal battle between U.S. filmmakers and companies that support free distribution technologies such as Peer to Peer, has resulted in a crisis for the software industry: software developers are directly deemed responsible for the use of their products (McCalman, 2005). The ruling of the US supreme court in favor of content developers in the case of MGM vs. Grokster somewhat shook the so-called ‘Sony Safe Harbor’ (a 1984 court ruling in the case of Sony vs. Universal according to which h/w and s/w developers are immune from liability for the infringing acts of their users) (Samuelson, 2005). It is certain that there will always be people with enough motivation to illegally use copyright material by bypassing protection mechanisms.

Although IPR protection was and is still considered a strategic goal for many organizations, vendors are not yet convinced to invest the needed, and in many cases substantial resources to achieve it (Schneider, 2005). Cost effectiveness is emerging as a major requirement for protecting IPR (Cohen, 2003). Many solutions have been proposed for addressing the problem of copyright protection and in the recent years the community has witnessed some huge security failures and partial successes. The initial movement for the development of advanced and cost-effective techniques for IPR (Intellectual Property Rights) management and protection of digital media was accompanied by great enthusiasm. Soon, as efforts were advancing, several technological, economic and cultural shortcomings were identified. Some efforts for producing security standards failed, others merged (Felten, 2005). A perfect IPR protection solution still eludes us, partly because the industry cannot or will not agree in common standards. This does not mean, however, that copyright protection is impossible, it just emphasizes the need for coordinated actions.

Complete Chapter List

Search this Book:
International Advisory Board
Table of Contents
In Lee
Chapter 1
Keith F. Ward, Erik Rolland, Raymond A. Patterson
Proponents of Customer Relationship Management (CRM) suggest that a firm can develop a value creation relationship, such that an increase in... Sample PDF
Managing the Customer Relationship: A Framework for E-CRM Analysis
Chapter 2
Soumaya Ben Letaifa
This chapter examines how e-CRM has affected both organizational and individual behavior in a leading Canadian bank. The innovative and... Sample PDF
A New Conceptual Framework for Greater Success with Integration of E-CRM
Chapter 3
Tim Coltman
Most sectors of industry, commerce, and government have reported variation in the performance payoff from electronic customer relationship... Sample PDF
Managerial Discretion and E-CRM Performance
Chapter 4
Patricia T. Warrington, Elizabeth Gangstad, Richard Feinberg, Ko de Ruyter
Multi-channel retailers that utilize an e-CRM approach stand to benefit in multiple arenas by providing targeted customer service as well as gaining... Sample PDF
Multi-Channel Retailing and Customer Satisfaction: Implications for E-CRM
Chapter 5
Veronica Liljander, Pia Polsa, Kim Forsberg
Not until very recently has mobile phone technology become sophisticated enough to allow more complex customized programs, which enable companies to... Sample PDF
Do Mobile CRM Services Appeal to Loyalty Program Customers?
Chapter 6
Michael Shumanov
While the managerial rationale for adopting customer relationship management (CRM) has been fairly well articulated in the literature, research on... Sample PDF
Developing a Global CRM Strategy
Chapter 7
John Gallaugher
This article synthesizes and leverages two strategic frameworks when analyzing the true nature of strategy and the Internet: (1) the concept of... Sample PDF
Strategic Positioning and Resource-Based Thinking: Cutting Through the Haze of Punditry to Understand Factors Behind Sustainable, Successful Internet Businesses
Chapter 8
Savvas Papagiannidis
This chapter covers the concept of e-business models and how they relate to the music video and television environments. After identifying the value... Sample PDF
A Tale of E-Business Models: From the Music to the Television Industry
Chapter 9
Kirill M. Yurov
Healthcare technology markets have been recently identified as potential investment targets. Having survived a major environmental shock, the... Sample PDF
Strategic Maneuvering in Healthcare Technology Markets: The Case of Emdeon Corporation
Chapter 10
Olli Kuivalainen
The aim of this chapter is to provide a holistic exploration of the development of the business model of a magazine Web site, and of the factors... Sample PDF
Complementary Role of Website in Business Model Development
Chapter 11
Tobias Kollmann is a German B2C platform for different kinds of service and handcraft orders. Based on the concept of reverse auctions, demanders... Sample PDF
A Reverse Auction-Based E-Business Model for B2C Service Markets
Chapter 12
Denis Caro
The 21st century continues to witness the transformation of organizational systems globally through the deployment of Information and Communication... Sample PDF
Evolving E-Health Systems: Symbiotic Constructs Between Corporate and E-Healthcare Worlds in International Space
Chapter 13
Karl Knapp, Sushil K. Sharma, Kevin King
Offshore information technology (IT) outsourcing has been becoming mainstream alternative to inhouse operations. While offshore development is a... Sample PDF
Socio-Economic Impacts of Offshore Outsourcing of Information Technology
Chapter 14
Indrit Troshani
The eXtensible Business Reporting Language (XBRL) is an emerging XML-based standard which has the potential to significantly improve the efficiency... Sample PDF
Towards Theory Development for Emergent E-Business Innovations: Using Convergent Interviewing to Explore the Adoption of XBRL in Australia
Chapter 15
Bill Vassiliadis
Copyright protection is becoming an important issue for organizations that create, use, and distribute digital content through e-commerce channels.... Sample PDF
An Introduction to the Management and Protection of Intellectual Property Rights
Chapter 16
Tagelsir Mohamed Gasmelseid
The unprecedented advancements witnessed in the field of information and communication technology over the last couple of years are significantly... Sample PDF
Intelligent Contracting: An E-Supply Chain Management Perspective
Chapter 17
Jaeki Song, Eric A. Walden
In this work, we examined the boundary of the applicability of network effects theory. We theorized that when adoption is cheap, the cognitive... Sample PDF
The Applicability of Network Effect Theory to Low-Cost Adoption Decisions: An Investigation of Peer-to-Peer File Sharing Technologies
Chapter 18
Wen-Jang Jih
Two mutually reinforcing forces currently are at work to propel an upward spiraling in the business arena. As wireless communication technology... Sample PDF
An Empirical Analysis of Cellular Phone Users' Convenience Perception and Its Impact on Shopping Intention in Mobile Commerce
Chapter 19
Fang He
Along with the exponential increase in online business transactions, the online payment system has gained in popularity because vendors and... Sample PDF
The Effects of System Features, Perceived Risk and Benefit, and Customer Characteristics on Online Bill Paying
About the Contributors