SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Digital Rights Management Metadata Schemes Jorge Espinosa, Adrienne Smith,  Nan Zhang, & Pam Carson http://www.geekosystem.com/wp-content/uploads/2010/03/digital-rights-management-drm.jpg
What is DRM? ,[object Object],[object Object],Agnew, 2008, p. 1 http://www.phanart.net/blog/?m=20091207
How does it work? ,[object Object],http://www.gpsinc.com/intellectual-property.html — all through  metadata!
What’s the purpose of DRM metadata?  ,[object Object],[object Object],[object Object],http://www.whatsnextblog.com/archives/2006/10/intellectual_property_issues_heatingup_in_social_media_and_virtual_reality.asp
What’s in DRM metadata? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Agnew, 2008, pp. 241-248 If an  antelope  is a  document … http://www.sxc.hu/photo/1128646
What are the DRM  metadata schemes? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],http://itmanagement.earthweb.com/img/2010/04/metadata.jpg
ONIX ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Created by EDItEUR, the Book Industry  Communication (UK), the Book Industry Study Group (US) ONIX, 2010
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],indecs created by BBC, RIAA, Content ID Forum (Japan) and Federation of European Publishers Cordis, 2001
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],OMA DRM created by Open Mobile Alliance (mobile/wireless industry) OMA, 2010
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],MPEG-21 created by Moving Pictures Experts Group (ISO/IEC) MPEG, 2010
Evaluation:  ONIX vs. indecs
[object Object],[object Object],[object Object],[object Object],[object Object],Evaluation:  ONIX ,[object Object],[object Object]
Evaluation:  indecs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Example metadata: ONIX ,[object Object],[object Object],[object Object],Product Identifier Date
Future Trends ,[object Object],[object Object],https://secure.ewebspot.com/upload/v_lauriehawn/documents/speakers_chair.jpg
Thank you! Merci! ANY QUESTIONS?

Weitere ähnliche Inhalte

Was ist angesagt?

Internet of Things IoT
Internet of Things IoTInternet of Things IoT
Internet of Things IoTFURQAN M LODHI
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019GoQA
 
Internet of Things: data protecy and 3d privacy
Internet of Things: data protecy and 3d privacyInternet of Things: data protecy and 3d privacy
Internet of Things: data protecy and 3d privacyLuca Bolognini
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io tPuneet Mishra
 
Io t features_and_architecture_2009
Io t features_and_architecture_2009Io t features_and_architecture_2009
Io t features_and_architecture_2009CATTID "Sapienza"
 
M2M & D2D Communication Patents for IoT Innovation Ranking
M2M & D2D Communication Patents for IoT Innovation RankingM2M & D2D Communication Patents for IoT Innovation Ranking
M2M & D2D Communication Patents for IoT Innovation RankingAlex G. Lee, Ph.D. Esq. CLP
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)Akanksha Prasad
 
Internet of Things -Overview
Internet of Things -OverviewInternet of Things -Overview
Internet of Things -OverviewIJRST Journal
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)Saurabh Yadav
 
From the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsFrom the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsThe Marketing Distillery
 
Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsInternet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsTarika Verma
 
To DRM or not to DRM?
To DRM or not to DRM?To DRM or not to DRM?
To DRM or not to DRM?Carlos Serrao
 
IoT internet of things
IoT  internet of thingsIoT  internet of things
IoT internet of thingsGd Insaa
 

Was ist angesagt? (20)

Internet of Things IoT
Internet of Things IoTInternet of Things IoT
Internet of Things IoT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
ЄВГЕНІЙ ПАСЄКА «IoT як це тестувати» Lviv QA Day 2019
 
Internet of Things: data protecy and 3d privacy
Internet of Things: data protecy and 3d privacyInternet of Things: data protecy and 3d privacy
Internet of Things: data protecy and 3d privacy
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io t
 
Wireless networks
Wireless networks Wireless networks
Wireless networks
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Io t features_and_architecture_2009
Io t features_and_architecture_2009Io t features_and_architecture_2009
Io t features_and_architecture_2009
 
M2M & D2D Communication Patents for IoT Innovation Ranking
M2M & D2D Communication Patents for IoT Innovation RankingM2M & D2D Communication Patents for IoT Innovation Ranking
M2M & D2D Communication Patents for IoT Innovation Ranking
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
Iot
IotIot
Iot
 
Internet of Things -Overview
Internet of Things -OverviewInternet of Things -Overview
Internet of Things -Overview
 
Presentazione
PresentazionePresentazione
Presentazione
 
The internet of things(IoT)
The internet of things(IoT)The internet of things(IoT)
The internet of things(IoT)
 
Iot intro
Iot introIot intro
Iot intro
 
Internet Of Things
 Internet Of Things Internet Of Things
Internet Of Things
 
From the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of ThingsFrom the Internet of Computers to the Internet of Things
From the Internet of Computers to the Internet of Things
 
Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsInternet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, Applications
 
To DRM or not to DRM?
To DRM or not to DRM?To DRM or not to DRM?
To DRM or not to DRM?
 
IoT internet of things
IoT  internet of thingsIoT  internet of things
IoT internet of things
 

Ähnlich wie Drm metadata presentation fina lwith-notes

How oneM2M fits into the IoT Landscape - enabling cross vertical domain inter...
How oneM2M fits into the IoT Landscape - enabling cross vertical domain inter...How oneM2M fits into the IoT Landscape - enabling cross vertical domain inter...
How oneM2M fits into the IoT Landscape - enabling cross vertical domain inter...oneM2M
 
Making rfid available to all, the tego way
Making rfid available to all, the tego wayMaking rfid available to all, the tego way
Making rfid available to all, the tego wayBock Mary
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks Nicola Cerami
 
Hello Android - Pune GTUG
Hello Android - Pune GTUGHello Android - Pune GTUG
Hello Android - Pune GTUGsushrutbidwai
 
Towards Socially Intelligent Media Computing
Towards Socially Intelligent Media ComputingTowards Socially Intelligent Media Computing
Towards Socially Intelligent Media ComputingPaolo Nesi
 
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...Paolo Nesi
 
What's the Right Messaging Standard for the IoT?
What's the Right Messaging  Standard for the IoT?What's the Right Messaging  Standard for the IoT?
What's the Right Messaging Standard for the IoT?Angelo Corsaro
 
Telcos, RCS & WebRTC - "democratisation" of voice and video
Telcos, RCS & WebRTC -  "democratisation" of voice and videoTelcos, RCS & WebRTC -  "democratisation" of voice and video
Telcos, RCS & WebRTC - "democratisation" of voice and videoRadu Vulpescu
 
The Long Road To Profitable Digital Media Innovation - Digibiz'09
The Long Road To Profitable Digital Media Innovation  - Digibiz'09The Long Road To Profitable Digital Media Innovation  - Digibiz'09
The Long Road To Profitable Digital Media Innovation - Digibiz'09Digibiz'09 Conference
 
An end-to-end standard oneM2M infrastructure for the Smart Home - Andre Bottaro
An end-to-end standard oneM2M infrastructure for the Smart Home - Andre BottaroAn end-to-end standard oneM2M infrastructure for the Smart Home - Andre Bottaro
An end-to-end standard oneM2M infrastructure for the Smart Home - Andre Bottaromfrancis
 
Internet of Things.pptx
Internet of Things.pptxInternet of Things.pptx
Internet of Things.pptxEshwar Prasad
 
Packet Forging over LAN
Packet Forging over LANPacket Forging over LAN
Packet Forging over LANABHIJEET SINGH
 
Unify Internet Of Things with Clayster
Unify Internet Of Things with ClaysterUnify Internet Of Things with Clayster
Unify Internet Of Things with Claysterclaysterworld
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfssuser57b3e5
 
Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...DESMOND YUEN
 

Ähnlich wie Drm metadata presentation fina lwith-notes (20)

Digital Rights Management
Digital Rights Management Digital Rights Management
Digital Rights Management
 
DRM_Interoperability_Final
DRM_Interoperability_FinalDRM_Interoperability_Final
DRM_Interoperability_Final
 
Digital Libraries
Digital LibrariesDigital Libraries
Digital Libraries
 
Permissioncode0623
Permissioncode0623Permissioncode0623
Permissioncode0623
 
How oneM2M fits into the IoT Landscape - enabling cross vertical domain inter...
How oneM2M fits into the IoT Landscape - enabling cross vertical domain inter...How oneM2M fits into the IoT Landscape - enabling cross vertical domain inter...
How oneM2M fits into the IoT Landscape - enabling cross vertical domain inter...
 
Making rfid available to all, the tego way
Making rfid available to all, the tego wayMaking rfid available to all, the tego way
Making rfid available to all, the tego way
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
 
Hello Android - Pune GTUG
Hello Android - Pune GTUGHello Android - Pune GTUG
Hello Android - Pune GTUG
 
Towards Socially Intelligent Media Computing
Towards Socially Intelligent Media ComputingTowards Socially Intelligent Media Computing
Towards Socially Intelligent Media Computing
 
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
Piracy and file sharing: challenges and perspectives for the Digital Renaissa...
 
What's the Right Messaging Standard for the IoT?
What's the Right Messaging  Standard for the IoT?What's the Right Messaging  Standard for the IoT?
What's the Right Messaging Standard for the IoT?
 
Telcos, RCS & WebRTC - "democratisation" of voice and video
Telcos, RCS & WebRTC -  "democratisation" of voice and videoTelcos, RCS & WebRTC -  "democratisation" of voice and video
Telcos, RCS & WebRTC - "democratisation" of voice and video
 
The Long Road To Profitable Digital Media Innovation - Digibiz'09
The Long Road To Profitable Digital Media Innovation  - Digibiz'09The Long Road To Profitable Digital Media Innovation  - Digibiz'09
The Long Road To Profitable Digital Media Innovation - Digibiz'09
 
An end-to-end standard oneM2M infrastructure for the Smart Home - Andre Bottaro
An end-to-end standard oneM2M infrastructure for the Smart Home - Andre BottaroAn end-to-end standard oneM2M infrastructure for the Smart Home - Andre Bottaro
An end-to-end standard oneM2M infrastructure for the Smart Home - Andre Bottaro
 
Internet of Things.pptx
Internet of Things.pptxInternet of Things.pptx
Internet of Things.pptx
 
The MPEG Extensible Middleware Vision
The MPEG Extensible Middleware VisionThe MPEG Extensible Middleware Vision
The MPEG Extensible Middleware Vision
 
Packet Forging over LAN
Packet Forging over LANPacket Forging over LAN
Packet Forging over LAN
 
Unify Internet Of Things with Clayster
Unify Internet Of Things with ClaysterUnify Internet Of Things with Clayster
Unify Internet Of Things with Clayster
 
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdfNXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
NXP'S-PORTFOLIO-FOR-ADDRESSING-IOT-SECURITY.pdf
 
Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...
 

Kürzlich hochgeladen

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Kürzlich hochgeladen (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Drm metadata presentation fina lwith-notes

Hinweis der Redaktion

  1. NAN Today we’ll cover Digital Rights Management, or DRM Metadata Schemes - their purposes, elements, and several well-known examples.
  2. NAN How can rights to digital objects, like music, movies, e-books, etc. be managed by their creators, rights owners and publishers? With DRM, stakeholders can manage both access and use of protected digital resources. It’s important to clarify that DRM is the 'digital management of rights' and not the 'management of digital rights'. That is, DRM manages all rights, not only the rights applicable to permissions over digital content" (Ianella, 2006, para. 2)
  3. NAN This metadata, which sets out how digital resources may be used and accessed, provides the administrative information - including copyright, distribution, ownership and restrictions - that protect the resource according to applicable laws. In addition to protection, DRM also offers verification of a resources’ authenticity; some rights administrative metadata also includes descriptive information like the creator and date of creation. While some DRM schemes exist on their own, others are easily incorporated as a “rights section” in existing metadata schemes.
  4. NAN Rights description defines the work’s copyright status, including the rights holder and definitions of legal use; Rights licensing outlines the contractual and licensing agreements of the resource; and Rights workflow languages exist to maintain control over how the work is accessed and used, including usage tracking and the enforcement of rights agreements - basically, any part of the workflow associated with a digital resource.
  5. NAN These are the commonly found elements in rights metadata. Provenance refers to the resource’s origin and ownership - ideally it should be an unbroken chain detailing who owned the resource and when. Rights holder can sometimes include contact information, which can be helpful for access and use of the resource Most of these are self-explanatory, but a good example of user and user roles applies to us at McGill: for instance, the user roles on many databases McGill subscribes too will define users as only those registered students and faculty of the university It’s interesting to point out that although number 6, constraints, requirements and agreements, means the terms of use - for example, no copying of the resource - this is not necessarily enforceable. However, the condition is legally binding.
  6. NAN Today we’ll discuss these four popular schemes; however, many more have been developed either specific collections, like Rutgers University Library, or PREMIS, specifically for preservation of digital resources
  7. PAM ONIX is the first DRM metadata scheme we will discuss. It’s created by Editeur, released in 2000 It’s for booksellers selling digital books online to convey information about their products It has many data elements – and you’ll see an example shortly – 230, to be precise. It’s coded in XML, with linguistic tags and numeric tags to define the fields
  8. PAM Indecs is created by a small consortium of organizations that put IP-protected content online It was established in 1998 It’s very complex – in fact, it’s ontology-based, meaning that it evolves. It maps to other schemes It provides a unique identification number for each digital object.
  9. PAM OMA is for the mobile market – including devices and software. It’s made by the Open Mobile Alliance, and it was launched in 2002 It’s goal is interoperability across devices, geographic locations, providers and networks It’s XML-based and encrypted meaning that the device must have the matching rights object in order to access protected content.
  10. PAM I’m sure you’re familiar with MPEG It’s made by the Moving Pictures Expert Group and goes back to 1988 The concepts of users and digital items are important with MPEG-21. It provides a framework in which one user interacts with another user, and the object of that interaction is a digital item. MPEG-21 has nine distinct parts, including the digital item declaration, digital item identification, intellectual property management and protection, a rights expression language and a rights data dictionary (MPEG-21, 2010).
  11. PAM Now I’m going to compare two DRM metadata schemes: ONIX and indecs
  12. PAM We’ll show you an example of ONIX metadata soon. It’s a widely-used format, used by the American Booksellers Association, Amazon and Barnes & Noble It’s convertible to MARC-21 and the only data that is lost is ONIX-only data. However, because it’s highly structured, there’s less flexibility for some fields, like the price and tax fields. But the structure makes it so that little manual intervention is needed and it also increases the speed of updates
  13. PAM Indecs, of course, is for e-commerce of intellectual property. While researching, we found that several other metadata schemes are based on indecs (for example: MPEG-21). That is, they contain sections of indecs metadata. It’s a comprehensive metadata scheme that manages intellectual property at every stage of digital exchange. Each digital object is assigned an iids – an indecs identification number. Its weakness is also its strength: because indecs is so generic, many additional modifications may be needed in order to apply it to specific domains, such as coding legal judgments in different parts of the world.
  14. PAM ONIX metadata is used by book publishers for digital objects This is only an excerpt of an ONIX metadata record It’s in XML In the header, there is the sender, the addressee, and the date sent In the product identifier section, there is a numeric id for the digital object Later on there are sections for descriptive details, measurements, title, contributor, subject, collateral (including any textual descriptions), publisher, market, suppliers, price, and tax.
  15. PAM I’m sure you’re all familiar with what DRM means for downloading media, proprietary file formats, jailbreaking, etc. Using DRM-protected media illegally is common and usually not enforced well Many consumers—including myself—are concerned with how DRM will affect digital media that we use, and how digital media will be preserved or stored in archives and libraries DRM is regulated in many countries, to different extents, and covered usually under copyright law Right now, in Canada, Bill C-32 An Act to Amend the Copyright Act, is being discussed in the House of Commons Michael Geist, an Internet law expert (who has a very interesting Web site, by the way: MichaelGeist.ca) has written extensively about the harm that could be done through this legislation if it becomes law If this bill becomes law, libraries will be forced to implement DRM in their inter-library digital loans and would require that digital loans self-destruct within five days of first use and limit any copying or distribution In addition, there is no exception in Bill C-32 for archives preserving digital materials (yet other countries have this exception) Ideally, there should be an exception for libraries, school, museums, archives, etc. This is our digital heritage! Even if locks become obsolete or broken, there is no legal way of circumventing them under this Bill
  16. PAM Does anyone have any questions about Digital Rights Management Metadata schemes?