economic incentives for protecting digital rights online source: authors: reporter: date: electronic...

12
Economic incentives for protecting digital rights online Source : Author s: Electronic Commerce Research and Applications, Vol.10, Issue 5, pp.553-564, 2011 N. Boris Margolin, Brian Neil Levine, James D. Miller, Matthew Wright Lu, Wan-Yu, Liang, Jiun-Lwen

Upload: sophie-jasmine-oconnor

Post on 03-Jan-2016

233 views

Category:

Documents


0 download

TRANSCRIPT

Economic incentives for protecting digital rights online

Source:

Authors:

Reporter:Date:

Electronic Commerce Research and Applications, Vol.10, Issue 5, pp.553-564, 2011N. Boris Margolin, Brian Neil Levine, James D. Miller, Matthew WrightLu, Wan-Yu, Liang, Jiun-Lwen2012/11/01

2

Outline

• Introduction• Background & Related work• The proposed protocol (SPIES)– Exchange period– Protection period

• Conclusions

3

Introduction

• Once electronic content has been released, it is very difficult to prevent it from being shared.

• This disclosure often represents economic harm to the content’s owner and others.

• To discourage illegitimate sharing.

4

Background & Related work(1/2)

• Game theory

• Digital rights management (DRM)– DRM is the use of technological means to allow only

authorized uses of or access to content.

– Traditional DRM uses techniques: encryption & watermarking

– DRM-free

5

Background & Related work(2/2)

• Digital rights management (DRM)

Content providerContent consumer

Escrow service

6

The proposed protocol (1/5)

• Secret Protection Incentive-based Escrow System (SPIES).

• SPIES is best suited for applications in which the content is legitimately shared among a small set of participants.

• SPIES should not be used to replace traditional DRM. (ex. movie and music files sold online)

• SPIES used to limit unauthorized sharing of passwords for accessing content on websites.

7

The proposed protocol (2/5)

• SPIES is a protocol executed between several actors:

信託付款服務 (第三方 )

8

The proposed protocol (3/5)

• Variables in SPIES

9

The proposed protocol (4/5)

• Exchange period

10

The proposed protocol (5/5)

• Protection period

Fig. the Bounty Payment

11

Conclusions

• SPIES uses the techniques of game theory to analyze strategies and outcomes.

• Applicable: passwords, corporate knowledge-sharing, pre-release media.

• Its chief limitations are the requirements for a limited number of legitimate.

• To limit and detect unauthorized sharing.

Thanks for your attention !