“Every Library’s Nightmare?”
- “TPM are configurations of hardware and software used to control access to, or use of, a digital work by restricting particular uses such as saving or printing.
- Hard restrictions: secure – container TPM where there is a physical limitation built into the hardware.
- ISSUES: user dissatisfaction, generate interoperability issues; block archival activities; increased staffing to handle these issues.
- Soft restrictions: discourage use, but not impossible to get around. Now almost accepted as part of e-resources (just the way things are). These change our expectations from vendors.
- Occurs in resources that are 1. Digital and 2. Licensed.
- These restrictions would be impossible on paper copies
- Soft restriction types: 1. Extent of use 2. Restriction by Frustration (often done with awkward chunking) 3. Obfuscation (poorly designed interfaces that do not properly show the capabilities) 4. Interface Omission (tasks only possible through browser or computer commands, left out of the interface) 5. Restriction by Decomposition (breaks down into files, makes it hard to save or e-mail) 6. Restriction by Warning (proclaims limitations and “misuse may result in...” language.
- Hard restriction types: 1. No copying or pasting of text 2. Secure container TPM (ex: only posting low resolution images)
“Technologies Employed to Control Access to or Use of Digital Cultural Collections”
- Digitized works are often harder to control and restrict access to, so that’s where TPM comes in (sits under the umbrella of DRM – “a broader set of concerns and practices associated with managing rights from both a licensor and a licensee perspective.”
- Usage controls manipulate the resource itself (same as a hard restriction?)
- Libraries are more likely than archives/museums to employ a system that restricts or controls access/use.
- Common systems are: authentication and authorization; IP range restrictions; network based ID systems
“Authentication and Authorization”
- Authentication: validating an assertion of identity (identity code and password)
- Other examples include:
1. 1. Shared secrets (like a shared password) 2. Public key encryption 3. Smart cards (not sure if I’ve ever seen this before, or if this method is even used anymore) 4. Biometric (personal physical characteristics) 5. Digital Signatures
- Authorization: access control or access management, or permitted to perform some kind of operation on a computer system.
- Divided into three categories: 1. “whether a subject may retrieve an object” 2. “whether a subject may create, change, or destroy an object; 3. The extent that the person can change the authorization rules.
Hello, I came to your blog and have been reading along your posts. I decided I will leave my first comment. I have enjoyed reading your blog. Nice blog. I will keep visiting this blog very often…
ReplyDeleteDRM Protection