Digital Rights Management & Plagiarism Dr. M.G. Sreekumar UNESCO Coordinator, Greenstone Support for South Asia Head, LRC & CDDL, IIM Kozhikode
Intranet / Internet K-Assets/Objects, Practices, CoP, Collaborative Space Gateway-out Data capture Organizational K @ Enterprise Wide
Enterprise IT Environment Integration Shared Data Intranet Firewall Internet PCs Servers
What is Content Management? Technologies, standards, principles and practices related to: Content creation, capturing, publishing Organization and storage Search, retrieval and delivery Preservation Rights management Version control Administration Integration with external content Integration with other applications on Intranets via web servers and browsers
Content Management: Components Content Management: Components External Content Internal Content Legacy Content Select Download Link Host Create Capture Publish Extract Convert Host Quality Control Integrity Performance Monitor Usage Maintenance Preservation Security Content Repository Organisation Search/ Retrieval Access
Content: Types Structured, Unstructured Source documents with / without Metadata Metadata t with / without t Source document Free / fee based Internal / external
Content: Types Internal content examples: E-Mail, Company News Plans, policies, project reports, best practices, annual reports, press releases, news letters, product catalogs, presentations, etc. Processes, Manuals, Factsheets Staff / expert profiles, phone directories Client, competitor info Software, Courseware, CBT SQL databases, library catalog, legacy databases
Content: Types External content examples: Licensed: Databases (bibliographic, full-text) e-journals e-books Software, etc. Free content (listserv, databases, e-journals, etc.) Web 2.0 / Social Network Locally hosted / remote access More and more external content is brought behind the firewall
External Content Why bring external content behind firewall? Robust & Reliable delivery compared to WWW (World Wide Wait) Storage Costs going Cheap Content aggregation, filtering, and profile- based delivery Integration with internal content
Content: Formats Text (HTML, ASCII) Binary objects (software) Graphics Images WYSIWYG documents PDF Multimedia presentations Digital audio, video More bandwidth more media rich content
Searchers
DRM A Collective name for technologies that prevent one from using a copyrighted work beyond the degree to which the copyright owner (or a publisher who may not actually hold a copyright) wishes ih to allow him/her to use it. -- Michael Godwin
DRM Any technology used to protect the interests of owners of content and services (such as copyright owners). Typically, authorised recipients or users must acquire a license in order to consume the protected material files, music, movies according to the rights or business rules set by the content owner -- Microsoft Security Glossary
ERM ERM stands for Enterprise Rights Management. It is also known as IRM, Information Rights Management. The commonly adopted name is Enterprise Digital Rights Management edrm.
ERM ERM is the persistent control of access to and usage of electronic information regardless of where it exists. Be it inside or outside your organization s firewall.
Protecting Unstructured Data
Data Protection Cycle
Objectives To meet all the complicated document security needs throughout the full document lifecycles and workflows. Easy to integrate with existing systems (Providing SDK for authentication, packaging, policy management). To support all sorts of documents/files/content being circulated in the everyday enterprise work environment. Provide Security Reliability and Scalability on a Provide Security, Reliability and Scalability on a 24X7X365 formula.
Issues with Strong DRM User Support Preservation and Archiving Fair Use Expensive No Interoperability What exactly is being sealed and delivered?
DRM Enabling New Business Models
New Business Models Right to use content more than once Right to share or re-distribute content Time-limited usage Usage limited Subscription model
Best Practices Secure Document Secure Node Secure Exchange Secure e Web Secure Print Secure File-Server
A Word About Open Access
Plagiarism The act of presenting the words, ideas, images, sounds, or the creative expression of others as my own.
Excuses
Possible Consequences
NO Need to Document if Facts that are widely known Information or Judgments considered as Common Knowledge Examples Mahatma Gandhi Father of the Nation Washington DC Capital of the USA
Three Strategies
Preventing Plagiarism
Simple Detection Techniques
Use a Search Engine
Screeners
Screeners
Screeners