Green Payments for Blue Carbon Economic Incentives for Protecting ...
Economic incentives for protecting digital rights online
description
Transcript of Economic incentives for protecting digital rights online
Economic incentives for protecting digital rights online
Source:
Authors:
Reporter:Date:
Electronic Commerce Research and Applications, Vol.10, Issue 5, pp.553-564, 2011N. Boris Margolin, Brian Neil Levine, James D. Miller, Matthew WrightLu, Wan-Yu, Liang, Jiun-Lwen2012/11/01
2
Outline
• Introduction• Background & Related work• The proposed protocol (SPIES)– Exchange period– Protection period
• Conclusions
3
Introduction
• Once electronic content has been released, it is very difficult to prevent it from being shared.
• This disclosure often represents economic harm to the content’s owner and others.
• To discourage illegitimate sharing.
4
Background & Related work(1/2)
• Game theory
• Digital rights management (DRM)– DRM is the use of technological means to allow only
authorized uses of or access to content.
– Traditional DRM uses techniques: encryption & watermarking
– DRM-free
5
Background & Related work(2/2)
• Digital rights management (DRM)
Content providerContent consumer
Escrow service
6
The proposed protocol (1/5)
• Secret Protection Incentive-based Escrow System (SPIES).
• SPIES is best suited for applications in which the content is legitimately shared among a small set of participants.
• SPIES should not be used to replace traditional DRM. (ex. movie and music files sold online)
• SPIES used to limit unauthorized sharing of passwords for accessing content on websites.
7
The proposed protocol (2/5)
• SPIES is a protocol executed between several actors:
信託付款服務 (第三方 )
8
The proposed protocol (3/5)
• Variables in SPIES
9
The proposed protocol (4/5)
• Exchange period
10
The proposed protocol (5/5)
• Protection period
Fig. the Bounty Payment
11
Conclusions
• SPIES uses the techniques of game theory to analyze strategies and outcomes.
• Applicable: passwords, corporate knowledge-sharing, pre-release media.
• Its chief limitations are the requirements for a limited number of legitimate.
• To limit and detect unauthorized sharing.
Thanks for your attention !