Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1052220.1052251acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicecConference Proceedingsconference-collections
Article

Towards a framework for understanding the effectiveness of digital content exploitation strategies

Published: 25 March 2004 Publication History

Abstract

Due to initiatives like Napster and Kazaa the business case for delivering protected digital content remains problematic. Still little is known about the effectiveness of content exploitation strategies. In this paper the literature on content protection, provisioning and usage is reviewed. Based on this review a causal framework is developed, which seeks to explain the effectiveness of content exploitation strategies. The paper ends with formulating a research agenda for studying content exploitation.

References

[1]
Chen, Z. & A. Dubinsky (2003) A conceptual model of Perceived Customer Value in E-commerce: A Preliminary Investigation. Psychology & Marketing, Vol. 20 (4): 323--347
[2]
Davis, F. D. (1989) Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, MIS Quarterly, Vol. 13, pp. 319--339
[3]
Eskicioglu, Ahmet M. and Delp, Edward J. (2001) An overview of multimedia content protection in consumer electronics devices, Signal Processing: Image Communication 16 (2001) (p 681--699), Elsevier publishers
[4]
Eskicioglu, Ahmet M. (2003) Protecting intellectual property in digital multimedia networks, IEEE Computer July 2003, IEEE Computer society
[5]
Felten, Edward W. (2003) A sceptical view of DRM and Fair Use, Communications of the ACM Vol. 46 No. 4 (April 2003), (p 57--59), ACM Publications
[6]
Gilmore, James H. and Pine II, B. Joseph, (1999) The Experience Economy, Harvard Business School Press
[7]
Gilmore, John, (2001) What's wrong with content protection, e-mail correspondence with Ron Rivest, 19 January 2001, www.mail-archive.com/[email protected]/msg04532.html
[8]
Klein, S. and Loebbecke, C. (2003) Emerging Pricing Strategies on the Web: lessons from the Airline Industry, Electronic Markets, 13(1): 46--58
[9]
National Research Council, (2000) The digital Dilemma - Intellectual Property in the Information Age, National Academy Press, Washington D.C. 2000
[10]
OECD, (1998) The Economic and Social Impacts of Electronic Commerce, online at: http://www.oecd.org/subject/e_commerce/ http://www.oecd.org/dataoecd/3/12/19944883.pdf
[11]
Odlyzko, Andrew (2003) Privacy, economics and price discrimination on the Internet, 5th International conference on electronic Commerce, N. Sadeh, ed., (p 355--366), ACM, 2003 www.dtc.umn.edu/~odlyzko/doc/privacy.economics.pdf
[12]
Rogers, Everett M. (1995) Diffusion of Innovations, The free press, New York 1995
[13]
Salden, A., Goedvolk, E., Doest, H. ter, Kersemakers, R., Slijp, D., Prins, J. E. J. (2002): Digital Rights Management in Information Publishing, International Conference on Law and Technology (LawTech 2002), Cambridge, USA, November 6-7 2002
[14]
Schneier, Bruce. (2001) The futility of digital copy prevention, Crypto-Gram Newsletter May 15, 2001, www.schneier.com/crypto-gram-0105.html
[15]
Shapiro, C. and Varian, H. R. (1999) Information Rules: A Strategic Guide to the Network Economy, Boston, MA: Havard Business School Press
[16]
Traw, C. Brendan S. (2003) Technical Challenges of Protecting Digital Entertainment Content, IEEE Computer July 2003, IEEE Computer Society

Index Terms

  1. Towards a framework for understanding the effectiveness of digital content exploitation strategies

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICEC '04: Proceedings of the 6th international conference on Electronic commerce
    March 2004
    684 pages
    ISBN:1581139306
    DOI:10.1145/1052220
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • ICEC: International Center for Electronic Commerce

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 March 2004

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. content exploitation
    2. content protection

    Qualifiers

    • Article

    Acceptance Rates

    Overall Acceptance Rate 150 of 244 submissions, 61%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 646
      Total Downloads
    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 08 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media