March 1, 2006
Journal Article

Who Owns Your Computer? [digital rights management]

Abstract

Sony’s much debated choice to use rootkit-like technology to protect intellectual property highlights the increasingly blurry line between who can, should, or does control the interaction between among a computational device, an algorithm embodied in software, and the data upon which it acts. Article discusses educational aspects of the situation.

Revised: December 20, 2006 | Published: March 1, 2006

Citation

Bishop M., and D.A. Frincke. 2006. Who Owns Your Computer? [digital rights management]. IEEE Security & Privacy 4, no. 2:61-63. PNNL-SA-49310. doi:10.1109/MSP.2006.56