Sony’s much debated choice to use rootkit-like technology to protect intellectual property highlights the increasingly blurry line between who can, should, or does control the interaction between among a computational device, an algorithm embodied in software, and the data upon which it acts. Article discusses educational aspects of the situation.
Revised: December 20, 2006 |
Published: March 1, 2006
Citation
Bishop M., and D.A. Frincke. 2006.Who Owns Your Computer? [digital rights management].IEEE Security & Privacy 4, no. 2:61-63.PNNL-SA-49310.doi:10.1109/MSP.2006.56