Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience
نویسندگان
چکیده
Copyright of e-Education material is valuable. The need for protecting it is prominent. In the past two years, we have developed an infrastructure called e-Course eXchange (eCX ) for protecting the copyrights of e-Courses, right from its development phase to its delivery phase. It has been adopted by an education institute, with a user-base of over 70,000 students, and has been receiving positive feedback from students. To design a secure and effective copyright protection infrastructure is not trivial. In particular, for efficiency purpose, one may allow students to retain a local copy of the e-Course material in their own computers; on the other hand, we should make it difficult for them to make illegal copies of the material. Only storing the material in encrypted form is not enough to protect the material. In this paper, we summarize some principles and knowledge we have gained through this project that should be observed for designing a secure copyright protection system. We believe that these principles would be useful to developers and researchers for designing and developing such a system.
منابع مشابه
Towards a Secure and De-centralized Digital Watermarking Infrastructure for the Protection of Intellectual Property
The advent of the Web, electronic commerce and the creation of electronic distribution channels for content have brought new challenges regarding the protection of intellectual property. As it has become increasingly difficult to protect the distribution medium against copying, techniques for asserting the copyright on information have gained in importance. A particularly promising method is th...
متن کاملA Comparative, descriptive study of the e-Learning deployment solutions in the field of medical education
Background: E-Learning training is programs based on the electronic device. University of medical sciences for health services have need of training human resources specialist. According to importance of technology, identifying electronic components, medical education and use of technology leads to the cause of education and the quality of the training. Methods: Descriptive-comparative st...
متن کاملA Secure Robust Digital Image Watermark
Digital watermarks have been proposed as a method for discouraging illicit copying and distribution of copyright material. This paper presents a new approach for the secure and robust copyright protection of digital images. The digital watermarks described in this paper are designed to be, as far as possible, invariant against image transformations such as rotation, translation, scaling and cro...
متن کاملImportance of Infrastructure and Learners Readiness for Administration of E-Learning in Undergraduate Medical Education
BACKGROUND: A combination of teaching modalities instead of a single method may enhance learning. The purpose of the current study was to evaluate the effectiveness of integrating e-learning modules into the syllabi of clinical contents from different clinical majors at different levels. METHODS: A total of 108 undergraduate students enrolled from various clinical majors, and participated via u...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 2 شماره
صفحات -
تاریخ انتشار 2006