{"id":60,"date":"2015-11-19T21:35:27","date_gmt":"2015-11-19T21:35:27","guid":{"rendered":"https:\/\/cybersecurity.bournemouth.ac.uk\/?page_id=60"},"modified":"2025-10-26T01:20:44","modified_gmt":"2025-10-26T01:20:44","slug":"human-factors-in-drm","status":"publish","type":"page","link":"https:\/\/cybersecurity.bournemouth.ac.uk\/?page_id=60","title":{"rendered":"Human Factors in DRM"},"content":{"rendered":"<p><strong><a href=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2015\/11\/HFDRM.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-93\" src=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2015\/11\/HFDRM-300x200.jpg\" alt=\"HFDRM\" width=\"300\" height=\"200\" srcset=\"https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2015\/11\/HFDRM-300x200.jpg 300w, https:\/\/cybersecurity.bournemouth.ac.uk\/wp-content\/uploads\/2015\/11\/HFDRM-1024x683.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Overview<\/strong><br \/>\nDigital Rights Management (DRM) refers to a collection of security mechanisms that are widely deployed on a number of copyright-protected digital assets. However, despite the existence of a number of studies of the technical architectures of rights management security systems, there is little scholarly\/academic literature dedicated to the human aspects associated with circumvention of DRM security.<\/p>\n<p>We are working with the game developers to better understand their interactions with copyright control mechanisms and digital rights management. We are also looking at what the implications of these interactions are given other \u2018stakeholders\u2019 associated with DRM, such as publishers, consumers, and legal practitioners.<\/p>\n<p>This is joint work between BUCSR, <a href=\"https:\/\/www1.bournemouth.ac.uk\/discover\/faculties\/faculty-science-technology\/our-departments\/department-creative-technology\">Department of Creative Technology<\/a>, and the <a href=\"https:\/\/microsites.bournemouth.ac.uk\/cippm\/\">Centre for Intellectual Property Policy &amp; Management<\/a>.<\/p>\n<p><strong>Contacts<\/strong>: <a href=\"http:\/\/staffprofiles.bournemouth.ac.uk\/display\/mfavale\">Marcella Favale<\/a>,\u00a0<a href=\"http:\/\/staffprofiles.bournemouth.ac.uk\/display\/sfaily\">Shamal Faily<\/a>, <a href=\"http:\/\/staffprofiles.bournemouth.ac.uk\/display\/cgatzidis\">Christos Gatzidis<\/a><\/p>\n<p><strong>Funders<\/strong>: Bournemouth University<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview Digital Rights Management (DRM) refers to a collection of security mechanisms that are widely deployed on a number of copyright-protected digital assets. However, despite the existence of a number of studies of the technical architectures of rights management security systems, there is little scholarly\/academic literature dedicated to the human aspects associated with circumvention of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":53,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width-page.php","meta":{"inline_featured_image":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"_links":{"self":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/60"}],"collection":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=60"}],"version-history":[{"count":13,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/60\/revisions"}],"predecessor-version":[{"id":1050,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/60\/revisions\/1050"}],"up":[{"embeddable":true,"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/53"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.bournemouth.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=60"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}