1,848 research outputs found

    Building communities for the exchange of learning objects: theoretical foundations and requirements

    Get PDF
    In order to reduce overall costs of developing high-quality digital courses (including both the content, and the learning and teaching activities), the exchange of learning objects has been recognized as a promising solution. This article makes an inventory of the issues involved in the exchange of learning objects within a community. It explores some basic theories, models and specifications and provides a theoretical framework containing the functional and non-functional requirements to establish an exchange system in the educational field. Three levels of requirements are discussed. First, the non-functional requirements that deal with the technical conditions to make learning objects interoperable. Second, some basic use cases (activities) are identified that must be facilitated to enable the technical exchange of learning objects, e.g. searching and adapting the objects. Third, some basic use cases are identified that are required to establish the exchange of learning objects in a community, e.g. policy management, information and training. The implications of this framework are then discussed, including recommendations concerning the identification of reward systems, role changes and evaluation instruments

    Audit-based Compliance Control (AC2) for EHR Systems

    Get PDF
    Traditionally, medical data is stored and processed using paper-based files. Recently, medical facilities have started to store, access and exchange medical data in digital form. The drivers for this change are mainly demands for cost reduction, and higher quality of health care. The main concerns when dealing with medical data are availability and confidentiality. Unavailability (even temporary) of medical data is expensive. Physicians may not be able to diagnose patients correctly, or they may have to repeat exams, adding to the overall costs of health care. In extreme cases availability of medical data can even be a matter of life or death. On the other hand, confidentiality of medical data is also important. Legislation requires medical facilities to observe the privacy of the patients, and states that patients have a final say on whether or not their medical data can be processed or not. Moreover, if physicians, or their EHR systems, are not trusted by the patients, for instance because of frequent privacy breaches, then patients may refuse to submit (correct) information, complicating the work of the physicians greatly. \ud \ud In traditional data protection systems, confidentiality and availability are conflicting requirements. The more data protection methods are applied to shield data from outsiders the more likely it becomes that authorized persons will not get access to the data in time. Consider for example, a password verification service that is temporarily not available, an access pass that someone forgot to bring, and so on. In this report we discuss a novel approach to data protection, Audit-based Compliance Control (AC2), and we argue that it is particularly suited for application in EHR systems. In AC2, a-priori access control is minimized to the mere authentication of users and objects, and their basic authorizations. More complex security procedures, such as checking user compliance to policies, are performed a-posteriori by using a formal and automated auditing mechanism. To support our claim we discuss legislation concerning the processing of health records, and we formalize a scenario involving medical personnel and a basic EHR system to show how AC2 can be used in practice. \ud \ud This report is based on previous work (Dekker & Etalle 2006) where we assessed the applicability of a-posteriori access control in a health care scenario. A more technically detailed article about AC2 recently appeared in the IJIS journal, where we focussed however on collaborative work environments (Cederquist, Corin, Dekker, Etalle, & Hartog, 2007). In this report we first provide background and related work before explaining the principal components of the AC2 framework. Moreover we model a detailed EHR case study to show its operation in practice. We conclude by discussing how this framework meets current trends in healthcare and by highlighting the main advantages and drawbacks of using an a-posteriori access control mechanism as opposed to more traditional access control mechanisms

    The relationship between copyright and contract law

    Get PDF
    Contracts lie at the heart of the regulatory system governing the creation and dissemination of cultural products in two respects: (1) The exclusive rights provided by copyright law only turn into financial reward, and thus incentives to creators, through a contract with a third party to exploit protected material. (2) From a user perspective purchases of protected material may take the form of a licensing contract, governing behaviour after the initial transaction. Thus, a review of the relationship between copyright and contract law has to address both supply- and demand-side issues. On the supply side, policy concerns include whether copyright law delivers the often stated aim of securing the financial independence of creators. Particularly acute are the complaints by both creators and producers that they fail to benefit from the exponential increase in the availability of copyright materials on the Internet. On the demand side, the issue of copyright exceptions and their policy justification has become central to a number of reviews and consultations dealing with digital content. Are exceptions based on user needs or market failure? Do exceptions require financial compensation? Can exceptions be contracted out by licence agreements? This report (i) reviews economic theory of contracts, value chains and transaction costs, (ii) identifies a comprehensive range of regulatory options relating to creator and user contracts, using an international comparative approach, (iii) surveys the empirical evidence on the effects of regulatory intervention, and (iv) where no evidence is available, extrapolates predicted effects from theory

    Digital Rights Management and Consumer Acceptability: A Multi-Disciplinary Discussion of Consumer Concerns and Expectations

    Get PDF
    The INDICARE project – the Informed Dialogue about Consumer Acceptability of DRM Solutions in Europe – has been set up to raise awareness about consumer and user issues of Digital Rights Management (DRM) solutions. One of the main goals of the INDICARE project is to contribute to the consensus-building among multiple players with heterogeneous interests in the digital environment. To promote this process and to contribute to the creation of a common level of understanding is the aim of the present report. It provides an overview of consumer concerns and expectations regarding DRMs, and discusses the findings from a social, legal, technical and business perspective. A general overview of the existing EC initiatives shows that questions of consumer acceptability of DRM have only recently begun to draw wider attention. A review of the relevant statements, studies and reports confirms that awareness of consumer concerns is still at a low level. Five major categories of concerns have been distinguished so far: (1) fair conditions of use and access to digital content, (2) privacy, (3) interoperability, (4) transparency and (5) various aspects of consumer friendliness. From the legal point of view, many of the identified issues go beyond the scope of copyright law, i.e. the field of law where DRM was traditionally discussed. Often they are a matter of general or sector-specific consumer protection law. Furthermore, it is still unclear to what extent technology and an appropriate design of technical solutions can provide an answer to some of the concerns of consumers. One goal of the technical chapter was exactly to highlight some of these technical possibilities. Finally, it is shown that consumer acceptability of DRM is important for the economic success of different business models based on DRM. Fair and responsive DRM design can be a profitable strategy, however DRM-free alternatives do exist too.Digital Rights Management; consumers; Intellectual property; business models

    Digital piracy : theory

    Get PDF
    This article reviews recent theoretical contributions on digital piracy. It starts by elaborating on the reasons for intellectual property protection, by reporting a few facts about copyright protection, and by examining reasons to become a digital pirate. Next, it provides an exploration of the consequences of digital piracy, using a base model and several extensions (with consumer sampling, network effects, and indirect appropriation). A closer look at market-structure implications of end-user piracy is then taken. After a brief review of commercial piracy, additional legal and private responses to end-user piracy are considered. Finally, a quick look at emerging new business models is taken.information good, piracy, copyright, IP protection, internet, peer-to-peer, software, music

    Digital Piracy: Theory

    Get PDF
    This article reviews recent theoretical contributions on digital piracy. It starts by elaborating on the reasons for intellectual property protection, by reporting a few facts about copyright protection, and by examining reasons to become a digital pirate. Next, it provides an exploration of the consequences of digital piracy, using a base model and several extensions (with consumer sampling, network effects, and indirect appropriation). A closer look at market-structure implications of end-user piracy is then taken. After a brief review of commercial piracy, additional legal and private responses to end-user piracy are considered. Finally, a quick look at emerging new business models is taken.information good, piracy, copyright, IP protection, internet, peer-to-peer, software, music

    Economics of Copyright Collecting Societies and Digital Rights: Is There a Case for a Centralised Digital Copyright Exchange?

    Get PDF
    Copyright collecting societies have attracted economists’ attention for over 30 years and the attention of government regulators for even longer. They have typically been accepted by economists and by courts of law as necessary for reducing transaction costs and enabling copyright to work. The advent of digitization has led to renewed interest in the topic and to the view that though new technologies offer the possibility of improved rights management, collecting societies are not responding sufficiently to these opportunities. That view was evident in recent enquiries into the role of copyright in the digital age in the UK, which proposed the formation of a Digital Copyright Exchange (DCE) that would promote online digital trade. This paper evaluates the case for the DCE in the light of what economists know about collective rights management
    • 

    corecore