Previous Chapter Chapter 6: Technical Mythologies and Security Risks Next Chapter

  • Citations
  • Add to My List
  • Text Size

Technical Mythologies and Security Risks
Technical mythologies and security risks
  • Introduction
  • The surveillance society?
  • From Foucault to Deleuze: from discipline towards control
  • The panoptic sort?
  • Cybercrime
  • Surveillance — a limited hope for the recording industry
  • Attempts at anonymity
  • Counter surveillance
  • The birth of digital rights management
  • Hard and soft DRM today
  • The problem with format capture: closure versus exposure
  • Managing the horror
  • The dialectic of technology
  • Conclusions

Given the legal limitations described in Chapter 5, and the role played by digital recording, compression and transmission technologies in the practice of peer-to-peer file-sharing, much attention has been given by the recording industry in recent years to technical barriers to copyright infringement. At the same time, technical solutions continue to be developed to address the problem of getting caught, getting prosecuted or getting stopped. Previous chapters have given much attention to the ...

Looks like you do not have access to this content.


Don’t know how to login?

Click here for free trial login.

Back to Top

Copy and paste the following HTML into your website