RESEARCH ANALYSIS AND EVALUATION - ugc journal

11
1 Research Analysis and Evaluation ImpactFactor-6.315(SJIF) RNI-RAJBIL2009/30097 International Level Double Blind Peer Reviewed, Refereed, Indexed Research Journal, ISSN(Print)-0975-3486, E-ISSN-2320-5482,RNI-RAJBIL-2009/30097, Impact Factor-6.376(SJIF), March -2022,Vol-I, Issue-03 International Double Blind Peer Reviewed, Refereed , Indexed , Multilingual- Multidisciplinary-High Impact Factor-Monthly-Research Journal Related to Higher Education For all Subject Issue : MARCH- 2022 Vol-I Dr. Krishan Bir Singh Editor in Chief IMPACT FACTOR 6.376 (SJIF) ISSN - 0975-3486 (Print) ISSN- 2320-5482 (Online) RNI Registration Number- RAJBIL2009/30097 RESEARCH ANALYSIS AND EVALUATION ISSUE- 03

Transcript of RESEARCH ANALYSIS AND EVALUATION - ugc journal

1Research Analysis and EvaluationImpactFactor-6.315(SJIF) RNI-RAJBIL2009/30097

International Level Double Blind Peer Reviewed, Refereed, Indexed Research Journal, ISSN(Print)-0975-3486, E-ISSN-2320-5482,RNI-RAJBIL-2009/30097, Impact Factor-6.376(SJIF), March -2022,Vol-I, Issue-03

International Double Blind Peer Reviewed, Refereed , Indexed , Multilingual-Multidisciplinary-High Impact Factor-Monthly-Research Journal Related toHigher Education For all Subject

Issue : MARCH- 2022Vol-I

Dr. Krishan Bir Singh Editor in Chief

IMPACT FACTOR 6.376 (SJIF)

ISSN - 0975-3486 (Print)ISSN- 2320-5482 (Online)RNI Registration Number-RAJBIL2009/30097

RESEARCH ANALYSIS AND EVALUATION

ISSUE- 03

2 Research Analysis and EvaluationImpactFactor-6.315(SJIF) RNI-RAJBIL2009/30097

International Level Double Blind Peer Reviewed, Refereed, Indexed Research Journal, ISSN(Print)-0975-3486, E-ISSN-2320-5482,RNI-RAJBIL-2009/30097, Impact Factor-6.376(SJIF), March -2022,Vol-I, Issue-03

Contact - 94 139 70 222, 94 600 700 95

E-mail:[email protected], [email protected]

Editor’s OfficeA- 215, Moti Nagar,

Street No.7Queens Road

Jaipur- 302021, Rajasthan,India

websitewww.ugcjournal.com/IRAE

1. Editing of the research journal is processed without any remittance. The selection and publication is done afterrecommendation of Peer Reviewed Team, Refereed and subject expert Team.

2. Thoughts, language vision and example in published research paper are entirely of author of research paper. It isno t necessary that both editor and editorial board are satisfied by the research paper. The responsibility of thematter of research paper is entirely of author.

3. Along with research paper it is compulsory to sent Membership form and copyright form. Both form can bedownloaded from website i.e. www.ugcjournal.com

4. In any Condition if any National/International university denies to accept the research paper published in the journalthen it is not the responsibility of Editor, Publisher and Manangement.

5 . Before re-use of published research paper in any manner, it is compulsory to take written acceptance from ChiefEditor unless it will be assumed as disobedience of copyright rules.In case of plagiarism, the entire moral responsibility of the paper material will rest with the author only.

6. The entire moral responsibility of the paper material sent for publication in the said journal will be that ofthe paper author. Chief Editor, Publisher, Printer, Peer Review and Refereed Board will not be responsible.

Authors are requested not to do any kind of plagiarism7. All the legal undertaking related to this research journal are subjected to be hearable at jaipur jurisdiction

only.

bl 'kks/k if=dk ds izdk'ku] lEiknu eqnz.k esa iw.kZr% lko/kkuh cjrh xbZ gSA fdlh Hkh izdkj dh =qfV egt

ekuoh; Hkwy ekuh tk;sA

'kks/k i= dh leLRk ftEEksnkjh 'kks/ki= ys[kd dh gksxhAmä tuZy esa çdk'ku gsrq Hksts x, isij lkexzh dk lEiw.kZ

uSfrd nkf;Ro isij ys[kd dk gksxkA eq[; laiknd ]çdk'kd ]eqæd ] fivj fjfoO;q eaMy ftEesnkj ugÈ gksxkA ys[kdksa

ls vuqjksèk gS fdlh Hkh çdkj dh lkfgfR;d pksjh u djsaA

3Research Analysis and EvaluationImpactFactor-6.315(SJIF) RNI-RAJBIL2009/30097

International Level Double Blind Peer Reviewed, Refereed, Indexed Research Journal, ISSN(Print)-0975-3486, E-ISSN-2320-5482,RNI-RAJBIL-2009/30097, Impact Factor-6.376(SJIF), March -2022,Vol-I, Issue-03

PatronProf. Kala Nath Shastri(Rashtrapati Puraskar” For His Contribution To

Sanskrit)

Prof. Dr. Alireza HeidariFull Professor And Academic Tenure, (USA)

Chief EditorDr. Krishan Bir Singh (Jaipur)

International Advisory BoardAaeid M. S. AyoubGeotechnical Environmental Engineering

Uqbah bin Muhammad IqbalPostgraduate Researcher

Badreldin Mohamed Ahmed AbdulrahmanAssociate Professor

Dr. Alexander N. LUKINPrincipal Research Scientist & Executive DirectorDr. U. C. ShuklaChief Librarian and Assistant ProfessorDr. Abd El-Aleem Saad Soliman DesokyProfessor Assistant

Prof. Ubaldo ComiteLecturer

Associate Chief EditorDr.Surinder SinghS.BalamuruganDr. Seema HabibDr.S.R.Boselin PrabhuDeepika VodnalaChristo AnanthDr. Snehangsu Sinha

EDITORIAL BOARD

EditorDr. Suresh Singh RathorDr. Arvind Vikram SinghRanjan SarkarDr.Naveen GautamDr.I U KhanDr. Deepak SharmaDr. S.N.JoshiDr. Kamalnayan B. ParmarDr. Sandeep NadkarniDr.Bindu ChauhanDr.Vinod SenDilip Jiwan RamtekeDr. Sushila KumariDr Indrani Singh RaiProf. Praveen GoswamiDr. Shubhangi Dinesh RathiG Raghavendra PrasadDr.Dnyaneshwar JadhavDr. A. Dinesh KumarAnand NayyarDr.R.Devi PriyaDr. Srijit BiswasDr.Rajender singhDr Dheeraj NegiDr. Sandeep KatariaSwapnil Murlidhar AkasheDr. Sunita AryaDr. Meeta Shukla

Associate EditorSangeeta MahashabdeRama Padmaja vedulaGuptajit Pathak

4 Research Analysis and EvaluationImpactFactor-6.315(SJIF) RNI-RAJBIL2009/30097

International Level Double Blind Peer Reviewed, Refereed, Indexed Research Journal, ISSN(Print)-0975-3486, E-ISSN-2320-5482,RNI-RAJBIL-2009/30097, Impact Factor-6.376(SJIF), March -2022,Vol-I, Issue-03

Dr R ArulDr. Kshitij ShinghalDr . Ekhlaque AhmadDr Niraj Kumar SinghRaffi Mohammed

Assistant EditorDr.Pintu Kumar MajiDr. Soumya Mukherjee

Subject ExpertRavindrajeet Kaur AroraDr. R. K. SharmaParser SeelwalKumar SankaranDr. Chitra TanwarDr. Neeta GuptaJyotirMoy ChatterjeeDr. Gunjan MishraDr. Seema SinghArchana MoreDr Ajay Kumar

Research Paper ReviewerDr. S. K. SinghDr. Pradip ChouhanDr. Narendrakumar S. PalDr.shama khanDr Indrani Singh RaiDr.Surinder SinghAmit TiwariNaveen Kumar KakumanuDr Dheeraj NegiDr. Shailesh Kumar SinghAshim BoraDandinker Suryakant N

Guest EditorDr. Lalit Kumar Sharma

Advisory BoardDr. Kanchan GoelPraveen KumarManoj Singh ShekhawatAbilashVishnu Narayan MishraDr. Gunjan MishraJyotir Moy ChatterjeeDr. Janak Singh Meena

70 Research Analysis and EvaluationImpactFactor-6.315(SJIF) RNI-RAJBIL2009/30097

International Level Double Blind Peer Reviewed, Refereed, Indexed Research Journal, ISSN(Print)-0975-3486, E-ISSN-2320-5482,RNI-RAJBIL-2009/30097, Impact Factor-6.376(SJIF), March -2022,Vol-I, Issue-03

Introduction

Copying the content, work and ideas of otherpeople is a human tendency and is an age-oldpractice. With the constant and fast developmentof information and communication technology, theuse of internet became wider as a result of whichcopied and pirated digital content is beingdistributed instantaneously. The sale of marketeddigital content and products have also becomeroutine resultantly the issues relating to copyrightinfringement and revenue losses to contentowners are increased. On one hand Users argue

Research Paper - Library Science

Digital Right Management-Its application In Libraries

Deputy Librarian, Ch. Devi Lal University, Sirsa (Haryana)Dr. Rajiv Vij

Digital right management is an important and inseparablesystem for protecting the copyrights of data circulated via the internet or other digital mediaby enabling secure distribution and disabling illegal distribution of the data. It encompassesa variety of technologies and strategies utilized by content owners and managers to limitaccess to the use of rights-protected content.The present study considers consumer concernsand expectations as well as DRM-based business models. DRM manifests both technologyand user-related issues of DRM and establishes how their functions are essential element ofmodern librarians’ toolkits to prevent unauthorized redistribution of contents and productsand restrict the way users can copy content they have acquired. This paper presents thechallenge faced by Users, Content creators and its associates as well as address digitalrights management issues in relation to provide users with access to information.Differentresources including books, journals, documents, seminar papers, in-house expertise areused in the study.Relevant literature is also consulted through internet browsing.

A B S T R A C T

Keywords: Digital Right Management, Internet, Publisher, Technologies, Copyright, ContentCreator, Retailer, Digital Library.

that DRM is strictly obstructing and limiting theuse of content frequently and on the other sidethe logic of content owners is that they make theirworks available on selected terms and conditions,make all of their work or part of it available oncharging of specific fee or free basis and makeuse of whatever technological protection is offeredby the system. So in this way Digital RightManagement prevents stealing and unauthoriseduse of content of the creators and profiting fromtheir work. However,librarians find themselvesdutiful trying to balance between the owners’ andusers’ rights. But before the librarian could do this

71Research Analysis and EvaluationImpactFactor-6.315(SJIF) RNI-RAJBIL2009/30097

International Level Double Blind Peer Reviewed, Refereed, Indexed Research Journal, ISSN(Print)-0975-3486, E-ISSN-2320-5482,RNI-RAJBIL-2009/30097, Impact Factor-6.376(SJIF), March -2022,Vol-I, Issue-03 it is necessary for the librarians to understand theconcept of DRM and how it works. The creationof DRM, its responses and policies and the issuesinvolved with its use are also necessary to balancethe needs and requirements of both users andcontent owners.

Digital Right ManagementDigital Rights Management is a technical

system enabling content owners for deliveringdigital content in a controlled way and furtherpreventing users from having access to the dataunless they meet the requirements of the rightholder, be it financial or otherwise. DRM can,therefore, also be described as encryption appliedto an e-book in order to control what users dowith it, all in an effort to give authors, publishers,and copyright holders a security that theirintellectual property will not be infringed online.Wikipedia describes the tools or technologicalprotection measures through DRM, as a set ofaccess control technologies for restricting the useof proprietary hardware and copyrighted works.This application of technology to facilitate theexploitation of rights is commonly referred to as“digital rights management”.According to Potts,Liza, Dean Holden, and Katie Dobruse(2015),DRM is technology that controls accessto content on digital devices.” Thus Digital rightsmanagement (DRM) is the use of technology tocontrol and manage access to copyrighted material

Need Of DRMThe advances in modern technology

made, digital piracy, sharing or downloading ofcreators’ content, much easier and digital piracyhas become a routine practice. One can makecopies quickly and often for free without beingdetected. According to the U.S. Chamber ofCommerce, the US economy loses billions ofdollars a year to online piracy. Despite existenceof copyright laws it is far from easy to police theinternet.

According to TrulsFretland, Lothar Fritsch, andArne-KristianGroven(2008), ‘Key goals of DRMare to ensure continuing revenue streams forpublishers and authors, to protect books frompiracy, to enable tracking of those engaging inillegal copying or downloading, and to limit whatusers can do with content beyond merely readingit’.DRM is a method of securing digital content toprevent unauthorized use and piracy of digitalmedia. This mechanism prevents users fromcopying, redistributing, or converting content in away that is not explicitly authorized by the contentprovider. DRM tools and software make it almostimpossible for anyone to steal protected content.Braid, (2004) expressed three main reasons forthe implementation of the DRM: Publishers are not in direct control when

supply is through a third party, They fear that inappropriate use might

result, and They fear erosion of their subscription

base.Because of the advent and further

progress of internet technology it has become veryeasy to copy any of digital material. Some of thecopyright owners are afraid that their copy rightworks will be misused. This is why the need ofdigital right management is felt.

Basic Tools & Techniques Used In DRMDRM has many access control

techniques to restrict the unauthorised usage andcopy of digital content on various devices, likepackaging of content, authentication as well asauthorization of the user and controlany other kindof usage of the content.The basic tools andtechniques used in DRM are:Encryption: is one of the standard method toprotect the content available in digital mediumfrom unauthorized use which includes scramblingof the content to make it unintelligible tounderstand for layman, until a key is used tomake the content intelligible.

72 Research Analysis and EvaluationImpactFactor-6.315(SJIF) RNI-RAJBIL2009/30097

International Level Double Blind Peer Reviewed, Refereed, Indexed Research Journal, ISSN(Print)-0975-3486, E-ISSN-2320-5482,RNI-RAJBIL-2009/30097, Impact Factor-6.376(SJIF), March -2022,Vol-I, Issue-03 Watermarking: is a method of embedding acopyright stamp into a digital content. The processis done in a way that does not change thequality of the host media and cannot becaptured by human eyes or ears.

Hashing Technology : protects the digitalcontent from being manipulated by using one-wayhash function and to check the authenticity ofcontent by performing this one-way function andcomparing the result with message digestprovided from the content provider.

Digital Certificate: is a technology where anidentity of a person is bind to a pair of electronickeys that can be used to encrypt and sign digitalinformation. Digital certificate provide completesecurity to all the parties in transaction along-withits use with encryption techniques.

Digital Fingerprinting: is also used to detecttempering of electronically transmitted messages.It cannot be reconstructed from any other digitalfingerprint. It is also called ‘ForensicFingerprinting.

Benefits Of DRMDRM maintains the right to ownership.

DRM takes a proactive approach to protect digitalcontent of authors in retaining ownership of theirwork by creating barriers to stealing. DRM helpsto enforce copyright laws. It protects the rightsand interests of the copyright holder by way ofpiracy protection.

DRM helps monetize digital content moreeffectively as it helps protect income streams andprevents illegal sharing thus, protecting fromtherevenue loss.DRM raises awareness andeducates users about copyright and intellectualproperty. DRM directly linked to business growthas it assures companies about the secure sharingof their productand make way for better licensingagreements and technologies. It alsosends a

message to consumer when the DRM protectedmaterial is used.

Drawbacks Of DRMThe main drawback of DRM is it do not

allows the content users to select and copy thecontent to cite in research work and also do notallow print e-book pages for reading and alsocannot use screen readers for text-to-speech andmakes life miserable for content consumers whofind it difficult to put content on all their personaldevices, make backups, or make transformativeuse of the material and also penalizes suchcustomers to face several inconveniences whencopying content is not allowed even for backuppurposes. It is like placing a lock without key onyour book.DRM do not allow the Users to accessthe product using multiple devices, even if oneowns them all. It may even result in lost book salesas some readers will refuse to buy books that areDRM enabled.It also requires extra work andunnecessary software to be usable just withincomplete functionality and capability.

DRM causes problems for libraries whenthe consumer is not allowed to lend the producteven to his family members. DRM schemes andlaws that require embedding copy protection intodevices andsystems cannot recognize Fair UseRights thus anger the development of open-sourcesoftware.

Issues Relating To DRMThe primary issue of Libraries is with the policyof DRM which restrict libraries to shareknowledge and resources freely and consequentlychanges the outlook and working methodology oflibraries.

Access to and use of content: Theaccustomedand expected usage options of content users foraccess that are given by copyright laws arecurtailed in the employment of DRM systems.Privacy:The UN Declaration of Human Rights,1948, defines privacy as a fundamental right of

73Research Analysis and EvaluationImpactFactor-6.315(SJIF) RNI-RAJBIL2009/30097

International Level Double Blind Peer Reviewed, Refereed, Indexed Research Journal, ISSN(Print)-0975-3486, E-ISSN-2320-5482,RNI-RAJBIL-2009/30097, Impact Factor-6.376(SJIF), March -2022,Vol-I, Issue-03 every human. The functioning of the DRM isbased on restricting the usage or distribution ofthe content. In the present time internet contentand information sharing has become a routine.Issues of hacking, unauthorised publication andcopying have become a major concern for contentproducers. Since this restriction is only possibleafter there is a formal identification of the enduser, the content producers end up collectinginformation about the users and also do not clearlyspecify the usage terms and the restrictions thatwould be imposed on consumers later

Transparency and fair contract terms:The contract terms in most of the digital

content are very bulky, complex and technical.Itis very important to know as to whetherconsumers are, at all, aware that DRM systemsare applied at the time of buying and consumingDRM-protected products and what details of theunderlying DRM systems consumers mayrecognise. If only the restrictions are explicitlyclear, it would go a long way in consumersatisfaction.Because consumers’ information andbehaviour in the context of DRM-based productsis hardly given an importance hence it entails riskswith respect to the user’s privacy.

Interoperability:Digital Rights Management systems

enable the distribution and use of multimediacontent in a controlled way through the completedigital value chain. Need for interoperability arisesin order to use the content on different devicesand different platforms to avoid vendor lock inthe user-organization. So, for the realisation of theconcept of superdistribution, interoperabilitybetween masses of different hardware andsoftware systems is required.

Security and hardware issues:Hardware security protects the machine

and peripheral hardware from theft and fromelectronic intrusion and damage. Since most

DRMsystems need an internet connection, it isdemanded by users that DRM software shouldnot limit the other software on users’ computer.Therefore, Security issues for users may arisewhen DRM systems are in conflict with othersoftware installed on a Personal Computer. Henceit entails the security or functionality of the user’scomputer or other device

Flexibility in business models:The employment of DRM brings a wider

choice for users to access and use for digitalproducts. This flexibility of a wider range ofbusiness models will expectedly alter the rights,expectations and the freedom of usersresultantly,this is seen by users, with somereservation. Fetscherin (2003) suggests, amongother things, that content providers have to learnto compete with appropriate business modelsagainst the pirated versions of their products, inparticular by designing their products with moreconsumer-centric protection technologies.

Product diversity and pricing issue:In the past few decades, businesses have

moved from pricing Internet service at a fixedhourly rate, to data planbased flat-rate pricingmodels. The product diversity and smart devicesgenerate large datasets continuously from allaspects and domains.The protection of DRMsystems hinders innovation and research on newtechnologies and has the potential to foreclosemarket entrance of new competitors and newdistribution technologies.Eva, (2004) also opinedthat with the intended phasing out of collectingsocieties and the only compensation via DRM,many creators will lose substantial parts of theirincome. As a result of this any individual creatorsand small and medium enterprises are endangeredby the high costs of licensing DRM technologies.

Challenges To DRMThe opinion on Digital Right Management

is not unanimously as the users who pay certain

74 Research Analysis and EvaluationImpactFactor-6.315(SJIF) RNI-RAJBIL2009/30097

International Level Double Blind Peer Reviewed, Refereed, Indexed Research Journal, ISSN(Print)-0975-3486, E-ISSN-2320-5482,RNI-RAJBIL-2009/30097, Impact Factor-6.376(SJIF), March -2022,Vol-I, Issue-03 fee can use and copy it in every possible way andwould like to share it with others for theirbenefits.Some businesses pay considerable amountfor a high-value industry would be willing to useDRM so that their competitors would not be ableto get the benefit of the same. In traditionallibraries there was a conceptof short range andlong range reference services,in which time istaken to provide the informationto the users. Butin digital libraries the users can retrieve theinformation sitting on the personal computers fromanywhere.DRM have some critics which pointout that DRM denies the use in fair cases.

The technology of DRM was not a perfectsolution.

In the area of Science, technology andbusiness, and even in the academic field anduniversity libraries, e-books and digital material isused for research and advancement of knowledge.DRM allows e-books to self-destruct unless itrenews its license with the publisher who useDRM to enforce loan cap for a certain period.

Inability to use e-books for researcheffectively.

The university library subscribes tocollection of e-journals. The license betweenthepublisher and the library states that excessiveor systematic downloading of articlescan result insuspension of the subscription.DRM place limitson activities such as copying andprinting.According to Bechtold, S. (2003), DigitalRights Management solutions are still in a stateof development, and thus no standard definitionexists.

DRM system is also not safe.This can also be hacked. This is due to

these threats many countries have signed treatiesto establish anti circumvention laws at global levellike WIPO copyright treaty and the WIPOperformances and phonograms treaty.

DRM will do little to stop piracy.Critics contend that DRM does very little

to prevent piracy, which is usually executedthrough web sites that host unprotected versionsof content. Its main effect may be to frustrateconsumers’ ability to take advantage of the fullpower of digital media resulting conflict withconsumer expectations.

DRM And Infringement Of Copyright LawDRM is a technology that controls access

to content on digital devices to prevent pirates fromstealing and profiting from their work and therebyencourages the creation of more content. Thepurpose of copyright law is to promote theprogress of useful arts and science by protectingthe exclusive right of content creator and inventorsto benefit from their works of authorship/ownership. Copyright in a work is infringed by aperson who, without the license of the copyrightowner, does or authorises another to do, any ofthe acts restricted by copyright. Violations ofcopyright law and moral rights drove the need fora new solution to protect content creators andowners. DRM is the perceived solution and is notcopyright. DRM tools enable developers oftechnologies and software interfaces to createdigital restriction mechanisms with the help ofcopyright protection to overcome acts that couldharm the value of a product in the market e.g.piracy, unauthorized usage and modification to theproduct.

The controversy started with the cultureclash between the copyright owner and the Users.The content creator/owner believes that accessshould be controlled and coping paid for. On theother hand and the internet content user believesthat the access should be universal and sharingshould be free. After passage of Digital MillenniumCopyright Act 1998 to update US Copyright Actof 1976 the matter of access became an issue ofdebate and On October 12, 1998, Congress passedthe Digital Millennium Copyright Act (DMCA).The law became effective in October 2000 and it

75Research Analysis and EvaluationImpactFactor-6.315(SJIF) RNI-RAJBIL2009/30097

International Level Double Blind Peer Reviewed, Refereed, Indexed Research Journal, ISSN(Print)-0975-3486, E-ISSN-2320-5482,RNI-RAJBIL-2009/30097, Impact Factor-6.376(SJIF), March -2022,Vol-I, Issue-03 has been incorporated into the Copyright Act (Title17 of the U. S. Code) and ultimately with thedifficulty of understanding the financial incentiveto major corporations to control the law, it seemsto many that copyright regulation is, in fact, out-dated. What Congress and the courts ultimatelydecide may determine how such activity continuesboth online and in the court of public opinion.

Application Of DRM In LibrariesAlmost anyone in the business of

producing, packaging, distributing, or selling e-books is affected by coming into the presence ofDRM, in either positive or negative ways. TheContent Creators restrict the damage that maybe associated with piracy and want to protect theirintellectual property. Consumers do not want tobe restricted by content creator in reading e-books.Rather they want to use them in their own way.They readers also advocate fair use and do notwant to be treated as potential defaulters. ThePublishers prefer government regulation and donot support laws associated with fair use and donot want to loss of sale as a result of piracy. TheSoftware & Hardware Companies want tobalance copyright protection, privacy, and fair usebecause their products are used for furtherproduction and distribution of digital content. RetailOnline stores are affected balancing the interestsof content providers and customers both. The mainmission of the libraries have to provide free accessto information and encourage reading and literacywhile protecting the privacy of patrons these tendto be against excessive technological and legalcontrol while respecting the rights of contentcreators and considering the concerns of both theirpatrons and content owners by:

Eliminating the “First sale” doctrine:It is an American legal concept that limits

the secondary transfer of intellectual propertyrights to others. The first sale doctrine providesthat an individual who knowingly purchases a copyof a copyrighted work from the copyright holder

receives the right to sell, display or otherwisedispose of that particular copy, notwithstandingthe interests of the copyright owner. It is first salethat allows libraries to loan lawfully acquired worksto the public.

Enforcing a”Pay-per-use “model ofinformation dissemination:

Pay-per-use is a type of paymentstructure, in which a user has access to potentiallyunlimited resources but only pays for what theyactually use.The policy associated with the objectstates thatevery use of the object requires thevalue of theobject to be decremented from thecredit balance of the user.With utility computing,a library can purchase computing resources tomatch fluctuating needs. It should not be thebusiness of government to favour or enforce anyparticular business model in the informationmarketplace, particularly one that raises majorissues of equity and potentially severe economicconsequences for public institutions.

Enforcing time limits or other limitations ofuse that prevent preservation and archiving:

Many market models of DRM distributionsystems envision content that essentially vanishafter a specific period of time or number of uses.DRM technologies can also prevent copyingcontent into new formats. Such controls willprevent libraries and information centres, researchinstitutions, and other cultural institutions frompreserving and providing long-term.

ConclusionDigital rights management (DRM) is the

use of technology to control and manage accessto copyrighted material. DRM is a managementof relationships between the Digital content ownerand User in general. The essential aspect ofinformation is that it is something to be sharedand not a kind of commodity whose value shouldbe determined in marketplace by force. There is

76 Research Analysis and EvaluationImpactFactor-6.315(SJIF) RNI-RAJBIL2009/30097

International Level Double Blind Peer Reviewed, Refereed, Indexed Research Journal, ISSN(Print)-0975-3486, E-ISSN-2320-5482,RNI-RAJBIL-2009/30097, Impact Factor-6.376(SJIF), March -2022,Vol-I, Issue-03

a need to identify effective ways of improvingthe way users-related issues are addressed inpolicy-making processes at all levels. The mostsensible way, to move forward with DRM forpublishers, authors, libraries and users is to strikea balance with security, utility, and accessibility.There is a need to frame more equitable copyrightpolicies that will encourage the flow of informationand its sharing in libraries and information centres,reward fairly the creators and authors of literaryand artistic works and software and hardwaremanufacturer also..

1 Bechtold, S. (2003), The Present and Future of Digital Rights Management - Musings onEmerging Legal Problems. s. In: Becker, Buhse, Günnewig, Rump (eds.), Digital RightsManagement – Technological, Economic, Legal and Political Aspects, Berlin, pp. 597 – 664.

2 Braid, Andrew.(2004), The use of a digital rights management system in a document supplyservice. Interlarding & document supply, 2004; 32 (3): 189-191.

3 Coyle, Karen .(2003), The Technology of Rights: Digital Rights Management based on a talkoriginally given at the Library of Congress, November 19, 2003.

4 EVA – European Visual Artists. (2004), Comments on the Informal Consultation of the FinalReport of the High Level Group on DRM of the European Commission, DG InformationSociety; online available at: http://europa.eu.int/information_society/eeurope/2005/all_about/digital_rights_man/doc/eva.doc

5 Fetcherin, M. (2003), Evaluating Consumer Acceptance for Protected Digital Content, in:Becker, E.; Buhse, W.; Günnewig, D.; Rump, N. (eds.): Digital Rights Management.Technological, Economic, Legal and Political Aspects, Berlin et al, pp. 301-320.

6 Kurt Schiller. (2010) Happy Medium: Ebooks, Licensing and DRM, Information Today 27,no. 2, Feb2010.

7 Potts, Liza, Dean Holden, and Katie Dobruse. (2015), Fracturing Digital Entertainment byKindlingRivalries and Blowing Steam.In Cultures of Copyright, edited by Dfmielle NicoleDeVossand Martine Courant Rife, 140—53. New York: Peter Lang, 2015.

8 Timothy, Armstrong K.(2006), Digital RightsManagement and the Process of Fair Use,HarvardJournal of law & Technology, Vol 20,Number 1 Fall 2006, available at http://jolt.law.harvard.edu/

9 TrulsFretland, Lothar Fritsch, and Arne-KristianGroven.(2008,)State of the Art in DigitalRight Management, MARIAGE Project Report 1018 Oslo: NorskRegnesenral [NorwegianComputing Centre]

R E F E R E N C E