1 Digital Rights Management: Desirable, Inevitable and Almost Irrelevant Andrew Odlyzko Digital Technology Center University of Minnesota

Slides:



Advertisements
Similar presentations
Chapter Nineteen The American Economy Personal Finances ~~~~~ Insurance Against Hardship.
Advertisements

Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Ind – Develop a foundational knowledge of pricing to understand its role in marketing. (Part II) Entrepreneurship I.
Consumer Issues Chapter 28.
The Stock Market Crash Mr. Dodson.
Macroeconomics Unit 11 Fiscal Policy Decisions Top 5 Concepts.
Economics and Law Lecture 5 Ross Anderson. Price discrimination Recall: an efficient monopolist sells to each customer at her reservation price - ‘selling.
INTERNET INFORMATION ACCESS How to avoid and eliminate common problems confronting usage of modern resources to access the Internet.
1 Privacy, Economic and Price Discrimination on the Internet By: Andrew Odlyzko Presented by: Magdi Eltom CS585 Spring 2009.
Little brother is watching you
1 Price Discrimination We thus far have studied a monopolist that charges: A. Same price for all units. B. Same price to all customers. Changing one or.
Rights Management McAfee Associates Strategy: Free Anti-Virus Software Downloading He asked users to send him whatever amount they thought it was worth.
University of Minnesota Andrew Odlyzko Digital Technology Center University of Minnesota To auction or not? Historical.
How to take advantage of search engines for your local business.. THE LAST FRONTIER LOCAL and MOBILE SEARCH Take advantage with…
1 Too expensive to meter: The influence of transaction costs in transportation and communication David Levinson and Andrew Odlyzko University of Minnesota.
7 Prepared by: Fernando Quijano and Yvonn Quijano © 2004 Prentice Hall Business PublishingPrinciples of Economics, 7/eKarl Case, Ray Fair Long-Run and.
1 How to live and prosper with insecure cyberinfrastructure Andrew Odlyzko Digital Technology Center University of Minnesota
1 Andrew Odlyzko The New Economy and old economics: What 19 th century railroads can tell us about the future of ecommerce
University of Minnesota Economics, psychology, and sociology and the limitations they impose on secure knowledge management Andrew Odlyzko Digital Technology.
Cybersecurity versus human space, and the role of cryptography and security Andrew Odlyzko, Digital Technology Center, University of Minnesota, 02/09/2007.
University of Minnesota Content and telecom pricing in history and in the war for eyeballs Andrew Odlyzko Digital Technology Center University of Minnesota.
University of Minnesota Cybersecurity and its limitations Andrew Odlyzko Digital Technology Center University of Minnesota
QBook UNIT 2 Setting Goals. QBook INTRODUCTION  During a negotiation, most people have a general idea of what they want:  higher pay, lower price, higher.
UNIT 4: Consumer and Housing Law Chapter 23 Contracts
E-Tailing Electronic Retailing or E-Tailing - is the sale of goods or services through the internet. This can include: business-to-business sales (B2B)
Computer Technology Part 5 Megan Rees ERMS 5/13.  Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to other.
This PowerPoint Presentation was designed to provide you with important information regarding our unique Business Opportunity and proprietary software.
Chapter 15 The Great Depression
Ben DiSera.  From 1999 to 2009, music sales and licensing dropped $8.3 million dollars. ◦ This number started at $14.6 million and dropped to $6.3 million.
Secrets Realtors® “Don’t want you to know about”
1 Chapter 6 Understanding Computers, 11 th Edition Software Ownership Rights Software license: agreement, either included in a software package or displayed.
What is E-Commerce? Section 8.1. What is E-commerce? E-commerce is the exchange of goods, services, information, or other businesses through electronic.
E-Commerce. What is E-Commerce Industry Canada version Commercial activity conducted over networks linking electronic devices (usually computers.) Simple.
NGN Services Pricing and the Virtues of Simplicity Andrew Odlyzko Director, Digital Technology Center
The Stock Market Crash Background 1920s appeared to be a decade of prosperity = “The Roaring 20s” 1920s appeared to be a decade of prosperity =
WELCOME TO THE FUTURE Use right and left arrow buttons to go forward or back Home SEE:Courses Free Courses Course Catalogue SIGN- UP to: All Courses.
Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.
Direct and Online Marketing: The New Marketing Model
Economics 2010 Lecture 13’ Monopoly pricing Monopoly  Price discrimination  Price discrimination and total revenue  Price discrimination and consumer.
Main Argument: Software should not be patentable because it discourages progress and innovation in the field. "...There is absolutely no evidence, whatsoever—
This template courtesy of BreakthroughBroker.com.
Microsoft ® Office SharePoint ® Server 2007 Training SharePoint document libraries I: Introduction to sharing files Bellwood-Antis School District presents:
There are 4 different types of economic systems: 1. Market economic system (pg R32) - this is an economic system based on individual choices and voluntary.
Cultural Conformity and Adaptation Social Change Chapter 3, section 3 Pgs
Addiction? Addiction – the state of being enslaved to a habit or practice or to something that is psychologically or physically habit- forming to such.
Chapter Seven The Interaction of People in Markets.
Government Finances Chapter 25. The Federal Government Section 1.
Economy: the complex of human activities concerned with the production, distribution, and consumption of goods and services the management of the resources.
1 AO 8/03 University of Minnesota 1 AO 8/03 University of Minnesota Providing security with insecure systems Andrew Odlyzko School of Mathematics and Digital.
SharePoint document libraries I: Introduction to sharing files Sharjah Higher Colleges of Technology presents:
 NEED  Food  Water  Clothes/shoes  Homes  Phones  Gas for cars  WANT  Accessories  Junk food we don’t need (eating out)  Online shopping.
1 Cultural Change What causes cultural change? Why has the rate of change increased? The culture of always being in contact; except with the people you’re.
Chapter 10 Challenge To Market Effectiveness 1: Monopolies McGraw-Hill/IrwinCopyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved.
© 2002 by Prentice Hall 6-1 The Growth in Computer Use Region est. Asia-Pacific European Union United States Latin.
Mario Čagalj Sveučilište u Splitu 2014/15. Sigurnost računala i podataka.
IOS APP STORE PRICING MODELS AND LICENSING POLICIES.
The role of the government in the economy Measuring the economy The Stock Market.
Shaping the Internet By: Marc Schaecher Jackie Ross.
Price Discrimination IB Economics Ch 11
PIRACY AND COMPUTERS Asad Patel. What is (software) piracy? ■Unauthorized copying of software ■Includes distributing and downloading ■AKA ripping, cracking,
What you need to know.  Each TDI vessel is equipped with satellite communications that supplies a LOW BANDWIDTH internet connection. Even though the.
Chapter 13 Section 2. Inflation Inflation - Is a general increase in prices; such as, over the years, prices rise and fall, but in the American economy,
Saving and Investing What’s the big deal?. What is the difference between saving and investing?
A Worldwide Depression. Postwar Europe Unstable New Democracies Germany and new countries formed from Austria-Hungary No experience with democracy Existing.
Today’s Goal Get to know you better Answer all your questions
Pure Monopoly Chapter 11 11/8/2018.
Economy: the complex of human activities concerned with the production, distribution, and consumption of goods and services the management of the resources.
Fiscal Policy.
Taxes, spending, fiscal policy, deficits, surpluses, national debt
What caused the greatest economic crisis in American history?
Presentation transcript:

1 Digital Rights Management: Desirable, Inevitable and Almost Irrelevant Andrew Odlyzko Digital Technology Center University of Minnesota

2 DRM Paradoxes: Conferences, papers, industry support A few widespread deployments (iTunes, …) but Steve Job calls for end to music DRM New York Times, Sept. 19, 2007: “We are ending TimeSelect, effective today.”

3 Outline: “The most important thing is to maximize the value of your intellectual property, not to protect it for the sake of protection.” Shapiro and Varian DRM often gets in the way of maximizing value Ecommerce needs occasional “speed bumps” (DRM) For effective application, security of DRM will take back seat to usability DRM to be widespread, but may play minor role, and be mostly insecure

4 Modern Economy: Strong incentive for price discrimination Increasing fixed, decreasing marginal costs Decline of privacy Can find out buyer’s willingness to pay Can control resale Opposed by counter trends: Political action Willingness to pay more for simple prices Network effects

5 Standard economic argument for price discrimination Charlie: willing to prepare a report on digital cash for $1,500 Alice: willing to pay $700 Bob: willing to pay $1,000 Uniform pricing makes transaction impossible Charging Alice $650 and Bob $950 makes everybody better off (in conventional economic model)

6 Politics makes for strange bedfellows, but so does economics: On average, for each dollar American consumers pay for prescription drugs, the Germans are paying 71 cents; the Swedes, 68 cents; the British, 65 cents; the French, 57 cents, and the Italians, 51 cents. Unfortunately, U.S. policy allows pharmaceutical industry to maintain that disparity.... It’s a moral outrage that Congress continues to allow millions of elderly and chronically ill Americans to suffer and die because they cannot afford the inflated prices charged for pharmaceuticals. Congressman Bernie Sanders letter to Barron’s

7 Versioning is motivated by incentives to price discriminate: It is not because of the few thousand francs which have to be spent to put a roof over the third-class carriages or to upholster the third-class seats that some company or other has open carriages with wooden benches. What the company is trying to do is to prevent the passengers who pay the second class fare from traveling third class; it hits the poor, not because it wants to hurt them, but to frighten the rich. And it is again for the same reason that the companies, having proven almost cruel to the third-class passengers and mean to the second-class ones, become lavish in dealing with first-class passengers. Having refused the poor what is necessary, they give the rich what is superfluous. Jules Dupuit, 1849

8 Secure systems (DRM and others): Several decades of proof we can’t build them If we could, we could not live with them Secure systems would stop secretaries from forging their bosses’ signatures

9 Security Pyramid: algorithms protocols systems users

10 Honor System Virus : This virus works on the honor system. Please forward this message to everyone you know and then delete all the files on your hard disk. Thank you for your cooperation.

11 Intentional ambiguity (in proposed SEC rule for corporate lawyers): Evidence of a material violation means information that would lead an attorney reasonably to believe that a material violation has occurred, is occurring, or is about to occur. VS. Evidence of a material violation means credible evidence, based upon which it would be unreasonable, under the circumstances, for a prudent and competent attorney not to conclude that it is reasonably likely that a material violation has occurred, is ongoing, or is about to occur. It is easy to make fun of lawyers, but don’t we all like to have some slack in our lives?

s: The “Golden Age” of civilian cryptography and security: But also: The “Golden Age” of fax, including faxed signatures

13 Why does a fax signature work? Hard to do serious damage with a single forged fax Fax usually just one of many elements of an interaction (involving heterogeneous elements, such as phone calls, s, personal meetings,...) The role of a fax signature has to be viewed in the context of the entire transaction. (And it is not used for definitive versions of large contracts,...)

14 Quantifiable benefits of (incomplete) security:

15 Other ways to skin the cat (other than explicit price discrimination): Microsoft Office (for Windows 3.11) components: Access$225 Excel$225 PowerPoint$225 Word$175 Total:$850 Office Pro bundle:$389

16 Bundling is an alternative to price discrimination in reducing consumer surplus Willingness to pay: word processorspreadsheet Alice $100 $300 Bob $300$100 Pricing and revenue: $100 for each program $400 $300 for each program $600 $400 for bundle $800

17 Site Licensing: # employees value 900$ 0 10$ 10 10$ 20 10$ 30 10$ 40 10$ 50 10$ 60 10$ 70 10$ 80 10$ $ employees Sales to individuals: optimal price either $50 or $60 revenue = $3,000 Site licensing: revenue = $5,500

18 Consumers’ willingness to pay more for simple pricing: What was the biggest complaint of AOL users? Not the widely mocked and irritating blue bar that appeared when members downloaded information. Not the frequent unsolicited junk . Not dropped connections. Their overwhelming gripe: the ticking clock. Users didn’t want to pay by the hour anymore. Case had heard from one AOL member who insisted that she was being cheated by AOL’s hourly rate pricing. When he checked her average monthly usage he found that she would be paying AOL more under the flat-rate price of $ When Case informed the user of that fact, her reaction was immediate. ‘I don’t care,’ she told an incredulous Case. ‘I am being cheated by you.’ from aol.com: How Steve Case Beat Bill Gates, Nailed the Netheads, and Made Millions in the War for the Web, Kara Swisher

19 Flat rates as a way to stimulate usage:

20 U.S. cell phone usage, minutes per day around June of each year. Almost flat rates :

21 Network effects : Although about three million computers get sold every year in China, people don’t pay for the software. Someday they will, though. And as long as they’re going to steal it, we want them to steal ours. They’ll get sort of addicted, and then we’ll somehow figure out how to collect sometime in the next decade. Bill Gates, 1998

22 Long history of content providers resisting new technologies: When circulating libraries were first opened, the booksellers were much alarmed; and their rapid increase, added to their fears, had led them to think that the sale of books would be much diminished by such libraries. But experience has proved that the sale of books, so far from being diminished by them, has been greatly promoted; as from these repositories many thousand families have been cheaply supplied with books, by which the taste of reading has become more general, and thousand of books are purchased each year by such as have first borrowed them at those libraries, and after reading, approving of them, have become purchasers. James Lackington English bookseller,

23 Conclusions: DRM research to flourish industry enamored of maximal control “real option” value academic inertia and love of many knobs to twirl, … Moderate deployment of DRM Modest actual usage of DRM For practical systems, usability far more important than security

24 Further data, discussions, and speculations in papers and presentation decks at: