2012
DOI: 10.1007/s12927-012-0006-1
|View full text |Cite
|
Sign up to set email alerts
|

Strategic value and drivers behind organizational adoption of enterprise DRM: The korean case

Abstract: In the context of now prevalent Extended Virtual Enterprises and our information and knowledge based economies, Enterprise DRM (EDRM) has become an important technical means to address many security issues ranging from simple persistent content protection to more complex dynamic governed usage pattern monitoring. Information is a strategic resource requiring prudent management. Therefore, a better understanding of the strategic value and major drivers behind organizational adoption of EDRM is needed. This pape… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…The role of EDRM is to protect organizational data through file encryption, permission control and audit trail technologies. Because of its persistent information asset protection, EDRM systems have become an important tool for securing information assets in the enterprise sector (Morin and Hovav, 2012). EDRM has traditionally employed a control-based ISSP, which contains a set of predetermined rules and permissions; furthermore, EDRM systems are governed by a system administrator.…”
Section: Enterprise Digital Rights Management Systemmentioning
confidence: 99%
“…The role of EDRM is to protect organizational data through file encryption, permission control and audit trail technologies. Because of its persistent information asset protection, EDRM systems have become an important tool for securing information assets in the enterprise sector (Morin and Hovav, 2012). EDRM has traditionally employed a control-based ISSP, which contains a set of predetermined rules and permissions; furthermore, EDRM systems are governed by a system administrator.…”
Section: Enterprise Digital Rights Management Systemmentioning
confidence: 99%
“…The combination of this approach with DRM [17] technologies in the context of SLA and ISSRM is a challenging opportunity for enhancing operational GRC in cloud computing. Moreover, as suggested in [18], compliance might be factored in by sound rights managed infrastructures. The case for inter-organizational structures (IOS) is raised as a potential adoption factor, which could be considered by analogy in environments based on cloud computing.…”
Section: Service Level Agreements and Exception Managementmentioning
confidence: 99%