fullrecord |
[{"key": "dc.contributor.advisor", "value": "M\u00f6nk\u00f6l\u00e4, Sanna", "language": null, "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Oksanen, Oskari", "language": null, "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2015-06-02T07:46:52Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2015-06-02T07:46:52Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2015", "language": null, "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/46154", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Digitaalinen k\u00e4ytt\u00f6oikeuksien hallinta \u2014 lyhennettyn\u00e4 DRM \u2014 on ollut yksi peliteollisuuden kiistellyimmist\u00e4 keinoista hillit\u00e4 piratismia Internetin kaupallistumisen j\u00e4lkeen. Vaikka menetelm\u00e4\u00e4 pidettiin alunperin v\u00e4ltt\u00e4m\u00e4tt\u00f6myyten\u00e4 pelialalle, pelaajat ja jopa pelinkehitt\u00e4j\u00e4t ovat v\u00e4itt\u00e4neet menetelm\u00e4n olevan vain haitaksi laillisille pelaajille ja pikemminkin houkuttelevan k\u00e4ytt\u00e4ji\u00e4 piratoimaan pelins\u00e4 sen seurauksena. T\u00e4ss\u00e4 tutkielmassa k\u00e4sitell\u00e4\u00e4n aluksi digitaalista k\u00e4ytt\u00f6oikeuksien hallintaa yleisesti, Internetin yleistymist\u00e4 edelt\u00e4neit\u00e4 tietokonepelien suojausmenetelmi\u00e4 ja lopuksi nelj\u00e4\u00e4 DRM-pohjaista suojausmenetelm\u00e4\u00e4 tietokonepelialalta.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "Digital rights management \u2014 DRM for short \u2014 has been one of gaming industry\u2019s most controversial methods to combat piracy since the commercialization of the Internet. While DRM was initially deemed as a necessity for the industry, gamers and even game developers have claimed that the method only serves as a hindrance for legal customers and that it tempts people to pirate their games because of that. This thesis first examines digital rights management in general, computer game protection methods used before the widespread usage of the Internet, and lastly four DRM methods used in the computer games.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted using Plone Publishing form by Oskari Oksanen (osaneeok) on 2015-06-02 07:46:52.319424. Form: Kandidaatintutkielma -lomake (https://kirjasto.jyu.fi/julkaisut/julkaisulomakkeet/kandin-tutkielma-lomake). JyX data: [jyx_publishing-allowed (fi) =True]", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by jyx lomake-julkaisija (jyx-julkaisija.group@korppi.jyu.fi) on 2015-06-02T07:46:52Z\nNo. of bitstreams: 2\nURN:NBN:fi:jyu-201506022146.pdf: 150996 bytes, checksum: 597e988cc525189ca74e1ee4429cfe1d (MD5)\nlicense.html: 4797 bytes, checksum: 6740be8a02596d1384f03f105bffa616 (MD5)", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2015-06-02T07:46:52Z (GMT). No. of bitstreams: 2\nURN:NBN:fi:jyu-201506022146.pdf: 150996 bytes, checksum: 597e988cc525189ca74e1ee4429cfe1d (MD5)\nlicense.html: 4797 bytes, checksum: 6740be8a02596d1384f03f105bffa616 (MD5)\n Previous issue date: 2015", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "21", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "drm", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "digital rights management", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tietokonepelit", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "piratismi", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "kopiosuojaus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Digitaaliset rajoitukset tietokonepelien suojauksessa", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-201506022146", "language": null, "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.dcmitype", "value": "Text", "language": "en", "element": "type", "qualifier": "dcmitype", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatintutkielma", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietotekniikka", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Mathematical Information Technology", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.date.updated", "value": "2015-06-02T07:46:53Z", "language": null, "element": "date", "qualifier": "updated", "schema": "dc"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": "fi", "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|