{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:30:05Z","timestamp":1761006605994,"version":"build-2065373602"},"reference-count":27,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2008,10,24]],"date-time":"2008-10-24T00:00:00Z","timestamp":1224806400000},"content-version":"vor","delay-in-days":662,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2007,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Recent digital library research has raised concerns about how use restrictions, such as limits on printing or emailing, may affect licensed digital resource usability. This paper describes the results of a study to investigate the types of technological protection measure (TPM) based use restrictions that authorized users of licensed scholarly resources experience when making typical use of licensed resources. Data collection involved a use based assessment of a sample of resources from engineering, health sciences and history\/art history. Analysis developed a framework of observed TPM. The framework distinguishes between \u201chard\u201d and \u201csoft\u201d TPM and identifies 6 subtypes of soft TPM including extent of use, frustration, obfuscation, omission, decomposition, and threat. The study concludes that soft TPM are common in licensed scholarly resources and while hard TPM are less common, they are not unknown. The framework provides a vocabulary to distinguish between different types of use restrictions and to therefore test which use restrictions may create more usability problems.<\/jats:p>","DOI":"10.1002\/meet.1450440228","type":"journal-article","created":{"date-parts":[[2009,2,11]],"date-time":"2009-02-11T13:31:01Z","timestamp":1234359061000},"page":"1-13","source":"Crossref","is-referenced-by-count":0,"title":["Can I email this? The use restrictions found in licensed digital resources"],"prefix":"10.1002","volume":"44","author":[{"given":"Kristin R.","family":"Eschenfelder","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2008,10,24]]},"reference":[{"volume-title":"Digital Libraries","year":"2000","author":"Arms W. Y.","key":"e_1_2_10_2_1"},{"volume-title":"Library: An Unquiet History","year":"2004","author":"Battle M.","key":"e_1_2_10_3_1"},{"key":"e_1_2_10_4_1","doi-asserted-by":"crossref","unstructured":"Braid A.(2005). The use of digital rights management in document supply.INDICARE Monitor \u2013 About Consumer and User Issues of Digital Rights Management Solutions(2)3. Retrieved January 2007http:\/\/www.indicare.org\/monitor","DOI":"10.1108\/02641610410699759"},{"volume-title":"Evaluating DRM: Building a Marketplace for the Convergent World","year":"2006","author":"Center for Democracy and Technology","key":"e_1_2_10_5_1"},{"key":"e_1_2_10_6_1","first-page":"109","volume-title":"The Role of Scientific and Technical Data and Information in the Public Domain: Proceedings of a Symposium","author":"Cohen J.","year":"2003"},{"volume-title":"Library Luminaries Series","year":"2003","author":"Coyle K.","key":"e_1_2_10_7_1"},{"key":"e_1_2_10_8_1","unstructured":"Coyle K.(2004). Rights Management and Digital Library Requirements.Ariadne 40."},{"issue":"2","key":"e_1_2_10_9_1","article-title":"The role of digital rights management in library lending","volume":"2","author":"Coyle K.","year":"2005","journal-title":"INDICARE Monitor \u2013 About Consumer and User Issues of Digital Rights Management Solutions"},{"key":"e_1_2_10_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199609)47:9<672::AID-ASI4>3.0.CO;2-P"},{"key":"e_1_2_10_11_1","unstructured":"Eschenfelder K. R.(forthcoming). Every Library's Nightmare? Digital Rights Management and Licensed Scholarly Digital Resources.College and Research Libraries.Preprint available as dLIST paper# 1803http:\/\/dlist.sir.arizona.edu\/1803\/"},{"key":"e_1_2_10_12_1","unstructured":"Eschenfelder K. R.;Walden B.(2007) Working Paper:The Social Construction of Access and Use Rights for Licensed Scholarly Digital ResourcesThe Society for Automotive Engineers Digital Library and ARTstor."},{"key":"e_1_2_10_13_1","article-title":"E\u2010service quality in libraries: Exploring its features and dimensions","volume":"377","author":"Hernon P.","year":"2005","journal-title":"Library and Information Science Research 27"},{"volume-title":"Intrallect Inc. 2004. Digital Rights Management: Final Report for the JISC","key":"e_1_2_10_14_1"},{"key":"e_1_2_10_15_1","first-page":"8","volume-title":"Conferences in Research and Practice for Information Technology","author":"Jackson M.","year":"2005"},{"key":"e_1_2_10_16_1","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226401232.001.0001"},{"key":"e_1_2_10_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(1999)50:10<890::AID-ASI6>3.0.CO;2-8"},{"key":"e_1_2_10_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/1097-4571(2000)9999:9999<::AID-ASI1047>3.0.CO;2-T"},{"issue":"4","key":"e_1_2_10_19_1","first-page":"127","article-title":"Libraries and Publishers: A Partnership at Risk","volume":"125","author":"Lamm D.","year":"1996","journal-title":"Daedalus"},{"volume-title":"University of Maryland University College June 10\u201011","year":"2004","author":"Lynch C.","key":"e_1_2_10_20_1"},{"volume-title":"Cyberscience: Research in the Age of the Internet","year":"2003","author":"Nentwich M.","key":"e_1_2_10_21_1"},{"issue":"4","key":"e_1_2_10_22_1","first-page":"55","article-title":"Buy or Lease? Two Models for Scholarly Information at the End (or the Beginning) of an Era?","volume":"125","author":"Okerson A.","year":"1996","journal-title":"Daedalus"},{"volume-title":"Book on the Bookshelf","year":"1999","author":"Petroski H.","key":"e_1_2_10_23_1"},{"issue":"6","key":"e_1_2_10_24_1","article-title":"Science can't accept technical barriers of content use","volume":"2","author":"Riehm U.","year":"2005","journal-title":"INDICARE Monitor \u2013 About Consumer and User Issues of Digital Rights Management Solutions"},{"issue":"5","key":"e_1_2_10_25_1","doi-asserted-by":"crossref","first-page":"22","DOI":"10.7771\/2380-176X.4155","article-title":"DRM and Research Libraries: Common Ground?","volume":"15","author":"Rosenblatt B.","year":"2003","journal-title":"Against the Grain"},{"volume-title":"Digital Rights Management: Business and Technology","year":"2002","author":"Rosenblatt B.","key":"e_1_2_10_26_1"},{"key":"e_1_2_10_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10321"},{"key":"e_1_2_10_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lisr.2006.06.002"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.1450440228","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.1450440228","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T09:41:12Z","timestamp":1760953272000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.1450440228"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,1]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,1]]}},"alternative-id":["10.1002\/meet.1450440228"],"URL":"https:\/\/doi.org\/10.1002\/meet.1450440228","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"type":"print","value":"0044-7870"},{"type":"electronic","value":"1550-8390"}],"subject":[],"published":{"date-parts":[[2007,1]]}}}