{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:08:28Z","timestamp":1754158108750,"version":"3.41.2"},"reference-count":8,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2007,2,27]],"date-time":"2007-02-27T00:00:00Z","timestamp":1172534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,2,27]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this Guest Editorial is to introduce the papers in this special issue.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>A brief summary of the main contributions of the papers included in this issue is provided.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>In order to combat the digital information war it was found that important work must be done to establish both users' and content providers' trust through fair e\u2010commerce\/digital rights management (DRM).<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The paper provides an overview of the basic requirements of DRM systems.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14684520710730994","type":"journal-article","created":{"date-parts":[[2007,2,28]],"date-time":"2007-02-28T10:56:50Z","timestamp":1172660210000},"page":"5-9","source":"Crossref","is-referenced-by-count":5,"title":["The digital information war"],"prefix":"10.1108","volume":"31","author":[{"given":"Mariemma I.","family":"Yag\u00fce","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022031720192165900_b2","unstructured":"Council of Europe (1950), EHCR (1950): European Convention of Human Rights and Fundamental Freedoms, Council of Europe, available at: http:\/\/conventions.coe.int\/treaty\/en\/Treaties\/Html\/005.htm (accessed 4 November 1950)."},{"key":"key2022031720192165900_b1","unstructured":"Council of Europe (2002), Directive 2002\/58\/EC (2002): Directive on Privacy and Electronic Communications of the European Parliament and of the Council, available at: http:\/\/europa.eu.int\/eur\u2010lex\/pri\/en\/oj\/dat\/2002\/l_201\/l_20120020731en00370047.pdf (accessed 12 July 2002)."},{"key":"key2022031720192165900_b3","unstructured":"Korba, L. and Kenny, S. (2002), \u201cTowards meeting the privacy challenge: adapting drM\u201d. NRC paper NRC 44956, available at: http:\/\/iit\u2010iti.nrc\u2010cnrc.gc.ca\/iit\u2010publications\u2010iti\/docs\/NRC\u201044956.pdf (accessed November 2002)."},{"key":"key2022031720192165900_b4","unstructured":"Ma\u00f1a, A., Yag\u00fce, M.I. and Benjumea, V. (2003), \u201cEC\u2010gate: an infrastructure for digital rights management\u201d, Proceedings of the IASTED International Conference on Communication, Network, and Information Security, Special Session on Architectures and Languages for Digital Rights Management and Access Control, New York City, December 10\u201012, 2003, Acta Press, Calgary."},{"key":"key2022031720192165900_b5","doi-asserted-by":"crossref","unstructured":"Ma\u00f1a, A., Yag\u00fce, M.I., Karnouskos, S. and Abie, H. (2006), \u201cInformation use\u2010control in e\u2010government applications\u201d, Encyclopedia of Digital Government, Idea Group Reference, Hershey, PA, pp. 1076\u20101082.","DOI":"10.4018\/978-1-59140-789-8.ch162"},{"key":"key2022031720192165900_b6","unstructured":"Oasis, XACM (2006), available at: www.oasis\u2010open.org\/committees\/tc_home.php?wg_abbrev=xacml."},{"key":"key2022031720192165900_b7","unstructured":"Yag\u00fce, M.I., Ma\u00f1a, A. and S\u00e1nchez, F. (2004), \u201cSemantic interoperability of authorizations\u201d, Proceedings of the Second Workshop on Security in Information Systems, 13 April 2004, Porto, Portugal, INSTICC Press."},{"key":"key2022031720192165900_frg8","doi-asserted-by":"crossref","unstructured":"Yag\u00fce, M.I. and Troya, J.M. (2002), \u201cA semantic approach for access control in Web services\u201d, Proceedings of EuroWeb 2002 International Conference, British Computer Society Electronic Workshops in Computing (eWiC), Oxford.","DOI":"10.14236\/ewic\/EW2002.3"}],"container-title":["Online Information Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14684520710730994","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520710730994\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520710730994\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:40:43Z","timestamp":1753404043000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/oir\/article\/31\/1\/5-9\/314715"}},"subtitle":[],"editor":[{"given":"Mariemma","family":"Yag\u00fce","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2007,2,27]]},"references-count":8,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,2,27]]}},"alternative-id":["10.1108\/14684520710730994"],"URL":"https:\/\/doi.org\/10.1108\/14684520710730994","relation":{},"ISSN":["1468-4527"],"issn-type":[{"type":"print","value":"1468-4527"}],"subject":[],"published":{"date-parts":[[2007,2,27]]}}}