Companies and individuals will then have an enormous incentive to produce original and value laden products because they know their work will be protected. Trusted systems are one way to ensure that digitized intellectual property can be restricted to paying customers. Trusted systems work by embedding a code in software products that can be recognized by specially equipped hardware instructing the computer or printer to allow only certain operations. 27 These instructions, called usage rights, could specify whether a user could make copies, “”loan”” a document to another computer for a specified period of time, or allow read-only capability. Vendors using trusted systems then could have control over how much access to allow consumers and instill value-creating scarcity on the digital information market.
And in the recording industry songs and videos could be offered individually for fractions of the current cost. Micropayments will play a key role in fueling this growth of cheaply available intellectual property. The Internet changes the logic of bundling for digital products, however, since the marginal cost of production is reduced to almost zero and distribution costs are negligible. Therefore once a company takes the time and money to produce a digital product it can afford to offer it to the public at very low prices when sales volume is high.
As end users browse the audience owner’s service, they’re notified of each item’s cost. Consumers could be induced to acquire trusted system technology with initial offers of free information in exchange for installing trusted systems software. This has already occurred to some extent with the pdf format, which makes documents available in a digitally unalterable form to anyone who downloads Adobe Acrobat software. Trusted systems would have broader applications, including software, music, video, and interactive documents. Once trusted systems become prevalent, digital information will have value because it is once again scarce.
25But again the barriers to entry are high and the vendor base is limited. There has been endless speculation about new business models that can be realized once digital 소액결제 정책 are feasible. Much focus over the years has been on allowing users to buy media, such as individual news articles, on an “a la carte” basis – that is, piece by piece, rather than as part of a subscription or with intrusive advertising. The general argument is that this would allow a transition away from ad-supported content on the internet, which is still the thesis behind the Brave browser and its tokenized browsing model. The most common method is providing the card number and other information over the phone. Therefore, it is relatively easy to extend charge card payments to the Internet. Indeed charge cards payments over the Internet are already quite popular (e.g. projections of a billion dollars spent this way in 1997). Direct use of charge cards over the Internet in the same way as using phone, introduces several security concerns, since the Internet is known not to provide confidentiality or authentication. This has resulted in several solutions, most notably the use of the SSL protocol to encrypt the credit card information.