Main Article Content

Abstract

Digital film production and how they are distributed have altered production and distribution for efficiencies, creativity and access to the world. But it has come with a series of cybersecurity problems, such as data breaches which exposes sensitive personal or corporate data, which leads to identity theft, reputation damage and financial loss. Intellectual property theft is another problem being faced by the film industry in the production process to digital distribution network vulnerabilities. The focus of this article is cybersecurity as an integral component of digital movie properties, including piracy, ransomware and insider threats. Using actual case studies and finding out what’s happening in the digital film ecosystem we can also make the case for strong security architectures. The paper suggests practical solutions such as advanced encryption technology, DRMs and new technologies such as blockchain and AI-based cybersecurity solutions. Overall, this research shows how we need a holistic cybersecurity approach to protect the future of digital film production and distribution.

Keywords

Cybersecurity Digital Distribution Digital Film Production Digital Rights Management (DRM) Intellectual Property Protection

Article Details

How to Cite
[1]
M. Alam, S. R. . Khan, I. R. Khan, and A. Q. Siddiquee, “The Role of Cybersecurity in Digital Film Production and Distribution: Challenges and Solutions”, Cybersys. J, vol. 1, no. 2, pp. 9–20, Dec. 2024, doi: 10.57238/csj.117pfd77.

How to Cite

[1]
M. Alam, S. R. . Khan, I. R. Khan, and A. Q. Siddiquee, “The Role of Cybersecurity in Digital Film Production and Distribution: Challenges and Solutions”, Cybersys. J, vol. 1, no. 2, pp. 9–20, Dec. 2024, doi: 10.57238/csj.117pfd77.

References

  1. T. A. Neyazi, A. Kumar, and H. A. Semetko, "Campaigns, digital media, and mobilization in India," The International Journal of Press/Politics, vol. 21, no. 3, pp. 398-416, 2016, doi: https://doi.org/10.1177/1940161216645336
  2. M. Alam and I. R. Khan, "Cyber-physical Attacks and IoT," in Intelligent Cyber-Physical Systems Security for Industry 4.0: Chapman and Hall/CRC, 2022, pp. 79-104.
  3. Neha, P. Gupta, I. R. Khan, and M. Alam, "Digital and IoT Forensic: Recent Trends, Methods and Challenges," in International Conference on Cybersecurity in Emerging Digital Era, 2022: Springer, Singapore, pp. 59-68, doi: https://doi.org/10.1007/978-981-99-5080-5_6
  4. R. S. Dewar, "The “triptych of cyber security”: A classifi cation of active cyber defence," in 2014 6th International Conference On Cyber Conflict (CyCon 2014), Tallinn, Estonia, 2014: IEEE, pp. 7-21, doi: https://doi.org/10.1109/CYCON.2014.6916392
  5. K. Denny, "Hacking Hollywood: The Entertainment Industry's Constant Concerns with Cybersecurity," Florida State University Business Review, vol. 18, p. 31, 2019.
  6. K. M. McClellan and H. D. McClellan, "Held Hostage: Why Cyber Attacks against Film and Media Industries Are on the Rise," Landslide, vol. 10, p. 16, 2017.
  7. A. Booth, N. Mohr, and P. Peters, "The digital utility: New opportunities and challenges," 2016. [Online]. Available: https://www.mckinsey.com/industries/electric-power-and-natural-gas/our-insights/the-digital-utility-new-opportunities-and-challenges
  8. T. Plagemann, V. Goebel, A. Mauthe, L. Mathy, T. Turletti, and G. Urvoy-Keller, "From content distribution networks to content networks—issues and challenges," Computer Communications, vol. 29, no. 5, pp. 551-562, 2006, doi: https://doi.org/10.1016/j.comcom.2005.06.006
  9. V. Demertzi, S. Demertzis, and K. Demertzis, "An overview of cyber threats, attacks and countermeasures on the primary domains of smart cities," Applied Sciences, vol. 13, no. 2, p. 790, 2023, doi: https://doi.org/10.3390/app13020790
  10. M. Thakur, "Cyber security threats and countermeasures in digital age," Journal of Applied Science and Education (JASE), vol. 4, no. 1, pp. 1-20, 2024, doi: https://doi.org/10.54060/a2zjournals.jase.42
  11. E. A. Fischer, Cybersecurity issues and challenges: In brief. Congressional Research Service, 2014.
  12. R. Sabillon, J. Serra-Ruiz, V. Cavaller, and J. Cano, "A comprehensive cybersecurity audit model to improve cybersecurity assurance: The cybersecurity audit model (CSAM)," in 2017 International Conference on Information Systems and Computer Science (INCISCOS), Quito, Ecuador, 2017: IEEE, pp. 253-259, doi: https://doi.org/10.1109/INCISCOS.2017.20
  13. C. Vorakulpipat, E. Rattanalerdnusorn, P. Thaenkaew, and H. D. Hai, "Recent challenges, trends, and concerns related to IoT security: An evolutionary study," in 2018 20th international conference on advanced communication technology (ICACT), Chuncheon, Korea (South), 2018: IEEE, pp. 405-410, doi: https://doi.org/10.23919/ICACT.2018.8323774
  14. K. Feher, "Trends and business models of new-smart-AI (NSAI) media," in 2020 13th CMI Conference on Cybersecurity and Privacy (CMI)-Digital Transformation-Potentials and Challenges (51275), Copenhagen, Denmark, 2020: IEEE, pp. 1-6, doi: https://doi.org/10.1109/CMI51275.2020.9322725
  15. E. Afful-Dadzie, S. Nabareseh, Z. K. Oplatková, and P. Klímek, "Framing media coverage of the 2014 Sony pictures entertainment hack: a topic modelling approach," in Proceedings of the 11th international conference on cyber warfare and security: ICCWS, 2016: Academic Conferences and Publishing Limited, pp. 1-8.
  16. C. Sullivan, "The 2014 Sony Hack and the Role of International Law," Journal of National Security Law and Policy, vol. 8, p. 437, 2015.
  17. K. Sarikakis, C. Krug, and J. R. Rodriguez-Amat, "Defining authorship in user-generated content: Copyright struggles in The Game of Thrones," New Media and Society, vol. 19, no. 4, pp. 542-559, 2017, doi: https://doi.org/10.1177/1461444815612446
  18. W. Hardy, "Brace yourselves, pirates are coming! the effects of Game of Thrones leak on TV viewership," Journal of Cultural Economics, vol. 46, pp. 27-55, 2022, doi: https://doi.org/10.1007/s10824-020-09404-1
  19. L. M. Ponte, Coming attractions: opportunities and challenges in thwarting global movie piracy. Edward Elgar Publishing, 2008.
  20. E. Bradley, "A Marketing Analysis on Disney Cruise Line," PhD Thesis, University of Mississippi 2023.
  21. K. M. McClellan and H. D. McClellan, "Held Hostage: Why Cyber Attacks against Film and Media Industries Are on the Rise," Landslide, vol. 10, p. 16, 2017.
  22. K. Denny, "Hacking Hollywood: The Entertainment Industry's Constant Concerns with Cybersecurity," Florida State University Business Review, vol. 18, p. 31, 2019.
  23. J. Lyons, "‘A Woman with an Endgame’: Megan Ellison, Annapurna Pictures and American Independent Film Production," in Indie Reframed: Women’s Filmmaking and Contemporary American Independent Cinema, 2016: Edinburgh: Edinburgh University Press, pp. 54-69, doi: https://doi.org/10.1515/9781474403931-007