5,549 research outputs found

    The Vonage Trilogy: A Case Study in Patent Bullying

    Get PDF
    This Article presents an in-depth case study of a series of infringement suits filed by “patent bullies.” Unlike the oft-discussed “patent trolls”—which typically sell no products or services and perform no R&D—patent bullies are large, established operating companies that threaten or institute costly patent infringement actions of dubious merit against smaller companies, usually in order to suppress competition or garner licensing fees. In an ideal world of high-quality patents and optimal patent licensing and litigation, infringement suits by aggressive incumbents would have a cleansing, almost Darwinian effect. Yet, defects and distortions in patent examination, licensing, and litigation—the very problems that are raised constantly in the context of patent trolls—generally apply with equal and, often, greater force to patent bullies. Nonetheless, patent bullies have scarcely been discussed in the academic literature or popular press, especially in recent years. This Article examines three patent infringement suits filed by incumbent telecommunications carriers—Sprint, Verizon, and AT&T—against Vonage, then an early-stage company providing consumer telephone services over the Internet. Based on a detailed analysis of the patentsat-issue, prior art, court documents, and news accounts, it shows that the incumbents were able to exploit defects in the patent system in order to prevent disruptive technologies from competing with their outmoded products and services. Because startups like Vonage typically lack the resources to vigorously defend against even weak patent suits, patent bullying can result in severe anticompetitive effects. The incumbents in the Vonage suits achieved their intended result— drastically reducing Vonage’s stock price, severely weakening its position in the market, and placing it at the brink of insolvency. This case study demonstrates that further theoretical and empirical study is warranted to assess the full extent of the patent bullying problem

    The Vonage Trilogy: A Case Study in Patent Bullying

    Get PDF
    This Article presents an in-depth case study of a series of infringement suits filed by “patent bullies.” Unlike the oft-discussed “patent trolls”—which typically sell no products or services and perform no R&D—patent bullies are large, established operating companies that threaten or institute costly patent infringement actions of dubious merit against smaller companies, usually in order to suppress competition or garner licensing fees. In an ideal world of high-quality patents and optimal patent licensing and litigation, infringement suits by aggressive incumbents would have a cleansing, almost Darwinian effect. Yet, defects and distortions in patent examination, licensing, and litigation—the very problems that are raised constantly in the context of patent trolls—generally apply with equal and, often, greater force to patent bullies. Nonetheless, patent bullies have scarcely been discussed in the academic literature or popular press, especially in recent years. This Article examines three patent infringement suits filed by incumbent telecommunications carriers—Sprint, Verizon, and AT&T—against Vonage, then an early-stage company providing consumer telephone services over the Internet. Based on a detailed analysis of the patentsat-issue, prior art, court documents, and news accounts, it shows that the incumbents were able to exploit defects in the patent system in order to prevent disruptive technologies from competing with their outmoded products and services. Because startups like Vonage typically lack the resources to vigorously defend against even weak patent suits, patent bullying can result in severe anticompetitive effects. The incumbents in the Vonage suits achieved their intended result— drastically reducing Vonage’s stock price, severely weakening its position in the market, and placing it at the brink of insolvency. This case study demonstrates that further theoretical and empirical study is warranted to assess the full extent of the patent bullying problem

    Why study movement variability in autism?

    Get PDF
    Autism has been defined as a disorder of social cognition, interaction and communication where ritualistic, repetitive behaviors are commonly observed. But how should we understand the behavioral and cognitive differences that have been the main focus of so much autism research? Can high-level cognitive processes and behaviors be identified as the core issues people with autism face, or do these characteristics perhaps often rather reflect individual attempts to cope with underlying physiological issues? Much research presented in this volume will point to the latter possibility, i.e. that people on the autism spectrum cope with issues at much lower physiological levels pertaining not only to Central Nervous Systems (CNS) function, but also to peripheral and autonomic systems (PNS, ANS) (Torres, Brincker, et al. 2013). The question that we pursue in this chapter is what might be fruitful ways of gaining objective measures of the large-scale systemic and heterogeneous effects of early atypical neurodevelopment; how to track their evolution over time and how to identify critical changes along the continuum of human development and aging. We suggest that the study of movement variability—very broadly conceived as including all minute fluctuations in bodily rhythms and their rates of change over time (coined micro-movements (Figure 1A-B) (Torres, Brincker, et al. 2013))—offers a uniquely valuable and entirely objectively quantifiable lens to better assess, understand and track not only autism but cognitive development and degeneration in general. This chapter presents the rationale firstly behind this focus on micro-movements and secondly behind the choice of specific kinds of data collection and statistical metrics as tools of analysis (Figure 1C). In brief the proposal is that the micro-movements (defined in Part I – Chapter 1), obtained using various time scales applied to different physiological data-types (Figure 1), contain information about layered influences and temporal adaptations, transformations and integrations across anatomically semi-independent subsystems that crosstalk and interact. Further, the notion of sensorimotor re-afference is used to highlight the fact that these layered micro-motions are sensed and that this sensory feedback plays a crucial role in the generation and control of movements in the first place. In other words, the measurements of various motoric and rhythmic variations provide an access point not only to the “motor systems”, but also access to much broader central and peripheral sensorimotor and regulatory systems. Lastly, we posit that this new lens can also be used to capture influences from systems of multiple entry points or collaborative control and regulation, such as those that emerge during dyadic social interactions

    Automatic Detection of Cyberbullying in Social Media Text

    Get PDF
    While social media offer great communication opportunities, they also increase the vulnerability of young people to threatening situations online. Recent studies report that cyberbullying constitutes a growing problem among youngsters. Successful prevention depends on the adequate detection of potentially harmful messages and the information overload on the Web requires intelligent systems to identify potential risks automatically. The focus of this paper is on automatic cyberbullying detection in social media text by modelling posts written by bullies, victims, and bystanders of online bullying. We describe the collection and fine-grained annotation of a training corpus for English and Dutch and perform a series of binary classification experiments to determine the feasibility of automatic cyberbullying detection. We make use of linear support vector machines exploiting a rich feature set and investigate which information sources contribute the most for this particular task. Experiments on a holdout test set reveal promising results for the detection of cyberbullying-related posts. After optimisation of the hyperparameters, the classifier yields an F1-score of 64% and 61% for English and Dutch respectively, and considerably outperforms baseline systems based on keywords and word unigrams.Comment: 21 pages, 9 tables, under revie

    Intellectual Property and the Prisoner’s Dilemma: A Game Theory Justification of Copyrights, Patents, and Trade Secrets

    Get PDF
    In this article, I will offer an argument for the protection of intellectual property based on individual self-interest and prudence. In large part, this argument will parallel considerations that arise in a prisoner’s dilemma game. In brief, allowing content to be unprotected in terms of free access leads to a sub-optimal outcome where creation and innovation are suppressed. Adopting the institutions of copyright, patent, and trade secret is one way to avoid these sub-optimal results

    Peer Gender and Mental Health

    Get PDF
    Adolescent mental health is key for later well-being. Yet, causal evidence on environmental drivers of adolescent mental health is scant. We study how an important classroom feature---the gender composition in compulsory-school---affects mental health. We use Swedish administrative data (N=576,285) to link variation in gender composition across classrooms within cohorts to mental health. We find that a higher share of female peers in a classroom increases the incidence of mental health diagnoses, particularly among boys. The effect persists into adulthood. Peer composition is thus an important and persistent driver of mental health

    A review on deep-learning-based cyberbullying detection

    Get PDF
    Bullying is described as an undesirable behavior by others that harms an individual physically, mentally, or socially. Cyberbullying is a virtual form (e.g., textual or image) of bullying or harassment, also known as online bullying. Cyberbullying detection is a pressing need in today’s world, as the prevalence of cyberbullying is continually growing, resulting in mental health issues. Conventional machine learning models were previously used to identify cyberbullying. However, current research demonstrates that deep learning surpasses traditional machine learning algorithms in identifying cyberbullying for several reasons, including handling extensive data, efficiently classifying text and images, extracting features automatically through hidden layers, and many others. This paper reviews the existing surveys and identifies the gaps in those studies. We also present a deep-learning-based defense ecosystem for cyberbullying detection, including data representation techniques and different deep-learning-based models and frameworks. We have critically analyzed the existing DL-based cyberbullying detection techniques and identified their significant contributions and the future research directions they have presented. We have also summarized the datasets being used, including the DL architecture being used and the tasks that are accomplished for each dataset. Finally, several challenges faced by the existing researchers and the open issues to be addressed in the future have been presented

    Working class gay men: Redefining community, restoring identity

    Get PDF
    This report presents the full results of one of a suite of three studies investigating how a range of pre-existing social and cultural factors mediate the development of gay male identity and shape the many forms of gay male social life in London today. These studies aim to problematise monolithic and (we believe) unhelpful social categories such as ‘gay community’ or ‘gay scene’ and show how the population of gay men in London is riven with cultural, political and social differences. It is common to talk simplistically about ‘gay men’ or ‘the gay community’. Commentators have unsuccessfully attempted to undermine such simplistic concepts by asserting that these identities and communities are restricted to White, middle class men. However, we believe that this position on its own is unhelpful because it fails to articulate the broader impact of such sweeping terminology. It serves to obscure the myriad ways of being gay that are not currently being described or represented in health or social policy or interventions for gay men. It implicitly robs anyone who is not White and middle class of a gay identity and sociality. It therefore uses the rhetoric of exclusion to ensure that so-called excluded groups are never considered in mainstream health and social policy for gay men because they are somehow not ‘properly’ gay. In addition, it is reductionist in relation to White middle class gay men. It is always well to be suspicious of any notion of the ‘default’ group which is considered powerful, wealthy etc. Such groups are usually one of two things: an aspirational ‘brand’ created by marketeers to sell us certain lifestyles (a quick review of the commercial gay media supports this suspicion) or a conceptual construction which everyone else uses as a benchmark to establish their own ‘individuality’ or ‘difference’. In short, we are asserting that, in policy terms, the White middle class ‘mainstream’ gay community is a useful political fallacy. In short, our representations of gay men and gay sociality remain woefully impoverished and simplistic. There is one additional over-arching effect of the White middle class fallacy. That is, by speaking the language of inclusion and exclusion, we are condemned to always consider weakness as opposed to strength. There is an implicit assumption in nearly all research and policy work on gay men that to be within the charmed circle of the White middle classes is to be without need. Thus, other experiences of being gay and other groups of gay men are described as automatically disadvantaged and weaker. These three reports will show that there is no paradigmatic gay experience or group. Rather, there are myriad ways of being gay, all of which are imbued with strengths and weaknesses. To this end, we have conducted a suite of qualitative studies into gay men resident in London. One of the others examines the relationship between ethnic minority identity and gay identity and the other investigates the lives of gay migrants in London. This report examines the experiences of blue collar or working class gay men. We aim, with all these studies to change the way that health promoters and policy makers conceive of the gay male population. We want to challenge the construction of the gay male population as having a centre which is privileged – White and middle class – and a periphery of excluded ethnic minorities, migrants, bisexuals and working class men etc. Instead, we present a conception of the gay population of London as a composite of a range of different experiences. As fractured, antagonistic and constantly changing. Moreover, the factors which fracture that population, which create the flux and antagonisms are larger social and structural factors such as ethnicity, religion, education, class, income etc. To put it simply, no gay man is simply gay, he probably also has a class background, an ethnicity, a job, a family, and a religious affiliation or history among other things. It is these differences that animate the gay population of London. Therefore, in all these reports we talk about things rarely considered in policy-oriented research on gay men. We talk of the importance of biological family and heterosexual forms of sociality for many gay men. We talk of the centrality of spirituality and organised religion. We talk about education and the passage from school to work. We talk about masculinity and health. We talk about nationalism. We talk very little about HIV and AIDS and sexual health. We have a transparent aim in doing so. We are hoping to take gay men’s health and social concerns out of the service and policy ‘ghetto’ that is HIV. We are reasserting a particularly sociological perspective that gay men’s health (sexual and otherwise) and the HIV epidemic are fundamentally influenced by broader social factors. In short, if we were to recommend one practice outcome as a result of these studies it would be to produce less community interventions telling gay men what to do (or how to be). Rather, we should be seeking to transform the education of all boys and to increase the capacity of all families to live with and enjoy their gay children; of all services to meet the needs of their gay users and of all communities to capitalise on the presence of their gay members. This is not as socially transformative an agenda as it sounds. We have much to learn from the experiences of working class gay men, gay men from ethnic minorities and gay migrants. Such interventions are, properly speaking, HIV health promotion

    Dark Side Leadership: A History and Organizing Template

    Get PDF
    We revisit the history of dark side leadership research over the past twenty years. The literature has developed from the view that this type of leadership is simply the dark side of charisma to a well defined construct. We emphasize the work of Hogan and colleagues who have developed an effective tool for the measurement of dark side leadership along eleven dimensions. The tool is called the Hogan Development Survey or HDS. The HDS has proven to be robust, valid, and reliable. We also suggest that the HDS is a helpful tool for organizing the academic literature regarding dark side leadership and related terms such as destructive and narcissistic leadership. We suggest that many of these related terms are more specific or narrow manifestations of dark side leadership
    • 

    corecore