3,489 research outputs found

    Rethinking the strategy of Amazon.com

    Get PDF
    The strategic challenge facing Amazon.com is that it is not able to convincethe investment community that it is able to generate profits in the long run. The doubtof investors is well grounded. This paper argues that Amazon should make a strategicshift to operate as a provider of technical services and business consulting in the areaof business-to-consumer e-commerce. At the same time it should reduce the range ofthe items sold on-line to, say, books and CDs, and treat this part of its business as akind of research and development activity. Its avant garde status as e-commerceinnovator and its track record in customer satisfaction have tremendous market valueand can serve as an 'open sesame' to enter the huge market of e-commerce consulting.Its continuing survival and (hopefully) future profitability hold deeper implications forother dot.com companies and B2C e-commerce

    Liberty and Property in the Patent Law

    Get PDF
    Patents have seldom troubled civil libertarians. A specialized form of property, patents seemed pertinent to the technologies of traditional industry but little else. Patent instruments offered their readers mere technical documentation; patent cases presented no more than the mapping of a text onto an instantiated artifact; patent policy was principally oriented toward economic optimization of the length and scope of protection. Unbound from technology, contemporary patent law now seems a more robust discipline. Modern patent instruments appropriate a diverse array of techniques that span the entire range of human endeavor. Patent claims, cut loose from physical moorings, have grown more abstract and oriented toward human behavior. We have yet to realize fully the consequences of postindustrial patenting, but the potential impact of the patent law upon personal liberties is becoming more apparent and more worthy of concern. Although the principles of the patent canon demonstrate sufficient flexibility to regulate uses of such inventions as software, business methods, and genetic fragments, they persist in bearing little regard for civil rights. The private rule making, made possible through the patent law, holds the potential to impinge upon individual liberties in ways not previously considered possible

    Contemplating Knudsen's Baseline: Where Small is not so Beautiful

    Get PDF
    Does the Internet's World Wide Web (the web) represent an opportunity or threat to the small firms of the world? In line with recent calls for entrepreneurship research to adopt a more evolutionary approach, this article considers the context, process, and possible outcomes of small place-based firms operating in a web-impacted environment. Despite initial optimism that the web would provide a level-playing field for firms of all sizes, little evidence exist to support such a notion. When the learning abilities deemed necessary to exploit the web are considered, it would seem that only the most entrepreneurial of small firms would likely adapt to web-impacted environments. It is concluded that the present rate of web-based change represents a unique and valuable research opportunity for entrepreneurship researchers

    People in the E-Business: New Challenges, New Solutions

    Get PDF
    [Excerpt] Human Resource Planning Society’s (HRPS) annual State of the Art/Practice (SOTA/P) study has become an integral contributor to HRPS’s mission of providing leading edge thinking to its members. Past efforts conducted in 1995, 1996, 1997, 1998, and 1999 have focused on identifying the issues on the horizon that will have a significant impact on the field of Human Resources (HR). This year, in a divergence from past practice, the SOTA/P effort aimed at developing a deeper understanding of one critical issue having a profound impact on organizations and HR, the rise of e-business. The rise of e-business has been both rapid and dramatic. One estimate puts the rate of adoption of the internet at 4,000 new users each hour (eMarketer, 1999) resulting in the expectation of 250 million people on line by the end of 2000, and 350 million by 2005 (Nua, 1999). E-commerce is expected to reach $1.3 trillion by 2003, and of that, 87 percent will go to the business to business (B2B) and 13 percent to the business to consumer (B2C) segments, respectively (Plumely, 2000)

    Usability of Humanly Computable Passwords

    Full text link
    Reusing passwords across multiple websites is a common practice that compromises security. Recently, Blum and Vempala have proposed password strategies to help people calculate, in their heads, passwords for different sites without dependence on third-party tools or external devices. Thus far, the security and efficiency of these "mental algorithms" has been analyzed only theoretically. But are such methods usable? We present the first usability study of humanly computable password strategies, involving a learning phase (to learn a password strategy), then a rehearsal phase (to login to a few websites), and multiple follow-up tests. In our user study, with training, participants were able to calculate a deterministic eight-character password for an arbitrary new website in under 20 seconds

    Information And Communications Technology: A Comparative View Of Technological Determinism

    Get PDF
    Misinterpretations by techno-centric managers hold that advances in information and communications technologies (ICT) are the prime causal factors in future business growth and that technology is an independent variable from which operational performance can be predicted. Technology pundits and economic futurists are convinced that the ‘new economy’ has indeed become reality as competitive pressures dramatically rise as a result of the increasing interdependencies forming among competing nations and firms. This competition has been made possible, in part, by the commercially viable World Wide Web and its superstructure known as the Internet. This paper scrutinizes the invaluable role played by information and communications technologies and the technological determinism they propagate

    Who Owns the Key to the Vault? Hold-up, Lock-out, and Other Copyright Strategies

    Get PDF

    Collusion and Collective Action in the Patent System: A Proposal for Patent Bounties

    Get PDF
    Persistent commentary contends that the Patent Office is issuing patents that appropriate public domain concepts at an alarming frequency. Complaints of low patent quality enjoy growing resonance with regard to business methods, computer software, and other inventions for which patents were not traditionally sought. In this article, Professor Jay Thomas explains how the judiciary\u27s lenient view of patentable subject matter and utility standards, along with miserly congressional funding policies, have rendered the Patent Office an increasingly porous agency. Professor Thomas next reviews existing proposals for improving patent quality, including the conventional wisdom that adoption of an opposition system will contribute meaningfully to the solution of our patent quality problem. Exploring the political economy of patent challenges, Professor Thomas reasons that oppositions do little to solve collective action problems, the possibility of collusion between the prior art holder and patentee, and the existence of the first inventor defense. Professor Thomas instead proposes that the Patent Office recruit members of the public to act as private patent examiners. By awarding prior art informants with a bounty assessed against applicants, the Patent Office can restore order to the patent system and reduce its social costs
    • …
    corecore