12,695 research outputs found

    Credit Where It’s Due: The Law and Norms of Attribution

    Get PDF
    The reputation we develop by receiving credit for the work we do proves to the world the nature of our human capital. If professional reputation were property, it would be the most valuable property that most people own because much human capital is difficult to measure. Although attribution is ubiquitous and important, it is largely unregulated by law. In the absence of law, economic sectors that value attribution have devised non-property regimes founded on social norms to acknowledge and reward employee effort and to attribute responsibility for the success or failure of products and projects. Extant contract-based and norms-based attribution regimes fail optimally to protect attribution interests. This article proposes a new approach to employment contracts designed to shore up the desirable characteristics of existing norms-based attribution systems while allowing legal intervention in cases of market failure. The right to public attribution would be waivable upon proof of a procedurally fair negotiation. The right to attribution necessary to build human capital, however, would be inalienable. Unlike an intellectual property right, attribution rights would not be enforced by restricting access to the misattributed work itself; the only remedy would be for the lost value of human capital. The variation in attribution norms that currently exists in different workplace cultures can and should be preserved through the proposed contract approach. The proposal strikes an appropriate balance between expansive and narrow legal protections for workplace knowledge and, in that respect, addresses one of the most vexing current debates at the intersection of intellectual property and employment law

    WISP: a wireless information security portal

    Get PDF
    M.Sc.Wireless networking is a fairly new technology that is important in information technology (IT). Hotels, Airports, Coffee shops, and homes are all installing wireless networks at a record pace, making wireless networks the best choice for consumers. This popularity of wireless networks is because of the affordability of wireless networks devices, and the easy installation [11]. In spite of the popularity of the wireless networks, one factor that has prevented them from being even more widespread can be summed up in a single word: security. It comes as no surprise that these two – wireless and security – converge to create one of the most important topics in the IT industry today [11]. Wireless networks by nature bring about new challenges unique to its environment. One example of these new challenges is: “Signal overflow beyond physical walls”, and with these kinds of new challenges unique to wireless networks, we have new security risks. Hence wireless networks lend themselves to a host of attack possibilities and risks. That is because wireless networks provide a convenient network access point for an attacker, potentially beyond the physical security controls of the organization [7]. Therefore it is challenging for managers to introduce wireless networks and properly manage the security of wireless networks, Security problems of wireless networks are the main reason for wireless networks not being rolled out optimally [1]. In this dissertation, we aim to present to both specialist and non–specialists in the IT industry the information needed to protect a wireless network. We will first identify and discuss the different security requirements of wireless networks. After that we shall examine the technology that helps make wireless networks secure, and describe the type of attacks against wireless networks and defense techniques to secure wireless networks. The research will concentrate on wireless LANs (Local Area Networks), and leading wireless LAN protocols and standards. The result of the research will be used to create WISP (A Wireless Information Security Portal). WISP will be a tool to support the management of a secure wireless network, and help assure the confidentiality, integrity, and availability of the information systems in a wireless network environment

    After Heparin: Protecting Consumers From the Risks of Substandard and Counterfeit Drugs

    Get PDF
    Based on case studies, examines globalization and quality management trends in pharmaceutical manufacturing, barriers to Federal Drug Administration oversight, and the security of pharmaceutical distribution. Makes policy recommendations to ensure safety

    Technological Evolution and the Devolution of Corporate Financial Reporting

    Get PDF
    My claim is that the technology link to the recent disclosure scandals is no coincidence. To be sure, cheating tempts all who seek wealth, in whatever line of business they find themselves. I want to show, however, how the rapid pace of innovation at a number of levels offered motive, opportunity, and rationalization for a downshift in financial reporting norms, which in turn made outright fraud more probable

    Consumers, Sellers-Advisors, and the Psychology of Trust

    Get PDF
    Every day, consumers ask sellers for advice. Because they do not or cannot know better, consumers rely on that advice in making financial decisions of varying significance. Sellers, motivated by strong and often conflicting self-interests, are well-positioned to lead consumers to make decisions that are profitable for sellers and may be harmful to the consumers themselves. Short of imposing fraud liability in extreme situations, the law neither protects the trust consumers place in “seller-advisors,” nor alerts them to the incentives motivating the advice that sellers give. This Article makes several contributions to the literature. First, it identifies and defines the seller-advisor. Sellers and advisors are usually regarded separately by the law; therefore, consumers interacting with them are protected by different rules. As a result, a false dichotomy has arisen between (1) a doctrine of caveat emptor, subject to liability for fraud and applying to consumers interacting with sellers, and (2) fiduciary duties protecting consumers interacting with advisors. This Article is the first attempt to study consumer trust in the many common transactions that fall somewhere in the space between. Second, in reporting the results of an original psychology experiment, this Article offers empirical evidence of how consumers’ decision making is influenced by the trust they place in seller-advisors. Finally, it explores how consumer trust in seller-advisors arises and how it can be manipulated in an effort to understand how legal policy should respond to both the ubiquity of seller-advisors and the consequences of consumer reliance on, and vulnerability to, their advice
    • 

    corecore