65,418 research outputs found

    Intangible resources, agglomeration effect of FDI intensity, and firm performance: Evidence from Chinese semiconductor firms

    Get PDF
    This study analyzes the impact of intangible resources on firm performance in an emerging economy context. Intangible resources are considered essential to firms? competitive advantage; however, we argue that firms? intangible resources can be negatively related with performance in emerging economies, due to their weak intellectual property rights protection. Furthermore, we incorporate the resource-based view and geographical agglomeration perspective to propose that geographical locations with dense foreign direct investment can affect the appropriability of intangible resources, thereby moderating the relationship between intangible resources and firm performance. We find empirical evidence to support our argument by examining 70 semiconductor firms in China from 1999 to 2006 period.intangible resources, intellectual property, agglomeration, foreign direct investment, emerging economy

    Technology, privacy and identity: a Hong Kong perspective

    Get PDF
    This article explores the concepts of privacy and identity in Hong Kong in relation to the law relating to data protection. It first considers the notions of privacy and identity in the light of Hong Kong's socioeconomic situation and recent postcolonial heritage. It then highlights the importance of identity management and considers the distinctions and overlaps between identity management and privacy protection. With this conceptual framework in mind, the article then considers the various laws in Hong Kong pertaining to data protection, with a focus on the aspects relating to identity management. It observes that while there is some legal protection in respect of the data relating to an individual's identity, there are other priorities which may take precedence in determining the extent of identity management under the legal system in Hong Kong. Finally, recommendations are made as to how to improve identity management within the context of data protection in Hong Kong

    CREATe 2012-2016: Impact on society, industry and policy through research excellence and knowledge exchange

    Get PDF
    On the eve of the CREATe Festival May 2016, the Centre published this legacy report (edited by Kerry Patterson & Sukhpreet Singh with contributions from consortium researchers)

    Lex Informatica: The Formulation of Information Policy Rules through Technology

    Get PDF
    Historically, law and government regulation have established default rules for information policy, including constitutional rules on freedom of expression and statutory rights of ownership of information. This Article will show that for network environments and the Information Society, however, law and government regulation are not the only source of rule-making. Technological capabilities and system design choices impose rules on participants. The creation and implementation of information policy are embedded in network designs and standards as well as in system configurations. Even user preferences and technical choices create overarching, local default rules. This Article argues, in essence, that the set of rules for information flows imposed by technology and communication networks form a “Lex Informatica” that policymakers must understand, consciously recognize, and encourage

    Democracy and Digital Authoritarianism: An Assessment of the EU’s External Engagement in the Promotion and Protection of Internet Freedom. College of Europe EU Diplomacy Paper 01/2020

    Get PDF
    The past decade has seen a gradual global increase in digital authoritarianism. Internet shutdowns, online censorship, mass surveillance and violations of privacy rights have all become more frequent in parts of the world where citizens are not guaranteed sufficient digital rights. The task of defending, promoting and protecting internet freedom is becoming increasingly relevant for the European Union (EU) − for internal digital and cybersecurity policies as well as for the EU’s external promotion of democracy and human rights. Whilst much has been written about the various internal policies which establish and protect internet freedom within the European Union and its member states, the EU’s external engagement in this field remains critically under-researched. To what extent does the EU engage externally in the promotion and protection of internet freedom? This paper answers this question by covering a wide variety of policy fields including human rights and democracy promotion, digital policy, enlargement and neighbourhood policy, development cooperation and trade policy. Whereas the EU faces a limited opportunity to shape global norms with regard to internet freedom or to change the course of digitally authoritarian states, it has demonstrated several strengths which deserve not to be overlooked. These include, for example, the externalisation of internal data protection and policies and the provision of direct support and protection for civil society. Despite facing significant obstacles, the promotion and protection of internet freedom has become an important area of the EU’s external action which is only set to become more relevant in the coming years

    Cross-Border Securitization: Without Law, But Not Lawless

    Get PDF
    The Article discusses two puzzles posed by cross-border securitization. First, why do the innovators in this area give away their creations through publications and other means rather than attempt to extract licensing fees by registering copyrights, patents, and trade names? The Article shows that innovators benefit from giving away their innovations through fees of the first clients or future clients to a greater extent than through licensing fees. Second, how can securitization markets develop under fragmented and unpredictable laws? The Article argues that cross-border securitization is flourishing under a law merchant, which is later incorporated into domestic laws. In fact, innovations and standardization of law are developing in tandem and the same professionals that innovate are those that work on standardization of the law. The Article concludes that cross-border securitization serves as a case study of legal change from the bottom up, rather than from the top down

    Identity principles in the digital age: a closer view

    Get PDF
    Identity and its management is now an integral part of web-based services and applications. It is also a live political issue that has captured the interest of organisations, businesses and society generally. As identity management systems assume functionally equivalent roles, their significance for privacy cannot be underestimated. The Centre for Democracy and Technology has recently released a draft version of what it regards as key privacy principles for identity management in the digital age. This paper will provide an overview of the key benchmarks identified by the CDT. The focus of this paper is to explore how best the Data Protection legislation can be said to provide a framework which best maintains a proper balance between 'identity' conscious technology and an individual's expectation of privacy to personal and sensitive data. The central argument will be that increased compliance with the key principles is not only appropriate for a distributed privacy environment but will go some way towards creating a space for various stakeholders to reach consensus applicable to existing and new information communication technologies. The conclusion is that securing compliance with the legislation will prove to be the biggest governance challenge. Standard setting and norms will go some way to ease the need for centralised regulatory oversight

    'TV Format Protection through Marketing Strategies?'

    Get PDF
    Commercially successful programme ideas are often imitated or adapted. Television formats, in particular, are routinely copied. Starting from radio formats in the 1950s to game shows and reality programme formats of today, producers have accused others of “stealing”. Although formats constitute one of the most important exports for British TV producers, there is still no certainty about the legal protection of TV formats from copycat versions. Since TV formats fail to fall neatly within the definitions of protected material under international copyright and trade mark regimes, producers have been trying to devise innovative means to protect their formats from plagiarism. The globalization of cultural and entertainment markets may itself have contributed to the rise of TV formats, interconnecting programming industries in a world of multiplying channels. This paper theorizes that global broadcasting and programme marketing strategies can also be used by TV format producers to protect their formats. Specifically, eight different strategies may be used: (a) trade show infrastructure and dynamics; (b) visual brand identity and channel fit; (c) brand extension and merchandising; (d) corporate branding; (e) national branding; (f) genre branding; (g) constant brand innovation; (h) fan communities. The paper develops a methodology for capturing the use and effectiveness of these eight strategies in preventing the copying of formats
    corecore