8 research outputs found
Data Protection by Default in Identity-Related Applications
Part 2: Session 1 - Privacy and Identity ManagementInternational audience“Privacy by default” is being discussed as one important principle for ICT system design. This principle has been taken up as “data protection by default” in the proposal for a European Data Protection Regulation published in 2012. However, it is debated what this principle should mean in practice. In this text, we analyze the relation to “security by default” and “privacy by design” and discuss different possible interpretations of the “data protection by default” principle. After presenting general considerations on how to choose and implement appropriate default settings, we exemplarily describe recommendations for typical identity-related application scenarios such as social network sites, user tracking on the web and user-controlled management of one’s identities. Both the general and the scenario-based elaborations provide guidance for developers as well as evaluators
A Comparison of Market Approaches to Software Vulnerability Disclosure
Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although the discussion on details of responsible vulnerability disclosure is controversial, there is a sort of consensus that better information sharing is socially beneficial. In the recent years we observe the emerging of “vulnerability markets ” as means to stimulate exchange of information. However, this term subsumes a broad range of different concepts, which are prone to confusion. This paper provides a first attempt to structure the field by (1) proposing a terminology for distinct concepts and (2) defining criteria to allow for a better comparability between different approaches. An application of this framework on four market types shows notable differences between the approaches
Patent Litigation Strategy and Its Effects on the Firm
Patent litigation has attracted scholarly attention to reconcile multiple views for new research. Accordingly, this paper addresses patent litigation strategy and its effect on the firm. Based on 106 papers and articles, six books, the author\u27s logic and practice impressions, it first defines patent litigation strategy and differentiates similar concepts. Second, based on the process, the author fine‐tunes patent litigation strategy into three tactics: threat, filing and verdict. Then, she categorizes and examines the impact of patent litigation on market value, monetary gain/loss and strategic collaboration. The findings show that the effect on the market value is more complex and ambiguous than anticipated, and sometimes contradictory. The analysis shows the consistency of monetary effect in practice, that firms tend to have higher monetary gains from private settlement than from legal awards. It also demonstrates that existing studies lag behind reality in investigating the detailed role of patent litigation on strategic collaboration from partnership (e.g. licensing and strategic alliance) to takeover (i.e. merger and acquisition). Finally, the author reflects on the findings, and maps out critical paths toward new research. This process also reveals that stakeholders, industrial settings and country environments moderate the studied relationship. This paper contributes to knowledge and practice: appreciates the interdisciplinary endeavors to draw the findings; categorizes patent litigation and its effect; and critiques prior studies on the relationship to integrate knowledge for future research
Recommended from our members
Review: intellectual property aspects of plant transformation
One of the recurring themes of the debates concerning the application of genetic transformation technology has been the role of Intellectual Property Rights (IPR). This term covers both the content of patents and the confidential expertise usually related to methodology and referred to as 'Trade Secrets'. This review explains the concepts behind patent protection, and discusses the wide-ranging scope of existing patents that cover all aspects of transgenic technology, from selectable markers and novel promoters to methods of gene introduction. Although few of the patents in this area have any real commercial value, there are a small number of key patents that restrict the 'freedom to operate' of new companies seeking to exploit the methods. Over the last 20 years, these restrictions have forced extensive cross-licensing between ag-biotech companies and have been one of the driving forces behind the consolidation of these companies. Although such issues are often considered of little interest to the academic scientist working in the public sector, they are of great importance in any discussion of the role of 'public-good breeding' and of the relationship between the public and private sectors