8 research outputs found

    Data Protection by Default in Identity-Related Applications

    No full text
    Part 2: Session 1 - Privacy and Identity ManagementInternational audience“Privacy by default” is being discussed as one important principle for ICT system design. This principle has been taken up as “data protection by default” in the proposal for a European Data Protection Regulation published in 2012. However, it is debated what this principle should mean in practice. In this text, we analyze the relation to “security by default” and “privacy by design” and discuss different possible interpretations of the “data protection by default” principle. After presenting general considerations on how to choose and implement appropriate default settings, we exemplarily describe recommendations for typical identity-related application scenarios such as social network sites, user tracking on the web and user-controlled management of one’s identities. Both the general and the scenario-based elaborations provide guidance for developers as well as evaluators

    A Comparison of Market Approaches to Software Vulnerability Disclosure

    No full text
    Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although the discussion on details of responsible vulnerability disclosure is controversial, there is a sort of consensus that better information sharing is socially beneficial. In the recent years we observe the emerging of “vulnerability markets ” as means to stimulate exchange of information. However, this term subsumes a broad range of different concepts, which are prone to confusion. This paper provides a first attempt to structure the field by (1) proposing a terminology for distinct concepts and (2) defining criteria to allow for a better comparability between different approaches. An application of this framework on four market types shows notable differences between the approaches

    Patent Litigation Strategy and Its Effects on the Firm

    No full text
    Patent litigation has attracted scholarly attention to reconcile multiple views for new research. Accordingly, this paper addresses patent litigation strategy and its effect on the firm. Based on 106 papers and articles, six books, the author\u27s logic and practice impressions, it first defines patent litigation strategy and differentiates similar concepts. Second, based on the process, the author fine‐tunes patent litigation strategy into three tactics: threat, filing and verdict. Then, she categorizes and examines the impact of patent litigation on market value, monetary gain/loss and strategic collaboration. The findings show that the effect on the market value is more complex and ambiguous than anticipated, and sometimes contradictory. The analysis shows the consistency of monetary effect in practice, that firms tend to have higher monetary gains from private settlement than from legal awards. It also demonstrates that existing studies lag behind reality in investigating the detailed role of patent litigation on strategic collaboration from partnership (e.g. licensing and strategic alliance) to takeover (i.e. merger and acquisition). Finally, the author reflects on the findings, and maps out critical paths toward new research. This process also reveals that stakeholders, industrial settings and country environments moderate the studied relationship. This paper contributes to knowledge and practice: appreciates the interdisciplinary endeavors to draw the findings; categorizes patent litigation and its effect; and critiques prior studies on the relationship to integrate knowledge for future research
    corecore