1,152 research outputs found
Memorandum: Erfolgsbedingungen empirischer Wirtschaftsforschung und empirisch gestuetzter wirtschafts- und sozialpolitischer Beratung
Based on the hypothesis that microdata are of crucial importance for internationally
competitive economic research and scientific advice in economic and social policy,
the authors develop various proposals for an improved data supply for empirical
work in Germany. Present shortcomings are mainly caused by a lack of coordination
between data collecting institutions and scientific users, extensive privacy protection
provisions and restrictive information policy of government agencies. In order to
overcome these problems, the authors ask for improved participation of scientific
users in data collection; provision of recent techniques for data anonymization and
decentralized use of confidential centralized data; liberalization of scientific data
access; and creation of a documentation center for organization and standardization
of data and data access. Finally, empirical economics, especially application of
microdata and modern tools of data analysis, should be emphasized within the
framework of university education
Information Management in Product Development Workflows – A Novel Approach on the basis of Pseudonymization of Product Information
AbstractInformation stored in the documentation of a product constitutes in many aspects the intellectual property (IP) of an enterprise. This valuable knowledge, built over years of extensive research and development deserves special attention and protection. Especially the context of distributed product development activities and increased collaborations with external partners puts companies at a growing risk that unauthorized individuals obtain access to this prized capital. In this paper, we present a novel concept for managing and sharing sensitive information in product development processes. Product information is separated and subsequently pseudonymized into independent blocks of data fragments which can be reassembled to specific information levels depending on the requirements of the organization. Thus, a user can be given access to that level of information specifically required to complete the task. The product information itself is only available as unordered data fragments and no longer interpretable even in case of data theft. By doing so, a comprehensive protection against internal and external abuse of sensitive product information can be realized which can easily be combined with existing concepts in the field of information protection
- …