Toshiro Kita
- Published in print:
- 2006
- Published Online:
- September 2007
- ISBN:
- 9780199297320
- eISBN:
- 9780191711237
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199297320.003.0016
- Subject:
- Business and Management, Innovation
This chapter looks at government and policy from a different perspective. E-Government has been an important if overlooked part of the e-Japan strategy, and central to this is Juki-net. The debacle ...
More
This chapter looks at government and policy from a different perspective. E-Government has been an important if overlooked part of the e-Japan strategy, and central to this is Juki-net. The debacle of its introduction is analysed, which was marked by initial confrontation with anti Juki-net campaigners concerned about privacy and information security, and subsequently between administrative agencies and residents, where passive resistance virtually assigned the Juki-card to oblivion. A ‘customer-oriented’ solution to the impasse is proposed, which is considered symptomatic of the whole e-Japan programme. It is shown that policy makers are as much in need of MOT education as the engineers and managers who still believe in the linear model of innovation.Less
This chapter looks at government and policy from a different perspective. E-Government has been an important if overlooked part of the e-Japan strategy, and central to this is Juki-net. The debacle of its introduction is analysed, which was marked by initial confrontation with anti Juki-net campaigners concerned about privacy and information security, and subsequently between administrative agencies and residents, where passive resistance virtually assigned the Juki-card to oblivion. A ‘customer-oriented’ solution to the impasse is proposed, which is considered symptomatic of the whole e-Japan programme. It is shown that policy makers are as much in need of MOT education as the engineers and managers who still believe in the linear model of innovation.
Alnoor Bhimani
- Published in print:
- 2003
- Published Online:
- August 2004
- ISBN:
- 9780199260386
- eISBN:
- 9780191601231
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/0199260389.003.0005
- Subject:
- Economics and Finance, Financial Economics
This chapter examines the strategic relations between expenditures on competitor analysis (CA) and information security (IS), and the implications for management accounting. It is shown that the ...
More
This chapter examines the strategic relations between expenditures on competitor analysis (CA) and information security (IS), and the implications for management accounting. It is shown that the amount spent on CA increases with the rival’s initial share of total profits, and decreases with increasing IS productivity. The firm with higher initial profits spends more on IS and less on CA than the firm with smaller initial profit share.Less
This chapter examines the strategic relations between expenditures on competitor analysis (CA) and information security (IS), and the implications for management accounting. It is shown that the amount spent on CA increases with the rival’s initial share of total profits, and decreases with increasing IS productivity. The firm with higher initial profits spends more on IS and less on CA than the firm with smaller initial profit share.
Jonathan Cave, Neil Robinson, Svitlana Kobzar, and Helen Rebecca Schindler
- Published in print:
- 2015
- Published Online:
- May 2016
- ISBN:
- 9780262029407
- eISBN:
- 9780262331166
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262029407.003.0006
- Subject:
- Computer Science, Programming Languages
This Chapter presents two frameworks to help understand the range of concerns relative to consumer harm articulated at national and European level in the context of cloud computing. These concerns ...
More
This Chapter presents two frameworks to help understand the range of concerns relative to consumer harm articulated at national and European level in the context of cloud computing. These concerns have been in the crosshairs of European telecommunications policy-makers since cloud computing became a prevalent issue for telecommunications regulation around 2007.Less
This Chapter presents two frameworks to help understand the range of concerns relative to consumer harm articulated at national and European level in the context of cloud computing. These concerns have been in the crosshairs of European telecommunications policy-makers since cloud computing became a prevalent issue for telecommunications regulation around 2007.
Andrea M. Matwyshyn
- Published in print:
- 2009
- Published Online:
- June 2013
- ISBN:
- 9780804760089
- eISBN:
- 9780804772594
- Item type:
- chapter
- Publisher:
- Stanford University Press
- DOI:
- 10.11126/stanford/9780804760089.003.0001
- Subject:
- Law, Intellectual Property, IT, and Media Law
This introductory chapter briefly sets out the book's purpose, which is to explore some of the dynamics behind corporations' struggle with information security. It then discusses the reasons behind ...
More
This introductory chapter briefly sets out the book's purpose, which is to explore some of the dynamics behind corporations' struggle with information security. It then discusses the reasons behind the continuing escalation in data vulnerability, which include dynamics on three levels: the macro or societal level; the meso or group level; and the micro or individual level. On the macro level, corporate hoarding of networked, aggregated consumer data, the expansion of information criminality, and the arrival of information security regulation have all affected the ecology of corporate information security. On the mesosystem/interpersonal level, information vulnerability erodes commercial trust and imposes costs on third parties. On the micro level, individual companies often ignore information security or believe the return on investment in information security to be inadequate. These suboptimal approaches result from, first, a failure to recognize the losses caused by weak information security, and second, an absence of thorough risk management planning. An overview of the subsequent chapters also presented.Less
This introductory chapter briefly sets out the book's purpose, which is to explore some of the dynamics behind corporations' struggle with information security. It then discusses the reasons behind the continuing escalation in data vulnerability, which include dynamics on three levels: the macro or societal level; the meso or group level; and the micro or individual level. On the macro level, corporate hoarding of networked, aggregated consumer data, the expansion of information criminality, and the arrival of information security regulation have all affected the ecology of corporate information security. On the mesosystem/interpersonal level, information vulnerability erodes commercial trust and imposes costs on third parties. On the micro level, individual companies often ignore information security or believe the return on investment in information security to be inadequate. These suboptimal approaches result from, first, a failure to recognize the losses caused by weak information security, and second, an absence of thorough risk management planning. An overview of the subsequent chapters also presented.
Keith M. Martin
- Published in print:
- 2012
- Published Online:
- December 2013
- ISBN:
- 9780199695591
- eISBN:
- 9780191774898
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199695591.003.0001
- Subject:
- Mathematics, Applied Mathematics
This chapter discusses the basic principles of cryptography. It covers the role of cryptography in securing information; the types of risk to which information is typically exposed; the main security ...
More
This chapter discusses the basic principles of cryptography. It covers the role of cryptography in securing information; the types of risk to which information is typically exposed; the main security services that are the focus of this book; the fundamentals of cryptosystems; the resources it is reasonable to assume that an attacker of a cryptosystem has access to; and the much misunderstood concept of ‘breaking’ a cryptosystem.Less
This chapter discusses the basic principles of cryptography. It covers the role of cryptography in securing information; the types of risk to which information is typically exposed; the main security services that are the focus of this book; the fundamentals of cryptosystems; the resources it is reasonable to assume that an attacker of a cryptosystem has access to; and the much misunderstood concept of ‘breaking’ a cryptosystem.
Jennifer A. Chandler
- Published in print:
- 2009
- Published Online:
- June 2013
- ISBN:
- 9780804760089
- eISBN:
- 9780804772594
- Item type:
- chapter
- Publisher:
- Stanford University Press
- DOI:
- 10.11126/stanford/9780804760089.003.0010
- Subject:
- Law, Intellectual Property, IT, and Media Law
This chapter examines software contracting through the lens of cybersecurity in order to analyze terms and practices that arguably reduce the general level of cybersecurity. The inspiration for this ...
More
This chapter examines software contracting through the lens of cybersecurity in order to analyze terms and practices that arguably reduce the general level of cybersecurity. The inspiration for this approach is the growing recognition that the cybersecurity problem is not merely a technical one, but is also dependent upon social and economic factors, including the applicable law. The first part of the chapter considers a series of clauses that undermine cybersecurity by suppressing public knowledge about software security vulnerabilities. The next part considers a range of practices (rather than license terms) that undermine cybersecurity. The final section turns to the question of what should be done, if anything, about license terms that undermine cybersecurity. In particular, it suggests that there are reasons to believe that such terms are the product of various market failures rather than a reflection of the optimal software license terms.Less
This chapter examines software contracting through the lens of cybersecurity in order to analyze terms and practices that arguably reduce the general level of cybersecurity. The inspiration for this approach is the growing recognition that the cybersecurity problem is not merely a technical one, but is also dependent upon social and economic factors, including the applicable law. The first part of the chapter considers a series of clauses that undermine cybersecurity by suppressing public knowledge about software security vulnerabilities. The next part considers a range of practices (rather than license terms) that undermine cybersecurity. The final section turns to the question of what should be done, if anything, about license terms that undermine cybersecurity. In particular, it suggests that there are reasons to believe that such terms are the product of various market failures rather than a reflection of the optimal software license terms.
Catherine L. Mann
- Published in print:
- 2015
- Published Online:
- September 2015
- ISBN:
- 9780226206844
- eISBN:
- 9780226206981
- Item type:
- chapter
- Publisher:
- University of Chicago Press
- DOI:
- 10.7208/chicago/9780226206981.003.0011
- Subject:
- Economics and Finance, Development, Growth, and Environmental
Vast amounts of information result from business and consumer search, communication, and transactions. All this information can enhance market efficiency and consumer surplus as firms tailor products ...
More
Vast amounts of information result from business and consumer search, communication, and transactions. All this information can enhance market efficiency and consumer surplus as firms tailor products to buyers. But, there is increased risk of information loss. What issues should be on the Digital Agenda with regard to information loss, and what data are available to inform and generate incentives for consumer, business, and policy interactions in the information marketplace? This paper reviews the situation and points out where we need more thought and more data. Topics include: (1) Frameworks for analysis: How should we model the information marketplace, particularly with regard to the benefits and costs of information aggregation and protection? (2) Quantification and data: What is the evidence on the prevalence and nature of information loss, and what are the costs of information loss, and to whom? (3) Market and Policy Response: What do we know about the efficacy of market vs. other approaches to incentivize market participants to avoid loss or remediate after information loss? Throughout, of particular interest is the international dimension of the information marketplace. What issues arise when countries differ in their attitudes and policies toward the information marketplace?Less
Vast amounts of information result from business and consumer search, communication, and transactions. All this information can enhance market efficiency and consumer surplus as firms tailor products to buyers. But, there is increased risk of information loss. What issues should be on the Digital Agenda with regard to information loss, and what data are available to inform and generate incentives for consumer, business, and policy interactions in the information marketplace? This paper reviews the situation and points out where we need more thought and more data. Topics include: (1) Frameworks for analysis: How should we model the information marketplace, particularly with regard to the benefits and costs of information aggregation and protection? (2) Quantification and data: What is the evidence on the prevalence and nature of information loss, and what are the costs of information loss, and to whom? (3) Market and Policy Response: What do we know about the efficacy of market vs. other approaches to incentivize market participants to avoid loss or remediate after information loss? Throughout, of particular interest is the international dimension of the information marketplace. What issues arise when countries differ in their attitudes and policies toward the information marketplace?
Keith M. Martin
- Published in print:
- 2012
- Published Online:
- December 2013
- ISBN:
- 9780199695591
- eISBN:
- 9780191774898
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199695591.001.0001
- Subject:
- Mathematics, Applied Mathematics
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents an introduction to the role that cryptography plays in providing information ...
More
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents an introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient current technologies and over-whelming theoretical research. A short appendix is included for those looking for a deeper appreciation of some of the concepts involved. By the end of this book, the reader will not only be able to understand the practical issues concerned with the deployment of cryptographic mechanisms, including the management of cryptographic keys, but will also be able to interpret future developments in this increasingly important area of technology.Less
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents an introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient current technologies and over-whelming theoretical research. A short appendix is included for those looking for a deeper appreciation of some of the concepts involved. By the end of this book, the reader will not only be able to understand the practical issues concerned with the deployment of cryptographic mechanisms, including the management of cryptographic keys, but will also be able to interpret future developments in this increasingly important area of technology.
Andrea M. Matwyshyn (ed.)
- Published in print:
- 2009
- Published Online:
- June 2013
- ISBN:
- 9780804760089
- eISBN:
- 9780804772594
- Item type:
- book
- Publisher:
- Stanford University Press
- DOI:
- 10.11126/stanford/9780804760089.001.0001
- Subject:
- Law, Intellectual Property, IT, and Media Law
As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets. Both Congress and the ...
More
As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets. Both Congress and the states have passed laws to improve practices, but the rate of data loss persists unabated and companies remain slow to invest in information security. Engaged in a bottom-up investigation, this book reveals the emergent nature of data leakage and vulnerability, as well as some of the areas where our current regulatory frameworks fall short. With insights from leading academics, information security professionals, and other area experts, this original work explores the business, legal, and social dynamics behind corporate information leakage and data breaches. The authors reveal common mistakes companies make, where breaches go unreported despite notification statutes, and surprising weaknesses in the federal laws that regulate financial data privacy, children's data collection, and health data privacy. This forward-looking book will be vital to meeting the increasing information security concerns that new data-intensive business models will have.Less
As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets. Both Congress and the states have passed laws to improve practices, but the rate of data loss persists unabated and companies remain slow to invest in information security. Engaged in a bottom-up investigation, this book reveals the emergent nature of data leakage and vulnerability, as well as some of the areas where our current regulatory frameworks fall short. With insights from leading academics, information security professionals, and other area experts, this original work explores the business, legal, and social dynamics behind corporate information leakage and data breaches. The authors reveal common mistakes companies make, where breaches go unreported despite notification statutes, and surprising weaknesses in the federal laws that regulate financial data privacy, children's data collection, and health data privacy. This forward-looking book will be vital to meeting the increasing information security concerns that new data-intensive business models will have.
Andrea M. Matwyshyn
- Published in print:
- 2009
- Published Online:
- June 2013
- ISBN:
- 9780804760089
- eISBN:
- 9780804772594
- Item type:
- chapter
- Publisher:
- Stanford University Press
- DOI:
- 10.11126/stanford/9780804760089.003.0012
- Subject:
- Law, Intellectual Property, IT, and Media Law
This concluding chapter reiterates the four major themes of the preceding chapters: (i) a need to focus on the human elements in information security; (ii) a need to recognize the emergent nature of ...
More
This concluding chapter reiterates the four major themes of the preceding chapters: (i) a need to focus on the human elements in information security; (ii) a need to recognize the emergent nature of information security threats; (iii) a need to consider the multiple simultaneous contexts of information risk; and (iv) a need for immediate improvements in corporate self-governance. In the short term, companies must put in place rigorous codes of information security conduct and exercise vigilant enforcement. In the long term, companies must learn to build cultures of information security and develop a sense of collective corporate responsibility for information security, regardless of whether regulation requires them to do so. Meaningful improvements in information security require a commitment to security as an ongoing, collaborative process.Less
This concluding chapter reiterates the four major themes of the preceding chapters: (i) a need to focus on the human elements in information security; (ii) a need to recognize the emergent nature of information security threats; (iii) a need to consider the multiple simultaneous contexts of information risk; and (iv) a need for immediate improvements in corporate self-governance. In the short term, companies must put in place rigorous codes of information security conduct and exercise vigilant enforcement. In the long term, companies must learn to build cultures of information security and develop a sense of collective corporate responsibility for information security, regardless of whether regulation requires them to do so. Meaningful improvements in information security require a commitment to security as an ongoing, collaborative process.
Kim Zetter
- Published in print:
- 2009
- Published Online:
- June 2013
- ISBN:
- 9780804760089
- eISBN:
- 9780804772594
- Item type:
- chapter
- Publisher:
- Stanford University Press
- DOI:
- 10.11126/stanford/9780804760089.003.0004
- Subject:
- Law, Intellectual Property, IT, and Media Law
This chapter presents an insider's view of how information about corporate information security breaches reaches the public. It says that “[d]espite the passage of state-level data security breach ...
More
This chapter presents an insider's view of how information about corporate information security breaches reaches the public. It says that “[d]espite the passage of state-level data security breach notification legislation in many states, journalists still often have to rely on sources other than the companies and organizations that experience a breach for information about a breach—either because the breach is not considered newsworthy or because the data that are stolen do not fall into the category of data covered by notification laws.” Journalists learn about breaches from a number of sources. Rarely, though, are companies or organizations that experienced the breach the first to reveal it. The chapter describes some of the practical limitations of data breach notification laws with regard to public disclosure of corporate security breaches. It argues that companies fear that disclosing such information would place them at a disadvantage with competitors and make them vulnerable to lawsuits from customers as well as to other potential intruders.Less
This chapter presents an insider's view of how information about corporate information security breaches reaches the public. It says that “[d]espite the passage of state-level data security breach notification legislation in many states, journalists still often have to rely on sources other than the companies and organizations that experience a breach for information about a breach—either because the breach is not considered newsworthy or because the data that are stolen do not fall into the category of data covered by notification laws.” Journalists learn about breaches from a number of sources. Rarely, though, are companies or organizations that experienced the breach the first to reveal it. The chapter describes some of the practical limitations of data breach notification laws with regard to public disclosure of corporate security breaches. It argues that companies fear that disclosing such information would place them at a disadvantage with competitors and make them vulnerable to lawsuits from customers as well as to other potential intruders.
Sharona Hoffman and Andy Podgurski
- Published in print:
- 2009
- Published Online:
- June 2013
- ISBN:
- 9780804760089
- eISBN:
- 9780804772594
- Item type:
- chapter
- Publisher:
- Stanford University Press
- DOI:
- 10.11126/stanford/9780804760089.003.0007
- Subject:
- Law, Intellectual Property, IT, and Media Law
This chapter analyzes electronic health data security vulnerabilities and the legal framework that has been established to address them. It describes the wide-ranging threats to health information ...
More
This chapter analyzes electronic health data security vulnerabilities and the legal framework that has been established to address them. It describes the wide-ranging threats to health information security and the harms that security breaches can produce. Some of the threats arise from sources that are internal to organizations, including irresponsible or malicious employees, while other threats are external, such as hackers and data miners. The harms associated with improper disclosure of private medical data can include medical identity theft, blackmail, public humiliation, medical mistakes, discrimination, and loss of financial, employment, and other opportunities. The chapter also discusses federal laws, state laws, and common-law causes of action that address patient privacy rights and health information security. Finally, it offers recommendations for improving safeguards for electronically processed health records.Less
This chapter analyzes electronic health data security vulnerabilities and the legal framework that has been established to address them. It describes the wide-ranging threats to health information security and the harms that security breaches can produce. Some of the threats arise from sources that are internal to organizations, including irresponsible or malicious employees, while other threats are external, such as hackers and data miners. The harms associated with improper disclosure of private medical data can include medical identity theft, blackmail, public humiliation, medical mistakes, discrimination, and loss of financial, employment, and other opportunities. The chapter also discusses federal laws, state laws, and common-law causes of action that address patient privacy rights and health information security. Finally, it offers recommendations for improving safeguards for electronically processed health records.
Cem Paya
- Published in print:
- 2009
- Published Online:
- June 2013
- ISBN:
- 9780804760089
- eISBN:
- 9780804772594
- Item type:
- chapter
- Publisher:
- Stanford University Press
- DOI:
- 10.11126/stanford/9780804760089.003.0008
- Subject:
- Law, Intellectual Property, IT, and Media Law
This chapter presents a technical critique challenging the most basic premises underlying the Gramm–Leach–Bliley Act—that “financial data” refers to data held by financial institutions. Instead, it ...
More
This chapter presents a technical critique challenging the most basic premises underlying the Gramm–Leach–Bliley Act—that “financial data” refers to data held by financial institutions. Instead, it argues that a better analysis starts with looking to the data, not the holder. After providing a primer on the basics of information security engineering, it asks whether there is something inherent in the nature of financial information that makes it a challenge for information security and any regulatory framework. Analyzing the two most common forms of financial information—credit card numbers and Social Security numbers—the chapter concludes that although the credit card industry appears to successfully mitigate risks of disclosure, the use of Social Security numbers as a financial identifier is inherently problematic and should be eliminated.Less
This chapter presents a technical critique challenging the most basic premises underlying the Gramm–Leach–Bliley Act—that “financial data” refers to data held by financial institutions. Instead, it argues that a better analysis starts with looking to the data, not the holder. After providing a primer on the basics of information security engineering, it asks whether there is something inherent in the nature of financial information that makes it a challenge for information security and any regulatory framework. Analyzing the two most common forms of financial information—credit card numbers and Social Security numbers—the chapter concludes that although the credit card industry appears to successfully mitigate risks of disclosure, the use of Social Security numbers as a financial identifier is inherently problematic and should be eliminated.
Kazuo Takaragi
- Published in print:
- 2013
- Published Online:
- September 2015
- ISBN:
- 9780823244560
- eISBN:
- 9780823268948
- Item type:
- chapter
- Publisher:
- Fordham University Press
- DOI:
- 10.5422/fordham/9780823244560.003.0012
- Subject:
- Information Science, Information Science
This chapter introduces the topic of information technology for a safe and secure society in Japan and shows an emerging trend toward a cyber-physical solution. It begins by reviewing major security ...
More
This chapter introduces the topic of information technology for a safe and secure society in Japan and shows an emerging trend toward a cyber-physical solution. It begins by reviewing major security incidents in the United States and Japan, and presenting the Japanese national strategy for information security. It then describes various emerging security technologies in Japan, starting with an overview of the two levels of security technology: the component level, such as finger vein authentication and RFID, and the system and management level, such as a multiple risk communicator. Each of these technologies is discussed in turn. The chapter also covers various issues related to mitigating information leakage.Less
This chapter introduces the topic of information technology for a safe and secure society in Japan and shows an emerging trend toward a cyber-physical solution. It begins by reviewing major security incidents in the United States and Japan, and presenting the Japanese national strategy for information security. It then describes various emerging security technologies in Japan, starting with an overview of the two levels of security technology: the component level, such as finger vein authentication and RFID, and the system and management level, such as a multiple risk communicator. Each of these technologies is discussed in turn. The chapter also covers various issues related to mitigating information leakage.
Jonathan Pincus, Sarah Blankinship, and Tomasz Ostwald
- Published in print:
- 2009
- Published Online:
- June 2013
- ISBN:
- 9780804760089
- eISBN:
- 9780804772594
- Item type:
- chapter
- Publisher:
- Stanford University Press
- DOI:
- 10.11126/stanford/9780804760089.003.0002
- Subject:
- Law, Intellectual Property, IT, and Media Law
This chapter argues for a multidisciplinary perspective in analyzing information security. Developing the best information security practices requires broadening the scope of current perspectives on ...
More
This chapter argues for a multidisciplinary perspective in analyzing information security. Developing the best information security practices requires broadening the scope of current perspectives on information security. Although computer science is not traditionally viewed as a social science, problems in its domain are inherently social in nature, relating to people and their interactions. Applying social science perspectives to the field of computer security not only helps explain current limitations and highlights emerging trends, but also points the way toward a radical rethinking of how to make progress on this vital issue.Less
This chapter argues for a multidisciplinary perspective in analyzing information security. Developing the best information security practices requires broadening the scope of current perspectives on information security. Although computer science is not traditionally viewed as a social science, problems in its domain are inherently social in nature, relating to people and their interactions. Applying social science perspectives to the field of computer security not only helps explain current limitations and highlights emerging trends, but also points the way toward a radical rethinking of how to make progress on this vital issue.
Greg R. Vetter
- Published in print:
- 2009
- Published Online:
- June 2013
- ISBN:
- 9780804760089
- eISBN:
- 9780804772594
- Item type:
- chapter
- Publisher:
- Stanford University Press
- DOI:
- 10.11126/stanford/9780804760089.003.0005
- Subject:
- Law, Intellectual Property, IT, and Media Law
This chapter discusses the strategic concerns companies face in deciding whether to patent information security methods. It argues that the full promise of cryptography for information security is ...
More
This chapter discusses the strategic concerns companies face in deciding whether to patent information security methods. It argues that the full promise of cryptography for information security is unrealized. Companies are increasingly patenting security technologies in an effort to expand their portfolios and better protect corporate intangible assets. Cryptographic methods can enable authentication in an electronic environment and help secure information storage, communications, and transactions. Patenting in the field has expanded aggressively, and greater patent density—sometimes described as a “thicket,”—affects both developers and users, and brings with it the potential to chill innovation. This greater patent density suggests the need for countermeasures such as patent pooling, patent-aware standard setting by firms and the government, and portfolio management of patents.Less
This chapter discusses the strategic concerns companies face in deciding whether to patent information security methods. It argues that the full promise of cryptography for information security is unrealized. Companies are increasingly patenting security technologies in an effort to expand their portfolios and better protect corporate intangible assets. Cryptographic methods can enable authentication in an electronic environment and help secure information storage, communications, and transactions. Patenting in the field has expanded aggressively, and greater patent density—sometimes described as a “thicket,”—affects both developers and users, and brings with it the potential to chill innovation. This greater patent density suggests the need for countermeasures such as patent pooling, patent-aware standard setting by firms and the government, and portfolio management of patents.
Lilian Edwards and Ian Brown
- Published in print:
- 2009
- Published Online:
- June 2013
- ISBN:
- 9780804760089
- eISBN:
- 9780804772594
- Item type:
- chapter
- Publisher:
- Stanford University Press
- DOI:
- 10.11126/stanford/9780804760089.003.0011
- Subject:
- Law, Intellectual Property, IT, and Media Law
This chapter discusses the challenges to information security from social networking websites and the new business models they represent. The success of this new generation of data-intensive virtual ...
More
This chapter discusses the challenges to information security from social networking websites and the new business models they represent. The success of this new generation of data-intensive virtual space enterprises raises heightened concerns about information security. It is already known that identity thieves are making extensive use of personal information disclosed in such virtual spaces to commit fraud, while unaccredited writers of subapplications for these spaces can also gain access and evade security around vast amounts of valuable data. It is argued that although the law may provide some data control protections, aspects of the code itself provide equally important means of achieving a delicate balance between users' expectations of data security and privacy and their desire to share information.Less
This chapter discusses the challenges to information security from social networking websites and the new business models they represent. The success of this new generation of data-intensive virtual space enterprises raises heightened concerns about information security. It is already known that identity thieves are making extensive use of personal information disclosed in such virtual spaces to commit fraud, while unaccredited writers of subapplications for these spaces can also gain access and evade security around vast amounts of valuable data. It is argued that although the law may provide some data control protections, aspects of the code itself provide equally important means of achieving a delicate balance between users' expectations of data security and privacy and their desire to share information.
Ewing Mahoney
- Published in print:
- 2020
- Published Online:
- June 2020
- ISBN:
- 9780198818625
- eISBN:
- 9780191859564
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780198818625.003.0010
- Subject:
- Law, Constitutional and Administrative Law
This chapter discusses the use of vetting in the civil service purge. Vetting took two forms—normal (or negative) and positive vetting (PV)—and both were used to screen recruits and to ‘purge’ those ...
More
This chapter discusses the use of vetting in the civil service purge. Vetting took two forms—normal (or negative) and positive vetting (PV)—and both were used to screen recruits and to ‘purge’ those already employed. There can be no objection to the principle that governments have a duty to ensure that sensitive security information does not get into the hands of the enemy, whether in war or peace. To that extent, it would be hard to argue against the practice of vetting to protect information from being compromised. That said, it must be recognized that the consequence of vetting was to discriminate against individuals, either on grounds of their political affiliations or beliefs, or on the ground of their lifestyle. It must also be recognized that while some of the individuals in question would be found work of a non-security nature, the effect of vetting would be to blight careers and opportunities.Less
This chapter discusses the use of vetting in the civil service purge. Vetting took two forms—normal (or negative) and positive vetting (PV)—and both were used to screen recruits and to ‘purge’ those already employed. There can be no objection to the principle that governments have a duty to ensure that sensitive security information does not get into the hands of the enemy, whether in war or peace. To that extent, it would be hard to argue against the practice of vetting to protect information from being compromised. That said, it must be recognized that the consequence of vetting was to discriminate against individuals, either on grounds of their political affiliations or beliefs, or on the ground of their lifestyle. It must also be recognized that while some of the individuals in question would be found work of a non-security nature, the effect of vetting would be to blight careers and opportunities.
Kris Erickson and Philip N. Howard
- Published in print:
- 2009
- Published Online:
- June 2013
- ISBN:
- 9780804760089
- eISBN:
- 9780804772594
- Item type:
- chapter
- Publisher:
- Stanford University Press
- DOI:
- 10.11126/stanford/9780804760089.003.0003
- Subject:
- Law, Intellectual Property, IT, and Media Law
This chapter explores how responsibility for protecting electronic data is currently attributed and examines legislation aimed at managing the problem of compromised personal records. It compares the ...
More
This chapter explores how responsibility for protecting electronic data is currently attributed and examines legislation aimed at managing the problem of compromised personal records. It compares the aims of legislation with an analysis of reported incidents of data loss for the period of 1980–2007. A discrepancy between legislative responses to electronic data loss and the actual damages incurred reveals that responsibility for maintaining the security of electronic personal records has been misplaced and should be reexamined. The chapter concludes with a brief discussion of the options for public policy oversight.Less
This chapter explores how responsibility for protecting electronic data is currently attributed and examines legislation aimed at managing the problem of compromised personal records. It compares the aims of legislation with an analysis of reported incidents of data loss for the period of 1980–2007. A discrepancy between legislative responses to electronic data loss and the actual damages incurred reveals that responsibility for maintaining the security of electronic personal records has been misplaced and should be reexamined. The chapter concludes with a brief discussion of the options for public policy oversight.
Xu Jinghong
- Published in print:
- 2015
- Published Online:
- April 2015
- ISBN:
- 9780190201265
- eISBN:
- 9780190201302
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780190201265.003.0010
- Subject:
- Economics and Finance, International
When discussing the Internet in China, most Western audiences only hear about espionage or Internet control portrayed by their media. They do not understand China’s social and economic Internet ...
More
When discussing the Internet in China, most Western audiences only hear about espionage or Internet control portrayed by their media. They do not understand China’s social and economic Internet challenges. Since the advent of the Internet, China has witnessed rapid development, and this has created many security and privacy problems for Chinese Internet users (netizens). To improve the security, reliability, and economic potential of its networks, China now also must improve Internet privacy. Generally speaking, Internet privacy is an important consideration in China’s national cybersecurity situation. The chapter traces the historical and cultural background of Internet privacy in China, the evolving legal frameworks for protecting the right to privacy and Internet privacy, and problems with the existing legal framework, and will offer suggestions for improvement.Less
When discussing the Internet in China, most Western audiences only hear about espionage or Internet control portrayed by their media. They do not understand China’s social and economic Internet challenges. Since the advent of the Internet, China has witnessed rapid development, and this has created many security and privacy problems for Chinese Internet users (netizens). To improve the security, reliability, and economic potential of its networks, China now also must improve Internet privacy. Generally speaking, Internet privacy is an important consideration in China’s national cybersecurity situation. The chapter traces the historical and cultural background of Internet privacy in China, the evolving legal frameworks for protecting the right to privacy and Internet privacy, and problems with the existing legal framework, and will offer suggestions for improvement.