مقاله انگلیسی رایگان در مورد حفاظت از مالکیت معنوی شرکت

 

مشخصات مقاله
عنوان مقاله  Protecting corporate intellectual property: Legal and technical approaches
ترجمه عنوان مقاله  حفاظت از مالکیت معنوی شرکت: رویکردهای حقوقی و فنی
فرمت مقاله  PDF
نوع مقاله  ISI
سال انتشار

مقاله سال 2016

تعداد صفحات مقاله  11 صفحه
رشته های مرتبط  مدیریت و اقتصاد
مجله  افق های تجارت – Business Horizons
دانشگاه  موسسه تحقیقات امنیت، دانشگاه Edith Cowan، استرالیا
کلمات کلیدی  قانون؛ حریم خصوصی؛ امنیت؛ رمزگذاری؛ خدمات ابر
کد محصول  EP4072
تعداد کلمات  7700 کلمه
نشریه  نشریه الزویر
لینک مقاله در سایت مرجع  لینک این مقاله در سایت الزویر (ساینس دایرکت) Sciencedirect – Elsevier
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

بخشی از متن مقاله:
1. The tension between privacy and disclosure

The ease of use of the internet for business communication has been a boon in terms of keeping abreast of the market and collaborating with colleagues separated by geography and time zone. This ease of use, however, has fostered an attitude of complacency which exposes the information stored by users to greater risks of theft in a highly competitive business environment.

The impetus for protection of data lies in personal privacy and business concerns generated by the revelations of WikiLeaks, Edward Snowden (Sifry, 2011), and business reality. For the latter, cyberattacks are one of the biggest threats facing businesses. The cost of data breaches at companies is expected to hit $2.1 trillion globally by 2019 (Kharpal, 2015). Maintaining confidentiality of data in this environment has become a necessity for businesses and individuals seeking to take commercial advantage of their newly-developed knowledge, skills, and information.

In the ASEAN region, cybercrime is recognized as one of the eight transnational crimes, in addition to illicit drug trafficking, money laundering, terrorism, arms smuggling, trafficking in person, sea piracy,and international economic crime. The addition of cybercrime to the list was decided in the Official Senior Meeting on Transnational Crime (SOMTC) which was held in Singapore on October 10, 2001. Cross-national variations can encourage what is referred to as ‘regulatory arbitrage,’ with individuals and groups committing offenses in territories where they are assured of facing little or nothing in the way of criminal sanctions. The jurisdictional problem governing cybercrimes has caused the legal authority of each country to act like an athlete who runs around a track in a stadium while the cyber criminals are the peers and spectators, analyzing the way the authority runs and determining the leaks and weaknesses. No matter how many laps around the track the authority runs, the outcome is always the same: to arrive at the finishing line just to discover that it is the starting point all over again (Rahman, 2012). However, recent events in the U.S. indicate governmental concern about a lack of asset protection may be turning as government agencies find they can no longer eavesdrop into and/or covertly access certain databases and equipment.

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا