دانلود رایگان مقاله حفاظت از مالکیت معنوی شرکت: رویکردهای حقوقی و فنی

عنوان فارسی
حفاظت از مالکیت معنوی شرکت: رویکردهای حقوقی و فنی
عنوان انگلیسی
Protecting corporate intellectual property: Legal and technical approaches
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
11
سال انتشار
2016
نشریه
الزویر - Elsevier
فرمت مقاله انگلیسی
PDF
کد محصول
EP4072
رشته های مرتبط با این مقاله
مدیریت و اقتصاد
مجله
افق های تجارت - Business Horizons
دانشگاه
موسسه تحقیقات امنیت، دانشگاه Edith Cowan، استرالیا
کلمات کلیدی
قانون؛ حریم خصوصی؛ امنیت؛ رمزگذاری؛ خدمات ابر
چکیده

Abstract


The recent FBI v. Apple case has the potential to turn a 227-year-old statute law into a tool for government agencies to gain access to personal and corporate information. Recent events such as ‘Petraeus-gate,’ hacked nude celebrity photos in the cloud, and the use of a search and seizure warrant in the United States seeking customer email contents on an extraterritorial server raise important issues for the supposedly safe storage of data on the World Wide Web. Not only may there be nowhere to hide in cyberspace but nothing in cyberspace may be private. This article explores the legal and technical issues raised by these matters, with emphasis on the court decision In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and Maintained by Microsoft Corporation and the subsequent upholding of that decision.

نتیجه گیری

4. Discussion


Even with good asset protection things can go wrong. Not so long ago at Florida International University (FIU) in their new research and teaching laboratories on cybersecurity, including the Advanced Wireless and Security Lab (ADWISE) and the Cyber-Physical Systems Security Lab (CSL), something unexpected went wrong. For his class project, Andrew De La Rosa–—a student in an ethical hacking class–—decided to attack Bluetooth, a technology standard used to exchange data over short distances. He wanted to show that weaknesses in Bluetooth could allow him to download someone’s private contacts. He picked a device at random on the FIU campus and hacked into it. ‘‘When I ran the serial number, I saw it was registered to campus police,’’ De La Rosa said. He rushed to the police substation at the FIU Engineering Center to explain. ‘‘You’re lucky you told me,’’ the officer told him. ‘‘Even if you’re doing this for a class, I could have arrested you.’’ Florida punishes unauthorized access to a computer system as a felony (Gretch, 2015).


بدون دیدگاه