Price Discrimination, Separation and Access: Protecting Competition or Protecting Competitors?
نویسندگان
چکیده
منابع مشابه
A Method for Protecting Access Pattern in Outsourced Data
Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...
متن کاملParliamentary Immunity: Protecting Democracy or Protecting Corruption?*
ARECURRING question within contemporary democratic countries relates to whether parliamentary immunity only serves to protect the interests of representatives, rather than the interests of those they were elected to represent. With every act that is suspected of being corrupt (for example, accepting a bribe in return for asking a question or delivering a speech in parliament, failure to declare...
متن کاملChaperones: protecting the patient or protecting the doctor?
The routine use of chaperones during medical examinations, including intimate examinations, is variable. Practice varies between countries and also within them. Use of a chaperone may protect patients from sexual abuse by medical or nursing practitioners. An appropriate chaperone may also protect healthcare practitioners from false accusations. This article considers issues surrounding the use ...
متن کاملIntertemporal price discrimination and competition
In this study we investigate the impact of competition on markets for non-durable goods where intertemporal price discrimination is possible. We develop a simple model of different potential scenarios for intertemporal price discrimination and implement it in a laboratory experiment. We compare the outcomes in monopolies and duopolies. Surprisingly, we find that competition does not necessarily...
متن کاملProtecting User Files by Reducing Application Access
Traditional discretionary access control mechanisms do not differentiate between a user’s running applications–hence they provide no means of preventing one application from exploiting another’s data. Commercial mandatory access control mechanisms such as SELinux and AppArmor aim to protect system files, but do little to prevent similar misuse of user data. This paper presents the PinUP access ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Australian Journal of Management
سال: 1999
ISSN: 0312-8962,1327-2020
DOI: 10.1177/031289629902400102