Strategic Obfuscation and Consumer Protection Policy
نویسندگان
چکیده
منابع مشابه
Strategic Obfuscation and Retail Pricing
Retailers often stock items that are only slightly di¤erentiated from othersdi¤erent sizes of a popular brand, or di¤erent avors in a common product line for instance. We argue that this practice is a form of strategic obfuscation, intended to raise consumer search costs, and margins on non-comparable products. We test our hypothesis using examples from several product categories in German a...
متن کاملLAWS, REGULATIONS, AND POLICY: Consumer Protection Act Sees Uneven Launch
The Consumer Product Safety Improve ment Act (CPSIA), passed by Congress in 2008 in response to widespread recalls of leadcontaining toys manufactured in China, imposed new testing and documen tation requirements upon manufacturers of juvenile products and gave the Consumer Product Safety Commission (CPSC) new enforcement powers to ensure compliance. Six months after the new law was schedule...
متن کاملStrategic Intellectual Property Protection Policy and North-South Technology Transfer
I analyze the welfare implications of protecting intellectual property rights (IPRs) in developing countries through its impact on innovation, market structure, and technology transfer. FDI, tariffs, and cooperation are introduced to the strategic IPR literature. In a North-South framework, the Southern government sets the IPR policy strategically by anticipating the Northern firm’s decision on...
متن کاملLocation Privacy Protection Through Obfuscation
Introduction. Technical improvements of detection and transmission of location information, together with the widespread adoption of mobile communication devices and location-based services for business, social or informational purposes, are increasing the privacy concerns. Better, more elaborated solutions are necessary to provide users (Rule Makers, as they are called in geopriv) the possibil...
متن کاملSoftware Protection by Hardware and Obfuscation
In this paper, we propose an architecture that protects software by the hardware. The protection hardware can reside on the local machine in the form of a chip or on a remote server on the same network. We show that such a protection method can be combined with the code obfuscation method and develop two obfuscation methods for the proposed software protection architecture.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of Industrial Economics
سال: 2014
ISSN: 0022-1821
DOI: 10.1111/joie.12060