Strategic Obfuscation and Consumer Protection Policy

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Strategic Obfuscation and Retail Pricing

Retailers often stock items that are only slightly di¤erentiated from others’–di¤erent sizes of a popular brand, or di¤erent ‡avors in a common product line for instance. We argue that this practice is a form of strategic obfuscation, intended to raise consumer search costs, and margins on non-comparable products. We test our hypothesis using examples from several product categories in German a...

متن کامل

LAWS, REGULATIONS, AND POLICY: Consumer Protection Act Sees Uneven Launch

The Consumer Product Safety Improve­ ment Act (CPSIA), passed by Congress in 2008 in response to widespread recalls of lead­containing toys manufactured in China, imposed new testing and documen­ tation requirements upon manufacturers of juvenile products and gave the Consumer Product Safety Commission (CPSC) new enforcement powers to ensure compliance. Six months after the new law was schedule...

متن کامل

Strategic Intellectual Property Protection Policy and North-South Technology Transfer

I analyze the welfare implications of protecting intellectual property rights (IPRs) in developing countries through its impact on innovation, market structure, and technology transfer. FDI, tariffs, and cooperation are introduced to the strategic IPR literature. In a North-South framework, the Southern government sets the IPR policy strategically by anticipating the Northern firm’s decision on...

متن کامل

Location Privacy Protection Through Obfuscation

Introduction. Technical improvements of detection and transmission of location information, together with the widespread adoption of mobile communication devices and location-based services for business, social or informational purposes, are increasing the privacy concerns. Better, more elaborated solutions are necessary to provide users (Rule Makers, as they are called in geopriv) the possibil...

متن کامل

Software Protection by Hardware and Obfuscation

In this paper, we propose an architecture that protects software by the hardware. The protection hardware can reside on the local machine in the form of a chip or on a remote server on the same network. We show that such a protection method can be combined with the code obfuscation method and develop two obfuscation methods for the proposed software protection architecture.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of Industrial Economics

سال: 2014

ISSN: 0022-1821

DOI: 10.1111/joie.12060