In: Operations Management
Oddly, one way to protect use of Intellectual Property for the inventor of software is to provide free access to the public under the concept of material.
ANS.
Protecting intellectual property is a variant of computing and communications security, an area of study that has long been pursued both in research laboratories and for real-world application. Security is currently enjoying renewed emphasis because of its relevance to conducting business online. While security technology encompasses a very large area, this discussion is limited to describing generally applicable principles and those technical topics relevant to the management of intellectual property.
As cryptography is an underpinning for many of the other tools discussed, the following section begins with a brief explanation of this technology. Next, the techniques that help manage IP within general-
As the technology needed for IP may not be affordable for IP alone, there is the possibility of a useful coincidence: The technology needed for IP may be largely a subset of what will be needed for electronic commerce.
For example, the committee passed silently over a concern closely related to IP—the effect of the digital world on personal privacy—because, although there is some intersection of the two sets of issues, they are sufficiently separable and sizable that each is best addressed in its own report.
A closely related topic, the Public Key Infrastructure—a set of emerging standards for distributing, interpreting, and protecting cryptographic keys—is primarily of technical interest.One of the antidevices rules outlaws devices that circumvent access controls; the other outlaws devices that circumvent use or copying controls.