Chapter 8: The Management of Intellectual Property in the Digital Business Ecosystem
1 Puay Tang and Jordi Molas-Gallart INTRODUCTION Information technology (IT) has increased the capacity to capture, store, process and transmit data. These features have enabled a wide array of applications and its pervasive use today is observed in all realms of activity – business operations, public sector services, educational facilities, the household and so on. Indeed, the use of IT is widely acknowledged to bestow an assortment of beneﬁts, such as cost savings and other forms of eﬃciencies. Yet IT can be a double-edged sword. Its ability to capture and transmit information at the click of a key can just as easily facilitate information loss and leakage (advertent and inadvertent) with the same easy action. As companies increase their use of digital networks to manage their internal and external processes, the potential for such losses increases, despite attempts by organizations to protect against them. The use of IT and electronic networks thus increases the risk of all forms of intellectual property (IP) to misappropriation or leakage, inadvertent or otherwise. Enhancing the security of networks is now a thriving business. Yet network security is more than just adding more IT-based solutions. Instead organizations must know and address appropriately the risks that such use engenders. This chapter analyses the nature of the problems posed by IP management in shared digital environments (SDEs), which form an integral element of the digital business ecosystem. The chapter discusses a range of approaches to their solution. Our main concern here is the management of information...
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.