Reference Hub3
Patents and Standards in the ICT Sector: Are Submarine Patents a Substantive Problem or a Red Herring?

Patents and Standards in the ICT Sector: Are Submarine Patents a Substantive Problem or a Red Herring?

Jane K. Winn
Copyright: © 2007 |Volume: 5 |Issue: 1 |Pages: 43
ISSN: 1539-3062|EISSN: 1539-3054|ISSN: 1539-3062|EISBN13: 9781615203833|EISSN: 1539-3054|DOI: 10.4018/jitsr.2007010104
Cite Article Cite Article

MLA

Winn, Jane K. "Patents and Standards in the ICT Sector: Are Submarine Patents a Substantive Problem or a Red Herring?." IJITSR vol.5, no.1 2007: pp.41-83. http://doi.org/10.4018/jitsr.2007010104

APA

Winn, J. K. (2007). Patents and Standards in the ICT Sector: Are Submarine Patents a Substantive Problem or a Red Herring?. International Journal of IT Standards and Standardization Research (IJITSR), 5(1), 41-83. http://doi.org/10.4018/jitsr.2007010104

Chicago

Winn, Jane K. "Patents and Standards in the ICT Sector: Are Submarine Patents a Substantive Problem or a Red Herring?," International Journal of IT Standards and Standardization Research (IJITSR) 5, no.1: 41-83. http://doi.org/10.4018/jitsr.2007010104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article examines the role of law reform in promoting the development of technical standards for the authentication of parties engaged in Internet commerce. Law reforms intended to improve the security of Internet commerce can only succeed if they address business, technical and legal issues simultaneously. The EU has used commercial law reform and formal standard development to coordinate work on authentication standards, while the U.S. has allowed the market to determine what type of authentication technology is appropriate and has left the development of standards to private consortia. While the EU approach may solve collective action problems more effectively, the U.S. approach may discover end user requirements and may allow business judgments about risk to inform the law more effectively. Neither approach has yet resolved the authentication problems facing businesses engaged in online commerce.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.