@article {966, title = {License Compliance in Open Source Cybersecurity Projects}, journal = {Technology Innovation Management Review}, volume = {6}, year = {2016}, month = {02/2016}, pages = {28-35}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {Developers of cybersecurity software often include and rely upon open source software packages in their commercial software products. Before open source code is absorbed into a proprietary product, developers must check the package license to see if the project is permissively licensed, thereby allowing for commercial-friendly inheritance and redistribution. However, there is a risk that the open source package license could be inaccurate due to being silently contaminated with restrictively licensed open source code that may prohibit the sale or confidentiality of commercial derivative work. Contamination of commercial products could lead to expensive remediation costs, damage to the company{\textquoteright}s reputation, and costly legal fees. In this article, we report on our preliminary analysis of more than 200 open source cybersecurity projects to identify the most frequently used license types and languages and to look for evidence of permissively licensed open source projects that are likely contaminated by restrictive licensed material (i.e., containing commercial-unfriendly code). Our analysis identified restrictive license contamination cases occurring in permissively licensed open source projects. Furthermore, we found a high proportion of code that lacked copyright attribution. We expect that the results of this study will: i) provide managers and developers with an understanding of how contamination can occur, ii) provide open source communities with an understanding on how they can better protect their intellectual property by including licenses and copyright information in their code, and ii) provide entrepreneurs with an understanding of the open source cybersecurity domain in terms of licensing and contamination and how they affect decisions about cybersecurity software architectures.}, keywords = {contamination, copyright, cybersecurity, GPL, license, open source, third-party code}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/966}, url = {http://timreview.ca/article/966}, author = {Ahmed Shah and Selman Selman and Ibrahim Abualhaol} } @article {989, title = {TIM Lecture Series {\textendash} An Introduction to Intellectual Property for Entrepreneurs}, journal = {Technology Innovation Management Review}, volume = {6}, year = {2016}, month = {05/2016}, pages = {27-29}, publisher = {Talent First Network}, address = {Ottawa}, keywords = {Canada, CIPO, copyright, entrepreneurship, industrial design, intellectual property, patents, startups, trade secrets, trademarks}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/989}, url = {http://timreview.ca/article/989}, author = {Elizabeth Collinson} } @article {693, title = {Leveraging Old Intellectual Property to Accelerate Technology Entrepreneurship}, journal = {Technology Innovation Management Review}, volume = {3}, year = {2013}, month = {06/2013}, pages = {21-27}, publisher = {Talent First Network}, address = {Ottawa}, abstract = {Acquiring or licensing assets to older technologies, including surviving intellectual property rights, is an often-overlooked viable strategy for accelerating technology entrepreneurship. This strategy can help entrepreneurs short-cut the growth of a customer base, reduce development effort, and shorten the time to market with a minimum viable product. However, this strategy is not without risk; entrepreneurs need to be careful that the acquired intellectual property rights are not fraught with issues that could severely outweigh any perceived value. Proper investigation is required to ensure success because the current literature fails to provide tools that an entrepreneur can apply when considering the acquisition of intellectual property. This article includes a case study of a technology company {\textendash} Piranha Games {\textendash} that indirectly acquired sole and exclusive access to a substantial historical customer base by acquiring and licensing older technology and surviving intellectual property assets. The founders then leveraged the existing product brand and its historical customers to acquire significant funding and went global with a minimum viable product in three years. The copyright and trademark assets provided value on day one to Piranha Games by making it difficult and risky for others to exploit the technology. Based on this case study, this article offers recommendations to entrepreneurs who may benefit from acquiring old intellectual property to accelerate the growth of their startups.}, keywords = {accelerated startup, business models, copyright, crowdfunding, due diligence, entrepreneurs, funding, intellectual property, old technology, product development clearance, trademark}, issn = {1927-0321}, doi = {http://doi.org/10.22215/timreview/693}, url = {http://timreview.ca/article/693}, author = {Derek Smith} }