TY - JOUR T1 - Disrupting the Disrupter: Strategic Countermeasures to Attack the Business Model of a Coercive Patent-Holding Firm JF - Technology Innovation Management Review Y1 - 2015 A1 - Derek Smith KW - business model KW - business model framework KW - coercive patent holder KW - countermeasures KW - intellectual property KW - non-practicing entity KW - NPE KW - patent KW - patent arsenal KW - patent office policy KW - patent shark KW - patent troll AB - A coercive patent-holding firm operates a business model that strategically targets firms to force unforeseen patent licensing rents. Coercive patent holders use aggressive litigation tactics to instantaneously create a complicated asymmetrical expensive problem with significant business risk. The strategy creates a dominant position by leveraging legal and business pressure to force the targeted firm into an involuntarily engagement with a coercive patent-holding firm. Such engagements can be quite profitable for the patent holders – and quite devastating for targeted firms. Thus, this article attempts to synthesize a business model framework that reveals insights concerning the profit formula, key resources, and key processes that support the dominant position of coercive patent-holding firms. Based on this framework, we further synthesize countermeasures to disrupt these business model elements and diminish the dominant position. The insights and countermeasures reveal strategic options and tactics that can be leveraged against the business model of a coercive patent-holding firm to alter the dominant position and improve the business situation of the targeted firm. PB - Talent First Network CY - Ottawa VL - 5 UR - http://timreview.ca/article/894 IS - 5 U1 - Geotab Inc. Derek Smith is the founder and principal of Magneto Innovention Management, an intellectual property consulting firm that assists entrepreneurs and small businesses with difficult intellectual property issues. He is also the Vice President of Intellectual Property for Geotab Inc. and a registered patent agent in both Canada and the United States. He has over 25 years of experience working as an intellectual property management consultant and patent agent for IBM Canada, Bell Canada, and Husky Injection Molding Systems, where he was Director of Global Intellectual Property. Prior to entering the field of intellectual property, he was an advisory engineer at IBM Canada, where he was involved in a variety of leading-edge software development projects. Derek holds an MASc degree in Technology Innovation Management from Carleton University in Ottawa, Canada, for which he was awarded a Senate Medal for Outstanding Academic Achievement. Derek also holds a BEng degree in Systems and Computer Engineering, also from Carleton University. ER - TY - JOUR T1 - Securing Cyberspace: Towards an Agenda for Research and Practice JF - Technology Innovation Management Review Y1 - 2015 A1 - Renaud Levesque A1 - D’Arcy Walsh A1 - David Whyte KW - Canada KW - challenges KW - countermeasures KW - cyber security KW - cybersafety KW - cybersecurity KW - cyberspace KW - detection KW - Internet of Things KW - leadership KW - mitigation KW - research KW - security AB - In this article, we seek to identify the important challenges preventing security in cyberspace and to identify the key questions that nations should set out to answer to play a leading role in securing cyberspace. An important assertion is that the challenge of securing cyberspace transcends the abilities of any single entity and requires a radical shift in our approach in how: i) research is conducted, ii) cybersecurity researchers are educated, iii) new defendable systems are developed, and iv) effective defensive countermeasures are deployed. Our response draws upon extensive source material and our personal experiences as cybersecurity professionals contributing to the establishment of the VENUS Cybersecurity Corporation, a not-for-profit corporation that aims to make Canada a global leader in cybersecurity. We view the challenge to be global and transdisciplinary in nature and this article to be of relevance world-wide to senior decision makers, policy makers, managers, educators, strategists, futurists, scientists, technologists, and others interested in shaping the online world of the future. PB - Talent First Network CY - Ottawa VL - 5 UR - http://timreview.ca/article/943 IS - 11 U1 - Communications Security Establishment Renaud Levesque is the Director General of Core Systems at the Communications Security Establishment (CSE) in Ottawa, Canada, where he is responsible for R&D and systems development. He has significant experience in the delivery of capability and organizational change in highly technical environments. His career began at CSE in 1986 as a Systems Engineer, responsible for the development and deployment of numerous systems, including the CSE IP corporate network in 1991. In 2000 Renaud went to work in the private sector as Head of Speech Technologies at Locus Dialogue, and later at Infospace Inc., where he became Director of Speech Solutions Engineering. He rejoined CSE in 2003, where he assumed the lead role in the IT R&D section. Subsequently, as a Director General, he focused efforts towards the emergence of CSE's Joint Research Office and The Tutte Institute for Mathematics and Computing. Renaud holds a Bachelor of Engineering from l’École Polytechnique, Université de Montréal, Canada. U2 - Communications Security Establishment D’Arcy Walsh is a Science Advisor at the Communications Security Establishment (CSE) in Ottawa, Canada. His research interests include software-engineering methods and techniques that support the development and deployment of dynamic systems, including dynamic languages, dynamic configuration, context-aware systems, and autonomic and autonomous systems. He received his BAH from Queen’s University in Kingston, Canada, and he received his BCS, his MCS, and his PhD in Computer Science from Carleton University in Ottawa, Canada. U3 - Communications Security Establishment David Whyte is the Technical Director for the Cyber Defence Branch at the Communications Security Establishment (CSE) in Ottawa, Canada. He is CSE's technical lead responsible for overseeing the implementation of the next-generation cyberthreat-detection services for the Government of Canada. He has held many positions over the last 16 years within CSE that span both the Signals Intelligence and Information Technology Security mission lines. David holds a PhD in Computer Science from Carleton University in Ottawa, Canada. The main focus of his research is on the development of network-based behavioural analysis techniques for the detection of rapidly propagating malware. ER - TY - JOUR T1 - TIM Lecture Series – Web Infections and Protections: Theory and Practice JF - Technology Innovation Management Review Y1 - 2014 A1 - Arnold Kwong KW - attack vectors KW - countermeasures KW - cybersecurity KW - infections KW - Internet KW - privacy KW - security KW - targets KW - threat vectors KW - threats PB - Talent First Network CY - Ottawa VL - 4 UR - http://timreview.ca/article/774 IS - 3 U1 - Extratelligence Arnold Kwong has over thirty years experience in management, manufacturing, and technology applications. His operational expertise and cross-disciplinary outlook have been applied in planning, analysis, implementation, and problem-solving settings. A strong operational emphasis on quality and risk management comes from extensive practical work. Ongoing technical expertise, with ongoing research and application publications, focus on telecommunications, security models, mobile financial applications security, complex systems integration and deployment, software modeling of enterprises, real-time data collection, and advancements in computer science. His technical experiences include a core of multivendor complex systems analysis; data base/storage/data communications relationships; software design, development, and evaluation; and hardware/software architectural design and implementation issues. Areas of specific management expertise include complex product development and management, technological risk management, and regulatory compliance for organizations in both the public and private service and manufacturing sectors. Areas of specific technical experience include application architectures; system architectures; applications and Internet security; storage/data base administration, management, and enterprise modeling; networking and data communications; and computer science research. ER -