August 2008
Las Vegas Business Press (10712186);8/25/2008, Vol. 25 Issue 34, pP6
The article discusses the increased use business blogs in the marketing mix. According to the author, there are increasing numbers of businesspeople taking the Internet to connect with potential customers including entrepreneur John Kaspar. He uses student bloggers and stay-at-home moms for his charity raffle company Win4Charity. The author also said that legal judgments costing millions are hitting the bloggers with claims including false charges, violation of intellectual property rights to exposure of trade secrets and online harassments.


Related Articles

  • Inside Job. Green, Robert P.; Dickinson, Glenn // California CPA;Jul2007, Vol. 76 Issue 1, p19 

    The article focuses on protection of intellectual property such as trade secrets and employee and customer personal information. According to government studies, most information-related breaches including unauthorized access to information and loss of laptop happen internally within the...

  • Defensive use of publications in an intellectual property strategy. Barrett, Bill // Nature Biotechnology;Feb2002, Vol. 20 Issue 2, p191 

    Examines the use defensive publications as part of an intellectual property approach in the United States. Benefits of defensive publications; Trade-secret protection; Examples of potentially effective publications.

  • `Secrets' to success: Maintaining trade secrets into the 21st century. Mendoza, Joanna R. // Business Journal Serving Fresno & the Central San Joaquin Valley;08/11/97, Issue 322184, p15 

    Discusses strategies in protecting trade secrets and intellectual property in the 21st century. Includes understanding trade secret laws; Establishing written policies; Screening employees; Conduction of periodic system and employee review.

  • Patent Pendency: A Great Reason to Cherish Your Trade Secrets. McDaniel, Steve; Hurt, Jon // Coatings World;Apr2012, Vol. 17 Issue 4, p62 

    The article offers information on a resolution on U.S. patent application. It states that patent was used as a strong presence in business to become ahead in market competition. It says that patent was also used in protecting market share and intellectual assets rather than utilizing trade...

  • Obama Administration Unveils Strategy To Combat Trade Theft. Biesecker, Calvin // Defense Daily;2/20/2013, Vol. 257 Issue 34, p8 

    The article reports on the release of a strategy by U.S. President Barack Obama's administration to reduce the theft of trade secrets and intellectual property in the U.S. The release comes after a cyber security firm reported that an organization linked to the Chinese military is engaged in...

  • CHOOSING THE RIGHT SOFTWARE PROTECTION. Alter, Scott M. // IEEE Software;Mar93, Vol. 10 Issue 2, p91 

    Discusses the option of intellectual property to protect software, programs and other materials. Factors that must be present in subject matter to qualify as a trade secret; Remedies when a misappropriation of the trade secret has occurred; Definition of copyright protection; Discussion on patents.

  • IP: A 'weapon' for all businesses. LOTEMPIO, VINCENT // Buffalo Law Journal;1/20/2013, Vol. 86 Issue 3, p13 

    The article focuses on the use of intellectual property (IP) in various kinds of businesses which protects trademarks, ideas, and the brand through defensive publications and trade secrets.

  • A general approach for determining when to patent, publish, or protect information as a trade secret. Daizadeh, Iraj; Miller, David; Glowalla, Andy; Leamer, Mike; Nandi, Ron; Numark, Clifford I. // Nature Biotechnology;Oct2002, Vol. 20 Issue 10, p1053 

    Discusses the need for companies to weigh the pros and cons of patent and trade secret protection when choosing how to protect their technology. Feasibility and time involved for a competitor to arrive independently at or reverse engineer the invention; Consideration of potential market...

  • That's My Joke... Art... Trick!: How the Internal Norms of IP Communities Are Ineffective Against Extra-Community Misappropriation. Schachter, Jeremy A. // Virginia Sports & Entertainment Law Journal;Fall2012, Vol. 12 Issue 1, p63 

    The article discusses ineffectiveness of Intellectual Property (IP) norms against extra-community misappropriation (ECM) including existing IP norms, role of IP norms in resolving ECM occurrences and need of checking ECM to prevent IP communities' decimitation.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics