The vulnerability of technical secrets to reverse engineering : implications for company policy

Thesis (S.M.)--Massachusetts Institute of Technology, System Design and Management Program, 2008.

Bibliographic Details
Main Author: Kodak, Cenkhan
Other Authors: Eric von Hippel.
Format: Thesis
Language:eng
Published: Massachusetts Institute of Technology 2008
Subjects:
Online Access:http://hdl.handle.net/1721.1/43117
_version_ 1811073068956647424
author Kodak, Cenkhan
author2 Eric von Hippel.
author_facet Eric von Hippel.
Kodak, Cenkhan
author_sort Kodak, Cenkhan
collection MIT
description Thesis (S.M.)--Massachusetts Institute of Technology, System Design and Management Program, 2008.
first_indexed 2024-09-23T09:28:07Z
format Thesis
id mit-1721.1/43117
institution Massachusetts Institute of Technology
language eng
last_indexed 2024-09-23T09:28:07Z
publishDate 2008
publisher Massachusetts Institute of Technology
record_format dspace
spelling mit-1721.1/431172019-04-10T08:31:33Z The vulnerability of technical secrets to reverse engineering : implications for company policy Kodak, Cenkhan Eric von Hippel. System Design and Management Program. System Design and Management Program. System Design and Management Program. Thesis (S.M.)--Massachusetts Institute of Technology, System Design and Management Program, 2008. Includes bibliographical references (leaf 81). In this thesis I will explore the controversial topic of reverse engineering, illustrating with case examples drawn from the data storage industry. I will explore intellectual property rights issues including, users' fair-use provisions that permit reverse engineering. I will also explore the nature of the practice via several types of analyses including: the costs and benefits of reverse engineering; the practical limitations of reverse engineering; and a layered approach to reverse engineering as it applies to complex systems. I will conclude with a discussion of innovation and its relationship to reverse engineering by Cenkhan Kodak. S.M. 2008-11-07T19:04:35Z 2008-11-07T19:04:35Z 2008 2008 Thesis http://hdl.handle.net/1721.1/43117 245533753 eng M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582 81 leaves application/pdf Massachusetts Institute of Technology
spellingShingle System Design and Management Program.
Kodak, Cenkhan
The vulnerability of technical secrets to reverse engineering : implications for company policy
title The vulnerability of technical secrets to reverse engineering : implications for company policy
title_full The vulnerability of technical secrets to reverse engineering : implications for company policy
title_fullStr The vulnerability of technical secrets to reverse engineering : implications for company policy
title_full_unstemmed The vulnerability of technical secrets to reverse engineering : implications for company policy
title_short The vulnerability of technical secrets to reverse engineering : implications for company policy
title_sort vulnerability of technical secrets to reverse engineering implications for company policy
topic System Design and Management Program.
url http://hdl.handle.net/1721.1/43117
work_keys_str_mv AT kodakcenkhan thevulnerabilityoftechnicalsecretstoreverseengineeringimplicationsforcompanypolicy
AT kodakcenkhan vulnerabilityoftechnicalsecretstoreverseengineeringimplicationsforcompanypolicy