Brand Protection in the Online World : A Comprehensive Guide
| Brand Protection in the Online World : A Comprehensive Guide |
| Autore | Barnett David N |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | London : , : Kogan Page, , 2016 |
| Descrizione fisica | 1 online resource (280 pages) |
| Disciplina | 658.8 |
| Soggetto topico |
Brand name products - Law and legislation
Electronic commerce - Law and legislation Brand choice Trademark infringement |
| ISBN |
9780749478704
0749478705 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Contents -- Information boxes -- About the author -- Acknowledgements -- Overview -- 01 Introduction -- 1.1 Background -- 1.1.1 The growth of the internet -- 1.1.2 The importance of online brand protection -- 1.1.3 Other areas for consideration -- 1.2 Internet technology - basic principles -- 1.3 Online brand protection - basic principles -- 02 Domain names -- 2.1 Domain-name ownership -- 2.2 Domain-name brand protection -- 2.3 Examples of domain-name abuses -- 2.4 Domain-name detection -- 2.5 Domain-name enforcement -- 03 General brand use and abuse -- 3.1 Introduction -- 3.2 Key categories of brand use or misuse -- 3.2.1 Brand seeding -- 3.2.2 Logo use and abuse -- 3.2.3 Site framing -- 3.2.4 Appearance of corporate e-mail addresses -- 3.2.5 Claims of affiliation -- 3.2.6 Customer comment and activism -- 04 e-Commerce activity and marketplaces -- 4.1 e-Commerce monitoring -- 4.2 Examples of probable infringing marketplace listings -- 4.3 Marketplace monitoring -- 4.4 Marketplace enforcement -- 05 Social media -- 5.1 Introduction -- 5.2 Key sites -- 5.3 Examples of brand infringements on social media -- 5.4 Social media enforcement -- 06 Online fraud -- 6.1 Phishing -- 6.1.1 Introduction -- 6.1.2 Phishing examples -- 6.1.3 Phishing detection and enforcement -- 6.2 '419' scams -- 6.2.1 Introduction -- 6.2.2 Monitoring and enforcement -- 6.3 Malware and fraud -- 6.4 Other monitoring -- 07 Digital piracy -- 7.1 Overview -- 7.1.1 Peer-to-peer (P2P) file-sharing -- 7.1.2 Cyberlockers -- 7.2 Piracy detection -- 7.3 Piracy enforcement -- 08 Mobile apps -- 8.1 Introduction -- 8.2 Mobile app monitoring and enforcement -- 09 Sponsored-ad monitoring -- 9.1 Introduction -- 9.2 Sponsored-ad monitoring and enforcement -- 10 Affiliate monitoring -- 10.1 Affiliate marketing programmes -- 10.2 Brand protection across affiliate networks.
10.3 Brand infringements on affiliate sites -- 11 'Deep' and 'Dark' Web -- 11.1 Introduction -- 11.2 Tor -- 11.3 IRC -- 12 Additional and future areas of interest -- 12.1 Bespoke, specialized or manual services -- 12.2 Current and future developments -- Appendix A Glossary of key terms -- Appendix B Examples of potential brandinfringements -- B.1 Introduction -- B.2 Luxury goods brand: L'Oréal (cosmetics) -- B.3 Financial services brand: Bank of America (banking) -- B.4 Educational institution: Macquarie University, Australia -- Appendix C Sample enforcement notices -- C.1 Introduction -- C.2 Enforcement notice templates -- Appendix D Rules languages - basic principles -- D.1 Introduction -- D.2 General functionality -- D.3 Sample rules -- Appendix E Internet technologies - additional technical detail -- Index. |
| Altri titoli varianti |
Protéger sa marque dans le cyberespace
Brand protection in the online world |
| Record Nr. | UNINA-9910154599803321 |
Barnett David N
|
||
| London : , : Kogan Page, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Defending the brand [[electronic resource] ] : aggressive strategies for protecting your brand in the online arena / / Brian H. Murray
| Defending the brand [[electronic resource] ] : aggressive strategies for protecting your brand in the online arena / / Brian H. Murray |
| Autore | Murray Brian H. <1968-> |
| Pubbl/distr/stampa | New York, : American Management Association, c2004 |
| Descrizione fisica | 1 online resource (286 p.) |
| Disciplina | 658.8/27 |
| Soggetto topico |
Brand name products
Trademark infringement Electronic commerce Product management |
| Soggetto genere / forma | Electronic books. |
| ISBN | 0-8144-2753-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Digital brand abuse -- The dark side -- Objectionable content -- Pornography -- Adult entertainment -- Child pornography -- Hate, violence, and extremism -- Gambling -- Parody -- Defining "objectionable" -- Who's at risk? -- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary. |
| Record Nr. | UNINA-9910456185103321 |
Murray Brian H. <1968->
|
||
| New York, : American Management Association, c2004 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Defending the brand [[electronic resource] ] : aggressive strategies for protecting your brand in the online arena / / Brian H. Murray
| Defending the brand [[electronic resource] ] : aggressive strategies for protecting your brand in the online arena / / Brian H. Murray |
| Autore | Murray Brian H. <1968-> |
| Pubbl/distr/stampa | New York, : American Management Association, c2004 |
| Descrizione fisica | 1 online resource (286 p.) |
| Disciplina | 658.8/27 |
| Soggetto topico |
Brand name products
Trademark infringement Electronic commerce Product management |
| ISBN | 0-8144-2753-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Digital brand abuse -- The dark side -- Objectionable content -- Pornography -- Adult entertainment -- Child pornography -- Hate, violence, and extremism -- Gambling -- Parody -- Defining "objectionable" -- Who's at risk? -- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary. |
| Record Nr. | UNINA-9910780265603321 |
Murray Brian H. <1968->
|
||
| New York, : American Management Association, c2004 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
In the matter of certain digital multimeters, and products with multimeter functionality [[electronic resource] ] : investigation no. 337-TA-588
| In the matter of certain digital multimeters, and products with multimeter functionality [[electronic resource] ] : investigation no. 337-TA-588 |
| Pubbl/distr/stampa | Washington, DC : , : U.S. International Trade Commission, , [2010] |
| Descrizione fisica | 1 online resource (162 unnumbered pages) : illustrations |
| Collana | Publication |
| Soggetto topico |
Digital multimeters
Trademark infringement |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | In the matter of certain digital multimeters, and products with multimeter functionality |
| Record Nr. | UNINA-9910700871603321 |
| Washington, DC : , : U.S. International Trade Commission, , [2010] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Stakeholder perspectives on ICANN : the .SUCKS domain and essential steps to guarantee trust and accountability in the Internet's operation : hearing before the Subcommittee on Courts, Intellectual Property, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Fourteenth Congress, first session, March 25, 2015
| Stakeholder perspectives on ICANN : the .SUCKS domain and essential steps to guarantee trust and accountability in the Internet's operation : hearing before the Subcommittee on Courts, Intellectual Property, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Fourteenth Congress, first session, March 25, 2015 |
| Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2015 |
| Descrizione fisica | 1 online resource (iv, 225 pages) : illustrations |
| Soggetto topico |
Internet domain names - Management
Internet governance - Government policy - United States Brand name products Trademark infringement Product management |
| Soggetto genere / forma | Legislative hearings. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Stakeholder perspectives on ICANN |
| Record Nr. | UNINA-9910703841803321 |
| Washington : , : U.S. Government Publishing Office, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||