<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ahmed Shah</style></author><author><style face="normal" font="default" size="100%">Selman Selman</style></author><author><style face="normal" font="default" size="100%">Ibrahim Abualhaol</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">License Compliance in Open Source Cybersecurity Projects</style></title><secondary-title><style face="normal" font="default" size="100%">Technology Innovation Management Review</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">contamination</style></keyword><keyword><style  face="normal" font="default" size="100%">copyright</style></keyword><keyword><style  face="normal" font="default" size="100%">cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">GPL</style></keyword><keyword><style  face="normal" font="default" size="100%">license</style></keyword><keyword><style  face="normal" font="default" size="100%">open source</style></keyword><keyword><style  face="normal" font="default" size="100%">third-party code</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">02/2016</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://timreview.ca/article/966</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Talent First Network</style></publisher><pub-location><style face="normal" font="default" size="100%">Ottawa</style></pub-location><volume><style face="normal" font="default" size="100%">6</style></volume><pages><style face="normal" font="default" size="100%">28-35</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Developers of cybersecurity software often include and rely upon open source software packages in their commercial software products. Before open source code is absorbed into a proprietary product, developers must check the package license to see if the project is permissively licensed, thereby allowing for commercial-friendly inheritance and redistribution. However, there is a risk that the open source package license could be inaccurate due to being silently contaminated with restrictively licensed open source code that may prohibit the sale or confidentiality of commercial derivative work. Contamination of commercial products could lead to expensive remediation costs, damage to the company's reputation, and costly legal fees. In this article, we report on our preliminary analysis of more than 200 open source cybersecurity projects to identify the most frequently used license types and languages and to look for evidence of permissively licensed open source projects that are likely contaminated by restrictive licensed material (i.e., containing commercial-unfriendly code). Our analysis identified restrictive license contamination cases occurring in permissively licensed open source projects. Furthermore, we found a high proportion of code that lacked copyright attribution. We expect that the results of this study will: i) provide managers and developers with an understanding of how contamination can occur, ii) provide open source communities with an understanding on how they can better protect their intellectual property by including licenses and copyright information in their code, and ii) provide entrepreneurs with an understanding of the open source cybersecurity domain in terms of licensing and contamination and how they affect decisions about cybersecurity software architectures.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><custom1><style face="normal" font="default" size="100%">Carleton University
Ahmed Shah holds a BEng in Software Engineering and is pursuing an MASc degree in Technology Innovation Management at Carleton University in Ottawa, Canada. Ahmed has experience working in cybersecurity research with the VENUS Cybersecurity Corporation and has experience managing legal deliverables at IBM.</style></custom1><custom2><style face="normal" font="default" size="100%">Carleton University
Selman Selman is a Software Engineer at Synopsys under the Software Integrity Group. He is also carrying out graduate studies in Technology Innovation Management at Carleton University in Ottawa, Canada. </style></custom2><custom3><style face="normal" font="default" size="100%">Carleton University
Ibrahim Abualhaol holds BSc and MSc degrees in Electrical Engineering from Jordan University of Science and Technology, an MEng in Technology Innovation Management from Carleton University in Ottawa, Canada, and a PhD in Electrical Engineering from the University of Mississippi in Oxford, United States. He worked for two years as a Wireless Engineer at Broadcom Corporation and as a System Engineer Intern at Qualcomm Incorporation in the United States. He then worked as an Assistant Professor of Wireless Communications at Khalifa University, United Arab Emirates for four years. Currently, he is a Cybersecurity R &amp; D Engineer working on operationalizing collective intelligence with artificial intelligence to improve cybersecurity. He is senior member of IEEE, a member of Phi Kappa Phi, and a member of Sigma Xi.</style></custom3></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Elizabeth Collinson</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">TIM Lecture Series – An Introduction to Intellectual Property for Entrepreneurs</style></title><secondary-title><style face="normal" font="default" size="100%">Technology Innovation Management Review</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Canada</style></keyword><keyword><style  face="normal" font="default" size="100%">CIPO</style></keyword><keyword><style  face="normal" font="default" size="100%">copyright</style></keyword><keyword><style  face="normal" font="default" size="100%">entrepreneurship</style></keyword><keyword><style  face="normal" font="default" size="100%">industrial design</style></keyword><keyword><style  face="normal" font="default" size="100%">intellectual property</style></keyword><keyword><style  face="normal" font="default" size="100%">patents</style></keyword><keyword><style  face="normal" font="default" size="100%">startups</style></keyword><keyword><style  face="normal" font="default" size="100%">trade secrets</style></keyword><keyword><style  face="normal" font="default" size="100%">trademarks</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year><pub-dates><date><style  face="normal" font="default" size="100%">05/2016</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://timreview.ca/article/989</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Talent First Network</style></publisher><pub-location><style face="normal" font="default" size="100%">Ottawa</style></pub-location><volume><style face="normal" font="default" size="100%">6</style></volume><pages><style face="normal" font="default" size="100%">27-29</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">5</style></issue><custom1><style face="normal" font="default" size="100%">Canadian Intellectual Property Office
Elizabeth Collinson is a Project Officer in the Outreach Program of the Canadian Intellectual Property Office (CIPO), where she has worked for more than 20 years in the Trademarks Branch, the Copyright and Industrial Design Branch, and the Information Branch. She has held various roles including Examiner, Policy and Training Officer, Supervisor, Business Development Officer, Project Officer and she was successful in acquiring Trademark Agent status.  Currently, Elizabeth works in an Outreach team promoting the awareness and further education of intellectual property.</style></custom1></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Derek Smith</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Leveraging Old Intellectual Property to Accelerate Technology Entrepreneurship</style></title><secondary-title><style face="normal" font="default" size="100%">Technology Innovation Management Review</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">accelerated startup</style></keyword><keyword><style  face="normal" font="default" size="100%">business models</style></keyword><keyword><style  face="normal" font="default" size="100%">copyright</style></keyword><keyword><style  face="normal" font="default" size="100%">crowdfunding</style></keyword><keyword><style  face="normal" font="default" size="100%">due diligence</style></keyword><keyword><style  face="normal" font="default" size="100%">entrepreneurs</style></keyword><keyword><style  face="normal" font="default" size="100%">funding</style></keyword><keyword><style  face="normal" font="default" size="100%">intellectual property</style></keyword><keyword><style  face="normal" font="default" size="100%">old technology</style></keyword><keyword><style  face="normal" font="default" size="100%">product development clearance</style></keyword><keyword><style  face="normal" font="default" size="100%">trademark</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">06/2013</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">http://timreview.ca/article/693</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">Talent First Network</style></publisher><pub-location><style face="normal" font="default" size="100%">Ottawa</style></pub-location><volume><style face="normal" font="default" size="100%">3</style></volume><pages><style face="normal" font="default" size="100%">21-27</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Acquiring or licensing assets to older technologies, including surviving intellectual property rights, is an often-overlooked viable strategy for accelerating technology entrepreneurship. This strategy can help entrepreneurs short-cut the growth of a customer base, reduce development effort, and shorten the time to market with a minimum viable product. However, this strategy is not without risk; entrepreneurs need to be careful that the acquired intellectual property rights are not fraught with issues that could severely outweigh any perceived value. Proper investigation is required to ensure success because the current literature fails to provide tools that an entrepreneur can apply when considering the acquisition of intellectual property. 

This article includes a case study of a technology company – Piranha Games – that indirectly acquired sole and exclusive access to a substantial historical customer base by acquiring and licensing older technology and surviving intellectual property assets. The founders then leveraged the existing product brand and its historical customers to acquire significant funding and went global with a minimum viable product in three years. The copyright and trademark assets provided value on day one to Piranha Games by making it difficult and risky for others to exploit the technology. Based on this case study, this article offers recommendations to entrepreneurs who may benefit from acquiring old intellectual property to accelerate the growth of their startups.</style></abstract><issue><style face="normal" font="default" size="100%">6</style></issue><custom1><style face="normal" font="default" size="100%">Magneto Innovention Management
Derek Smith is the founder and principal of Magneto Innovention Management, an intellectual property consulting firm that assists entrepreneurs and small businesses to navigate and grow their international patent portfolios. He has over 20 years of experience working as an intellectual property management consultant and patent agent for IBM Canada, Bell Canada and, most recently, Husky Injection Molding Systems where he was Director, Global Intellectual Property. Prior to entering the field of intellectual property, he was an advisory engineer at IBM Canada where he was involved in a variety of leading-edge software development projects. Derek is currently a graduate student in the Technology Innovation Management (TIM) program at Carleton University in Ottawa, Canada. He also holds a BEng degree in Systems and Computer Engineering from Carleton University and is a registered patent agent in both Canada and the United States.</style></custom1></record></records></xml>