COURSE DESCRIPTION

Intellectual Property is a broad category of law concerning the rights of the owners of intangible products of invention or creativity. For example, IP law grants exclusive rights to certain owners of artistic works, technological inventions, and symbols or designs. Subcategories of IP law include patent, copyright, trademark, and trade secrets. IP lawyers work in litigation, licensing, technology transfer, venture capital, IP asset management, and trademark and patent prosecution.

 

COURSE OUTCOMES

  • Upon successful completion of this course, students will able to:
  • Understand  the owners of intangible products
  • Understand of IP law grants exclusive rights to certain owners.
  • Provide an understanding of the dynamics and regulation of some of the most prominent industries and applications.
  •  Provide understanding of trademark and patent prosecution.
  •  

COURSE CONTENT

  •  Introduction of intellectual Property.
  • Rights of the owners of intangible products of invention or creativity. For example, IP law grants exclusive rights to certain owners of artistic works,
  •  Technological inventions, and symbols or designs.
  •  Subcategories of IP law include patent, copyright, trademark, and trade secrets.
  • IP lawyers work in litigation

 

READING MATERIALS

Manuel Castells (2000), “The Rise of the Network Society

 Brynjolfsson, E., & Saunders, A. (2009). Wired for Innovation: How Information Technology is Reshaping the Economy

Schiller, D. (2000). Digital Capitalism: Networking the Global Market

COURSE DESCRIPTION

The aim of this course is for students to understand IT contracts and their complexities to ensure you draft watertight agreements and manage the risks effectively.  All those involved in IT transactions need to understand the trends and industry ‘norms’. A tough commercial environment means you need to guarantee you are getting the best terms available and the best deal for companies or clients. This course has been specifically designed to develop students’ understanding of the structure and content of IT contracts:

 

COURSE CONTENT

  • What they are
  •  How and why they work
  • What should be included
  • How to put them in place
  • How to overcome the key challenges

READING MATERIALS

  •  Brynjolfsson, E., & Saunders, A. (2009). Wired for Innovation: How Information Technology is Reshaping the Economy
  • Schiller, D. (2000). Digital Capitalism: Networking the Global Market System


COURSE DESCRIPTION

This course intends to introduce students to the study of the technical, formal and informal controls to provide systems security and information privacy for organizations. The course among others will include security analysis of technology and organizational systems for information assurance. The course will provide students with an in-depth understanding of technical and managerial issues of information security and privacy. The course achieves this by discussing foundational aspects of a wide spectrum of activities, methods, methodologies, procedures and best practices used in information security and privacy field.

 

COURSE OUTCOMES:

Upon successful completion of this course, students will be able to:

  •  Analyze the  impact of systems security and information privacy for organizations
  • Understand the broad role of information security and information privacy in business processes.
  •  Understand the technical foundations for information security and information privacy.
  •  Study the implications for information security and privacy in Enterprise Information Systems and Inter-Organizational business processes.
  •  Describe legal and public relations implications of security and privacy issues

 

COURSE CONTENT

  •  Introduction to the course Information System Security and Privacy: nature and scope.
  • History of Information Security and Privacy Information and Data Privacy Security of Technical Systems in Organizations Issues in Information Security Issues in Information Privacy.
  •  Internet Communications and TCP/IP Network Security, Firewalls and VPNs .
  •  Information System Risk Management Threats and Attacks
  • Cryptography and Encryption.
  • The art and science of Hacking.
  •  Intrusion Detection and Prevention Systems.
  •  Identity Management.
  •  Information and data Privacy.
  • Security and Privacy of Formal Systems in Organizations Planning for Information System Security and Privacy Designing Information System Security and Privacy Corporate Governance for IS Security and Privacy

 

COMPULSORY READING MATERIALS

  • Jeffrey A. H . Modern Database Management (12th Edition) 
  •   David, K & Michael, G.S .Fundamentals Of Information Systems Security (Information Systems Security & Assurance Series)  (1st Edition)
  •  Sean-Philip & Oriyano  Michael GreggHacker.  Techniques, Tools, And Incident Handling (Jones & Bartlett Learning Information Systems Security & Assurance Series) 1st Edition
  • Darril Gibson. Managing Risk In Information Systems (Information Systems Security & Assurance Series) 1st Edition