COURSE DESCRIPTION
Intellectual Property is a broad category of law concerning the rights of the owners of intangible products of invention or creativity. For example, IP law grants exclusive rights to certain owners of artistic works, technological inventions, and symbols or designs. Subcategories of IP law include patent, copyright, trademark, and trade secrets. IP lawyers work in litigation, licensing, technology transfer, venture capital, IP asset management, and trademark and patent prosecution.
COURSE OUTCOMES
- Upon successful completion of this
course, students will able to:
- Understand
the owners of intangible products
- Understand
of IP law grants exclusive rights to certain owners.
- Provide
an understanding of the dynamics and regulation of some of the most prominent industries
and applications.
- Provide understanding of trademark and patent
prosecution.
-
COURSE CONTENT
- Introduction
of intellectual Property.
- Rights
of the owners of intangible products of invention or creativity. For example, IP
law grants exclusive rights to certain owners of artistic works,
- Technological
inventions, and symbols or designs.
- Subcategories
of IP law include patent, copyright, trademark, and trade secrets.
- IP
lawyers work in litigation
READING MATERIALS
Manuel Castells (2000), “The Rise of the Network Society”
Brynjolfsson, E., & Saunders, A. (2009). Wired for Innovation: How Information Technology is Reshaping the Economy
Schiller, D. (2000). Digital Capitalism: Networking the Global MarketCOURSE DESCRIPTION
The aim of this course is for students to understand IT contracts and their complexities to ensure you draft watertight agreements and manage the risks effectively. All those involved in IT transactions need to understand the trends and industry ‘norms’. A tough commercial environment means you need to guarantee you are getting the best terms available and the best deal for companies or clients. This course has been specifically designed to develop students’ understanding of the structure and content of IT contracts:
COURSE CONTENT
- What they are
- How and why they work
- What should be included
- How to put them in place
- How to overcome the key challenges
READING MATERIALS
- Brynjolfsson,
E., & Saunders, A. (2009). Wired for
Innovation: How Information Technology is Reshaping the Economy
- Schiller,
D. (2000). Digital Capitalism: Networking
the Global Market System
COURSE DESCRIPTION
This course intends to introduce students to the study of the technical, formal and informal controls to provide systems security and information privacy for organizations. The course among others will include security analysis of technology and organizational systems for information assurance. The course will provide students with an in-depth understanding of technical and managerial issues of information security and privacy. The course achieves this by discussing foundational aspects of a wide spectrum of activities, methods, methodologies, procedures and best practices used in information security and privacy field.
COURSE OUTCOMES:
Upon successful completion of this course, students will be able to:
- Analyze
the impact of systems security and
information privacy for organizations
- Understand the broad role of information
security and information privacy in business processes.
- Understand the technical foundations for
information security and information privacy.
- Study
the implications for information security and privacy in Enterprise Information
Systems and Inter-Organizational business processes.
- Describe legal and public relations
implications of security and privacy issues
COURSE CONTENT
- Introduction
to the course Information System Security and Privacy: nature and scope.
- History
of Information Security and Privacy Information and Data Privacy Security of
Technical Systems in Organizations Issues in Information Security Issues in
Information Privacy.
- Internet
Communications and TCP/IP Network Security, Firewalls and VPNs .
- Information
System Risk Management Threats and Attacks
- Cryptography
and Encryption.
- The
art and science of Hacking.
- Intrusion
Detection and Prevention Systems.
- Identity
Management.
- Information
and data Privacy.
- Security
and Privacy of Formal Systems in Organizations Planning for Information System
Security and Privacy Designing Information System Security and Privacy
Corporate Governance for IS Security and Privacy
COMPULSORY READING MATERIALS
- Jeffrey
A. H . Modern Database Management (12th Edition)
- David, K & Michael, G.S .Fundamentals Of Information Systems Security
(Information Systems Security & Assurance Series) (1st Edition)
- Sean-Philip & Oriyano Michael GreggHacker. Techniques, Tools, And Incident Handling (Jones
& Bartlett Learning Information Systems Security & Assurance Series) 1st Edition
- Darril Gibson. Managing Risk In Information Systems (Information
Systems Security & Assurance Series) 1st
Edition