Beruflich Dokumente
Kultur Dokumente
TECHNOLOGY MANAGEMENT
[Information Technology]
Contents
Introduction 3
Information Technology Management 3 IT Service Management 4 Security Management 5
Patent Laws
Conditions of Patentability
9
Types of Patents 9
10 10
References
11
Introduction
I. Information Technology Management:
Information Technology Management is concerned with exploring and understanding Information Technology as a corporate resource that determines both the strategic and operational capabilities of the firm in designing and developing products and services for maximum customer satisfaction, corporate productivity, profitability and competitiveness. Under IT management there are five sub-categories: 1. 2. 3. 4. 5. IT Governance IT service Management Financial Management Security Management Risk Management
1) IT Governance: IT Governance or ICT (Information & Communications Technology) Governance, is a subset discipline of Corporate Governance focused on information technology (IT) systems and their performance and risk management. The rising interest in IT governance is partly due to compliance initiatives, as well as the acknowledgment that IT projects can easily get out of control and profoundly affect the performance of an organization. But to include foundational mechanism IT governance institute expands the statement: The leadership and organizational structures and processes that ensure that the organizations IT sustains and extends the organizations strategies and objectives."
The discipline of information technology governance derives from corporate governance and deals primarily with the connection between business focus and IT management of an organization. It highlights the importance of IT related matters in contemporary organizations and states that strategic IT decisions should be owned by the corporate board, rather than by the chief information officer or other IT managers. 2) IT Service Management: IT Service Management (ITSM) is a discipline for managing information technology (IT) systems, philosophically centered on the customer's perspective of IT's contribution to the business. ITSM stands in deliberate contrast to technology-centered approaches to IT management and business interaction. The following represents a characteristic statement from the ITSM literature: Providers of IT services can no longer afford to focus on technology and their internal organization, they now have to consider the quality of the services they provide and focus on the relationship with customers. ITSM is process-focused and in this sense have ties and common interests with process improvement movement frameworks and methodologies. For example it relates to: TQM Six Sigma Business Process Management CMMI TSM is related to the field of Management Information Systems (MIS) in scope. However, ITSM has a distinct practitioner point of view, and is more introspective (i.e. IT thinking about the delivery of IT to the business) as opposed to the more academic and outward facing connotation of MIS 3) Financial Management: It is the management of the finances of a business / organization in order to achieve financial objectives. Taking a commercial business as the most common organizational structure, the key objectives of financial management would be to: Create wealth for the business Generate cash Provide an adequate return on investment bearing in mind the risks that the business is taking and the resources invested There are three key elements to the process of financial management:
(1) Financial Planning Management need to ensure that enough funding is available at the right time to meet the needs of the business. In the short term, funding may be needed to invest in equipment and stocks, pay employees and fund sales made on credit.
(2) Financial Control Financial control is a critically important activity to help the business ensure that the business is meeting its objectives. Financial control addresses questions such as: Are assets being used efficiently? Are the businesses assets secure? Do management act in the best interest of shareholders and in accordance with business rules? (3) Financial Decision-making The key aspects of financial decision-making relate to investment, financing and dividends: Investments must be financed in some way however there are always financing alternatives that can be considered. For example it is possible to raise finance from selling new shares, borrowing from banks or taking credit from suppliers A key financing decision is whether profits earned by the business should be retained rather than distributed to shareholders via dividends. If dividends are too high, the business may be starved of funding to reinvest in growing revenues and profits further. 4) Security Management: Security Management is a broad field of management related to asset management, physical security and human resource safety functions. It entails the identification of an organization's information assets and the development, documentation and implementation of policies, standards, procedures and guidelines. In network management it is the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many sub functions, such as creating, deleting, and controlling security services and mechanisms; distributing security-relevant information; reporting security-relevant events;
controlling the distribution of cryptographic keying material; and authorizing subscriber access, rights, and privileges. Management tools such as information classification, risk assessment and risk analysis are used to identify threats, classify assets and to rate system vulnerabilities so that effective control can be implemented. Under security management there are:
Access control Alarm management Physical Security Physical Security Professional Security policy
5) Risk Management: Risk management is a structured approach to manage uncertainty related to a threat, a sequence of human activities including: risk assessment, strategies development to manage it, and mitigation of risk using managerial resources. The objective of risk management is to reduce different risks related to a preselected domain to the level accepted by society. It may refer to numerous types of threats caused by environment, technology, humans, organizations and politics. Areas of risk management include: Enterprise risk management Risk management to project management
III.
Intellectual Property:
Intellectual property refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce. Intellectual property is divided into two categories: Industrial property, which includes inventions (patents), trademarks, industrial designs, and geographic indications of source; and Copyright, which includes literary and artistic works such as novels, poems and plays, films, musical works, artistic works such as drawings, paintings, photographs and sculptures, and architectural designs. Rights related to copyright include those of performing artists in their performances, producers of phonograms in their recordings, and those of broadcasters in their radio and television programs. The two branches of Intellectual Property:
Copyright:
Copyright relates to artistic creations, such as poems, novels, music, paintings, and cinematographic works. In most European languages other than English, copyright is known as authors rights. The expression copyright refers to the main act which, in respect of literary and artistic creations, may be made only by the author or with his authorization. That act is the making of copies of the literary or artistic work, such as a book, a painting, a sculpture, a photograph, or motion picture. The second expression, authors rights refers to the person whose the creator of the artistic work, its author, thus underlining the fact, recognized in most laws, that the author has certain specific rights in his creation, such as the right to prevent a distorted reproduction, which only he can exercise, whereas other rights, such as the right to make copies, can be exercised by other persons, for example, a publisher who has obtained a license to this effect from the author.
Industrial Property:
Industrial property shall be understood in the broadest sense and shall apply not only to industry and commerce proper, but likewise to agricultural and extractive industries and to
all manufactured or natural products, for example, wines, grain, tobacco leaf, fruit, cattle, minerals, mineral waters, beer, flowers, and flour. Industrial property takes a range of forms, the main types of which will be outlined in this booklet. These include patents to protect inventions; and industrial designs, which are aesthetic creations determining the appearance of industrial products. Industrial property also covers trademarks, service marks, layout-designs of integrated circuits, commercial names and designations, as well as geographical indications, and protection against unfair competition. In some of these, the aspect of intellectual creation, although existent, is less clearly defined. What counts here is that the object of industrial property typically consists of signs transmitting information, in particular to consumers, as regards products and services offered on the market. Protection is directed against unauthorized use of such signs likely to mislead consumers, and against mislead practices in general.
Patents, also referred to as patents for invention, are the most widespread means of protecting the rights of inventors. Simply put, a patent is the right granted to an inventor by a State, or by regional office acting for several States, which allows the inventor to exclude anyone else from commercially exploiting his invention for a limited period, generally 20 years. By granting an exclusive right, patents provide incentives to individuals, offering them recognition for their creativity and material reward for their marketable inventions. These incentives encourage innovation, which in turn contributes to the continuing enhancement of the quality of human life. In return for the exclusive right, the inventor must adequately disclose the patented invention to the public, so that others can gain the new knowledge and can further develop the technology. In order to obtain a patent for an invention, the inventor submits an application to the national or regional patent office. In the application the inventor must describe the invention in detail and compare it with previous existing technologies in the same field in order to demonstrate its newness. Not all inventions are patentable.
Conditions of patentability:
Industrial Applicability (utility). The invention must be of practical use, Or capable of some kind of industrial application. Novelty. It must show some new characteristic that is not known in the Body of existing knowledge in its technical field. Inventive step (non-obviousness). It must show an inventive step that could Not be deduced by a person with average knowledge of the technical field. Patentable subject matter. The invention must fall within the scope of Patentable subject matter as defined by national law. This varies from one Country to another.
V. Types Of Patents
There are two types of patents.
10
I.
Product Patent:
The creation of a new alloy is an example of a product invention.
II.
Process Patent:
The invention of a new method or process of making a Known or new alloy is a process invention.
Compulsory License:
A compulsory license is an authorization to exploit the invention given by a Governmental authority. It is generally issued only in very special cases, defined In the law, and only where the entity wishing to exploit the patented invention Is unable to obtain the authorization of the owner of the patent. The conditions regarding the granting of compulsory licenses are regulated in detail by laws that provide for them. The decision to grant a compulsory license must provide for an adequate remuneration of the patentee. The decision may be the subject of an appeal.
11
References
1. M.K. Badawy (1998), Technology Management Education: Alternative Models. California Management Review.
2. http://www.gartner.com/it/products/research/topi
cs/topics.jsp
3. http://www.wipo.int
12