Trade Secret Intellectual work or product belonging to business not in the

Trade secret intellectual work or product belonging

This preview shows page 21 - 24 out of 86 pages.

Trade Secret  Intellectual work or product belonging to business, not in the public domain ° Copyright  Statutory grant protecting intellectual property from being copied for the life of the author plus 70 years ° Patents  Grants creator of invention an exclusive monopoly on ideas behind invention for 20 years, Patent law grants a monopoly on underlying concepts and ideas of software, Originality, novelty and invention are key concepts ° Challenges to intellectual property ° Digital media from physical media  Ease of replication, Ease of transmissions, Ease of alteration, Compactness, Difficulties in establishing uniqueness ° Digital Millennium Copyright Act (DMCA)  Makes it illegal to circumvent technology-based protections of copyrighted materials. ° ° System Quality: Data Quality and System Errors ° What is an acceptable, technologically feasible level of system quality? ° Flawless software is economically unfeasible ° Three principal sources of poor system performance ° Software bugs, errors ° Hardware or facility failures ° Poor input data quality (most common source of business system failure) ° ° Computer-Related Liability Problems ° If software fails, who is responsible? ° If seen as part of a machine that injures or harms, software producer and operator may be liable ° If seen as similar to book, difficult to hold author/publisher responsible ° If seen as a service? Would this be similar to telephone systems not being liable for transmitted messages? ° ° Professional Code of Conduct ° Promises by professions to regulate themselves in the general interest of society ° Promulgated by associations of professionals ° American Medical Association (AMA) ° American Bar Association (ABA) ° Association for Computing Machinery (ACM) ° Canadian association (CMA, CBA)
Image of page 21
° ° Quality of Life: Equity, Access, Boundaries ° Negative social consequences of systems ° Balancing power center versus periphery ° Rapidity of Change  reduced response time to competition ° Maintaining Boundaries  Family, work, and leisure ° Dependence and vulnerability ° Computer crime and abuse  Spam, CAN-SPAM act of 2003 ° Employment  Trickle-down technology, Reengineering job loss ° Equity and access  The digital divide ° Health Risks  Repetitive stress injury (RSI), Carpal tunnel syndrome (CTS), Computer vision syndrome (CVS), Technostress ° Lecture 5 ° IT Infrastructure ° Set of physical devices and software required to operate an enterprise ° Set of firm-wide services including ° Computing platforms providing computing services ° Physical facilities management services ° IT management, education and other services ° “Service platform” perspective ° More accurate view of investments ° Connection between the firm, IT infrastructure and Business Capabilities ° ° ° ° ° Evolution of IT infrastructure
Image of page 22
° ° Stages of IT Infrastructure Evolution ° ° Pt2.
Image of page 23
Image of page 24

You've reached the end of your free preview.

Want to read all 86 pages?

  • Fall '12
  • AlecCram
  • Business, Computer network

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes